VMworld 2013
Anthony Davis, VMware
Bruce Perram, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Application Virtualization, University of New HampshireTony Austwick
Presentation to EDUCAUSE, NERCOMP by David Blezzard from University of New Hampshire.
More here http://www.educause.edu/nercomp-annual-conference/2016/2016/streamlining-application-deployment-and-management-through-virtualization
We will report how using the Application Jukebox application virtualization solution at the University of New Hampshire has saved time and simplified management of public and department-specific computer labs and our VDI environment. Traditionally, we used a combination of imaging and then various scripted deployments to install applications. With application virtualization, we have been able to move over a hundred Windows applications into virtual packages that can be "installed" by users on demand. We will discuss the general problem of managing large numbers of complex applications across a range of computer environments while also trying to be flexible and responsive to users.
Outcomes: Understand how application virtualization can overcome issues with deploying software * Appreciate the capabilities of Application Jukebox to be able to assess its utility to your campus * Obtain a model for evaluating a tool's potential savings
No BS, Vendor Neutral Comparison of Application Layering SolutionsUnidesk Corporation
Application layering is quickly becoming the standard for application packaging and lifecycle management. As this innovative technology has become mainstream, many vendors are bringing layering solutions to market. EUC Expert, Ron Oglesby cuts through the marketing BS to provide a vendor-neutral overview of Citrix AppDisk, FSLogix, Liquidware Labs FlexApp, Unidesk, and VMware App Volumes. Ron worked directly with experts in each of the products including third-party consultants, founders, CTOs, and product managers to develop the content for this session.
OUTLINE:
- What is uberSVN
- Download and installation
- Major features
- Adding repositories
- Adding users and groups
- Demonstration of main features
Move Enterprise Applications WS2003 to WS2008 (6.19.2012)AppZero Inc
Appzero at a glance
On boarding existing apps
Market context
Migration options
New in AppZero 5.2
Feature focus: moving apps to latest OS
Demo
Summary and Q&A
Forrester Research on Globally Distributed Development Using SubversionWANdisco Plc
On December 3, 2009, Jeffrey Hammond, Senior Analyst at Forrester Research presented the findings of a WANdisco customer using Subversion MultiSite. Mr. Hammond and members of Forrester Research's consulting team will explain the reasons behind Subversion's rapid ascent to the leadership position in the SCM space, and discuss the findings of the TEI study.
The subject of the study was a Global Fortune 500 company in the semiconductor industry using Subversion MultiSite at locations in the United States and Asia.
Forrester found significant benefits and cost savings in a broad range of areas due to Subversion MultiSite's ability to provide remote users with real-time access to Subversion repositories and eliminate downtime.
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit SydneyAmazon Web Services
Containers accelerate development. They address the very real challenge of application packaging and delivery. Thanks to containers, teams can quickly and reliably deploy their applications in a variety of environments. But solutions always come with a cost. Containers simplify the developer experience by pushing complexity down into the infrastructure. This shift requires a change in the security approach in order to preserve the advantages containers bring. In this talk, we'll use practical examples to understand the security strategy and tactics you need to continue to accelerate development while meeting your security goals no matter where you're deploying containers.
Application Virtualization, University of New HampshireTony Austwick
Presentation to EDUCAUSE, NERCOMP by David Blezzard from University of New Hampshire.
More here http://www.educause.edu/nercomp-annual-conference/2016/2016/streamlining-application-deployment-and-management-through-virtualization
We will report how using the Application Jukebox application virtualization solution at the University of New Hampshire has saved time and simplified management of public and department-specific computer labs and our VDI environment. Traditionally, we used a combination of imaging and then various scripted deployments to install applications. With application virtualization, we have been able to move over a hundred Windows applications into virtual packages that can be "installed" by users on demand. We will discuss the general problem of managing large numbers of complex applications across a range of computer environments while also trying to be flexible and responsive to users.
