What CloudStackers Need To Know About LINSTOR/DRBDShapeBlue
Philipp explains the best performing Open Source software-defined storage software available to Apache CloudStack today. It consists of two well-concerted components. LINSTOR and DRBD. Each of them also has its independent use cases, where it is deployed alone. In this presentation, the combination of these two is examined. They form the control plane and the data plane of the SDS. We will touch on: Performance, scalability, hyper-convergence (data-locality for high IO performance), resiliency through data replication (synchronous within a site, 2-way, 3-way, or more), snapshots, backup (to S3), encryption at rest, deduplication, compression, placement policies (regarding failure domains), management CLI and webGUI, monitoring interface, self-healing (restoring redundancy after device/node failure), the federation of multiple sites (async mirroring and repeatedly snapshot difference shipping), QoS control (noisy neighbors limitation) and of course: complete integration with CloudStack for KVM guests. It is Open Source software following the Unix philosophy. Each component solves one task, made for maximal re-usability. The solution leverages the Linux kernel, LVM and/or ZFS, and many Open Source software libraries. Building on these giant Open Source foundations, not only saves LINBIT from re-inventing the wheels, it also empowers your day 2 operation teams since they are already familiar with these technologies.
Philipp Reisner is one of the founders and CEO of LINBIT in Vienna/Austria. He holds a Dipl.-Ing. (comparable to MSc) degree in computer science from Technical University in Vienna. His professional career has been dominated by developing DRBD, a storage replication software for Linux. While in the early years (2001) this was writing kernel code, today he leads a company of 30 employees with locations in Austria and the USA. LINBIT is an Open Source company offering enterprise-level support subscriptions for its Open Source technologies.
-----------------------------------------
CloudStack Collaboration Conference 2022 took place on 14th-16th November in Sofia, Bulgaria and virtually. The day saw a hybrid get-together of the global CloudStack community hosting 370 attendees. The event hosted 43 sessions from leading CloudStack experts, users and skilful engineers from the open-source world, which included: technical talks, user stories, new features and integrations presentations and more.
Integrando FreeBSD com Active Directory e OpenLDAPelliando dias
O documento discute a integração do FreeBSD com o Active Directory e OpenLDAP, incluindo o que é LDAP, como o OpenLDAP e Active Directory funcionam como serviços de diretório, e como projetos como nss_ldap, pam_ldap e SFU facilitam a integração através de mapeamento de objetos e arquivos de configuração.
Ceph Türkiye 7. Meetup Ankara: Ceph Temelleri ve CRUSH MAP YönetimiHuseyin Cotuk
Konu: Ceph Temelleri ve CRUSH Map Yönetimi
Sunum: Dr. Hüseyin ÇOTUK
İçerik: • Ceph Nedir?
• Ceph Bileşenleri
• CRUSH Map Nedir?
• CRUSH Map nasıl kişiselleştirilir?
• Karma diskler ile veri havuzu oluşturma
Vincent Van der Kussen discusses KVM and related virtualization tools. KVM is a kernel module that allows Linux to function as a hypervisor. It supports x86, PowerPC and s390 architectures. Key tools discussed include libvirt (the virtualization API), virsh (command line tool for libvirt), Qemu (runs virtual machines), and virt-tools like virt-install. The document provides an overview of using these tools to manage virtual machines and storage.
Edge computing has been gaining popularity as it defines a model that brings compute and storage closer to where they are consumed by the end-user. By being closer to the end-user a better experience can be provided with a reduction in overall latency, lower bandwidth requirements, lower TCO, more flexible hardware/software model, while also ensuring security and reliability. In this talk, Abhishek discusses aligning Apache CloudStack with this evolving cloud computing model and supporting Edge Zones, which can be also looked upon as lightweight zones, with minimal resources.
Abhishek Kumar is a committer of the Apache CloudStack project and has worked on the notable features such as VM ingestion, CloudStack Kubernetes Service, IPv6 support, etc. He works as a Software Engineer at ShapeBlue.
-----------------------------------------
CloudStack Collaboration Conference 2022 took place on 14th-16th November in Sofia, Bulgaria and virtually. The day saw a hybrid get-together of the global CloudStack community hosting 370 attendees. The event hosted 43 sessions from leading CloudStack experts, users and skilful engineers from the open-source world, which included: technical talks, user stories, new features and integrations presentations and more.
AIX 6.1 introduces several new security features including role-based access control (RBAC) which allows privileged tasks to be delegated to non-privileged users. It also includes an encrypted filesystem that encrypts data for protection and an updated security tool called AIX Security Expert for centralized security management. The document discusses these features and others such as the new secure by default installation option and systems director console.
The document discusses F5 Networks solutions for application delivery networking, including an overview of the F5 ADN and how it provides application acceleration, load balancing, security and other capabilities. Use cases are presented showing how the F5 ADN improves performance and user experience. Professional services and resources from F5 are also mentioned.
What CloudStackers Need To Know About LINSTOR/DRBDShapeBlue
Philipp explains the best performing Open Source software-defined storage software available to Apache CloudStack today. It consists of two well-concerted components. LINSTOR and DRBD. Each of them also has its independent use cases, where it is deployed alone. In this presentation, the combination of these two is examined. They form the control plane and the data plane of the SDS. We will touch on: Performance, scalability, hyper-convergence (data-locality for high IO performance), resiliency through data replication (synchronous within a site, 2-way, 3-way, or more), snapshots, backup (to S3), encryption at rest, deduplication, compression, placement policies (regarding failure domains), management CLI and webGUI, monitoring interface, self-healing (restoring redundancy after device/node failure), the federation of multiple sites (async mirroring and repeatedly snapshot difference shipping), QoS control (noisy neighbors limitation) and of course: complete integration with CloudStack for KVM guests. It is Open Source software following the Unix philosophy. Each component solves one task, made for maximal re-usability. The solution leverages the Linux kernel, LVM and/or ZFS, and many Open Source software libraries. Building on these giant Open Source foundations, not only saves LINBIT from re-inventing the wheels, it also empowers your day 2 operation teams since they are already familiar with these technologies.
Philipp Reisner is one of the founders and CEO of LINBIT in Vienna/Austria. He holds a Dipl.-Ing. (comparable to MSc) degree in computer science from Technical University in Vienna. His professional career has been dominated by developing DRBD, a storage replication software for Linux. While in the early years (2001) this was writing kernel code, today he leads a company of 30 employees with locations in Austria and the USA. LINBIT is an Open Source company offering enterprise-level support subscriptions for its Open Source technologies.
-----------------------------------------
CloudStack Collaboration Conference 2022 took place on 14th-16th November in Sofia, Bulgaria and virtually. The day saw a hybrid get-together of the global CloudStack community hosting 370 attendees. The event hosted 43 sessions from leading CloudStack experts, users and skilful engineers from the open-source world, which included: technical talks, user stories, new features and integrations presentations and more.
