VMworld 2013
Mark Ewert, VMware
Andy Philp, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success VMworld
VMworld 2013
Simon Long, VMware
Justin Venezia, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware Mirage Storage and Network Deduplication, DEMYSTIFIED VMworld
VMworld 2013
Anil Gupta, VMware
Kapil Kasetwar, VMware
Shlomo Wygodny, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Planning For Catastrophe with IBM WAS and IBM BPMWASdev Community
This document discusses planning for disaster recovery of WebSphere Application Server and IBM Business Process Manager applications across multiple data centers. It covers various disaster recovery architecture options including active/passive and different active/active models. Key considerations for recovering WebSphere Application Server and IBM BPM applications are discussed such as using backup/restore of configuration files, transaction log replay, and message queue recovery. The importance of having independent cells aligned with data center boundaries is emphasized to avoid a single failure impacting both sites.
This document discusses how Catalogic ECX copy data management software can be used with IBM FlashSystem V9000 all-flash storage arrays to provide software-defined agility. The IBM FlashSystem offers high performance storage with data compression and disaster recovery capabilities. Catalogic ECX automates copy creation, tracking, usage, refresh, and deletion to simplify management of copies for use cases like disaster recovery, testing/development, and self-service. A live demonstration shows how ECX streamlines recovery and enables self-service access to copies. Resources for learning more about the joint solution are provided.
5 Ways to Avoid Server and Application DowntimeNeverfail Group
This webinar discusses 5 ways to avoid server and application downtime: 1) Protecting power, cooling, and network services; 2) Maintaining hardware availability through redundancy and virtualization; 3) Ensuring data availability, accessibility, and protection from corruption through backups, snapshots, and replication; 4) Addressing operating system issues and performance; 5) Maintaining application stability and proper configuration. It then describes how Neverfail and Neverfail SRMXtender help minimize downtime through real-time replication, application-aware protection and recovery, and integration with vSphere Site Recovery Manager.
This document summarizes the key announcements and new features being unveiled at VMworld 2011. It highlights how VMware's vSphere 5 and vCloud Suite help drive business transformation by enabling a flexible hybrid cloud model. The updates provide improved infrastructure scalability, availability, security and management capabilities to reduce IT complexity and costs. Specifically, vSphere 5 features like ESXi convergence, auto deploy, storage DRS, and increased VM sizing allow for more efficient provisioning and resource optimization.
Introducing Citrix XenApp 6 provides new features for application and desktop virtualization including support for any device, self-service applications, real-time collaboration, and a single management console. Key enhancements include support for smartphones, Windows 7, USB devices, high definition audio and graphics, and integration with Active Directory for simplified administration. XenApp 6 aims to deliver applications and desktops from any infrastructure to any user on any device.
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success VMworld
VMworld 2013
Simon Long, VMware
Justin Venezia, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware Mirage Storage and Network Deduplication, DEMYSTIFIED VMworld
VMworld 2013
Anil Gupta, VMware
Kapil Kasetwar, VMware
Shlomo Wygodny, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Planning For Catastrophe with IBM WAS and IBM BPMWASdev Community
This document discusses planning for disaster recovery of WebSphere Application Server and IBM Business Process Manager applications across multiple data centers. It covers various disaster recovery architecture options including active/passive and different active/active models. Key considerations for recovering WebSphere Application Server and IBM BPM applications are discussed such as using backup/restore of configuration files, transaction log replay, and message queue recovery. The importance of having independent cells aligned with data center boundaries is emphasized to avoid a single failure impacting both sites.
This document discusses how Catalogic ECX copy data management software can be used with IBM FlashSystem V9000 all-flash storage arrays to provide software-defined agility. The IBM FlashSystem offers high performance storage with data compression and disaster recovery capabilities. Catalogic ECX automates copy creation, tracking, usage, refresh, and deletion to simplify management of copies for use cases like disaster recovery, testing/development, and self-service. A live demonstration shows how ECX streamlines recovery and enables self-service access to copies. Resources for learning more about the joint solution are provided.
5 Ways to Avoid Server and Application DowntimeNeverfail Group
This webinar discusses 5 ways to avoid server and application downtime: 1) Protecting power, cooling, and network services; 2) Maintaining hardware availability through redundancy and virtualization; 3) Ensuring data availability, accessibility, and protection from corruption through backups, snapshots, and replication; 4) Addressing operating system issues and performance; 5) Maintaining application stability and proper configuration. It then describes how Neverfail and Neverfail SRMXtender help minimize downtime through real-time replication, application-aware protection and recovery, and integration with vSphere Site Recovery Manager.
This document summarizes the key announcements and new features being unveiled at VMworld 2011. It highlights how VMware's vSphere 5 and vCloud Suite help drive business transformation by enabling a flexible hybrid cloud model. The updates provide improved infrastructure scalability, availability, security and management capabilities to reduce IT complexity and costs. Specifically, vSphere 5 features like ESXi convergence, auto deploy, storage DRS, and increased VM sizing allow for more efficient provisioning and resource optimization.
Introducing Citrix XenApp 6 provides new features for application and desktop virtualization including support for any device, self-service applications, real-time collaboration, and a single management console. Key enhancements include support for smartphones, Windows 7, USB devices, high definition audio and graphics, and integration with Active Directory for simplified administration. XenApp 6 aims to deliver applications and desktops from any infrastructure to any user on any device.
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...WASdev Community
WebSphere Application Server ND Intelligent Management provides capabilities to help address challenges of web tier complexity, application health uncertainty, availability issues, and over-provisioned servers. It offers dynamic routing, health management, application editions management, auto-scaling, and has been available since WebSphere Application Server ND version 8.5.0. These capabilities work to provide continuous availability during failures, updates, traffic surges and other issues through self-protecting, self-healing, self-managing, self-optimizing and self-configuring functions.
VMworld 2013: Deep Dive into vSphere Log Management with vCenter Log InsightVMworld
VMworld 2013
Steve Flanders, VMware
Chengdu Huang, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Application Virtualization, University of New HampshireTony Austwick
Presentation to EDUCAUSE, NERCOMP by David Blezzard from University of New Hampshire.
More here http://www.educause.edu/nercomp-annual-conference/2016/2016/streamlining-application-deployment-and-management-through-virtualization
We will report how using the Application Jukebox application virtualization solution at the University of New Hampshire has saved time and simplified management of public and department-specific computer labs and our VDI environment. Traditionally, we used a combination of imaging and then various scripted deployments to install applications. With application virtualization, we have been able to move over a hundred Windows applications into virtual packages that can be "installed" by users on demand. We will discuss the general problem of managing large numbers of complex applications across a range of computer environments while also trying to be flexible and responsive to users.
