The document discusses the future of software-defined storage in 3 years. It predicts that storage media will continue to advance with higher capacities and lower latencies using technologies like 3D NAND and NVDIMMs. Networking and interconnects like NVMe over Fabrics will allow disaggregated storage resources to be pooled and shared across servers. Software-defined storage platforms will evolve to provide common services for distributed data platforms beyond just block storage, with advanced data placement and policy controls to optimize different workloads.
Not content to simply describe the Virtual Volume (VVOL) framework, this session instead examines practical use cases: How different configurations and workloads benefit from VVOLs. Learn how Storage Policy Based Management (SPBM) couples with VVOLs to provide VM configuration options not previously available. We demonstrate a handful of real-life scenarios, specifically covering how VVOLs benefits oversubscribed systems, disaster recovery preparation and multi-tenant requirements for customers. Specific configuration options and constraints are covered in detail, including how they work with underlying storage.
VMworld 2015: Conducting a Successful Virtual SAN Proof of ConceptVMworld
In this session, Cormac Hogan and Julienne Pham of VMware take a comprehensive look at the setup, policy management, failure handling, and monitoring tools needed to perform a successful Proof of Concept. This session empowered attendees to go and implement their own VSAN POCs.
Not content to simply describe the Virtual Volume (VVOL) framework, this session instead examines practical use cases: How different configurations and workloads benefit from VVOLs. Learn how Storage Policy Based Management (SPBM) couples with VVOLs to provide VM configuration options not previously available. We demonstrate a handful of real-life scenarios, specifically covering how VVOLs benefits oversubscribed systems, disaster recovery preparation and multi-tenant requirements for customers. Specific configuration options and constraints are covered in detail, including how they work with underlying storage.
VMworld 2015: Conducting a Successful Virtual SAN Proof of ConceptVMworld
In this session, Cormac Hogan and Julienne Pham of VMware take a comprehensive look at the setup, policy management, failure handling, and monitoring tools needed to perform a successful Proof of Concept. This session empowered attendees to go and implement their own VSAN POCs.
The popularity of Virtual SAN is growing daily. Server admins are finally free to aggregate storage in their servers to create a shared storage system that scales with their compute needs. The underlying key to making it all work is networking. All Virtual SAN data flows through it, and correct selection and configuration of networking components will mean the difference between disruptive success or dramatic failure. This session will give deep insight in the do's and don'ts of Virtual SAN networking. Best practices for physical and virtual switch configuration and performance testing will be discussed. Virtual SAN 5.5 and 6.0 will be covered, and the networking differences discussed. Methods of troubleshooting network issues will be covered. For those configuring a Virtual SAN network for the first time, for labs or enterprise scale, this session is a must-see.
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
Policy based management greatly simplifies the work of IT Administrators making it easy to ensure that applications and VMs receive the resources, protection and functionality required. Learn about the latest enhancements of Site Recovery Manager in this space, which represent a huge step towards providing policy based DR. In this session we'll dive deep into how this approach works and how to work with them.
VMworld 2015: Advanced SQL Server on vSphereVMworld
Microsoft SQL Server is one of the most widely deployed “apps” in the market today and is used as the database layer for a myriad of applications, ranging from departmental content repositories to large enterprise OLTP systems. Typical SQL Server workloads are somewhat trivial to virtualize; however, business critical SQL Servers require careful planning to satisfy performance, high availability, and disaster recovery requirements. It is the design of these business critical databases that will be the focus of this breakout session. You will learn how build high-performance SQL Server virtual machines through proper resource allocation, database file management, and use of all-flash storage like XtremIO. You will also learn how to protect these critical systems using a combination of SQL Server and vSphere high availability features. For example, did you know you can vMotion shared-disk Windows Failover Cluster nodes? You can in vSphere 6! Finally, you will learn techniques for rapid deployment, backup, and recovery of SQL Server virtual machines using an all-flash array.