Integrando FreeBSD com Active Directory e OpenLDAPelliando dias
O documento discute a integração do FreeBSD com o Active Directory e OpenLDAP, incluindo o que é LDAP, como o OpenLDAP e Active Directory funcionam como serviços de diretório, e como projetos como nss_ldap, pam_ldap e SFU facilitam a integração através de mapeamento de objetos e arquivos de configuração.
Ceph Türkiye 7. Meetup Ankara: Ceph Temelleri ve CRUSH MAP YönetimiHuseyin Cotuk
Konu: Ceph Temelleri ve CRUSH Map Yönetimi
Sunum: Dr. Hüseyin ÇOTUK
İçerik: • Ceph Nedir?
• Ceph Bileşenleri
• CRUSH Map Nedir?
• CRUSH Map nasıl kişiselleştirilir?
• Karma diskler ile veri havuzu oluşturma
Vincent Van der Kussen discusses KVM and related virtualization tools. KVM is a kernel module that allows Linux to function as a hypervisor. It supports x86, PowerPC and s390 architectures. Key tools discussed include libvirt (the virtualization API), virsh (command line tool for libvirt), Qemu (runs virtual machines), and virt-tools like virt-install. The document provides an overview of using these tools to manage virtual machines and storage.
Edge computing has been gaining popularity as it defines a model that brings compute and storage closer to where they are consumed by the end-user. By being closer to the end-user a better experience can be provided with a reduction in overall latency, lower bandwidth requirements, lower TCO, more flexible hardware/software model, while also ensuring security and reliability. In this talk, Abhishek discusses aligning Apache CloudStack with this evolving cloud computing model and supporting Edge Zones, which can be also looked upon as lightweight zones, with minimal resources.
Abhishek Kumar is a committer of the Apache CloudStack project and has worked on the notable features such as VM ingestion, CloudStack Kubernetes Service, IPv6 support, etc. He works as a Software Engineer at ShapeBlue.
-----------------------------------------
CloudStack Collaboration Conference 2022 took place on 14th-16th November in Sofia, Bulgaria and virtually. The day saw a hybrid get-together of the global CloudStack community hosting 370 attendees. The event hosted 43 sessions from leading CloudStack experts, users and skilful engineers from the open-source world, which included: technical talks, user stories, new features and integrations presentations and more.
AIX 6.1 introduces several new security features including role-based access control (RBAC) which allows privileged tasks to be delegated to non-privileged users. It also includes an encrypted filesystem that encrypts data for protection and an updated security tool called AIX Security Expert for centralized security management. The document discusses these features and others such as the new secure by default installation option and systems director console.
The document discusses F5 Networks solutions for application delivery networking, including an overview of the F5 ADN and how it provides application acceleration, load balancing, security and other capabilities. Use cases are presented showing how the F5 ADN improves performance and user experience. Professional services and resources from F5 are also mentioned.
Windows Server 2022 is now in preview, the next release in our Long-Term Servicing Channel (LTSC), which will be generally available later this calendar year. It builds on Windows Server 2019, our fastest adopted Windows Server ever. This release includes advanced multi-layer security, hybrid capabilities with Azure, and a flexible platform to modernize applications with containers.
LibVirt and KVM provide virtualization capabilities on Linux systems. LibVirt uses a standardized API to manage different hypervisors like KVM. KVM allows running virtual machines at native speeds by using hardware virtualization extensions. It provides high density and portability compared to running systems directly on hardware. LibVirt handles tasks like networking, storage, and interfaces through tools like Virsh and Virt-Manager, and advanced topics include security with SELinux, bridged networking, and remote access.
Integrated Intrusion Detection Services for z/OS Communications Server zOSCommserver
This document discusses integrated intrusion detection services for z/OS Communications Server. It provides an overview of the intrusion detection system, describing the types of events it can detect including scans, attacks against the TCP/IP stack, and interface flooding. It also outlines the policy model and available actions for responding to detected intrusion events.
VM Autoscaling With CloudStack VR As Network ProviderShapeBlue
In this talk, Wei looks at the new VM autoscaling functionality in CloudStack (due for the 4.18 release) that gives VM autoscaling without relying on any external devices.
Wei Zhou is a committer and PMC member of Apache CloudStack project, and works for ShapeBlue as a Software Architect.
-----------------------------------------
CloudStack Collaboration Conference 2022 took place on 14th-16th November in Sofia, Bulgaria and virtually. The day saw a hybrid get-together of the global CloudStack community hosting 370 attendees. The event hosted 43 sessions from leading CloudStack experts, users and skilful engineers from the open-source world, which included: technical talks, user stories, new features and integrations presentations and more.
This document discusses eBay's architectural principles for scaling its large ecommerce site. It outlines four main strategies: (1) Partition everything by data, load, or usage to split problems into manageable chunks and allow independent scalability. (2) Use asynchronous processing wherever possible to improve scalability, availability, and latency. (3) Favor automated and adaptive systems over manual processes to reduce costs and improve functionality. (4) Design all systems to be failure-tolerant by assuming failure, rapidly detecting and recovering from failures, and degrading gracefully when necessary. Specific patterns for implementing each strategy across databases, applications, search, and other areas are also discussed.
The document discusses Avaya's messaging portfolio, including Communication Manager Messaging 6.0, Modular Messaging 5.2, and new features from developer partner Mutare. Communication Manager Messaging 6.0 is a powerful addition to Avaya Aura Communication Manager that provides voice and text messaging capabilities. Modular Messaging 5.2 is a unified messaging solution that addresses different customer needs and is available in single server or multi-server configurations. Mutare provides enhanced voice mail with speech-to-text transcription and message mirroring for geographic redundancy of the Avaya message store.
Troubleshooting & Debugging Production Microservices in Kubernetes as present...Baruch Sadogursky
Debugging applications in production is like being the detective in a crime movie. Especially with microservices. Especially with containers. Especially in the cloud. Trying to see what’s going on in a production deployment at scale is impossible without proper tools! Google has spent over a decade deploying containerized Java applications at unprecedented scale and the infrastructure and tools developed by Google have made it uniquely possible to manage, troubleshoot, and debug, at scale.
Join this session to see how you can diagnose and troubleshoot production issues w/ out of the box Kubernetes tools, as well as getting insight from the ecosystem with Weave Scope, JFrog Artifactory & Stackdriver tools.
The document provides best practices for Cisco Identity Services Engine (ISE) configurations. It discusses recommendations for wired and wireless dot1x configurations, redirected flows, upgrading to ISE 2.0, and configuring mobile device management (MDM) authorization policies across different ISE versions. Key recommendations include enabling radius server dead detection, using policy sets to optimize policy lookups, and configuring separate authorization policies for MDM redirection and registered devices.
Ceph is an open source distributed storage system that is highly scalable, self-managing, and provides multiple access methods including block, file, and object storage. It uses CRUSH to intelligently distribute data and replicas across clusters. Ceph Storage Clusters contain OSD, MON, and optionally MDS daemons. OSDs store data objects, MONs maintain cluster maps and state, and MDS provides metadata for CephFS. Ceph can be deployed with CloudStack to provide the backend storage for virtual machine volumes.