Outcomes: Understand how application virtualization can overcome issues with deploying software * Appreciate the capabilities of Application Jukebox to be able to assess its utility to your campus * Obtain a model for evaluating a tool's potential savings
The document provides an overview of VMware ThinApp, including its architecture, isolation modes, package formats, deployment methods, and key features. ThinApp uses a virtual operating system and sandbox model to deliver applications in a compressed executable file format while isolating them from the underlying system. It supports various isolation modes and deployment options and also includes capabilities like scripting, memory sharing, boot services, and application linking.
VMworld Europe 2014: Advanced SQL Server on vSphere Techniques and Best Pract...VMworld
This document provides an overview and agenda for a presentation on virtualizing SQL Server workloads on VMware vSphere. The presentation will cover designing SQL Server virtual machines for performance in production environments, consolidating multiple SQL Server workloads, and ensuring SQL Server availability using vSphere features. It emphasizes understanding the workload, optimizing for storage and network performance, avoiding swapping, using large memory pages, and accounting for NUMA when configuring SQL Server virtual machines.
Citrix XenDesktop and XenApp 7.5 Architecture DeploymentHuy Pham
Desktop virtualization allows users to access virtual desktops and applications from any device. It provides Windows desktops, apps, and data as a service for every user through a high-definition user experience across any network. The solution includes application migration and lifecycle management tools. Citrix XenDesktop is an open, scalable platform that uses FlexCast to deliver virtual desktops and applications through various models depending on use cases.
Come to this session to get an update about everything related to OpenNTF, the open source community for IBM Collaboration Solutions.
See the contest winning XPages projects live and learn about the new open source projects for IBM Connections.
The session will also cover the IBM Social Business Toolkit SDK which allows XPages, Java and JavaScript developers to easily access IBM Connections and IBM SmartCloud for Social Business from custom applications. Attend this session to see demos of the latest functionality and new samples of the toolkit.
Citrix unterscheidet wieder zwischen XenApp 7.5 und XenDesktop 7.5. Aber keine Angst, beide Produkte verwenden die gleiche Technologie wie in XenDesktop 7.1, die Flexcast-Management-Architektur. Also keine IMA-Dienste und Zonen-Data-Kollektoren mehr.
Neu wird es auch möglich sein, die Citrix-Lösungen in hybride oder öffentliche Clouds zu integrieren, wie zum Beispiel Amazon Web Services oder Windows Azure. Daneben werden auch andere Produkte wie AppDNA, Mobile Device Management oder die neuste Protokoll-Errungenschaft Framehawk in der kommenden Version je nach Lizenzversion integriert sein.
Slides zum Referat von Stephan Pfister.
1693: 21 Ways to Make Your Data Work for You - IBM Connect 2016panagenda
Your collaboration infrastructure contains a gold mine of information just waiting to get used. Francie Tanner and Henning Kunz cover a rich variety of collaboration topics such as cloud readiness, onboarding, social adoption, the Notes Browser Plugin and more. Learn from 21 real world companies and how they tackled their next collaboration move by diving into their very own data sets.
A presentation from Francie Tanner (panagenda) and Henning Kunz (panagenda).
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
This year VMware vSphere 6 combined with vRealize Operations 6.1 (vR Ops 6) adds critical features to increase technical agility in the infrastructure, and reduce Mean time to Repair. With a new Automated remediation action framework in vR Ops, vSphere 6’s ability to vMotion Physical Raw Device mappings (RDMs), and a complete Management Pack Ecosystem for monitoring Infrastructure to applications, administrators have the tools needed to get to maintain 5 9’s uptime, shorten Mean Time to Repair (MTTR), and predict capacity requirements as and when the business requires.. This session will be a deep technical explanation, and live demonstration of these tools. It will give administrators a solid understanding of how they can use these tools to monitor and manage their application clusters, keep applications running during Infrastructure maintenance, and get deep holistic visibility into the entire Application ecosystem, from Storage to Networking.
Slides zur Präsentation von Roger Bösch, Citrix, am Citrix Day 2014 von Digicomp:
XenDesktop ist Marktführer im Bereich Desktop-Virtualisierung und liefert die einzige Komplettlösung zur Mobilisierung von Windows-Anwendungen und -Desktops für beliebige Anwendungsfälle. Sie lernen die Neuerungen der aktuellen Version aus technischer Sicht kennen, erhalten Tipps und Tricks und weitere Informationen darüber, was Citrix Workspace Suite zu bieten hat.
Skylark aims to provide a generic platform which enables cloud applications to be easily deployed and accessed.
In the front-end, Skylark ports Spice to Xen and customizes Spice for application window delivery and display. Skylark users can start any application subscribed from Skylark application store and does not need to know whether it runs in Linux or Windows.
In the back-end, by providing Xen Image File System (Xen-IFS), multiple VMs are allowed to start up simultaneously from the same snapshot or the same disk image. Xen-IFS will automatically keep and isolate the private data produced by each VM.
Skylark makes it possible for Multiple User Single Installation (MUSI) among VMs, and also makes it easy for application delivery through remote VM access.
Nov 2014 2 blu pointe continuity cloudrar-master Ron_Roberts
This document discusses BluPointe's cloud backup and disaster recovery solutions. It outlines BluPointe's customer commitment of always providing free trials, training, certification, startup assistance and unlimited software licenses. The document also summarizes BluPointe's backup and recovery features, including support for various operating systems, applications, virtualization platforms, and disaster recovery options like virtual disaster recovery and bare metal recovery. Finally, it discusses BluPointe's upcoming product releases and enhancements in areas like protection, recovery, performance, usability and manageability.
This document discusses disaster recovery and deployment operations for software engineers. It defines key terms like business continuity, disaster recovery, recovery time objective (RTO), and recovery point objective (RPO). Systems are divided into tiers based on their RTO and RPO. Tier 1 systems require data to be kept up to date in a mirrored secondary data center, while tiers 2-4 can use backups stored either online or offline. Software in secondary data centers must also be kept in alignment. The failover process involves triggering a switch, activating the secondary data center, and resuming operations from that site.
No BS, Vendor Neutral Comparison of Application Layering SolutionsUnidesk Corporation
Application layering is quickly becoming the standard for application packaging and lifecycle management. As this innovative technology has become mainstream, many vendors are bringing layering solutions to market. EUC Expert, Ron Oglesby cuts through the marketing BS to provide a vendor-neutral overview of Citrix AppDisk, FSLogix, Liquidware Labs FlexApp, Unidesk, and VMware App Volumes. Ron worked directly with experts in each of the products including third-party consultants, founders, CTOs, and product managers to develop the content for this session.