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
Active Directory Domain Services (ADDS) allows organizations to deploy a scalable and secure directory service for managing users, resources and applications. Virtualization of ADDS has been supported for many years now, however has required careful management to avoid pitfalls around replication, time management, and access. Windows Server 2012 provides greater support for virtualization by including virtualization-safe features and support for rapid domain controller deployment.
What is coming for VMware vSphere?
Delivered at VMUG DK/UK/BE in November 2014. Session is all about vSphere futures, what can be expected in the near future.
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...VMworld
This session discusses the lessons learned from VMware Professional Services Engineering during development of collateral for customers. It brings real world experiences to light, so that common issues can be addressed prior to deployment of the solution, rather than after the fact.
VMworld 2015: Extreme Performance Series - vSphere Compute & MemoryVMworld
In this session we'll dive deep into how the vSphere compute and memory schedulers work to provide the same level of performance as bare metal. Hosted by two outstanding performance engineers, they will review concepts like how and when vSphere schedules vCPUs, how virtual machines are idles, understand virtual machine memory overhead and how large memory pages help or hurt performance. If you want to understand what vSphere does at an atomic level you don't want to miss this advanced session.
VMworld 2013: Meaningful Mobility: The Future of End-User Computing in Public...VMworld
VMworld 2013
Matt Cooley, VMware
William Walders, WRNMMC
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
The popularity of Virtual SAN is growing daily. Server admins are finally free to aggregate storage in their servers to create a shared storage system that scales with their compute needs. The underlying key to making it all work is networking. All Virtual SAN data flows through it, and correct selection and configuration of networking components will mean the difference between disruptive success or dramatic failure. This session will give deep insight in the do's and don'ts of Virtual SAN networking. Best practices for physical and virtual switch configuration and performance testing will be discussed. Virtual SAN 5.5 and 6.0 will be covered, and the networking differences discussed. Methods of troubleshooting network issues will be covered. For those configuring a Virtual SAN network for the first time, for labs or enterprise scale, this session is a must-see.
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
Policy based management greatly simplifies the work of IT Administrators making it easy to ensure that applications and VMs receive the resources, protection and functionality required. Learn about the latest enhancements of Site Recovery Manager in this space, which represent a huge step towards providing policy based DR. In this session we'll dive deep into how this approach works and how to work with them.
VMworld 2015: Advanced SQL Server on vSphereVMworld
Microsoft SQL Server is one of the most widely deployed “apps” in the market today and is used as the database layer for a myriad of applications, ranging from departmental content repositories to large enterprise OLTP systems. Typical SQL Server workloads are somewhat trivial to virtualize; however, business critical SQL Servers require careful planning to satisfy performance, high availability, and disaster recovery requirements. It is the design of these business critical databases that will be the focus of this breakout session. You will learn how build high-performance SQL Server virtual machines through proper resource allocation, database file management, and use of all-flash storage like XtremIO. You will also learn how to protect these critical systems using a combination of SQL Server and vSphere high availability features. For example, did you know you can vMotion shared-disk Windows Failover Cluster nodes? You can in vSphere 6! Finally, you will learn techniques for rapid deployment, backup, and recovery of SQL Server virtual machines using an all-flash array.
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
Active Directory Domain Services (ADDS) allows organizations to deploy a scalable and secure directory service for managing users, resources and applications. Virtualization of ADDS has been supported for many years now, however has required careful management to avoid pitfalls around replication, time management, and access. Windows Server 2012 provides greater support for virtualization by including virtualization-safe features and support for rapid domain controller deployment.
What is coming for VMware vSphere?
Delivered at VMUG DK/UK/BE in November 2014. Session is all about vSphere futures, what can be expected in the near future.
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...VMworld
This session discusses the lessons learned from VMware Professional Services Engineering during development of collateral for customers. It brings real world experiences to light, so that common issues can be addressed prior to deployment of the solution, rather than after the fact.
VMworld 2015: Extreme Performance Series - vSphere Compute & MemoryVMworld
In this session we'll dive deep into how the vSphere compute and memory schedulers work to provide the same level of performance as bare metal. Hosted by two outstanding performance engineers, they will review concepts like how and when vSphere schedules vCPUs, how virtual machines are idles, understand virtual machine memory overhead and how large memory pages help or hurt performance. If you want to understand what vSphere does at an atomic level you don't want to miss this advanced session.