Zabbix: Uma ferramenta para Gerenciamento de ambientes de T.IAécio Pires
Zabbix é uma ferramenta Open Source e multiplataforma. Tem apenas uma versão que é considerada de classe Enterprise e gratuita, sendo utilizada para monitorar e gerenciar a disponibilidade e o desempenho de aplicações, ativos e serviços de rede. Nesta palestra serão apresentadas as características, funcionalidades, as novidades da última versão, os componentes do Zabbix e será feito um "passeio" pela interface web da ferramenta. Na palestra também será falado sobre o livro "De A a Zabbix", escrito por mim, Adail Spinola e André Déo, lançado em fevereiro/2015. O livro ensina a usar desde recursos básicos a avançados.
NSX for vSphere Logical Routing Deep DivePooja Patel
This document provides an overview of NSX logical routing capabilities including:
- NSX logical routing uses distributed logical routers that provide scalable tenant routing and security across ESXi hosts.
- NSX Edge services gateways provide connectivity between logical and physical networks and offer services like firewalls, VPN, and load balancing.
- NSX supports both active-standby and equal-cost multi-path high availability models for logical routers and edge gateways to ensure continuity of operations.
Data Power can be used as the first line of defense for RESTful APIs. It supports various authentication schemes including SSO cookie authentication, basic authentication using user ID and password, and JWT authentication. Data Power handles authentication by validating credentials against backend systems like LDAP. It also supports logging API transactions to Splunk for reporting and auditing purposes.
System Center Orchestrator 2012 OverviewAmit Gatenyo
System Center Orchestrator provides capabilities for integration, orchestration, and automation. It is part of the System Center suite and can help organizations achieve consistency, compliance, and remove manual tasks. Orchestrator allows authoring of runbooks to automate tasks across different systems through its integration with other Microsoft and third party products. It provides capabilities for IT professionals, operators, developers and business managers.
This document discusses upgrading a Windows Server 2003 domain to Windows Server 2008. It outlines the benefits of upgrading such as improved management, virtualization, security and Active Directory features in Windows Server 2008. It then covers the different upgrade options and provides steps for a smooth migration including preparing the Windows Server 2003 environment before installing Windows Server 2008. A demo of performing the domain upgrade process is shown. New features in Windows Server 2008 R2 are also briefly outlined.
Windows Server 2022 is now in preview, the next release in our Long-Term Servicing Channel (LTSC), which will be generally available later this calendar year. It builds on Windows Server 2019, our fastest adopted Windows Server ever. This release includes advanced multi-layer security, hybrid capabilities with Azure, and a flexible platform to modernize applications with containers.
LibVirt and KVM provide virtualization capabilities on Linux systems. LibVirt uses a standardized API to manage different hypervisors like KVM. KVM allows running virtual machines at native speeds by using hardware virtualization extensions. It provides high density and portability compared to running systems directly on hardware. LibVirt handles tasks like networking, storage, and interfaces through tools like Virsh and Virt-Manager, and advanced topics include security with SELinux, bridged networking, and remote access.
Integrated Intrusion Detection Services for z/OS Communications Server zOSCommserver
This document discusses integrated intrusion detection services for z/OS Communications Server. It provides an overview of the intrusion detection system, describing the types of events it can detect including scans, attacks against the TCP/IP stack, and interface flooding. It also outlines the policy model and available actions for responding to detected intrusion events.
VM Autoscaling With CloudStack VR As Network ProviderShapeBlue
In this talk, Wei looks at the new VM autoscaling functionality in CloudStack (due for the 4.18 release) that gives VM autoscaling without relying on any external devices.
Wei Zhou is a committer and PMC member of Apache CloudStack project, and works for ShapeBlue as a Software Architect.
-----------------------------------------
CloudStack Collaboration Conference 2022 took place on 14th-16th November in Sofia, Bulgaria and virtually. The day saw a hybrid get-together of the global CloudStack community hosting 370 attendees. The event hosted 43 sessions from leading CloudStack experts, users and skilful engineers from the open-source world, which included: technical talks, user stories, new features and integrations presentations and more.
This document discusses eBay's architectural principles for scaling its large ecommerce site. It outlines four main strategies: (1) Partition everything by data, load, or usage to split problems into manageable chunks and allow independent scalability. (2) Use asynchronous processing wherever possible to improve scalability, availability, and latency. (3) Favor automated and adaptive systems over manual processes to reduce costs and improve functionality. (4) Design all systems to be failure-tolerant by assuming failure, rapidly detecting and recovering from failures, and degrading gracefully when necessary. Specific patterns for implementing each strategy across databases, applications, search, and other areas are also discussed.
The document discusses Avaya's messaging portfolio, including Communication Manager Messaging 6.0, Modular Messaging 5.2, and new features from developer partner Mutare. Communication Manager Messaging 6.0 is a powerful addition to Avaya Aura Communication Manager that provides voice and text messaging capabilities. Modular Messaging 5.2 is a unified messaging solution that addresses different customer needs and is available in single server or multi-server configurations. Mutare provides enhanced voice mail with speech-to-text transcription and message mirroring for geographic redundancy of the Avaya message store.
Troubleshooting & Debugging Production Microservices in Kubernetes as present...Baruch Sadogursky
Debugging applications in production is like being the detective in a crime movie. Especially with microservices. Especially with containers. Especially in the cloud. Trying to see what’s going on in a production deployment at scale is impossible without proper tools! Google has spent over a decade deploying containerized Java applications at unprecedented scale and the infrastructure and tools developed by Google have made it uniquely possible to manage, troubleshoot, and debug, at scale.
Join this session to see how you can diagnose and troubleshoot production issues w/ out of the box Kubernetes tools, as well as getting insight from the ecosystem with Weave Scope, JFrog Artifactory & Stackdriver tools.
The document provides best practices for Cisco Identity Services Engine (ISE) configurations. It discusses recommendations for wired and wireless dot1x configurations, redirected flows, upgrading to ISE 2.0, and configuring mobile device management (MDM) authorization policies across different ISE versions. Key recommendations include enabling radius server dead detection, using policy sets to optimize policy lookups, and configuring separate authorization policies for MDM redirection and registered devices.
Ceph is an open source distributed storage system that is highly scalable, self-managing, and provides multiple access methods including block, file, and object storage. It uses CRUSH to intelligently distribute data and replicas across clusters. Ceph Storage Clusters contain OSD, MON, and optionally MDS daemons. OSDs store data objects, MONs maintain cluster maps and state, and MDS provides metadata for CephFS. Ceph can be deployed with CloudStack to provide the backend storage for virtual machine volumes.