VMworld Europe 2014: Storage DRS - Deep Dive and Best PracticesVMworld
This document discusses new features in VMware vSphere 6.0 related to storage management and optimization. It introduces Storage DRS which helps balance storage resource utilization across datastores and hosts. New features like IO reservations allow minimum guaranteed performance levels for VMs. Storage DRS also integrates with storage array technologies like thin provisioning, deduplication, auto-tiering, and replication to improve storage efficiency and availability. The document provides best practices for deploying Storage DRS to maximize its benefits.
Windows Server 2012 provides a scalable and easy to manage virtual desktop infrastructure (VDI) solution. It offers three deployment choices for VDI - desktop sessions, pooled virtual machines, and personal virtual machines. The platform features centralized management, easy deployment through automation, unified administration, and streamlined virtual machine management. It delivers a consistently rich user experience for remote users through technologies like RemoteFX for graphics and USB redirection.
This document discusses server consolidation and virtualization using blade servers and VMware. It begins with an overview of server consolidation benefits like lower costs and improved efficiency. It then describes blade server types, consolidation steps, and system management. Case studies show how organizations implemented consolidation using blades. The document also covers VMware software products and how virtualization allows further consolidation. It ends by noting virtualization and consolidation can reduce complexity through a multi-step process.
This document summarizes Citrix CloudBridge and Branch Repeater, which provide a unified platform to accelerate applications across public and private networks. Key benefits include accelerating desktops, applications and multimedia to branch offices and mobile users, improving WAN performance, and optimizing XenDesktop and XenApp. Features include HDX acceleration, QoS, protocol support including TCP and SSL, security, integrated Windows services, and flexible management. It is available as virtual or physical appliances in various models.
Citrix Master Class - Live Upgrade from XenApp 6.5 to 7.6Lee Bushen
Video available here: http://www.citrix.com/tv/#videos/12787
Join technology experts Lee Bushen and Patrick Irwin as they discuss and demonstrate a step-by-step move from XenApp 6.5 to XenApp 7.6. With this live demo, we’ll take a user-centric approach and transition across to a new XenApp 7.6 environment with minimal disruption and retraining. We’ll be showing best-practice methods such as consolidating your old and new system with StoreFront, testing for application compatibility with AppDNA and upgrading a server live into the new XenDesktop 7.6 system.
VMworld 2013
Raymond Dusseault, VMware
Dean Flaming, VMware
Sarah Semple, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
This document provides an overview of application streaming and virtualization technologies. It discusses what application streaming is, how application isolation environments work through file system, registry, and object redirection rules. It then summarizes several major application virtualization solutions including Microsoft App-V, VMware ThinApp, CloudVolumes, Symantec SVS, Spoon, Numecent Jukebox, FSLogix, and Sandboxie. It also discusses how Windows provides some virtualization capabilities through UAC and application compatibility shims. In conclusion, it recommends considering simple virtualization solutions or SaaS-based services and reviewing a detailed comparison of vendors.
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...WASdev Community
WebSphere Application Server ND Intelligent Management provides capabilities to help address challenges of web tier complexity, application health uncertainty, availability issues, and over-provisioned servers. It offers dynamic routing, health management, application editions management, auto-scaling, and has been available since WebSphere Application Server ND version 8.5.0. These capabilities work to provide continuous availability during failures, updates, traffic surges and other issues through self-protecting, self-healing, self-managing, self-optimizing and self-configuring functions.
VMworld 2013: Deep Dive into vSphere Log Management with vCenter Log InsightVMworld
VMworld 2013
Steve Flanders, VMware
Chengdu Huang, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Application Virtualization, University of New HampshireTony Austwick
Presentation to EDUCAUSE, NERCOMP by David Blezzard from University of New Hampshire.
More here http://www.educause.edu/nercomp-annual-conference/2016/2016/streamlining-application-deployment-and-management-through-virtualization
We will report how using the Application Jukebox application virtualization solution at the University of New Hampshire has saved time and simplified management of public and department-specific computer labs and our VDI environment. Traditionally, we used a combination of imaging and then various scripted deployments to install applications. With application virtualization, we have been able to move over a hundred Windows applications into virtual packages that can be "installed" by users on demand. We will discuss the general problem of managing large numbers of complex applications across a range of computer environments while also trying to be flexible and responsive to users.
Outcomes: Understand how application virtualization can overcome issues with deploying software * Appreciate the capabilities of Application Jukebox to be able to assess its utility to your campus * Obtain a model for evaluating a tool's potential savings
The document provides an overview of VMware ThinApp, including its architecture, isolation modes, package formats, deployment methods, and key features. ThinApp uses a virtual operating system and sandbox model to deliver applications in a compressed executable file format while isolating them from the underlying system. It supports various isolation modes and deployment options and also includes capabilities like scripting, memory sharing, boot services, and application linking.
VMworld Europe 2014: Advanced SQL Server on vSphere Techniques and Best Pract...VMworld
This document provides an overview and agenda for a presentation on virtualizing SQL Server workloads on VMware vSphere. The presentation will cover designing SQL Server virtual machines for performance in production environments, consolidating multiple SQL Server workloads, and ensuring SQL Server availability using vSphere features. It emphasizes understanding the workload, optimizing for storage and network performance, avoiding swapping, using large memory pages, and accounting for NUMA when configuring SQL Server virtual machines.
Citrix XenDesktop and XenApp 7.5 Architecture DeploymentHuy Pham
Desktop virtualization allows users to access virtual desktops and applications from any device. It provides Windows desktops, apps, and data as a service for every user through a high-definition user experience across any network. The solution includes application migration and lifecycle management tools. Citrix XenDesktop is an open, scalable platform that uses FlexCast to deliver virtual desktops and applications through various models depending on use cases.
Come to this session to get an update about everything related to OpenNTF, the open source community for IBM Collaboration Solutions.
See the contest winning XPages projects live and learn about the new open source projects for IBM Connections.
The session will also cover the IBM Social Business Toolkit SDK which allows XPages, Java and JavaScript developers to easily access IBM Connections and IBM SmartCloud for Social Business from custom applications. Attend this session to see demos of the latest functionality and new samples of the toolkit.
Citrix unterscheidet wieder zwischen XenApp 7.5 und XenDesktop 7.5. Aber keine Angst, beide Produkte verwenden die gleiche Technologie wie in XenDesktop 7.1, die Flexcast-Management-Architektur. Also keine IMA-Dienste und Zonen-Data-Kollektoren mehr.