VMworld 2013: Meaningful Mobility: The Future of End-User Computing in Public...VMworld
VMworld 2013
Matt Cooley, VMware
William Walders, WRNMMC
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Webinar - Minimise your security risk with Hybrid Cloud and OVH vRackOVHcloud
Discover how a hybrid cloud, with the OVH vRack can helps you to minimize your IT security risks.
The associated Webinar took place on February 25th, 2016
Discover our next Webinar and events : http://www.ovh.co.uk/events/
1. The OVH vRack: how to minimise your security risk with Hybrid Cloud
2. Thank you for joining this Webinar
3. Some information about the Webinar
4. Today’s speaker : Danny Lang - Infrastructure and Network specialist
5. Webinar Agenda
6. Facts and figures, 61% of businesses affected by incidents in 2015
7. Impacts of these incidents
8. The solutions
9. Use cases
10. Typical Startup using an in-house Dedicated Server
11. Outsourcing the Dedicated Server
12. Typical Startup (outsourced)
13. Typical Startup infrastructure evolution
14. N-tier architecture - Stage 1
15. N-tier architecture - Stage 2 : Optimized availability
16. N-tier architecture - Stage 2 : High availability
17. N-tier architecture with Dedicated Cloud : High availability, vRack
18. N-tier architecture with Dedicated Cloud : High availability, vRack, hybrid
19. N-tier architecture with Dedicated Cloud : High availability, vRack, hybrid, multi-continent
20. Products used
21. Questions and Answers session
22. Q&A part 1
23. Q&A part 2
24. Q&A part 3
25. Q&A part 4
26. Q&A part 5
27. Keep in touch
28. Thank you
Découvrez en détail les caractéristiques et avantages des lignes à débit symétrique SDSL d’OVH Télécom.
1. OVH Télécom - SDSL
2. Connexion SDSL OVH
3. Arguments clés
4. SDSL, Symetric Digital Subscriber Line
5. GTR, Garantie de Temps de Rétablissement
6. SDSL, une technologie adaptée pour la VoIP
7. Connexion hybride ADSL/SDSL
8. Schéma de connexion physique
9. Protocole ATM & EFM
10. Vitesse de synchronisation
11. Les modems SDSL OVH
12. Testez votre ligne
13. Merci
OverTheBox is a solution which combines up to 4 Internet connections. You can connect it to any operator using only one RJ45 port. Find out how!
1. Introduction to OverTheBox
2. Part I - What it is
3. OVH launches the OverTheBox
4. Schematics : Aggregation
5. Schematics : Load Balancing
6. Schematics : Active Fail-Over
7. Technical specifications
8. Part II - Why did we do it ?
9. The choice is a luxury
10. Do you mix ?
11. The different combinations
12. Part III - How does it works ?
13. Implementation, and end-to-end schematics 14. The box is equipped with 1 RJ45 1Gbps port 15. You can connect up to 4 modems 16. The OverTheBox’s DHCP is in control 17. Wifi is managed by the modems
18. Part IV - Our recipe
19. The technologies we used
20. Infrastructure details
21. Part V - Quick start
22. Before starting
23. Subscription & first WAN
24. The funnel of activation
25. Service subscription and activation
26. Subscription
27. Running
28. Adding another WAN
29. Everything is green ? All is OK
30. Test the aggregate and the fail-over
31. Part VI - Go further
32. Onboarding center
33. GitHub
34. Thank you
[FR] Timeseries appliqué aux couches de bébéOVHcloud
Il y a un nouveau type de bases de données à la mode : les timeseries. Je tenterais bien de vous expliquer comment ça fonctionne, mais je dois d'abord aller changer la couche de bébé... Par Vincent Casse, développeur chez OVH.
Tous ceux qui font du web connaissent HTTP. Mais que se passe-t-il quand on le pousse dans ses retranchements ? Retours d’expérience sur nos développements en interne.