Zabbix: Uma ferramenta para Gerenciamento de ambientes de T.IAécio Pires
Zabbix é uma ferramenta Open Source e multiplataforma. Tem apenas uma versão que é considerada de classe Enterprise e gratuita, sendo utilizada para monitorar e gerenciar a disponibilidade e o desempenho de aplicações, ativos e serviços de rede. Nesta palestra serão apresentadas as características, funcionalidades, as novidades da última versão, os componentes do Zabbix e será feito um "passeio" pela interface web da ferramenta. Na palestra também será falado sobre o livro "De A a Zabbix", escrito por mim, Adail Spinola e André Déo, lançado em fevereiro/2015. O livro ensina a usar desde recursos básicos a avançados.
NSX for vSphere Logical Routing Deep DivePooja Patel
This document provides an overview of NSX logical routing capabilities including:
- NSX logical routing uses distributed logical routers that provide scalable tenant routing and security across ESXi hosts.
- NSX Edge services gateways provide connectivity between logical and physical networks and offer services like firewalls, VPN, and load balancing.
- NSX supports both active-standby and equal-cost multi-path high availability models for logical routers and edge gateways to ensure continuity of operations.
Data Power can be used as the first line of defense for RESTful APIs. It supports various authentication schemes including SSO cookie authentication, basic authentication using user ID and password, and JWT authentication. Data Power handles authentication by validating credentials against backend systems like LDAP. It also supports logging API transactions to Splunk for reporting and auditing purposes.
System Center Orchestrator 2012 OverviewAmit Gatenyo
System Center Orchestrator provides capabilities for integration, orchestration, and automation. It is part of the System Center suite and can help organizations achieve consistency, compliance, and remove manual tasks. Orchestrator allows authoring of runbooks to automate tasks across different systems through its integration with other Microsoft and third party products. It provides capabilities for IT professionals, operators, developers and business managers.
This document discusses upgrading a Windows Server 2003 domain to Windows Server 2008. It outlines the benefits of upgrading such as improved management, virtualization, security and Active Directory features in Windows Server 2008. It then covers the different upgrade options and provides steps for a smooth migration including preparing the Windows Server 2003 environment before installing Windows Server 2008. A demo of performing the domain upgrade process is shown. New features in Windows Server 2008 R2 are also briefly outlined.
The document outlines the steps to install IBM Tivoli Identity Manager 5.1 which includes:
1. Installing WebSphere Application Server, DB2, Tivoli Directory Server, and Tivoli Directory Integrator
2. Configuring the installed products using the Middleware Configuration Tool
3. Installing maintenance fixes and patches for WebSphere Application Server and Tivoli Directory Server
Fantastic Slide on z-Operations Analytics Solution from IBMLuigi Tommaseo
IBM Netcool Operations Insight provides modern dashboards and full mobile access to visualize operations performance and health. It integrates out of the box with common systems and has analytics to increase the value of events. Its use resulted in a 98% reduction in critical events, a 30% reduction in events passed to operations in March 2015, almost a 50% reduction in repeating events, and a 90% reduction for known event classes, improving staff focus and utilization.
The document discusses implementing a business service management (BSM) system for monitoring infrastructure and business processes. Key points include:
- The goal is to monitor from both an operations and customer perspective, and measure business processes not just systems.
- A vision is described where all monitoring is centralized and events are automatically handled through ticket creation and prioritization.
- The approach involves starting with base monitoring, normalizing data, correlating events, refining data, automating tasks like ticket creation, and visualizing information.
This document provides an overview and summary of creating resource models and providers for IBM Tivoli Monitoring Version 5.1.1. It discusses the ITM architecture and how endpoints integrate with the ITM engine. It provides details on using the Workbench tool to create new resource models. The document also explores industry standard technologies that ITM uses and how it implements providers. Finally, it includes a practical example of engineering a Java ILT provider.
This document provides an integration guide for IBM Tivoli Netcool/OMNIbus, IBM Tivoli Network Manager, and IBM Tivoli Netcool Configuration Manager. It describes how to deploy these products together in a lab environment and integrate their data and user interfaces. Use cases for how the integrated system can be used for tasks like problem isolation, configuration rollback, and implementing new configuration standards are also presented.
IBM SmartCloud Orchestrator is a cloud management platform that provides:
1) An easy to use graphical interface for designing and managing cloud service automation workflows across different IT domains.
2) Integrations with other IBM products like SmartCloud Provisioning, Monitoring, and Cost Management to enable end-to-end service orchestration.
3) A marketplace for sharing and reusing cloud automation content from IBM, partners, and customers to accelerate cloud integrations and deployments.
1) The document introduces Jazz for Service Management, an open architecture from IBM designed to improve visibility, control, and automation through simplified integration of multi-vendor tools.
2) It provides top 5 reasons to check out the beta, including easily plugging in or swapping tools, integrating tools at a fraction of the time and cost, and developing integrations once and reusing many times.
3) The financial impact section estimates potential labor savings of $426,000 and revenue savings of $1,164,800 by simplifying integration and providing a cross-domain view compared to traditional approaches.
IBM Monitoring and Event Management SolutionsIBM Danmark
This document discusses IBM's monitoring and event management solutions including IBM Tivoli Monitoring, IBM Event Management, and IBM Business Service Management. It provides an agenda for the Nordic Pulse conference on May 28-29 including presentations on new technologies, IBM monitoring solutions, customer examples, and more. Specific topics covered include IBM Tivoli Monitoring dashboards, IBM SmartCloud Monitoring, IBM SmartCloud Application Performance Management, benefits of analytics, and solutions for monitoring workloads in cloud environments.
IBM Netcool Operations Insight combines proven Operations Management and Alarm consolidation capabilities with innovative analytics to help clients empower their IT operations staff to rapidly identify, isolate and resolve problems before they impact their company's business services
Ibm connections 5.0 installation step-by-step (windows and tds)Fuangwith Sopharath
This document provides step-by-step instructions for installing IBM Connections 5.0. It lists the required installation packages and provides detailed steps for preparing the environment, installing prerequisite software like IBM Installation Manager, DB2, Tivoli Directory Integrator and WebSphere Application Server, creating and configuring the database, federating LDAP, installing and configuring IBM Connections, and enabling SSL.
Active Directory is a database that stores information about a network's users, computers, groups, and other network resources. It allows for centralized management of these resources.
A domain controller is a server that responds to authentication requests on the Windows domain. It authenticates users' credentials when they log into the domain network.
Lightweight Directory Access Protocol (LDAP) is an open standard protocol that Active Directory supports to make user and resource information widely accessible for management and querying across the network.
- Windows Server 2008 R2 aims to provide regular and compatible server releases through an R2 update model, allowing for feature enhancements and adapting to changing industry needs.
- It focuses on compatibility while enabling the latest server technologies, and emphasizes scalability, virtualization, management improvements, and synergies with the Windows client platform.
- Key areas of focus include virtualization, management automation through PowerShell, support for new hardware, and addressing trends like multi-core systems and 64-bit computing.
Active Directory Introduction
Active Directory Basics
Components of Active Directory
Active Directory hierarchical structure.
Active Directory Database.
Flexible Single Master Operations (FSMO)Role
Active Directory Services.