Neu wird es auch möglich sein, die Citrix-Lösungen in hybride oder öffentliche Clouds zu integrieren, wie zum Beispiel Amazon Web Services oder Windows Azure. Daneben werden auch andere Produkte wie AppDNA, Mobile Device Management oder die neuste Protokoll-Errungenschaft Framehawk in der kommenden Version je nach Lizenzversion integriert sein.
Slides zum Referat von Stephan Pfister.
1693: 21 Ways to Make Your Data Work for You - IBM Connect 2016panagenda
Your collaboration infrastructure contains a gold mine of information just waiting to get used. Francie Tanner and Henning Kunz cover a rich variety of collaboration topics such as cloud readiness, onboarding, social adoption, the Notes Browser Plugin and more. Learn from 21 real world companies and how they tackled their next collaboration move by diving into their very own data sets.
A presentation from Francie Tanner (panagenda) and Henning Kunz (panagenda).
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
This year VMware vSphere 6 combined with vRealize Operations 6.1 (vR Ops 6) adds critical features to increase technical agility in the infrastructure, and reduce Mean time to Repair. With a new Automated remediation action framework in vR Ops, vSphere 6’s ability to vMotion Physical Raw Device mappings (RDMs), and a complete Management Pack Ecosystem for monitoring Infrastructure to applications, administrators have the tools needed to get to maintain 5 9’s uptime, shorten Mean Time to Repair (MTTR), and predict capacity requirements as and when the business requires.. This session will be a deep technical explanation, and live demonstration of these tools. It will give administrators a solid understanding of how they can use these tools to monitor and manage their application clusters, keep applications running during Infrastructure maintenance, and get deep holistic visibility into the entire Application ecosystem, from Storage to Networking.
Slides zur Präsentation von Roger Bösch, Citrix, am Citrix Day 2014 von Digicomp:
XenDesktop ist Marktführer im Bereich Desktop-Virtualisierung und liefert die einzige Komplettlösung zur Mobilisierung von Windows-Anwendungen und -Desktops für beliebige Anwendungsfälle. Sie lernen die Neuerungen der aktuellen Version aus technischer Sicht kennen, erhalten Tipps und Tricks und weitere Informationen darüber, was Citrix Workspace Suite zu bieten hat.
Skylark aims to provide a generic platform which enables cloud applications to be easily deployed and accessed.
In the front-end, Skylark ports Spice to Xen and customizes Spice for application window delivery and display. Skylark users can start any application subscribed from Skylark application store and does not need to know whether it runs in Linux or Windows.
In the back-end, by providing Xen Image File System (Xen-IFS), multiple VMs are allowed to start up simultaneously from the same snapshot or the same disk image. Xen-IFS will automatically keep and isolate the private data produced by each VM.
Skylark makes it possible for Multiple User Single Installation (MUSI) among VMs, and also makes it easy for application delivery through remote VM access.
Nov 2014 2 blu pointe continuity cloudrar-master Ron_Roberts
This document discusses BluPointe's cloud backup and disaster recovery solutions. It outlines BluPointe's customer commitment of always providing free trials, training, certification, startup assistance and unlimited software licenses. The document also summarizes BluPointe's backup and recovery features, including support for various operating systems, applications, virtualization platforms, and disaster recovery options like virtual disaster recovery and bare metal recovery. Finally, it discusses BluPointe's upcoming product releases and enhancements in areas like protection, recovery, performance, usability and manageability.
This document discusses disaster recovery and deployment operations for software engineers. It defines key terms like business continuity, disaster recovery, recovery time objective (RTO), and recovery point objective (RPO). Systems are divided into tiers based on their RTO and RPO. Tier 1 systems require data to be kept up to date in a mirrored secondary data center, while tiers 2-4 can use backups stored either online or offline. Software in secondary data centers must also be kept in alignment. The failover process involves triggering a switch, activating the secondary data center, and resuming operations from that site.
No BS, Vendor Neutral Comparison of Application Layering SolutionsUnidesk Corporation
Application layering is quickly becoming the standard for application packaging and lifecycle management. As this innovative technology has become mainstream, many vendors are bringing layering solutions to market. EUC Expert, Ron Oglesby cuts through the marketing BS to provide a vendor-neutral overview of Citrix AppDisk, FSLogix, Liquidware Labs FlexApp, Unidesk, and VMware App Volumes. Ron worked directly with experts in each of the products including third-party consultants, founders, CTOs, and product managers to develop the content for this session.
VMworld Europe 2014: Storage DRS - Deep Dive and Best PracticesVMworld
This document discusses new features in VMware vSphere 6.0 related to storage management and optimization. It introduces Storage DRS which helps balance storage resource utilization across datastores and hosts. New features like IO reservations allow minimum guaranteed performance levels for VMs. Storage DRS also integrates with storage array technologies like thin provisioning, deduplication, auto-tiering, and replication to improve storage efficiency and availability. The document provides best practices for deploying Storage DRS to maximize its benefits.
Windows Server 2012 provides a scalable and easy to manage virtual desktop infrastructure (VDI) solution. It offers three deployment choices for VDI - desktop sessions, pooled virtual machines, and personal virtual machines. The platform features centralized management, easy deployment through automation, unified administration, and streamlined virtual machine management. It delivers a consistently rich user experience for remote users through technologies like RemoteFX for graphics and USB redirection.
This document discusses server consolidation and virtualization using blade servers and VMware. It begins with an overview of server consolidation benefits like lower costs and improved efficiency. It then describes blade server types, consolidation steps, and system management. Case studies show how organizations implemented consolidation using blades. The document also covers VMware software products and how virtualization allows further consolidation. It ends by noting virtualization and consolidation can reduce complexity through a multi-step process.
This document summarizes Citrix CloudBridge and Branch Repeater, which provide a unified platform to accelerate applications across public and private networks. Key benefits include accelerating desktops, applications and multimedia to branch offices and mobile users, improving WAN performance, and optimizing XenDesktop and XenApp. Features include HDX acceleration, QoS, protocol support including TCP and SSL, security, integrated Windows services, and flexible management. It is available as virtual or physical appliances in various models.
Citrix Master Class - Live Upgrade from XenApp 6.5 to 7.6Lee Bushen
Video available here: http://www.citrix.com/tv/#videos/12787
Join technology experts Lee Bushen and Patrick Irwin as they discuss and demonstrate a step-by-step move from XenApp 6.5 to XenApp 7.6. With this live demo, we’ll take a user-centric approach and transition across to a new XenApp 7.6 environment with minimal disruption and retraining. We’ll be showing best-practice methods such as consolidating your old and new system with StoreFront, testing for application compatibility with AppDNA and upgrading a server live into the new XenDesktop 7.6 system.