[FR] OVH Webinar : 10 questions à poser à votre Cloud Service ProviderOVHcloud
Un fournisseur de cloud ne devrait pas craindre de répondre à toute question légitime posée par un utilisateur potentiel. Tour d'horizon en 10 questions des principaux facteurs de choix, en toute transparence.
Shamit khemka discusses Popular types of Software & their usages in Current S...SynapseIndia
Software is a form of written data in code that is transmitted to your computer to perform certain tasks commanded by you. For every program that you wish to run on your computer, there will be a different coded instruction. SynapseIndia Founder Shamit Khemka discusses popular types of software & their usages in current scenario for various Web development & design processes.
MayaData Datastax webinar - Operating Cassandra on Kubernetes with the help ...MayaData Inc
In this webinar experts from DataStax - the lead developer of Cassandra - and from MayaData - the lead developer of OpenEBS and LitmusChaos - will discuss and demonstrate ways to ensure the ease of use and resilience of Cassandra on Kubernetes.
Topics to be discussed and demonstrated include:
Provisioning underlying storage - how to make it consistent irrespective of the underlying hardware or cloud? Are there are ever reasons to have the storage replicate across nodes or is dynamic LocalPV the best choice in all cases?
Cass Operator - DataStax Kubernetes Operator for Apache Cassandra
Resilience - how to proactively assess the overall environment including the underlying Kubernetes with the help of Litmus
New Ceph capabilities and Reference ArchitecturesKamesh Pemmaraju
Have you heard about Inktank Ceph and are interested to learn some tips and tricks for getting started quickly and efficiently with Ceph? Then this is the session for you!
In this two part session you learn details of:
• the very latest enhancements and capabilities delivered in Inktank Ceph Enterprise such as a new erasure coded storage back-end, support for tiering, and the introduction of user quotas.
• best practices, lessons learned and architecture considerations founded in real customer deployments of Dell and Inktank Ceph solutions that will help accelerate your Ceph deployment.
Software Defined Storage, Big Data and Ceph - What Is all the Fuss About?Red_Hat_Storage
Software Defined Storage, Big Data and Ceph - What Is all the Fuss About? By: Kamesh Pemmaraju,Neil Levine
Have you heard about Inktank Ceph and are interested to learn some tips and tricks for getting started quickly and efficiently with Ceph? Then this is the session for you! In this two part session you learn details of: • the very latest enhancements and capabilities delivered in Inktank Ceph Enterprise such as a new erasure coded storage back-end, support for tiering, and the introduction of user quotas. • best practices, lessons learned and architecture considerations founded in real customer deployments of Dell and Inktank Ceph solutions that will help accelerate your Ceph deployment.
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageMayaData Inc
Webinar Session - https://youtu.be/_5MfGMf8PG4
In this webinar, we share how the Container Attached Storage pattern makes performance tuning more tractable, by giving each workload its own storage system, thereby decreasing the variables needed to understand and tune performance.
We then introduce MayaStor, a breakthrough in the use of containers and Kubernetes as a data plane. MayaStor is the first containerized data engine available that delivers near the theoretical maximum performance of underlying systems. MayaStor performance scales with the underlying hardware and has been shown, for example, to deliver in excess of 10 million IOPS in a particular environment.
DCEU 18: Use Cases and Practical Solutions for Docker Container Storage on Sw...Docker, Inc.
Mark Church - Product Manager, Docker
Don Stewart - Solutions Architect, Docker
Persistent storage has quickly advanced from something considered incompatible with containers to a mature set of solutions and patterns that have been thoroughly adopted by the industry. We’ll define the persistent characteristics of different use-cases and map these to some of the many solutions that exist for container storage. From this talk you’ll learn about the storage options available to users on Swarm, Kubernetes, on-premises, cloud, and how they work and compare to each other. You’ll also learn how to characterize different persistent application requirements and the solutions best for suited for them.