Some useful Tool
This document discusses upgrading from Windows 2000 to Windows 2003. It outlines the benefits of upgrading such as improved security and new features. It provides guidance on preparing for the upgrade including taking inventories of clients, domains, and schemas. It describes using ADPrep to prepare the forest and domains. The document discusses post-installation tasks such as verifying the new domain controller and functional levels. It aims to provide best practices for a smooth upgrade process.
The document discusses HotLink DR Express, a disaster recovery solution that replicates virtual machines from an on-premises VMware environment to the Amazon Web Services (AWS) cloud. It provides recovery time objectives (RTO) of minutes and recovery point objectives (RPO) configurable from 15 minutes to 2 hours. The solution allows virtual machines to be recovered to AWS cloud infrastructure with minimal data loss in the event of an on-premises failure. It integrates with existing VMware environments and management consoles to configure replication and perform disaster recovery testing without impacting production systems. Pricing is based on actual AWS cloud usage during disaster recovery events rather than requiring dedicated recovery infrastructure.
Jacopo Nardiello - Monitoring Cloud-Native applications with Prometheus - Cod...Codemotion
We are going to talk about Prometheus and how to use to monitor micro-services "Cloud-Native" application s. We are going to dive deep into the Prometheus monitoring model, we will see what are the components be hind this system and how they integrate with each others to provide an efficient and modern monitoring sy stem. We will also have a glance on Prometheus native integrations for cloud-native environments such as Kubernetes.
UKOUG Tech15 - Deploying Oracle 12c Cloud Control in Maximum Availability Arc...Zahid Anwar (OCM)
Common Cloud Control deployments can sometimes be exposed to single points of failure. In this presentation we will be discussing these pitfalls and how, through deploying Cloud Control within the Maximum Availability Architecture can provide a robust system. Aimed at a technical audience - we will dive into giving High Availability and Disaster Recovery for the OMS repository and OMS Web Tier through the use of RAC, Web Tier Clustering, Data Guard and Storage Replication. We will take our audience through the simple but effective steps required for this type of deployment in addition to the license implications of using Maximum Availability Architecture including what Oracle give you for free under a restricted-use license. This presentation is based on a recent project completed by our speaker Zahid Anwar. This project saw Zahid provide Maximum Availability Architecture for Cloud Control which was monitoring 6, critical X4-2 Eighth Exadata Machines.
Solaris 10 and 11 Installation, Management and Monitoring made easy. Central Management Server with support for automated deployment of LDoms and Zones
This document provides a guide for setting up a class environment using virtual machines for training on Kaspersky Security for Virtualization 3.0 Light Agent. It describes setting up domain controllers, workstations, Hyper-V servers, and various virtual machines. Key steps include installing operating systems, configuring networking and domains, deploying virtual desktop infrastructure and Remote Desktop Services, and installing Kaspersky Security Center and Protection Servers. The goal is to replicate an ABC company network with all necessary infrastructure elements for demonstrations in the training labs.
Tackling your own database performance challenges is serious business. For a change of pace, let’s have some fun learning from other teams’ performance predicaments.
Join us for an interactive session where we dissect four specific database performance challenges faced by teams considering or using ScyllaDB. For each dilemma, we'll:
- Examine the context and technical requirements
- Talk about potential solutions and cover the pros and cons of each
- Disclose what approach the team took, and how it worked out
About the speaker:
Felipe is an IT specialist with years of experience on distributed systems and open-source technologies. He is one of the co-authors of "Database Performance at Scale", an Open Access, freely available publication for individuals interested on improving database performance. At ScyllaDB, he works as a Solution Architect.
This document describes a lab scenario with multiple Windows domains and VPN connections. There are three domains each with their own DNS and DHCP servers. Two member servers provide VPN access for connecting workstations to each domain. The document provides instructions for creating users on each domain controller and connecting two workstations to different domains via VPN.
The document discusses Cummins' plan to migrate its E-Business Suite instances to a new Exadata platform and upgrade to release 12.2. Key steps included exporting the databases using Export/Import, upgrading customizations to Oracle standards, and upgrading applications to 12.2. Downtime was minimized by preparing databases in advance and combining steps where possible. Challenges arose from sharing hardware resources between instances for the first time.
The weekly report provides updates on several projects and activities:
- Project planning for the DCIM and new backup system projects.
- Operational activities including datacenter cleaning and labeling, storage migrations, and backup failures.
- 74 open service tickets across networking, data center infrastructure, operations, and hybrid cloud.
- 1 open incident in data center infrastructure for the past week.
- 105 open service requests across networking and operations for the past week.
- Testing of the Veeam backup system proof of concept was completed successfully with backup and restore of a 100GB VM taking around 36 minutes.
This document provides instructions for setting up a TrinityCore private server on Linux. It discusses downloading and compiling TrinityCore source code, configuring the required MySQL databases, and basic server configuration. Key steps include installing prerequisites like build tools and libraries, cloning the TrinityCore source repository, running cmake to configure the build, importing SQL files to set up the auth, characters, and world databases, and editing the realmlist table to point clients to the server.
What we unlearned_and_learned_by_moving_from_m9000_to_ssc_ukoug2014Philippe Fierens
The document discusses moving databases from 3 Oracle M9000 servers to a new Oracle SPARC SuperCluster (SSC) system. It describes the key phases of the project including lifting and shifting the databases from the M9000s to application domains on the SSC, making use of the SSC's integrated storage cells, upgrading databases from Oracle 9i and 10g to 11g, and consolidating databases. It also covers issues encountered such as performance problems after the initial migration and regressions encountered during patching cycles. The document provides details on configuring features on the SSC like RAC One Node, Data Guard, and database resource management.
The document discusses new features in Informix 11.70, including:
- Table and storage space defragmentation tools to improve performance.
- Enhancements to storage space administration through utilities to generate schemas and commands.
- Tools for deploying and embedding Informix instances through the Deployment Assistant and Utility.
- Increased usability through features like automatic DBA procedures, table location, and event alarms.
Informix User Group France - 30/11/2010 - Fonctionalités IDS 11.7Nicolas Desachy
Informix 11.70 includes several new features to improve administration, performance, and availability. Key features include:
1) A table defragmenter (OLTR) that can reorganize tables online with no downtime.
2) Enhancements to storage provisioning and the ability to generate schemas for dbspaces, chunks, and logs.
3) An embeddability toolkit including a deployment assistant and utility to rapidly deploy packaged Informix instances.
4) Performance improvements such as forest of trees indexing, multi-index scans, and fragment-level statistics.
An introduction about DRLM (Disaster Recovery Linux Manager) features, news and a complete workshop on DR management with ReaR and DRLM.
DRLM Project Intro: will explain the following items:
- What is DRLM ?
- DRLM Short History
- DRLM Features
- News on version 2.1.0
- How to contribute ?