VMworld 2013
Raymond Dusseault, VMware
Dean Flaming, VMware
Sarah Semple, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
This document provides an overview of application streaming and virtualization technologies. It discusses what application streaming is, how application isolation environments work through file system, registry, and object redirection rules. It then summarizes several major application virtualization solutions including Microsoft App-V, VMware ThinApp, CloudVolumes, Symantec SVS, Spoon, Numecent Jukebox, FSLogix, and Sandboxie. It also discusses how Windows provides some virtualization capabilities through UAC and application compatibility shims. In conclusion, it recommends considering simple virtualization solutions or SaaS-based services and reviewing a detailed comparison of vendors.
Application Streaming is dead. A smart way to choose an alternativeDenis Gundarev
Application streaming is dead according to the author. Application virtualization isolates applications from the operating system for improved security and compatibility. It virtualizes the file system, registry, and other system resources. Major application virtualization solutions include App-V from Microsoft, ThinApp from VMware, and CloudVolumes. Other options discussed are Symantec Workspace Streaming, Spoon, Jukebox, FSLogix, and Sandboxie. Windows also includes some virtualization capabilities with UAC and the Application Compatibility Toolkit.
The document provides an overview of the Endpoint Protection 10 solution from Sophos, including:
1) It protects against various threats like malware, adware, malicious URLs, and sensitive data leaks.
2) Protection is provided by SophosLabs active protection databases and techniques like application control, device control, and anonymizing proxies.
3) The solution includes endpoint software, Sophos Update Managers for updating endpoints, and the Sophos Enterprise Console for centralized management.
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...VMworld
VMworld 2013
Issy Ben-Shaul, VMware
Hanan Stein, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMware Mirage is an image management solution that centralizes desktop images on a Mirage server infrastructure. It allows for single image management, application layering, endpoint repair by restoring devices to a base image or snapshot, and operating system/hardware refreshes. Key components include the Mirage server, management server, storage, and optional branch reflectors, gateways, and file portals. Benefits for LAPKER include reducing bandwidth usage by transferring only changes, allowing disconnected updates, and fast rollbacks. Upgrades to the latest version require updating the management server first, then servers, with agents automatically upgrading.
VMware ThinApp is an agentless application virtualization solution that allows any Windows application to be run virtually from various devices without installing it locally or making changes to the underlying operating system. It uses a single executable or MSI file to encapsulate and isolate applications. ThinApp packages can be seamlessly deployed on any existing management framework and streamed from a file server to multiple users without additional infrastructure. It ensures security by executing applications in user-mode and sandboxing any registry or file system changes made by the application.
Microsoft System center Configuration manager 2012 sp1solarisyougood
This document discusses ways to empower users, simplify administration, and unify infrastructure using System Center 2012 Configuration Manager. It focuses on enabling mobile device management, deploying applications to new platforms like Windows 8, and reducing infrastructure requirements through a centralized administration site. It also covers cross-platform management capabilities for Linux, UNIX, and Mac systems.
Presentation technical deep dive of horizon 6 and mirage 5solarisyougood
The document provides an overview and summary of VMware's Horizon 6 and Mirage 5 solutions. It discusses how these solutions help organizations address challenges of managing mobile workforces and multiple devices per user through a unified workspace, simplified management, and reduced costs. Key capabilities covered include unified access to virtual desktops and applications from any device, centralized image management for physical and virtual endpoints, and automated desktop provisioning.
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld
VMworld 2013
Jared Cook, VMware
Ashish Jain, VMware
Andrew Johnson, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMware vSphere 5.1 is a virtualization platform that allows running multiple operating systems as virtual machines on a single physical server. It transforms hardware into software. Key benefits include maximizing hardware utilization, pooling resources, reducing costs, providing high availability, and making administration and backup/restore easier. The document discusses virtualization concepts and components, VMware products, storage, virtual center installation, and career opportunities in virtualization.
This document discusses different cloud computing layers (IaaS, PaaS, SaaS) and how IBM Integration Bus can integrate with them. It describes how tools like Chef, IBM UrbanCode Deploy, and Bluemix PaaS can be used to automate deployment and management of IIB in cloud environments. The document also discusses how IIB can connect to SaaS applications and provide APIs to expose integration services as cloud applications.
The document provides an overview of new features in vRealize Automation 7.0, including:
1. Simplified deployment architecture with fewer virtual appliance components and services to manage.
2. Enhanced identity management (vIDM) with multi-domain and multi-tenant support, SAML token integration, and improved scalability.
3. Converged blueprint designer that unifies infrastructure and application blueprinting and enables software component libraries and multi-tier application authoring.
4. Integration with NSX for on-demand networking and security group configuration during application deployment.
5. LifeCycle extensibility framework that enables centralized policy-based triggering of third-party integr
This document discusses VMware Dell solutions for VDI. It describes how VMware solutions can simplify management and application delivery by providing a single template for the complete environment that allows applications to be delivered and updated instantly at scale. It then discusses different types of virtual desktop deployments and protocols like Blast Extreme. It also covers topics like provisioning applications into a single application stack, using instant clones to copy desktop VMs, and innovations in hosted applications and RDS desktops in Horizon.
This document discusses tools in Visual Studio 2012 for diagnosing issues in ASP.NET applications in production environments. It covers the remote debugger, IntelliTrace, dump debugging, profiling, and managing symbols. The remote debugger allows debugging production apps without impacting performance but requires firewall configuration. IntelliTrace provides a "back-in-time" debugger using log files. Dump files capture app state at a point in time. Profiling identifies performance bottlenecks. Symbols are needed to map binaries to source and require matching the production build.
AAI-2016 WebSphere Application Server Installation and Maintenance in the Ent...WASdev Community
WebSphere Application Server Installation and Maintenance in the Enterprise discusses best practices for installing and maintaining WebSphere Application Server in an enterprise environment. Key points include:
- Manual installation and updates are time-consuming, so tools like Install Factory and IBM Installation Manager were created to automate the process.
- Maintenance includes applying interim fixes and fix packs. Fix packs bundle preventative maintenance fixes that have undergone extensive regression testing.
- It is important to apply maintenance proactively to reduce outages and their associated costs. A single fix pack can contain hundreds of fixes for defects and security issues.
- Careful planning is required for maintenance including testing strategies, change management processes, and understanding impacts
This document provides an overview and troubleshooting techniques for Citrix Application Streaming. It discusses new features in Offline Plugin 6.5 like VHD streaming, RadeFastLaunch, and SHA2 signing. VHD streaming is designed for use in pooled desktop environments and mounts the application VHD in C:\Program Files\Citrix\RadeCache\. Troubleshooting tips include checking registry keys, using tools like Process Explorer, Process Monitor, and Diskpart, and reviewing Citrix blogs and Sysinternals documentation. Helpful resources for streaming applications are also listed.
