Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
Array DesktopDirect ist ein Remote-Desktop-Zugriffsmodul für Unternehmen, das eigenständig oder in Verbindung mit anderen Zugangslösungen auf allen Plattformen der SPX- und AG Serie verfügbar ist.
Weitere Informationen unter:
http://www.intellicomp.de/array-desktopdirect.html
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
Companies today have distributed mobile workforces and employees who are connecting to the corporate network via a large number of devices. These employees are located all over the globe, and they need seamless access to their information.
This creates pressure on IT to figure out how to deliver the right business services and data to users, and to deliver these in a way that is efficient, secure and auditable for IT. Moreover, the experience must be productive for users no matter what device they are using to connect from.
Horizon Workspace 1.5 is uniquely positioned to deliver on these objectives.
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Summit 7 Systems
Many administrators have a simple view of mobile device management: “I don’t need that.” Microsoft hopes to change that attitude by including MDM features as part of Office 365. View this presentation to learn what those features are, how they work, what they can do (and can’t do) to help you manage devices, and how you can use them to reduce the cost and pain of BYOD deployment.
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
Array DesktopDirect ist ein Remote-Desktop-Zugriffsmodul für Unternehmen, das eigenständig oder in Verbindung mit anderen Zugangslösungen auf allen Plattformen der SPX- und AG Serie verfügbar ist.
Weitere Informationen unter:
http://www.intellicomp.de/array-desktopdirect.html
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
Companies today have distributed mobile workforces and employees who are connecting to the corporate network via a large number of devices. These employees are located all over the globe, and they need seamless access to their information.
This creates pressure on IT to figure out how to deliver the right business services and data to users, and to deliver these in a way that is efficient, secure and auditable for IT. Moreover, the experience must be productive for users no matter what device they are using to connect from.
Horizon Workspace 1.5 is uniquely positioned to deliver on these objectives.
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Summit 7 Systems
Many administrators have a simple view of mobile device management: “I don’t need that.” Microsoft hopes to change that attitude by including MDM features as part of Office 365. View this presentation to learn what those features are, how they work, what they can do (and can’t do) to help you manage devices, and how you can use them to reduce the cost and pain of BYOD deployment.
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Dell World
How do you securely include personally-owned devices into your standardized management scheme? And how can you quickly update all of your endpoints to include the latest security patches and have an audit report to confirm that all of them were updated successfully?
This focuses on specific use cases to securely manage mobility and bring-your-own-device (BYOD) client devices offered by Dell and other manufacturers. It also demonstrates exclusive secure management advantages available only from Dell.
hva det betyr at alle tar kontrollen over egen IT-arena? Richard Hayton gir oss innsikt i hva konsekvensene er av at de ansatte definerer sin egen IT-arbeidsplass og hvordan fremtidens klientløsninger skal bygges for å ivareta både ansatte og bedriftens interesser.
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security. It will enable organizations to pursue priorities such as mobility, flexwork and consumerization while effectively managing risk.
Top 3 Reasons to Deliver Web Apps with Application VirtualizationCitrix
Learn how you can simplify management and secure browser apps by using app virtualization to centrally host a single image of a browser and deliver them on-demand.
The trend towards personally owned devices in the workplace is on the rise, requiring IT organizations to address this concept with flexibility, yet without compromising security and regulatory requirements.
Download the slide deck as C/D/H discusses:
■Why the move to personal devices?
■How and what technologies are involved?
■Advantages and disadvantages of personal devices
■Managing personal devices
■Four different corporate policies
■What’s next
For more information about C/D/H, contact us at (616) 776-1600 or (248) 546-1800.
Windows Apps on Chromebooks: Deliver a Seamless ExperienceCitrix
Citrix and Google work together to help organizations simplify access to business-critical Windows applications on Chromebooks along side Google Apps, SaaS and other cloud-based services. Read this paper to learn more.
BYOD (Bring Your Own Device) Risks And BenefitsModis
Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.
In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Citrix
This whitepaper busts myths and describes how VDI has proven to be successful—providing positive outcomes for IT and employees, addressing security vulnerabilities, and delivering favorable economics back to the business.