Gestione gerarchica dei dati con SUSE Enterprise Storage e HPE DMFSUSE Italy
In questa sessione HPE e SUSE illustrano con casi reali come HPE Data Management Framework e SUSE Enterprise Storage permettano di risolvere i problemi di gestione della crescita esponenziale dei dati realizzando un’architettura software-defined flessibile, scalabile ed economica. (Alberto Galli, HPE Italia e SUSE)
DCEU 18: Provisioning and Managing Storage for Docker ContainersDocker, Inc.
Anshul Pundir - Senior Software Engineer, Docker
Anusha Ragunathan - Senior Software Engineer, Docker Inc
In this talk, we will discuss storage concepts related to containers on the Docker platform with the perspective of what is important throughout the lifecycle of an application., We will focus on application provisioning: creating persistent volumes and policies for stateful data and management: replication and failover scenarios, backup/restore, monitoring etc. Through this talk, we will cover the latest storage features and also some of the current and future direction of container storage. Key concepts covered about running stateful applications: - Persistent Volumes - Provisioning (Static vs Topology-aware) - Data Availability (failover with scheduler policies) - Data Protection (using Backup/Restore) - Monitoring (using Prometheus/Grafana dashboards) We will look at each of the characteristics in detail with demos.
This presentation will dive into all the storage options available with the most popular container orchestrators such as Kubernetes, Docker, and Mesos.
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
This year VMware vSphere 6 combined with vRealize Operations 6.1 (vR Ops 6) adds critical features to increase technical agility in the infrastructure, and reduce Mean time to Repair. With a new Automated remediation action framework in vR Ops, vSphere 6’s ability to vMotion Physical Raw Device mappings (RDMs), and a complete Management Pack Ecosystem for monitoring Infrastructure to applications, administrators have the tools needed to get to maintain 5 9’s uptime, shorten Mean Time to Repair (MTTR), and predict capacity requirements as and when the business requires.. This session will be a deep technical explanation, and live demonstration of these tools. It will give administrators a solid understanding of how they can use these tools to monitor and manage their application clusters, keep applications running during Infrastructure maintenance, and get deep holistic visibility into the entire Application ecosystem, from Storage to Networking.
VMware 2015: Next Horizon for Cloud Networking and SecurityVMworld
Software Defined Networking (SDN) and network virtualization has become an accepted part of modern data center architecture. The transformation of networking into a software industry has accelerated innovation and given rise to a number of new technologies and use cases that were previously impossible. Network virtualization is starting to have profound impact on services, security, the underlying physical networks and the organization of the IT organizations that use them. How will network virtualization impact the next horizon for cloud networking and security?
In this session Guido Appenzeller presents a tech-preview of NSX working with Docker Containers and Amazon Web Services (AWS). Additional speakers include Scott Lowe, Mukesh Hira and Jacob Cherkas from VMware and Suneet Nandwani from eBay.
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld
VMware’s latest 6.0 version of the vSphere Distributed Switch (VDS) provides unparalleled networking features, control mechanisms, and new ways to construct a LAN topology. In this year’s version of one of the highest rated VMworld sessions, you’ll get front row seats to a deep dive on the VDS in a variety of real world use cases. Gain new knowledge for building multi-tenant capable configurations with NIOC version 3 and CoS marking, learn how to protect critical vSphere management workloads consuming the VDS, and follow along as we review the steps necessary to leverage the TCP/IP stack for routed vMotion.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like in 3 Years Time?
1. The Future of Software-Defined Storage –
What Does It Look Like in 3 Years Time?
Richard McDougall, VMware, Inc
CTO6453
#CTO6453
2. • This presentation may contain product features that are currently under development.
• This overview of new technology represents no commitment from VMware to deliver these
features in any generally available product.
• Features are subject to change, and must not be included in contracts, purchase orders, or
sales agreements of any kind.
• Technical feasibility and market demand will affect final delivery.
• Pricing and packaging for any new technologies or features discussed or presented have not
been determined.