Similar to VMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive (20)
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld
1. This document provides an overview and agenda for a presentation on vSphere 6.x host resource deep dive topics including compute, storage, and network.
2. It introduces the presenters, Niels Hagoort and Frank Denneman, and provides background on their expertise.
3. The document outlines the topics to be covered under each section, including NUMA, CPU cache, DIMM configuration, I/O queue placement, driver considerations, RSS and NetQueue scaling for networking.
VMworld 2016: Troubleshooting 101 for HorizonVMworld
This document provides an overview of troubleshooting tools and techniques for Horizon. It begins with introductions and disclaimers. It then covers defining problems, identifying symptoms, gathering additional information, determining possible causes, identifying the root cause, resolving problems, and documenting solutions. Common troubleshooting tools are discussed, including ESXCLI commands, vSphere CLI commands, and log file locations and contents. Methods for collecting log files from Horizon components like desktops, clients, and servers are also provided.
VMworld 2016: Advanced Network Services with NSXVMworld
NSX provides network virtualization and security services including distributed firewalling, load balancing, and VPN connectivity. It reproduces traditional network and security functions in software throughout the virtual infrastructure for improved performance, agility, and security compared to physical appliances. Over 1700 customers use NSX across various industries, with growth of 100% year-over-year. NSX services can be distributed across hypervisors for massive scalability. The platform also integrates with security and application delivery partners to enhance its native capabilities.
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld
This document provides an overview of how to deploy VMware NSX with Cisco infrastructure, including:
- NSX has minimal requirements of 1600 MTU and IP connectivity and is agnostic to the underlying network topology.
- When using Cisco Nexus switches, VLANs must be configured for various traffic types and SVIs created with consistent IP subnets. Jumbo MTU is required across all links.
- NSX is also compatible with Cisco ACI fabrics using Fabric Path or DFA topologies, with the VXLAN VLAN spanning multiple pods/clusters across the fabric.
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld
This document discusses enforcing vSphere cluster designs using PowerCLI automation. It provides an overview of vSphere cluster design basics like HA and DRS configurations. It then discusses crafting declarative configurations to define the desired infrastructure state. Infrastructure as code principles are reviewed for managing configurations outside the endpoints. The presentation introduces the Vester project for declaratively configuring vSphere clusters using PowerCLI.
Horizon 7 introduces several new features including just-in-time desktops that instantly provision desktops and applications when users log in using VMware's instant clone technology. It also features smart policies that dynamically change desktop configurations based on user location or device. Infrastructure updates improve scalability and failover capabilities. The user experience is enhanced with support for 3D graphics, new protocols like Blast Extreme for optimized mobile access, and expanded capabilities for hosted applications and RDS desktops.
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld
Virtual Volumes provide a more efficient operational model for external storage management in vSphere. They integrate storage capabilities directly into virtual machines at the individual disk level through Storage Policy-Based Management. This simplifies operations by removing the need for static LUN/volume provisioning and allows storage services to be applied non-disruptively on a per-virtual machine basis according to policies. A key component is the VASA Provider, which is used to publish an array's storage capabilities and manage the creation of VM-level objects called Virtual Volumes on behalf of vSphere.
VMworld 2016: The KISS of vRealize Operations! VMworld
This presentation introduces new features in vRealize Operations 6.3 that simplify operations management. It begins with an overview of the vRealize Operations architecture and dashboard. New features are then demonstrated, including a recommended actions page, cluster resource dashboard, data collection notifications, workload balancing through rebalancing containers, guided remediation through alerts, integration with vRealize Log Insight, capacity management of clusters and projections, and extensibility with management packs. Finally, related VMworld sessions are listed that provide further information on capacity planning, troubleshooting, intelligent operations management, log insight, and network insight.
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld
This document provides an overview and introduction to PowerShell and PowerCLI for managing VMware environments. It discusses what PowerShell and PowerCLI are, important terminology like modules and functions, how to set them up and configure profiles, and examples of how to start coding with PowerShell including gathering data, writing logic statements, and using cmdlets safely. The presenters are introduced and an agenda is provided covering these topics at a high level to get started with PowerShell and PowerCLI.
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld
This document is a disclaimer stating that the presentation may include features still under development and not committed to be delivered in final products. Any features discussed are subject to change based on technical feasibility and market demand, and pricing and packaging have not been determined for any new technologies presented. The document is confidential.
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld
Virtualizing Active Directory domain controllers provides benefits like increased availability, scalability, and manageability. However, there are some technical challenges to address like ensuring proper time synchronization. This presentation provides best practices for virtualizing domain controllers including using host-guest affinity rules, disabling time synchronization settings, and ensuring the ESXi host clock is correct. It also introduces new "safety" features in Windows Server 2012 like VM GenerationID that help address issues from restoring or reverting snapshots like USN rollback.
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
Iain Leiter from A.T. Still University discussed their organization's migration from a hardware-based firewall to NSX to improve performance and compliance. Some key advantages of NSX include distributed firewalling for high performance and scalability, pay-as-you-grow flexibility, and advanced security features like microsegmentation. Their deployment process involved installing NSX, defining security groups, building security policies using syslog data from "recon rules", and applying a common services policy. Discoveries included many backdoors, application architecture issues, and the security benefits of microsegmentation.
VMworld 2015: Troubleshooting for vSphere 6VMworld
The document provides an overview of troubleshooting tools and techniques for vSphere 6. It discusses gathering diagnostic information, identifying potential causes, and resolving problems. The vSphere ESXi Shell and vCLI commands can be used to troubleshoot issues locally or remotely via SSH. An example troubleshooting process is provided to demonstrate defining a vMotion failure problem, gathering logs, testing connectivity, and resolving an incorrect VMkernel interface IP address.
VMworld 2015: Advanced SQL Server on vSphereVMworld
Microsoft SQL Server is one of the most widely deployed “apps” in the market today and is used as the database layer for a myriad of applications, ranging from departmental content repositories to large enterprise OLTP systems. Typical SQL Server workloads are somewhat trivial to virtualize; however, business critical SQL Servers require careful planning to satisfy performance, high availability, and disaster recovery requirements. It is the design of these business critical databases that will be the focus of this breakout session. You will learn how build high-performance SQL Server virtual machines through proper resource allocation, database file management, and use of all-flash storage like XtremIO. You will also learn how to protect these critical systems using a combination of SQL Server and vSphere high availability features. For example, did you know you can vMotion shared-disk Windows Failover Cluster nodes? You can in vSphere 6! Finally, you will learn techniques for rapid deployment, backup, and recovery of SQL Server virtual machines using an all-flash array.