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld
VMworld 2013
Rajiv Krishnamurthy, VMware
Manish Mittal, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: How to Troubleshoot VM Performance Issues Across Applications, ...VMworld
VMworld 2013
Praveen Kannan, VMware
Samuel McBride, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Dell World
How do you securely include personally-owned devices into your standardized management scheme? And how can you quickly update all of your endpoints to include the latest security patches and have an audit report to confirm that all of them were updated successfully?
This focuses on specific use cases to securely manage mobility and bring-your-own-device (BYOD) client devices offered by Dell and other manufacturers. It also demonstrates exclusive secure management advantages available only from Dell.
hva det betyr at alle tar kontrollen over egen IT-arena? Richard Hayton gir oss innsikt i hva konsekvensene er av at de ansatte definerer sin egen IT-arbeidsplass og hvordan fremtidens klientløsninger skal bygges for å ivareta både ansatte og bedriftens interesser.
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security. It will enable organizations to pursue priorities such as mobility, flexwork and consumerization while effectively managing risk.
Top 3 Reasons to Deliver Web Apps with Application VirtualizationCitrix
Learn how you can simplify management and secure browser apps by using app virtualization to centrally host a single image of a browser and deliver them on-demand.
The trend towards personally owned devices in the workplace is on the rise, requiring IT organizations to address this concept with flexibility, yet without compromising security and regulatory requirements.
Download the slide deck as C/D/H discusses:
■Why the move to personal devices?
■How and what technologies are involved?
■Advantages and disadvantages of personal devices
■Managing personal devices
■Four different corporate policies
■What’s next
For more information about C/D/H, contact us at (616) 776-1600 or (248) 546-1800.
Windows Apps on Chromebooks: Deliver a Seamless ExperienceCitrix
Citrix and Google work together to help organizations simplify access to business-critical Windows applications on Chromebooks along side Google Apps, SaaS and other cloud-based services. Read this paper to learn more.
BYOD (Bring Your Own Device) Risks And BenefitsModis
Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.
In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Citrix
This whitepaper busts myths and describes how VDI has proven to be successful—providing positive outcomes for IT and employees, addressing security vulnerabilities, and delivering favorable economics back to the business.
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld
VMworld 2013
Rajiv Krishnamurthy, VMware
Manish Mittal, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: How to Troubleshoot VM Performance Issues Across Applications, ...VMworld
VMworld 2013
Praveen Kannan, VMware
Samuel McBride, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013
Moderator: Courtney Burry, VMware
Marilyn Basanta, VMware
Justin Venezia, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Extreme Performance Series: Storage in a Flash VMworld
VMworld 2013
Sankaran Sivathanu, VMware
Mark Achtemichuk, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: How to Customize Your vCenter Operations Management Deployment ...VMworld
VMworld 2013
Praveen Kannan, VMware
Todd Wright, FedEx Services
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld
VMworld 2013
Andrew Hawthorn, VMware
Bhavin Mathia, VMware
Vishesh Nirwal, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Performance and Capacity Management of DRS Clusters VMworld
VMworld 2013
Anne Holler, VMware
Ganesha Shanmuganathan, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld
VMworld 2013
Arun Goel, VMware
Serge Maskalik, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops VMworld
VMworld 2013
Courtney Burry, VMware
Donal Geary, VMware
Tristan Todd, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...VMworld
VMworld 2013
Vyenkatesh (Venky) Deshpande, VMware
Sachin Thakkar, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: vSphere Web Client - Technical WalkthroughVMworld
VMworld 2013
Ameet Jani, VMware
Justin King, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013
Archish Dalal, VMware
Nikhil Kelshikar, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...VMworld
VMworld 2013
Scott Lowe, VMware
Dan Wendlandt, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware NSX Integration with OpenStack VMworld
VMworld 2013
Somik Behera, VMware
Mark McClain, DreamHost & OpenStack
Salvatore Orlando, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the HoodVMworld
VMworld 2013
Matt Coppinger, VMware
Jack McMichaels, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Gestion territoriale et innovation
Introduction par M. Alain Oulevey, président de la SIA Vaud
Planification d'infrastructures et de transports scolaires:
quel rôle pour la géomatique ?