Workshop: will provide the opportunity to dig into topics relevant to real DR needs and to get your questions/doubts answered
- How to set up DRLM
- DRLM Operations (manage networks, clients, backups, jobs, import/export dr images)
- Best Practices
- Questions & Answers
Workshop instructions: https://github.com/brainupdaters/fosdem17_workshop
The document discusses migrating a Novell GroupWise environment from Netware to Linux. It provides an overview of both manual and wizard-guided migration approaches. The manual process involves installing agents, copying data, and configuring the agents on the Linux server. The wizard aims to simplify the process but provides less control. Key steps covered include pre-migration planning, post office and domain migration, and post-migration configuration changes.
This document provides an overview of DNS configuration and troubleshooting on BIG-IP systems. It includes:
1. A sample DNS zone file configuration with resource records for domains, name servers, mail servers, and hosts.
2. An introduction to BIG-IP DNS and how it can load balance DNS queries across datacenters using wide IPs, pools, and listeners.
3. Instructions for troubleshooting DNS resolution and iQuery communication between BIG-IP systems in the same sync group.
- The document describes tasks to configure a network domain including Active Directory, DNS, DHCP, file shares, and websites. It involves setting up domain controllers, a certification authority, file servers, firewall, and virtualized web and application servers. The goal is to provide secure internal and external access to resources for users and clients on the intranet and internet.
Similar to Upgrading AD from Windows Server 2003 to Windows Server 2008 R2 (20)
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
Microsoft has a history of providing rich IT-infrastructure solutions to help manage every aspect of enterprise operations. Microsoft’s people-centric solution consists of products and technologies that can help IT departments handle the influx of consumer-oriented technology and the work style expectations of users, thereby helping increase productivity and satisfaction for the people within their organizations.
Microsoft’s people-centric IT vision helps organizations enable and embrace the consumerization of IT by:
1. Enabling your end users by allowing users to work on the device(s) of their choice and providing consistent access to corporate resources from those devices.
2. Helping protect your data by protecting corporate information and managing risk.
3. Unifying your environment by delivering comprehensive application and device management from both your existing on-premises infrastructure, including System Center Configuration Manager, Windows Server, and Active Directory, as well as cloud-based services, including Windows Intune and Windows Azure.
Let’s discuss each of these areas in more detail.
ענן פרטי וענן ציבורי: לא שני עולמות מתחרים אלא שני מימדים לאותו העולםAmit Gatenyo
ענן פרטי או ענן ציבורי – איזה מהם מהווה את האופציה החכמה, הכדאית והזולה ביותר? הוויכוח החם שמתקיים כיום בתעשייה סביב שאלה זאת מפספס את המהות האמיתית. אלו לא שני עולמות מתחרים, אלא שני מימדים לאותו העולם.
למעשה, ארגונים לא צריכים להחליט בין ענן ציבורי לפרטי, אלא לעמוד על השאלה כיצד השילוב בין השניים ישרת את העסק שלהם בצורה הטובה ביותר. המטרה הינה לשלב On-Premises עם Off-Premises לכדי סביבה אחת אשר מנוהלת כסביבה אחת - זהו החזון אשר בסופו של דבר יאומץ על ידי רוב הארגונים.
בהרצאה זאת עמית גטניו יפרט מדוע עננים ציבוריים חייבים לווייני On-Premises כדי לנצח ויסביר מדוע סביבות ה-On-Premises לא מסוגלות להיות באמת חזקות ללא חיבור לענן ציבורי.
This document discusses hybrid cloud deployment and its capabilities. A hybrid cloud combines private and public clouds where some workloads run in the private cloud and others in the public cloud. It allows organizations to scale workloads at a reduced total cost of ownership while maintaining control over sensitive data and applications on private infrastructure. Key capabilities of hybrid cloud include handling variable demand, quickly provisioning resources, optimizing data centers, and enabling new application development.
RemoteFX delivers a consistently rich user experience over LAN or WAN by using hardware and software GPUs. It provides features like rich multimedia, USB redirection, and multi-touch. RemoteFX works well even with limited bandwidth, latency, packet loss, and uses technologies like WAN acceleration and single sign-on. It has adaptive graphics, media streaming, USB redirection, and supports sessions, VMs, and physical machines with a choice of software or physical GPUs.
Asset Management & Service Manager 2012Amit Gatenyo
IT asset management (ITAM) is the set of business practices that combines financial, contractual and inventory functions to support the life cycle and strategic decision making for all IT software and hardware assets in a business. A new process management pack for Microsoft System Center Service Manager allows organizations to implement ITAM practices for their IT assets.
The document provides information about an upcoming Infrastructure & Management User Group event including registration links and updates. It then discusses how Windows Server 2012 can help optimize hybrid IT environments through features like private and public cloud support, first-party applications, cost optimization, and regulatory compliance. Specific capabilities of Windows Server 2012 that improve scalability for virtual machines, hosts, and clusters are listed. The document concludes by comparing Hyper-V and VMware scaling and features like guest clustering, disaster recovery, networking, storage, and live migration.
Hyper-V Best Practices & Tips and TricksAmit Gatenyo
This document discusses best practices for configuring Hyper-V hosts and virtual machines. It recommends:
- Using Server Core installation and dedicating hosts to the Hyper-V role for improved security and reliability.
- Properly sizing host CPUs, memory, and storage and separating networks for management, storage, and VMs.
- Configuring virtual machines with fixed VHDs, proper RAM and network settings, and latest integration components.
- Implementing security practices like regular patching of VMs and limiting processor usage to prevent overcommitment.
- Using VSS-aware backups and excluding unnecessary files/folders from antivirus scans to optimize performance.
Getting the most out of RDS (Terminal Services)Amit Gatenyo
This document contains contact information for Amit Gatenyo, the Infrastructure & Security Manager at Dario, who works with Microsoft on Windows Server management. It also includes information on Remote Desktop Services features like RemoteApp and Desktop, RemoteFX, and optimizations for different device types and network conditions. Remote Desktop Services provides a full-fidelity remote experience for users on any device while improving productivity and supporting rich media content. Features like RemoteFX adaptive graphics and USB redirection allow a choice of software or physical GPU for virtual machines.
IaaS stands for Infrastructure as a Service. This document discusses Microsoft's System Center 2012 suite, which provides tools for IaaS. It allows self-service provisioning of virtual machines across private and public clouds. It also provides monitoring, backup/recovery, and automation capabilities for infrastructure management and service delivery. The System Center tools work together to provide a unified platform for managing physical and virtual infrastructure from a single console.
The document discusses new features in System Center Operations Manager (SCOM) 2012 and System Center Configuration Manager (SCCM) 2012. For SCOM 2012, it highlights improvements to topology simplification, expanded network and application monitoring capabilities, and enhanced dashboards. For SCCM 2012, it outlines the new console design, improved tools for managing application lifecycles, client health monitoring, and expanded device management and software update functions.