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
Active Directory Domain Services (ADDS) allows organizations to deploy a scalable and secure directory service for managing users, resources and applications. Virtualization of ADDS has been supported for many years now, however has required careful management to avoid pitfalls around replication, time management, and access. Windows Server 2012 provides greater support for virtualization by including virtualization-safe features and support for rapid domain controller deployment.
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
Policy based management greatly simplifies the work of IT Administrators making it easy to ensure that applications and VMs receive the resources, protection and functionality required. Learn about the latest enhancements of Site Recovery Manager in this space, which represent a huge step towards providing policy based DR. In this session we'll dive deep into how this approach works and how to work with them.
VMworld 2015: Building a Business Case for Virtual SANVMworld
This presentation discusses building a business case for VMware Virtual SAN. It provides an overview of Virtual SAN and its benefits for customers like choice, integration, cost savings and performance. A case study is presented of how Dominos Pizza implemented Virtual SAN which resulted in roughly 40% lower costs compared to a traditional storage array. The presentation concludes by demonstrating the Virtual SAN assessment tool and various ways customers can try Virtual SAN.
Not content to simply describe the Virtual Volume (VVOL) framework, this session instead examines practical use cases: How different configurations and workloads benefit from VVOLs. Learn how Storage Policy Based Management (SPBM) couples with VVOLs to provide VM configuration options not previously available. We demonstrate a handful of real-life scenarios, specifically covering how VVOLs benefits oversubscribed systems, disaster recovery preparation and multi-tenant requirements for customers. Specific configuration options and constraints are covered in detail, including how they work with underlying storage.
VMworld 2015: Virtual Volumes Technical Deep DiveVMworld
This document provides a technical deep dive on virtual volumes. It begins with an overview of the challenges with today's LUN-centric storage architectures, such as complex provisioning, wasted resources, and lack of granular control. It then introduces an application-centric model using virtual volumes that provides dynamic storage service levels, fine-grained control at the VM level, and common management across arrays. The rest of the document details the management plane, data plane, consumption model using storage policy-based management, virtual machine lifecycles, snapshots, and offloading operations with virtual volumes.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
VMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
1. Horizon Mirage Image Deployment Deep Dive
Mark Ewert, VMware
Andy Philp, VMware
EUC5587
#EUC5587
2. 2
Agenda
Horizon Mirage Single Image Management Overview
Horizon Mirage Single Image Management Deep Dive
• Base Layer considerations and strategies
• Base Layer lifecycle
• How Base and App Layers are deployed
• Handling potential Base Layer conflicts
Questions?
4. 4
Layered, Single Image Management
Horizon Mirage Layers
Layers are stored in the data center
Mirage performs granular operations
on Mirage-managed endpoints
Orange layers continuously
backed up from endpoints
Green layers managed by IT –
OS, drivers
End User PC
Machine Identity Layer
(identity, customizations)
User Personalization Layer
(user data & profile, installed apps)
Base Layer
(OS, infra SW, core apps)
Driver Library
Mirage Application layers
5. 5
Horizon Mirage Layers
Apps not installed
by Mirage
User profile
User data
Machine
identity
Drivers
Base layer
Network Optimized
Synchronization & Streaming
Application layer(s)
Mirage
Servers &
Single
Instance
Stores
6. 6
Horizon Mirage Application Layers
Application Layers
• Traditional Windows apps and ThinApps
• Windows apps need to be captured
• Similar to ThinApp capture process
• Applications are “updated” (assigned) to CVDs
and CVD Collections
• App Layer deployment uses same mechanism
as Base Layer assignment
• Requires Base Layer to have been previously
deployed or deployed with App Layer
End User PC
Machine Identity Layer
(identity, customizations)
User Personalization Layer
(user data & profile, installed apps)
Base Layer
(OS, infra SW, core apps)
Driver Library
Application Layers
7. 7
Options: Multiple Applications per Layer and Multiple Layers
End User PC
Machine Identity Layer
User Personalization Layer
Base Layer
Driver Library
Application Layer
MS Office, Adobe Acrobat, Google Chrome
End User PC
Machine Identity Layer
Base Layer
Driver Library
Application Layer 1: MS Office
Application Layer 2: Adobe Acrobat
Application Layer 3: GoogleChrome
User Personalization Layer
8. 8
Single Base Layer + App Layers = Multiple Use Cases
End User PC
Machine Identity Layer
Everything else
User Personalization Layer
Base Layer
Driver Library
Finance Apps
Human Resources Apps
Training Apps
Development Apps
Sales Support Apps
9. 9
Single Image Management with Base and Application Layers
Finance Apps
HR Apps
IT Apps
Finance Desktops
HR Desktops
IT Desktops
Single
Base Layer
Windows 7
Antivirus
Common Apps
10. 10
Driver Profiles
Drivers required to support a specific brand/model of Endpoint
Decouples the hardware from the other layers
Download drivers from vendor and import into Mirage Driver library
11. 11
Single Image Management with Driver Profiles
Dell Drivers
HP Drivers
Lenovo Drivers
Dell Laptops
HP Laptops
Lenovo Laptops
Single
Base Layer
12. 12
Bringing It All Together: Single Image Management
Single
Base Layer
Windows 7
Antivirus
Common Apps
Dell Drivers
HP Drivers
VMware Drivers
Finance Apps
HR Apps
IT Apps
Up to 20,000
Endpoints
13. 13
Image Management Step 1: Build Reference Machine
Network
Mirage server cluster
Mirage SIS
Laptop (or PC)
with Mirage client
Golden master VM
with Mirage client
Mirage Reference Machine
14. 14
Step 2: Create Reference Centralized Virtual Desktop (CVD)
Mirage server cluster
Mirage SIS
Only unique files
are copied across
the network
Network
Network optimized synchronization
Laptop (or PC)
with Mirage client
Golden master VM
with Mirage client
Mirage Reference Machine
15. 15
Step 3: Capture a Base Layer
Mirage
console
Reference
CVDs
Mirage SIS
Base Layer
Desktop Admin
Mirage server cluster
Base Layer Rules
16. 16
Step 4: Assign (Deploy) the Base Layer
Network
Mirage server cluster
Mirage SIS
Mirage
console
Base
Layer
Network
Collection
18. 18
Horizon Mirage Layers Recap
Horizon Mirage Layers
Layers are stored in the data center
Mirage performs granular operations
on Mirage-managed endpoints
Orange layers continuously
backed up from endpoints
Green layers managed by IT –
OS, drivers
End User PC
Machine Identity Layer
(identity, customizations)
User Personalization Layer
(user data & profile, installed apps)
Base Layer
(OS, infra SW, core apps)
Driver Library
Mirage Application layers
19. 19
Base Layers
Base Layers are:
• a copy of the configuration of an Endpoint containing the operating system,
updates and service packs, and common applications
• captured from Reference Machine
Base Layers can be:
• deployed to Endpoints via CVDs and CVD Collections
• used to migrate Windows XP to Windows 7
• created and tested in the datacenter before deployment
Base Layer
(OS, infra SW, core apps)
20. 20
Base Layer Considerations
Have as few Base Layers as possible,
one Base Layer is ideal!