Abram Pointet, MicroGis
La géomatique au service du développement des projets d’énergies renouvelables
Etienne Roy, Romande Energie
L'impression 3D pour l'architecture et l'urbanisme
Luc Dayer et Olivier Zieschank, d3Dprint SA
Google glass : exemple d'une application géolocalisée
Benoît Golay, Institut de recherche Icare
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
Scalable enterprise mobility solutions: How to give your employees tools they need without sacrificing user experience and security.
Consumerization of IT and BYOD are here – and it’s a GOOD thing. Today's dynamic workplaces and hyper-competitive markets drive demand for more mobile productivity solutions. Nearly 70% of enterprise employees report making better decisions, being more productive and happier if they are allowed to use mobile devices and cloud-based tools. Yet, IT organizations often resist these trends because of cost and risk associated with multi-platform, multi-device ecosystem having access to corporate data and resources.
In this webinar, product experts from Sencha and Centrify will help your organization embrace BYOD and SaaS in a cost-effective, scalable way. Sencha Space is an advanced platform for securely deploying mobile apps and delivering a consistent, elegant, mobile user experience to end-users. Users can launch any mobile web app, or HTML5 app in a secure, managed environment. Combining Space with secure, Active Directory- or Cloud-Based Identity and Access Management (IAM) from Centrify gives IT visibility and control over mobile platforms and SaaS / in-house apps while improving user experience and reducing security risk.
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual WorkspaceVMworld
VMworld 2013
Scott Davis, VMware
Daniel Beveridge, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...Jürgen Ambrosi
In questa seconda sessione faremo una panoramica sulla visione di VMware riguardo l’End User Computing e su come sia possibile declinare il paradigma del Workspace Digitale in tutte le sue sfaccettature attraverso Workspace ONE, la soluzione VMware semplice e sicura per il lavoro nell’Era Digitale.
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)Heidi Hoff
Storcom has created this series because we are seeing, just like you, a ton of emails in our inbox on the topic of virtual workspace and remote work options. We felt that it was time to put on a series that was coming from a vendor-agnostic standpoint and really was designed to provide information that you really need to make informed decisions. We hope that we can help cut through the clutter and marketing hype in this series and dig into some of the real questions you need to be asking around any of the topics we are planning to discuss in this series. These seven questions are:
1) How much customization will each employee require?
2) How many applications do my remote users need to have access to?
3) What kind of device will your end-user be utilizing?
4) What do my users need as far as performance to get their work done effectively?
5) Why not choose RDS (remote desktop services)?
6) How are you going to deal with security challenges today?
7) Which financial model do you want to use?
E’ una piattaforma di Digital Workspace che consente di distribuire e gestire con semplicità e sicurezza qualsiasi applicazione su qualunque dispositivo, integrando funzionalità di controllo dell’accesso, gestione delle applicazioni e gestione degli endpoint multipiattaforma. È disponibile come servizio cloud o per la distribuzione on-site.
MT50 Data is the new currency: Protect it!Dell EMC World
Data is meant to roam, and contrary to popular opinion, better security is better business. But endpoints and users remain the key vulnerability to even the most robust security programs. In fact, 95% of all breaches occur at the endpoint, and organizations can still be susceptible to the latest viruses and malware. In this session you will learn how to protect your data on digital and physical workstations throughout the organization, wherever employees use it – at home, on the road, collaborating with partners, and more.
Learn more at Dell.com/datasecurity
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
With remote work being a reality for most, users expect to be able to connect to any resource, on any device, from anywhere in the world. Let’s face it – there is a growing realization that remote work is here to stay, so let’s do it right.
There are three critical areas that should be top of mind:
- How can we do remote work better?
- How can we maintain security?
- And, how can we reduce costs?
In this presentation, we share ideas and show tools in the Microsoft cloud for better remote work, better security and opportunity to reduce costs.