Outcomes: Understand how application virtualization can overcome issues with deploying software * Appreciate the capabilities of Application Jukebox to be able to assess its utility to your campus * Obtain a model for evaluating a tool's potential savings
No BS, Vendor Neutral Comparison of Application Layering SolutionsUnidesk Corporation
Application layering is quickly becoming the standard for application packaging and lifecycle management. As this innovative technology has become mainstream, many vendors are bringing layering solutions to market. EUC Expert, Ron Oglesby cuts through the marketing BS to provide a vendor-neutral overview of Citrix AppDisk, FSLogix, Liquidware Labs FlexApp, Unidesk, and VMware App Volumes. Ron worked directly with experts in each of the products including third-party consultants, founders, CTOs, and product managers to develop the content for this session.
OUTLINE:
- What is uberSVN
- Download and installation
- Major features
- Adding repositories
- Adding users and groups
- Demonstration of main features
Move Enterprise Applications WS2003 to WS2008 (6.19.2012)AppZero Inc
Appzero at a glance
On boarding existing apps
Market context
Migration options
New in AppZero 5.2
Feature focus: moving apps to latest OS
Demo
Summary and Q&A
Forrester Research on Globally Distributed Development Using SubversionWANdisco Plc
On December 3, 2009, Jeffrey Hammond, Senior Analyst at Forrester Research presented the findings of a WANdisco customer using Subversion MultiSite. Mr. Hammond and members of Forrester Research's consulting team will explain the reasons behind Subversion's rapid ascent to the leadership position in the SCM space, and discuss the findings of the TEI study.
The subject of the study was a Global Fortune 500 company in the semiconductor industry using Subversion MultiSite at locations in the United States and Asia.
Forrester found significant benefits and cost savings in a broad range of areas due to Subversion MultiSite's ability to provide remote users with real-time access to Subversion repositories and eliminate downtime.
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit SydneyAmazon Web Services
Containers accelerate development. They address the very real challenge of application packaging and delivery. Thanks to containers, teams can quickly and reliably deploy their applications in a variety of environments. But solutions always come with a cost. Containers simplify the developer experience by pushing complexity down into the infrastructure. This shift requires a change in the security approach in order to preserve the advantages containers bring. In this talk, we'll use practical examples to understand the security strategy and tactics you need to continue to accelerate development while meeting your security goals no matter where you're deploying containers.
RightScale User Conference NYC 2011 -
Raphael Simon - Senior Systems Architect, RightScale
Shivan Bindal - Product Manager, RightScale
Deploying Windows-based applications in the cloud has historically been challenging because the available machine images were often inconsistent across regions/clouds and they lacked simple remote control. Add in the inflexibility that comes with pre-baked application stacks along with a lack of consistent automation, and you have the recipe for a sudden onset migraine. With RightScale ServerTemplates™, you can dynamically configure, launch, and manage your Windows software stacks in the cloud. We'll showcase a proven setup for a scalable, production .NET web application and present a live demo in which we'll use ServerTemplates with built-in Microsoft best practices to launch a SQL Server-based web application.
Fabian Stäber, Instana -
In recent years, we saw a great paradigm shift in software engineering away from static monolithic applications towards dynamic distributed horizontally scalable architectures. Docker is one of the key technologies enabling this development. This shift poses a lot of new challenges for application monitoring, ranging from practical issues (need for automation) to technical challenges (Docker networking) to organizational topics (blurring line between software engineers and operations) to fundamental questions (define what is an application). In this talk we show how Docker changed the way we do monitoring, how modern application monitoring systems work, and what future developments we expect.
VMworld 2013: ThinApp 101 and What's New in ThinApp Next VersionVMworld
VMworld 2013
Peter Björk, VMware
Tina de Benedictis, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyBlack Duck by Synopsys
According to SAP 85% of cybersecurity attacks target the application layer. To be successful in defending against these attacks you need to use a variety of tools. In session we'll go into the various types application security tools and approaches, including SAST, DAST, RASP, PEN, as well as Open Source Vulnerability Management. We'll help you understand the differences between these tools and help you develop a plan for filling your application security toolbox.