Hardware Considerations
• most drivers can be handled by Driver Profiles
• a few drivers need to be installed after layer deployment
• some hardware requires “support software”
• Unified communications, scanners, point of sale
• VMware Tools
21. 21
Base Layer Considerations
Applications
• include system-level software: firewalls and antivirus
• software common to multiple departments or use-cases
OS and Software Licensing
• Volume licenses preferred
• Microsoft VLK for Windows and Office automatically detected
• MAK, Retail keys
• handled manually or via script after first layer deployment
• Applications tied to specific hardware or hardware key
• not recommended for Base Layer. Install outside of Mirage.
22. 22
Base Layers and Endpoint Encryption Software
Full Disk Encryption
• Mirage cannot make changes to partitions or boot sectors
• Install FDE that modify hard drives before Mirage
• Checkpoint FDE, PGPDisk, Sophos Safeguard, McAfee Endpoint Encryption
• Sophos v5.5 IS supported
Microsoft Bitlocker
• Bitlocker is fully supported by Mirage
• Must be enabled.
• Base Layers do not enable or disable Bitlocker
Microsoft Encrypted File System (EFS)
• Mirage supports EFS
• files are uploaded to Mirage unencrypted
• protecting (backing up) EFS files is enabled by default
23. 23
Base Layer Strategy: Department or Use Case Specific
Base Layer contents
• Operating system
• AntiVirus and Firewall
• Standard utilities
• Departmental applications
• Use case specific applications
Everything handled in single layer
• does not require external app deployment
Drawback: more reference machines and base layers to maintain
24. 24
Base Layer Strategy: Specialized Hardware
Base Layer contents
• Operating system
• AntiVirus and Firewall
• Standard utilities
• Point of Sale (PoS) hardware support
• PoS applications
Benefits: supports hardware required by special use case (PoS)
Drawback: more reference machines and base layers to maintain
25. 25
Base Layer Strategy: Generic Standard Desktop
Base Layer contents
• Operating system
• AntiVirus and Firewall
• Standard utilities
Driver Profile
Supports multiple departments and use cases
• Fewer reference machines and base layers to maintain
Drawback: requires another way to handle applications
27. 27
Base Layer Lifecycle
Build and Test Reference Machine
Create Reference CVD
Create Base Layer
Test Base Layer
Deploy Base Layer to Endpoints
• with Driver Profile and optional App Layer(s)
28. 28
Base Layer Lifecycle Continued
Update Reference Machine
Changes update Reference CVD via
Mirage synchronization (backup)
Create updated Base Layer
Test updated Base Layer
Deploy updated Base Layer to Endpoints
• with optional updated Driver Profile and App Layer(s)
29. 29
How Layers Are Deployed
1. Mirage logically “flattens” the layers
2. Takes VSS snapshot of each Endpoint
3. Analyzes Endpoints to determine what
to download
Local
Base Layers
Server
30. 30
How Layers Are Deployed
4. Just the files and settings required are
downloaded to each Endpoint
5. User prompted to Reboot
6. Mirage merges Layer into existing
config during Windows boot
7. User logs in
8. Mirage finalizes Layer deployment
• Driver detection
32. 32
Base Layer Conflicts
Base Layers can potentially conflict with software
installed on Endpoints.
• older version of application in Base Layer
• Windows updates in Base Layer conflict with Endpoint application
requirements
• newer updates on Endpoint conflict with versions in Base Layer
Handling Conflicts:
1. Test before deployment
2. Layer Dry-Run Reports
3. Base Layer Rules
4. Base Layer Override Policies
35. 35
What Base Layers Capture
Base Layer captures include by default:
• Contents of the C: drive (with some exceptions)
• All major settings
• HKEY_LOCAL_MACHINESYSTEMCurrentControlSet
• HKEY_LOCAL_MACHINESOFTWARE
Captures do NOT include:
• Machine identity
• User profiles
36. 36
Base Layer Rules and Override Policies
Base Layer Rules:
• what is included and excluded in a Base Layer capture
• what is explicitly protected from being overwritten on Endpoints
during Base Layer deployment
Base Layer Override Policies
• enable special handling based on existence of files or registry settings
• example: if specific files required by Office 2007 exist, do not overwrite
them with newer versions in the Base Layer
37. 37
Anatomy of Base Layer Rules: File System
1. Show Factory Rules
2. Do Not Download: Rules
Files that will NOT be overwritten
by layer
3. Rule Exceptions:
Files within the do not download
areas that WILL be overwritten by
layer.
1
2
3
38. 38
Anatomy of Base Layer Rules: Registry
1. System and Software Hives
HLKMSystemCurrentControlSet
HKLMSoftware
2. Registry Keys to Exclude
Keys that will NOT be overwritten
by layer
3. Registry Values to Exclude:
Values that will NOT be overwritten
by layer
1
2
3
39. 39
Base Layer Rules Example – Windows Defender
1
2
1. File System Do Not Download Rules
2. Registry Keys to Exclude:
HKLMSYSTEM Hive
40. 40
Base Layer Rules Example – Windows Defender
3
3. Registry Keys to Exclude:
HKLMSOFTWARE Hive
41. 41
Base Layer Override Policies
Enable preserving files and registry settings IF they already exist.
42. 42
Base Layer Override Policy Example – Zimbra Desktop
1
2
1. File System: Do Not Override
by Layer
2. Not-to-Override Registry Keys:
HKLMSOFTWARE Hive
3
3. Not-to-Override Registry Values:
HKLMSOFTWARE Hive
44. 44
Other VMware Activities Related to This Session
HOL:
HOL-MBL-1309
Horizon Mirage - Manage Physical Desktops
Group Discussions:
EUC1000-GD; EUC1004-GD
Mirage with Daniel Beveridge or Mark Ewert