CIS13: Impact of Mobile Computing on ITCloudIDSummit
Ashish Jain, Director of Product Management, VMware
Mobile computing and business functions moving to public cloud have resulted in a diverse set of devices and applications entering the workplace. In this session we will look at the latest industry trends, new use cases and scenarios and what are some of the tools available to address these new challenges.
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
Smart phones and tablets are invading the business environment at top speed, with “bring your own device” (BYOD) providing a number of benefits for organisations across all sectors. With the right implementation, and ongoing secure support, performance through technology can be achieved in areas such as employee satisfaction, cost reduction, team work and collaboration and productivity.
Charlie Hales and Nigel Robson cover the important considerations a business should make before implementing an MDM/BYOD strategy, and will consider the ongoing implications of allowing corporate data to be accessed on personal devices ensuring the maximum benefit to businesses, customers and the end users.
AppManagEvent: Application deployment across several devices with ConfigMgr 2...Peter Daalmans
Join Peter Daalmans and Kenneth van Surksum in this session where is demonstrated how to deploy 1 application to multiple Microsoft Windows, Android and Apple devices. Peter and Kenneth will explain the Configuration Manager application model, how to deploy an application and demonstrate the end-user experience. This session contains lot's of demos; anyone interested in deploying applications with System Center 2012 Configuration Manager will enjoy and learn more on application deployment.
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
On Thursday, September 25, Bluebox Security hosted a webinar on transforming risky mobile apps into self-defending apps. During the webinar, Subbu Iyer, VP of Product management, analyzed the anatomy of risky apps and explained how to encrypt and protect data from device or app-level compromises.
View and listen to the entire webinar here:
http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html
Similar to VMworld 2013: Unleashing Productivity in the New Mobile Era (20)
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
This year VMware vSphere 6 combined with vRealize Operations 6.1 (vR Ops 6) adds critical features to increase technical agility in the infrastructure, and reduce Mean time to Repair. With a new Automated remediation action framework in vR Ops, vSphere 6’s ability to vMotion Physical Raw Device mappings (RDMs), and a complete Management Pack Ecosystem for monitoring Infrastructure to applications, administrators have the tools needed to get to maintain 5 9’s uptime, shorten Mean Time to Repair (MTTR), and predict capacity requirements as and when the business requires.. This session will be a deep technical explanation, and live demonstration of these tools. It will give administrators a solid understanding of how they can use these tools to monitor and manage their application clusters, keep applications running during Infrastructure maintenance, and get deep holistic visibility into the entire Application ecosystem, from Storage to Networking.
VMworld 2015: Advanced SQL Server on vSphereVMworld
Microsoft SQL Server is one of the most widely deployed “apps” in the market today and is used as the database layer for a myriad of applications, ranging from departmental content repositories to large enterprise OLTP systems. Typical SQL Server workloads are somewhat trivial to virtualize; however, business critical SQL Servers require careful planning to satisfy performance, high availability, and disaster recovery requirements. It is the design of these business critical databases that will be the focus of this breakout session. You will learn how build high-performance SQL Server virtual machines through proper resource allocation, database file management, and use of all-flash storage like XtremIO. You will also learn how to protect these critical systems using a combination of SQL Server and vSphere high availability features. For example, did you know you can vMotion shared-disk Windows Failover Cluster nodes? You can in vSphere 6! Finally, you will learn techniques for rapid deployment, backup, and recovery of SQL Server virtual machines using an all-flash array.
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
Active Directory Domain Services (ADDS) allows organizations to deploy a scalable and secure directory service for managing users, resources and applications. Virtualization of ADDS has been supported for many years now, however has required careful management to avoid pitfalls around replication, time management, and access. Windows Server 2012 provides greater support for virtualization by including virtualization-safe features and support for rapid domain controller deployment.
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
Policy based management greatly simplifies the work of IT Administrators making it easy to ensure that applications and VMs receive the resources, protection and functionality required. Learn about the latest enhancements of Site Recovery Manager in this space, which represent a huge step towards providing policy based DR. In this session we'll dive deep into how this approach works and how to work with them.