RightScale User Conference NYC 2011 -
Raphael Simon - Senior Systems Architect, RightScale
Shivan Bindal - Product Manager, RightScale
Deploying Windows-based applications in the cloud has historically been challenging because the available machine images were often inconsistent across regions/clouds and they lacked simple remote control. Add in the inflexibility that comes with pre-baked application stacks along with a lack of consistent automation, and you have the recipe for a sudden onset migraine. With RightScale ServerTemplates™, you can dynamically configure, launch, and manage your Windows software stacks in the cloud. We'll showcase a proven setup for a scalable, production .NET web application and present a live demo in which we'll use ServerTemplates with built-in Microsoft best practices to launch a SQL Server-based web application.
Fabian Stäber, Instana -
In recent years, we saw a great paradigm shift in software engineering away from static monolithic applications towards dynamic distributed horizontally scalable architectures. Docker is one of the key technologies enabling this development. This shift poses a lot of new challenges for application monitoring, ranging from practical issues (need for automation) to technical challenges (Docker networking) to organizational topics (blurring line between software engineers and operations) to fundamental questions (define what is an application). In this talk we show how Docker changed the way we do monitoring, how modern application monitoring systems work, and what future developments we expect.
VMworld 2013: ThinApp 101 and What's New in ThinApp Next VersionVMworld
VMworld 2013
Peter Björk, VMware
Tina de Benedictis, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyBlack Duck by Synopsys
According to SAP 85% of cybersecurity attacks target the application layer. To be successful in defending against these attacks you need to use a variety of tools. In session we'll go into the various types application security tools and approaches, including SAST, DAST, RASP, PEN, as well as Open Source Vulnerability Management. We'll help you understand the differences between these tools and help you develop a plan for filling your application security toolbox.
eG Enterprise Logon Simulator for Citrix XenApp & XenDesktopeG Innovations
eG Enterprise Citrix logon simulator helps you fix XenApp & XenDesktop issues before users are affected. Proactively monitor Citrix XenApp logon slowdowns.
In this presentation, you will discover how to:
- Proactively monitor logon performance by simulating and testing XenApp and XenDesktop logon sessions from various locations
- Identify why logon is slow and which step in the logon process takes more processing time: is it authentication, enumeration, HDX session establishment, application launch?
- Test and ensure if the entire Citrix delivery infrastructure (XenApp, XenDesktop, NetScaler, StoreFront, PVS, license server, AD, etc.) is working as expected to support user logon
- Leverage deep Citrix monitoring capabilities of eG Enterprise to identify real user logon issues in real time and provide speedy resolution
Horizon Application Manager is VMware's new SaaS application delivery solution. It provides a simple, cross-delivery platform for managing virtual applications – if an app can be virtualized with ThinApp, it can be delivered through Horizon to a desktop, tablet, or mobile device.
This flexible, simple and quick method of application delivery is the future of workforce productivity!
View our slide deck as we explore how VMware Horizon Application Manager empowers IT and gives end-users an easy, secure way to get to their work!
And for more information on this or other virtualization topics, visit our blog at www.cdhtalkstech.com.
VMworld 2013: Architecting VMware Horizon Workspace for Scale and PerformanceVMworld
VMworld 2013
Jared Cook, VMware
Andrew Johnson, VMware
Kit Colbert, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Differentiating yourself as a business is a must in Facebook Marketing. Apps Mav has brought to you a handy tutorial on how to run a photo contest on Facebook to further your brand page's reach, gain new fans and create conversations about your brand.
VMware End-User-Computing Best Practices PosterVMware Academy
The End-User-Computing Best Practices poster gives you up-to-date tips and guidelines for configuring and sizing the wide range of EUC products. Enlarge and print!
CCF 4 XAP has been designed to exploit XAP capabilities on the cloud and leverage XAP scalability, low latency and high-throughput features when deployed in such dynamic environment
Citrix unterscheidet wieder zwischen XenApp 7.5 und XenDesktop 7.5. Aber keine Angst, beide Produkte verwenden die gleiche Technologie wie in XenDesktop 7.1, die Flexcast-Management-Architektur. Also keine IMA-Dienste und Zonen-Data-Kollektoren mehr.