System Center Configuration Manager 2012 OverviewAmit Gatenyo
System Center Configuration Manager 2012 focuses on user-centric client management through empowering users, controlling systems, and unifying infrastructure. Key features include improved client health monitoring, settings management across different platforms, support for mobile device management, cross-platform management of Linux and UNIX servers, enhanced software update capabilities, and modernized infrastructure.
System Center Data Protection Manager 2012 OverviewAmit Gatenyo
This document discusses new features in Data Protection Manager (DPM) 2012, including a centralized management console, enhanced workload protection such as for SharePoint and Hyper-V, and improved integration with System Center and ticketing systems. Key enhancements are a single console for managing backups across an enterprise, role-based access control, certificate-based authentication, smarter media colocation, and support for generic data sources and item-level recovery of additional workloads like SharePoint. DPM 2012 aims to reduce management costs and integrate better with existing environments and systems.
RemoteFX - Rich End User Experience for VDI and Remote DesktopsAmit Gatenyo
RemoteFX provides a rich user experience for virtual desktops and remote desktop sessions. It allows full fidelity rendering of graphics and media on both low-cost and advanced client devices. RemoteFX uses hardware-accelerated graphics processing and advanced codecs to deliver a local-like experience remotely. It is compatible with VDI, session-based desktops, and supports host- or client-side rendering depending on configuration and network conditions. RemoteFX improves user productivity by enabling access to any screen content from any device anywhere.
System Center Datacenter Cloud Management Vision & RoadmapAmit Gatenyo
This document outlines Microsoft's vision and roadmap for System Center Cloud and Datacenter Management. It discusses increasing pressures on IT from business users to provide services faster, cheaper, and more scalable. Microsoft is committed to bringing its experience from public clouds like Windows Azure to help customers build and manage private clouds. The future roadmap focuses on delivering common management experiences across private and public clouds through features like self-service provisioning, delegation and control, and application visibility. Key components will include capabilities for infrastructure and application management, automation, and integration across System Center products and clouds.
This document provides an overview of System Center 2012. It discusses the key components of System Center 2012 including Virtual Machine Manager, Server Application Virtualization, System Center "Concero", Configuration Manager, Operations Manager, Orchestrator, Service Manager, and Data Protection Manager. It highlights new features and investment areas for each component and provides a roadmap for future releases. The presentation includes a demo of Virtual Machine Manager and discusses how System Center 2012 can help organizations move to a private cloud model and gain benefits like agility, automation, and focus on applications and services.
System Center Service Manager 2012 OverviewAmit Gatenyo
1. Service Manager 2012 focuses on enabling IT as a Service objectives like automation, reducing costs, increasing service levels, and providing more transparency.
2. It utilizes configuration management, integration, and a centralized data storage to enable controlled automation.
3. A self-service portal allows for role-based access and requests to be filled, further enabling standardization and compliance.
4. Additional functionality comes from integration with tools like System Center Orchestrator, Virtual Machine Manager, and the data warehouse for reporting.
System Center Virtual Machine Manager 2012 - Whats NewAmit Gatenyo
System Center Virtual Machine Manager (VMM) 2012 enables building private clouds and federating them to public clouds. VMM 2012 focuses on fabric management, services, cloud deployment, and fabric management. It allows highly automated management of Hyper-V, storage, networks, and other infrastructure. VMM 2012 also supports building private clouds with capabilities like self-service user roles, quotas, and templates to model multi-tier applications. Additionally, a product called Concero allows extending private clouds built with VMM 2012 into the public Azure cloud for a hybrid approach.
The document discusses Microsoft's private cloud computing roadmap. It defines cloud computing and outlines Microsoft's offerings including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It describes the evolution from traditional datacenters to virtualized datacenters to private and public clouds. It highlights key aspects of private clouds like application packaging, monitoring, and automation. It also discusses System Center 2012 and how it can help manage private and public clouds with common tools and deliver applications as a service.
System Center Operations Manager 2012 OverviewAmit Gatenyo
System Center Operations Manager 2012 includes several new features such as expanded application and network monitoring, simplified management server topology, and improved dashboards and visualizations. It allows monitoring of additional applications like Java EE and expands network monitoring capabilities. The new release also includes System Center Advisor which analyzes server configuration and performance data to provide recommendations to improve issues before they cause outages.
Windows Server 2008 R2 & SP1 for IT Pro'sAmit Gatenyo
This document summarizes key features and capabilities of Windows Server 2008 R2 including its release cadence, editions, enterprise scenarios, upgrade reasons, technology investment areas, virtualization features like Hyper-V and Remote Desktop Services (RDS), and new capabilities in R2 SP1 like Dynamic Memory and RemoteFX. It provides an overview of server and presentation virtualization solutions available in Windows Server 2008 R2.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
3. Why Upgrade your servers
In relation to Active Directory:
- RODC
- Server Core
- AD Snapshots (ntdsutil.exe, dsamain.exe)
- DS Auditing (auditpol.exe)
- Restartable AD service
- Administrative Center
- PowerShell Cmdlts
- AD Best Practice Analyzer
- Protect from accidental deletion
- GPO benefits
- Support lifecycle
4. Why Upgrade your DCs
Windows 2008 Domain Windows 2008 R2
Function Level Domain Function Level
- Authentication mechanism
- DFSR replication of Sysvol
assurance
(dfsrmig.exe)
for AD-FS
- Advanced Encryption Services (AES
- Managed Service Accounts
128 and 256) for Kerberos
(MSA)
- Last Interactive Logon Information
- Fine-Grained Password Policy Windows 2008 R2 Forest
- Personal Virtual Desktops Function Level
- Offline Domain Join (djoin.exe)
- AD Recycle Bin
5. Plan
What are the upgrade goals?
Map existing resources
What other roles do DCs perform?
Map the risks
Can you consolidate?
Can you virtualize?
Should you virtualize?
Plan for rollback
6. Identify potential issues
This is mostly because DES encryption types for the
Kerberos authentication protocol are disabled by default in
Windows Server 2008/R2.
– SAP
– Oracle Internet Directory (OID), CA Identity Manager,
Tivoli Identity Management
– Samba and other Linux/Unix interoperability
– NetApp, EMC Celera or other storage devices
– Firewalls, VPN, RADIUS
– http://support.microsoft.com/kb/977321
7. Identify potential issues
Additional considerations:
– Terminal Server License Server on a DC
– CA on a DC
– Smart Cards
– Customized password filters
– Time keeping software
– 3rd-party apps that are hard coded to work against
specific DCs
– Exchange servers with manual DC configuration
8. Test
- The bigger and more complex you are, the more you
need to test before you act.
- Consider regulations and standards (such as Change
Management procedures)
- Test environment needs to be as close to production as
possible.
- Test and production need to be totally isolated from each
other.
9. Backup
Make sure you have a recent, supported and working
backup:
- System State
- Boot Partition
- System Partition
- All GPOs (by using GPMC)
- Scripts etc.
Do NOT use a VM snapshot as backup!
10. Backup
As an extra security measure:
- Consider disconnecting one DC in addition to
backing up.