Not content to simply describe the Virtual Volume (VVOL) framework, this session instead examines practical use cases: How different configurations and workloads benefit from VVOLs. Learn how Storage Policy Based Management (SPBM) couples with VVOLs to provide VM configuration options not previously available. We demonstrate a handful of real-life scenarios, specifically covering how VVOLs benefits oversubscribed systems, disaster recovery preparation and multi-tenant requirements for customers. Specific configuration options and constraints are covered in detail, including how they work with underlying storage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Search and Society: Reimagining Information Access for Radical Futures
VMworld 2013: Unleashing Productivity in the New Mobile Era
1. Unleashing Productivity in the New Mobile Era
Ben Goodman, VMware
Andrew Hawthorn, VMware
EUC5843
#EUC5843
2. 2
• Purpose of this Session:
• Education / Thought Leadership
• Not a Sales Pitch
• Agenda:
• Market Snapshot
• Nirvana
• The VMware Approach
• An Example
• Your Questions
3. 3
The Requirements We Used to Have…
Change is hard and
highly managed
Software implemented
from the center out
Difficult to adjust to
users needs
Control Through OwnershipPeople you employ
Using a network you
own to connect to…
Using software you own
on a Windows desktop
you own
An application you own,
running on a server you
own
4. 4
What the World Wants Now…
Control & Governance are
Becoming More Challenging
Inability to track, control or
secure information assets
Can not remove access
you didn’t grant
Serious compliance concerns
Apps live in many
clouds and are easily
procured without IT
Always connected, via
3G, 4G and public or
personal wifi
Non-owned devices and
multiple non-Windows
OSs
Employees, contractors
outsourcers, partners
citizens, students
5. 5
IT Management Processes are Not Optimized
Ownership
Devices
Connection
Apps
PAST
90%
Windows Apps2
Ethernet
IT
Owned
1
Desktop
TODAY
50%
Non-Windows Apps2
3G/4G
33%
Industry average
BYOD adoption1
10%
of Enterprises are
completely mobile
and laptop4
FUTURE
4:1
Ratio of Mobile apps to
Windows Apps3
Public/
Always On
60%
of Enterprises will
be completely
mobile and laptop4
85%
of Enterprises with
BYOD programs1
STAGE IT IS
OPTIMIZED FOR
All citations are from Gartner, Inc. and are used with permission. Specifics are included in the footnotes.
6. 7
2013 Smartphones Global Trends
OS
In million
of units
Android 178
iOS 32
Microsoft 7
BlackBerry 6
All Others 2
TOTAL 722,4
79%
14%
3% 3%
1%
Android
iOS
Microsoft
BlackBerry
Others
Smartphones worldwide
shipment Q2 2013
Source: Gartner 2013
Market share Q2 2013
8. 9
Android Landscape
Security
• Perception is that
Android is not secure
• Google Play is ‘wild
wild west’
• Enterprise features
(eg: MDM) weak
Fragmentation Lack of control
• No two devices are the
same in terms of
capabilities or UI
• Hard for IT to support
diverse environment
• OS upgrades are
controlled by
carrier/OEM
• Security patches not
pushed out in a timely
manner
Not much traction in enterprise segment
Widely popular in developing countries
• Lots of choice – screen size, price, capabilities, etc.
10. 11
Android in the Enterprise
The enterprise isn’t Google’s priority
• MDM APIs 3 years behind Apple’s MDM APIs
• 3LM founded by Android team members frustrated with Google
• Motorola bought 3LM
• Google bought Motorola and got 3LM on a platter
• Google kills 3LM and lays off the team
So OEMs starting to add Enterprise capabilities
• Samsung added SAFE MDM APIs
• LG has its own MDM APIs
• Motorola and HTC don’t have anything yet
11. 12
iOS Landscape
Increasing support
for enterprise
features
in every hardware and
software release
Security Fragmentation
• Perception is that iOS
is more secure than
Android
• App Store is curated
• Strong enterprise
features (encryption,
MDM, etc.)