Neu wird es auch möglich sein, die Citrix-Lösungen in hybride oder öffentliche Clouds zu integrieren, wie zum Beispiel Amazon Web Services oder Windows Azure. Daneben werden auch andere Produkte wie AppDNA, Mobile Device Management oder die neuste Protokoll-Errungenschaft Framehawk in der kommenden Version je nach Lizenzversion integriert sein.
Slides zum Referat von Stephan Pfister.
Presentation from Virtualization Deep Dive Day 2011 on making VDI successful for all use cases by Tom Rose, Chief Marketing Officer, Unidesk Corporation.
Similar to VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Horizon (20)
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
This year VMware vSphere 6 combined with vRealize Operations 6.1 (vR Ops 6) adds critical features to increase technical agility in the infrastructure, and reduce Mean time to Repair. With a new Automated remediation action framework in vR Ops, vSphere 6’s ability to vMotion Physical Raw Device mappings (RDMs), and a complete Management Pack Ecosystem for monitoring Infrastructure to applications, administrators have the tools needed to get to maintain 5 9’s uptime, shorten Mean Time to Repair (MTTR), and predict capacity requirements as and when the business requires.. This session will be a deep technical explanation, and live demonstration of these tools. It will give administrators a solid understanding of how they can use these tools to monitor and manage their application clusters, keep applications running during Infrastructure maintenance, and get deep holistic visibility into the entire Application ecosystem, from Storage to Networking.
VMworld 2015: Advanced SQL Server on vSphereVMworld
Microsoft SQL Server is one of the most widely deployed “apps” in the market today and is used as the database layer for a myriad of applications, ranging from departmental content repositories to large enterprise OLTP systems. Typical SQL Server workloads are somewhat trivial to virtualize; however, business critical SQL Servers require careful planning to satisfy performance, high availability, and disaster recovery requirements. It is the design of these business critical databases that will be the focus of this breakout session. You will learn how build high-performance SQL Server virtual machines through proper resource allocation, database file management, and use of all-flash storage like XtremIO. You will also learn how to protect these critical systems using a combination of SQL Server and vSphere high availability features. For example, did you know you can vMotion shared-disk Windows Failover Cluster nodes? You can in vSphere 6! Finally, you will learn techniques for rapid deployment, backup, and recovery of SQL Server virtual machines using an all-flash array.
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
Active Directory Domain Services (ADDS) allows organizations to deploy a scalable and secure directory service for managing users, resources and applications. Virtualization of ADDS has been supported for many years now, however has required careful management to avoid pitfalls around replication, time management, and access. Windows Server 2012 provides greater support for virtualization by including virtualization-safe features and support for rapid domain controller deployment.
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
Policy based management greatly simplifies the work of IT Administrators making it easy to ensure that applications and VMs receive the resources, protection and functionality required. Learn about the latest enhancements of Site Recovery Manager in this space, which represent a huge step towards providing policy based DR. In this session we'll dive deep into how this approach works and how to work with them.
Not content to simply describe the Virtual Volume (VVOL) framework, this session instead examines practical use cases: How different configurations and workloads benefit from VVOLs. Learn how Storage Policy Based Management (SPBM) couples with VVOLs to provide VM configuration options not previously available. We demonstrate a handful of real-life scenarios, specifically covering how VVOLs benefits oversubscribed systems, disaster recovery preparation and multi-tenant requirements for customers. Specific configuration options and constraints are covered in detail, including how they work with underlying storage.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Horizon
1. The Top Four Technical Issues
with XenApp Solved with Horizon
Anthony Davis, VMware
Bruce Perram, VMware
EUC5227
#VSVC5227
2. 22
Issue 1- User Experience on Shared Server Sessions
Some natively installed applications will not live together on
the same Xenapp/TS server
Opening applications that exist on different Xenapp/TS
Servers initiates an additional logon process
File associations that trigger applications installed on a
different Xenapp/TS server may not work properly or will
force another logon process
Profile corruption can occur when multiple sessions are
logged on
2
3. 33
Windows
Operating System
Physical
Registry
Physical
File System
Windows
Operating System
Physical
Registry
Physical
File System
Windows
Operating System
Physical
Registry
Physical
File System
Solution - Removing Application Conflict
ThinApp
Compressed Container (EXE)
Virtual OS (VOS)
Application
Registry Access
File Access
Virtual
Registry
Virtual
File System
Sandbox
4. 44
ThinApp on TS/Citrix XenApp
VMware ThinApp works on
Terminal Servers!