Disclaimer
CONFIDENTIAL 2
3. This Talk: The Future of SDS
CONFIDENTIAL 3
Hardware
Futures & Trends
New Workloads
Emerging Cloud Native Platforms
4. Storage Workload Map
4
1 Million
IOPS
One
Thousand
IOPS
10’s of
Terabytes
10’s of
PetabytesNew
WorkloadsFocus
of Most
SDS
Today
CONFIDENTIAL
5. What Are Cloud-Native Applications?
Developer access via APIs
Microservices, not
monolithic stacks
Application
Continuous integration
and deployment
Availability architected in the
app, not hypervisor
Built for scale
Decoupled from
infrastructure
CONFIDENTIAL 5
6. What do Linux Containers Need from Storage?
• Ability to copy & clone root images
• Isolated namespaces between containers
• QoS Controls between containers
6
Parent Linux
Container 1
/
/etc /containers
/containers/cont1/rootfs
etc var
/containers/cont2/roofts
etc var
Container 2
Option A: copy whole root tree CONFIDENTIAL 6
7. Containers and Fast Clone Using Shared Read-Only Images
• Actions
– Quick update of child to use same boot image
• Downsides:
– Container root fs not writable
7
/
/etc /containers
/containers/cont1/rootfs
etc var
CONFIDENTIAL 7
9. Docker’s Direction: Leverage native copy-on-write filesystem
Goal:
– Snap single image into writable clones
– Boot clones as isolated linux instances
9
Parent Linux
Golden
/
/etc /containers
/containers/golden/rootfs
etc var
/containers/cont1/roofts
etc var
Container 1
# zfs snapshot cpool/golden@base
# zfs clone cpool/root@base cpool/cont1
CONFIDENTIAL 9
10. /
/etc /containers
/containers/cont1/rootfs
etc shared var
Shared /containers/cont2/roofts
etc shared var
Shared Data: Containers can Share Filesystem Within Host
Containers Today:
Share within the host
Containers Future:
Share across hosts
Clustered File Systems
10
container1 container2
CONFIDENTIAL 10
11. Docker Storage Abstractions with Linux Containers
CONFIDENTIAL 11
Docker
Container
/
/etc /var
/data
Non-persistent
boot environment
Local
Disks
“VOLUME /var/lib/mysql”
Persistent
Data
12. Container Storage Use Cases
CONFIDENTIAL 12
Unshared Volumes Shared Volumes Persist to External Storage
Use Case: Running container-
based SQL or noSQL DB
Use Case: Sharing a set of tools
or content across app instances
Use Case: Object store for
retention/archival, DBaaS for
config/transactions
Host
C C
Storage Platform
Host
C C
Host
C C
Host
C C
Storage Platform
Host
C C
Host
C C
Cloud
Storage
API API
13. Hadoop
batch analysis
Eliminate the Silos: Converged Big Data Platform
Distributed Resource Manager or Virtualization platform
Host Host Host Host Host Host
HBase
real-time queries
NoSQL
Cassandra,
Mongo, etc
Big SQL
Impala,
Pivotal HawQCompute
layer
Distributed Storage Platform
Host
Other
Spark,
Shark,
Solr,
Platfora,
Etc,…
File System (HDFS, MAPR, GPFS) Block StoragePOSIX
CONFIDENTIAL 13
16. Storage Media Technology: Capacities & Latencies – 2016
16
Magnetic Storage
NVMe SSD
DRAM
~500ns
~10ms
~1s
NVM
~100ns
Capacity Oriented SSD
Object Storage
~1ms
~10us
Trip to Australia in 12 hours
Trip to Australia in 1 hour
Trip to Australia in 36 seconds
Trip to Australia in 1.8 seconds
Trip to Australia in .3 seconds
Trip to Australia in 50 days
1TB
1TB
4TB
16TB
32TB
CONFIDENTIAL
4TB
4TB
48TB
192 TB
384TB
Per
Host
17. 17
Storage Media Technology
1 Million
IOPS
One
Thousand
IOPS
10’s of
Gigabytes
10’s of
Terabytes
3D NAND
“Capacity Flash”
2D NAND
“IOPS Flash”
CONFIDENTIAL
18. NVDIMM’s
18
Magnetic Storage
NVMe SSD
DRAM
~500ns
~10ms
~1s
NVM
~100ns
Capacity Oriented SSD
Object Storage
~1ms
~10us
1TB
1TB
4TB
16TB
32TB
CONFIDENTIAL
Std DRAM Event Xfer NANDDDR3 / DDR4
NVDIMM-N[2]
(Type 1)
NANDRAM
Buffer
Async Block XferDDR3 / DDR4
NVDIMM-F[1]
(Type 3)
NVMSync XferDDR4
Type 4[1]
DRAM + NAND: Non-volatile Memory Load/Store
DRAM + NAND: Non-volatile Memory Block Mode
Next Generation Load/Store Memory
More in INF66324 – Non-Volatile Memory
19. 3D XPoint™ Technology: An Innovative, High-Density Design[1]
19
• Non-Volatile
• 1000x higher write endurance than NAND
• 1000x Faster than NAND
• 10x Denser than DRAM
• Can serve as system memory and storage
• Cross Point Structure: allows individual
memory cell to be addressed
• Cacheline load/store should be possible.