• Different screen sizes
but not capabilities so
perception is that there
is no fragmention in the
Apple world
In tune with enterprise opportunity and have great traction
Popular in North America, Western Europe and
other richer geographical pockets
• Price rules them out in many developing countries
14. 15
BlackBerry Landscape
Was good standard in enterprise market
Missed BYOD trend completely and lost traction
BB 10 has new functionality
• BlackBerry Balance – built in dual persona solution
• Small market share and not growing
Loyal BB shops that didn’t already switch will
likely stay with BB
Most customers already started switching to a
more strategic platform
• Don’t view BB as strategic anymore
• Migrating to iOS or Android or both
15. 16
Windows Landscape
Windows Phone and Windows 8 are still early
• Windows Phone – more consumer oriented
• Windows Tablet seems to be more enterprise friendly
and will likely get more traction that Windows
phones in 2014
MSFT has deep pockets and will likely become
the third dominant mobile platform
• Distant third….
16. 17
More Apps, More Devices, More Users…. No Help
What has been the impact of mobile devices on your IT helpdesk
over the last two years?
Did not add Helpdesk
staff in response to
increased workload
No increased
workload
Source: Gartner N=392
62%
19%
15%
4%
Added Helpdesk staff
Not sure
17. 18
Common Responses Only Mask Problem
Buy a Point Solution Does not scale, increases cost
Creates a management mess
Lock It Down
Unhappy workforce
IT is viewed the “bad guy”
Ignore It Poor IT Control
Security and compliance risk
18. 19
Mobile Management Is Evolving
USER OWNED
UNMANAGED
IT OWNED
MANAGED
Unrestricted
Personal Device
Corporate-Owned
Devices
Bring Your Own
Devices (BYOD)
Corporate-Owned
Personally Enabled (COPE)
of workers believe
their smartphones
should be enabled for
work and personal
92%Manage
Corporate
Workspace
Only
Device
Apps & Data
Corporate
Apps &
Data
19. 20
What Is Nirvana?
Deliver the right business apps and data to
user devices in a way that is efficient and
secure for IT and productive for the end user
20. 21
Five Steps to Address the Mobility Challenge
Manage
users, not
devices
Embrace
co-ownership
Architect for
change and
continual
improvement
Prioritize
end user
experience
Treat mobile
as a first-
class citizen
21. 22
Manage Only What You Need To
Horizon
Secure: The workspace is completely enterprise-
owned and controlled
• Support for corporate security, compliance and
privacy policies
• Corporate data is fully encrypted
• Jailbreak and Root’ed detection
• Complete separation of personal and corporate
data
Customizable: Ability to provision, manage and
remove corporate data and applications on
employees’ devices
Productive: Key apps for employee productivity are
pre-installed (Email, Calendar, Secure Browser, Files)
Horizon Secure Mobile Workspace
22. 23
VMware Horizon is the Platform for Workforce Mobility
Broker: Manage & secure centrally
and broker services to your
workforce by policy
Transform: Transform
desktops, diverse apps and
data into centralized services
Deliver: Empower your workforce
with flexible access across devices,
locations and connectivity
23. 24
The Perfect End-User Experience…
Instantiate anywhere – any device, everywhere
Where possible, must be cached and offline
UI attractive and easy to use
Context aware – what I need, when I need it
24. 25
The Perfect End-User Experience…
Launch every type of app
Access every type of data repository
Variable editing mode (Xenapp or VDI)
25. 26
While…
Secure with on-prem deployment, remote wipe, block copy & paste
Audit for compliance, risk, security
Strong authentication
27. 28
Secure File Sharing
with Internal or
External Users
Centralized Access to Data,
SaaS Applications and View
Desktops
Unified Management
Platform for Managing
and Securing the
Workspace
Extensible via APIs
Policy
Engine
Entitlement
Management
AD
Integration
Reporting/Audi
t
Compliance
App
Catalog
Single Sign-
On
Corporate
Secure Workspace
Personal
Horizon Workspace At-a-Glance (Markitecture)
On ANY
Device
Secure Workspace Separating
Personal and Corporate Data
Data Containment
Remote Wipe
At-Rest Encryption
Enterprise Passcode
In-Transit