Conflicting Apps can run on same Terminal
Server.
No more server “Silos” for incompatible or high-
maintenance apps.
Having all applications virtualised with Thinapp
and available from every server in the farm
means that applications will launch immediately
within the same shared session.
File extension association will be consistent
across the server farm resulting in a better user
experience
Clipboard mapping, atl tabbing, printing etc will
all work better in a single session
Less chance of a corrupt roaming profile from a
single server session.
5. 55
Issue 2- Operational Management on Shared Server Sessions
Too much complexity in having different applications
published from siloed server farms
A single Xenapp/TS image to deploy
Support more users through efficient spread of users and
Thinapp memory sharing
Deployment capabilities like PVS are most optimized when
the server images are identical
5
6. 66
Leverage Virtualization for Better-than-Physical Security
Issues
“AV storms” can cause 100%
saturation in shared compute (CPU)
and SAN/NAS (storage I/O)
environments
Traditional agents are resource
intensive - not optimized for high
utilization, efficient clouds
Opportunities
Leverage hypervisor to offload AV
functions from agents into a
dedicated security VM
Deploy security in a more agile,
service-driven manner to both
private and public cloud
environments
VMware vSphere
Introspection
SVM
OS
Hardened
AV
VM
APP
OS
Kernel
BIOS
VM
APP
OS
Kernel
BIOS
VM
APP
OS
Kernel
BIOS
7. 77
Support More Users with VMware ThinApp Memory Sharing
Memory Sharing
• Memory pages from one instance of an application are shared with other
instances of the same application
• Application packages must be run from the same
location
• Applies to shared, multiuser environments
such as Terminal Server
• Shared even when users are logged into
different sessions
• Example: Microsoft Office loads common DLLs
into different applications
• One copy of MSO.dll loaded for all Office apps
App
Instance
#2
App
Instance
#1
Shared Memory Page
Unique
Page
Unique
Page
Unique
Page
9. 99
Issue 3 Endpoint (client) Management – Horizon Mirage
Fully control and manage clients
Repurpose PC’s
In or out of Active Directory
Control patching and security
OS upgrades with no downtime
Peripheral driver management
Anti Virus management
Local application delivery
• Browser, media player,
• CODEC’s, etc
10. 1010
XenApp Client Delivery – Horizon Mirage and ThinApp
Avoid errors and conflicts
Isolate and deploy
receiver/ICA Client software
Manage multiple client
versions on devices
Different configurations for
different farms
11. 1111
Deploy Receiver and Local Applications to PC’s with ThinApp
Local apps
Isolated local apps
Remote apps
13. 1313
Issue 4 – Change in Application Landscape and User Interaction
Application are moving to an OS neutral architecture
Commodity applications are being hosted in the cloud (SaaS)
Users want an applications on demand
1
14. 1414
Change in Application Landscape
1996 2020
100%
0%
50%
25%
75%
OS Neutral
Windows
2011
Installed base of enterprise applications
CROSSOVER
POINT
Source: Gartner, 2011
300B app downloads
by 2016
of LOB apps
are SaaS80%
Sources: IDC 2012, Morgan Stanley 2011, Gartner 2012, Forrester 2012, Pew 2011
15. 1515
OS Neutral Applications Are Becoming the Majority
Installed base of enterprise applications
Source: Gartner
Windows
OS
Neutral
A New
Approach
Is Required
16. 1616
SaaS Applications
Virtual Desktops
App Management
App Publishing
User Data Mgmt
Collaborative Workspace
Cross-Platform Portal
Mobility and Offline
Enterprise App Store
End User Workspace
Directory FederationAD
License Tracking
Access Management
Admin Console
Easy Access to Applications with Horizon Workspace
1