- Consider disabling outbound replication on the
Schema Master DC during the Schema upgrade.
repadmin /options <server_name>
+/-disable_outbound_repl
11. Backup
What's the tombstone lifetime (TSL)?
- Default up to Windows Server 2003 R2 = 60 days,
for later = 180 days
- If Forest is upgraded, TSL is not automatically
changed
dsquery * “cn=directory service,cn=windows
nt,cn=services,cn=configuration,dc=contoso,
dc=com” –scope base –attr tombstonelifetime
12. Permissions
Make sure the user you're working with is a
member of:
- Domain Admins
- Enterprise Admins
- Schema Admins
13. Previous Operating Systems
Make sure DFL and FFL are Windows 2000 Native
or above.
If they exist, all Windows 2000 DCs must be running
SP4.
- Issues with Win9X/NT4.0 client computers:
http://support.microsoft.com/kb/555038
http://support.microsoft.com/kb/946405
http://support.microsoft.com/kb/942564
- Issues with External Trusts to NT4.0 domains:
http://support.microsoft.com/kb/2021766
14. Domain and Forest
Check the overall health of the existing AD:
– Replication
– DNS
– Events
– Logs
Find FSMO holders:
– netdom query fsmo
Consider temporarily disabling AV on the DCs.
15. Execute – Schema upgrade
Schema upgrade is a one-way process!
- Needs to run once per forest.
- On the existing Schema Master, insert the
Windows Server 2008 R2 media, go to
x:supportadprep:
adprep.exe /forestprep
or
adprep32.exe /forestprep
- When finished, wait for replication.
16. Verify – Schema upgrade
- Check version:
dsquery * “cn=ActiveDirectoryUpdate,
cn=ForestUpdates,cn=configuration,dc=contoso,
dc=com” -scope base -attr revision
(should be 5 for 2008 R2)
dsquery * “cn=schema,cn=configuration,dc=contoso,
dc=com” -scope base -attr objectversion
(should be 47 for 2008 R2)
- Verify replication
repadmin /replsum /bysrc /bydest /sort:delta
17. Execute – Domain preparation
- Needs to run once for each to-be upgraded
domain in the forest.
- On the existing Infrastructure Master:
adprep.exe /domainprep (/gpprep)
or
adprep32.exe /domainprep (/gpprep)
18. Verify – Domain preparation
- Check version:
dsquery * “cn=ActiveDirectoryUpdate,cn=DomainUpdates,
cn=system,dc=contoso,dc=com” -scope base -attr revision
(should be 5 for 2008 R2)
19. Execute – RODC preparation
- Only needs to run once per forest, but needs to
be able to connect to all Infrastructure Masters in all
the domains in the forest.
- On any existing DC:
adprep.exe /rodcprep
or
adprep32.exe /rodcprep
http://support.microsoft.com/kb/949257
20. Verify – RODC preparation
Check version:
dsquery * “cn=ActivedirectoryRodcUpdate,
cn=ForestUpdates,cn=configuration,
dc=contoso,dc=com” -scope base -attr revision
(should be 2)
22. Action
- Promote the first Windows Server 2008 R2 DC.
- Move relevant roles
– DHCP
– DNS
– WINS
- Transfer FSMO
- If needed, point relevant applications to new DC.
23. Names and IP addresses
Is it simpler to
1. New DCs, new
keep the old DC’s Simplest
names, new IPs
name and/or IP
address?
2. New DCs, new Medium
Possible options: names, old IPs complexity
3. New DCs, old May be more
names, old IPs complex
24. New DCs, old names and IPs
Option 1: Problems:
- Demote old DC - What do you do with the
Give name and IP to the FSMO roles and other roles
new server on the old DC?
- Promote new server to - DNS, DHCP etc. may not
DC (+GC) function for a while.
25. New DCs, old names and IPs
Option 2:
- Give new server a temp. name and temp. IP
- Promote new server to DC (+GC)
- Move DNS, DHCP etc.
,
- Rename old DC to alt. name and assign alt. IP
- Rename new DC to old name, assign old IP
- Transfer FSMO
- Demote old DC (you may want to wait a few days)
To rename a DC – you must use netdom.exe
26. Check everything is ok
Always wait for KCC (15-30 minutes).
If replication topology is complex – wait for
replication for as long as it takes.
Before you demote old DC, make sure new DC is
functioning:
- Check replication
- Check SYSVOL
- Check events
27. Time synchronization
PDC Emulator of the Forest Root
Domain is responsible for time
Servers and
keeping.
workstations pull
If not properly configured – Event ID 12
(W32Time).
from DCs.
http://support.microsoft.com/kb/816042
PDC Emulators of
other domains in forest Never pull time
pull time from FRD DCs pull time from host if using
PDCE. from PDCEs. virtualization!
28. Time synchronization
- Configuration for FRD PDCE:
w32tm /config /update /manualpeerlist:"timeserver.iix.net.il"
/syncfromflags:manual
net stop w32time && net start w32time
w32tm /resync
- Check HKLM/SYS/CCS/Services/W32Time/Config >
AnnounceFlags = 10 (Decimal)
- If you get an error, check that UDP port 123 is open
through the FW:
portqry -n timeserver.iix.net.il -e 123 -p udp
29. Some additional tips
- Never clone a DC operating system!
- Remember Windows Server 2008 R2
issues a random computer name by default
- Do NOT disable IPv6
http://support.microsoft.com/kb/929852
- Configure Windows Update
- Secure the server(s)
30. Some additional tips
- Configure Anti-Virus exclusions
http://support.microsoft.com/kb/822158
- Configure backups
- Do not use snapshots for virtual DCs
- Do not pause/resume virtual DCs
- If on VMs, exclude DCs from Live
Migration or vMotion
31. Removing old DCs
Take your time If demoting is
to test. If all = ok, demote unsuccessful –
old DCs one by one consider forcing
(dcpromo.exe). (/forceremoval)
Consider shutting
down old DC(s) for If demoting was unsuccessful – you must
a few days (the clean AD from old DC remains
“who did it???!” (ntdsutil.exe)
effect). http://support.microsoft.com/kb/216498
32. Raising DFL and FFL
Domain Function Level:
- Active Directory Users and Computers
Check version:
dsquery * “dc=contoso,dc=com” -scope base -attr msDS-Behavior-Version
(should be 2 for 2003, 4 for 2008 R2)
Forest Function Level:
- Active Directory Domains and Trusts
Check version:
dsquery * “cn=partitions,cn=configuration,dc=contoso,dc=com” -scope base
-attr msDS-Behavior-Version
(should be 2 for 2003, 4 for 2008 R2)
33. Demo
- Adding the first Windows Server 2008 R2 DC.
- Removing the old Windows Server 2003 DC.
- Raising DFL/FFL.
34. Conclusion
Upgrading your
AD to Windows
Server 2008 R2 is Plan and test
important even if before you move.
you do not plan
to use any of the
benefits.
Upgrading is not Verify and clean More sessions on
rocket science. after you move. AD will follow…