Encryption
Enterprise
Authorized
User
28. 29
VMware Horizon Workspace Serves Both IT and End Users
Get access to a secure workspace that
contains the user’s files, apps, and
Windows desktops on any device
END USERS
Provision, populate, manage and
secure the workspace remotely
across all users and devices
IT ADMINS
29. 30
VMware Horizon Workspace Serves Both IT and End Users
Get access to a secure workspace that
contains the user’s files, apps, and
Windows desktops on any device
END USERS
Provision, populate, manage and
secure the workspace remotely
across all users and devices
IT ADMINS
30. 31
Persistent and centralized identity
Integrated with directory services (AD)
Single sign on (SaaS, View)
Enterprise application catalog
Apps customized for the device platform
Access to View desktops
File sync and sharing
Sync across devices
Sharing with internal and external users
Consistent experience across devices
Isolation and security
What’s Inside the Workspace for End Users
Single Hub for Accessing All Business
Apps, Files and Windows Desktops
Any Device
FilesApps Desktop
Security + Policy
31. 32
SSL-secured portal for
accessing apps and data
on any web browser
Desktop agents integrated
with the file directory on
Macs and Windows
Desktop
Provide a virtualized
operating system runs a
corporate workspace that is
controlled and managed by
IT
Android
Leverage iOS7 to create a
container of apps that is
managed and secured by
IT
iOS
Deliver a Secure Workspace on Every Device
32. 33
VMware Horizon Workspace Serves Both IT and End Users
Get access to a secure workspace that
contains the user’s files, apps, and
Windows desktops on any device
END USERS
Provision, populate, manage and
secure the workspace remotely
across all users and devices
IT ADMINS
33. 34
Provision, Manage and Secure the Workspace
Provision, manage and secure the
workspace remotely
Deliver a custom workspace with the
right services
Gain visibility, conduct audits and
capacity planning through dashboards,
usage reports, etc.
Future-proof/preserve existing
investment in apps and file shares
Easily scale to support new app and
device platforms
Centralized Management Based on User’s
Policy, Identity and Context
Security + Policy
=
Service
Catalog
Policy Context
Identity
Custom Workspace
FilesApps Desktop
34. 35
The Challenges – How Big Was the Problem?
VMware
IT
15kEmployees
28kPartners
2+Devices Per
Employee
50+Internal/
Custom Apps
15kLogins
Per Day
4+File
Repositories
80+SaaS
Apps
• Siloed access management
• Multiple file repositories lacks
agility and mobility
• Heterogeneous application portfolio
• Audit & compliance
• Weak security
• Manual provisioning
• Lack of multiple device support
• Increased license costs
• Huge support costs
Problems
35. 36
How VMware Is Using Horizon Workspace
Rolled out to 15,000 employees
Production 3 weeks after GA
VMware employees are accessing over 72
applications, 6000 virtual desktops, and 4 TB of
data through Horizon Workspace clients on iOS,
Android, Windows and Mac OS devices
Results
Benefits
End-users have one AD password and a single
place to access, sync and share data
Strong authentication if outside network
Single administrative dashboard
Single place to de-provision when employee
leaves the company
405
50
January February March April May
Oracle EBS Service Tickets
Introduction of Horizon
“Nearly 90% drop in service tickets and that’s just one of
72 applications. Each of those tickets is an average of 30
minutes of helpdesk time. That’s an annual savings of
$63k—just for one application.”
Thirumalesh Reddy-IT Deployment Manager
36. 37
VMware Horizon Is the Platform for Workforce Mobility
Broker: Manage & secure
centrally and broker services
to your workforce by policy
300Transform: Transform
desktops, diverse apps and
data into centralized
services
Deliver: Empower your
workforce with flexible access
across devices, locations and
connectivity
38. 39
Other VMware Activities Related to This Session
Additional Sessions:
EUC5004
Horizon Workspace at Scale
• Wednesday 11:30 Moscone West 2006
• Thursday 10:30 Moscone West 2014
HOL:
HOL-MBL-1304
Horizon Workspace - Explore and Deploy
Group Discussions:
EUC1005-GD
Workspace with Rasmus Jensen