• Stackable to boost density
• Memory cell can be read or written w/o
requiring a transistor, reducing power & cost
1. “Intel and Micron Produce Breakthrough Memory Technology”, Intel
21. What’s Really Behind a Storage Array?
23
OS
Storage
Stack
Data
Services
OS
Storage
Stack
Data
Services
Dual Failover
Processors
Clustered
OS
iSCSI, FC, etc
Shared Disk
SAS or FC
Fail-over
Services
De-dup
Volumes
Mirroring
Caching
Etc,…
Industry std
X86 Servers
SAS or FC
Network
CONFIDENTIAL
22. Different Types of SDS (1):
24
Fail-Over Software
on Commodity Servers
HP
Dell
Intel
Super-Micro
etc,…
Nextenta
Data On-tap Virtual
Appliance
EMC VNX VA
etc,…OS
Storage
Stack
Data
Services
OS
Storage
Stack
Data
Services
Your
Servers
Software-
Defined
Storage
CONFIDENTIAL
23. (1) Better: Software Replication Using Servers + Local Disks
25
OS
Data
Services
OS
Storage Stack
Data
Services
Software
Replication
Clustered
Storage
Stack
Simpler
Server
configuration
Lower cost
Less to go
wrong
Not very
Scalable
CONFIDENTIAL
24. (2) Caching Hot Core/Cold Edge
26
Scale-out Storage Service
Hot Tier
Caching of Reads/Writes
Host Host Host Host Host Host Host
Compute Layer – All Flash
Host
Low Latency Network
iSCSIS3
Scale-out
Storage Tier
CONFIDENTIAL
25. (3) Scale-Out SDS
27
OS
Storage Stack
OS OS OS
Storage
Network
Protocol
iSCSI or
Proprietary
Compute Scalable
More Fault
Tolerance
Rolling
Upgrades
More
Management
(Separate
compute and
storage silos)
Data
Services
Data
Services
Data
Services
Data
Services
CONFIDENTIAL
26. (4) Hyperconverged SDS
28
Hypervisor
Storage Stack
Hypervisor Hypervisor Hypervisor
Easier
Management:
(Top-Down
Provisioning)
Scalable
More Fault
Tolerance
Rolling
Upgrades
Fixed
Compute and
Storage Ratio
Data
Services
App App App App App
VSAN
CONFIDENTIAL
30. Device Interconnects
Server
PCI-e Bus
HCA
SATA/SAS HDD/SSDs
Server
PCI-e Bus
NVMe SSD
Intel P3700 @3Gbytes/sec
SATA
SAS
Server
PCI-e Bus
Electrical
Adapter NVM
Over
PCIe
Flash:
- Intel P3700 @3GB/s
- Samsung XS1715
NVM
- Future devices
SAS 6-12G @ 1.2Gbytes/sec
4 lanes gen3 x 4 = 4Gbytes/sec
HCA
HCA
PCIe Serial Speed Bytes/sec
Gen 1 2gbits per lane 256MB/sec
Gen 2 4gbits per lane 512MB/sec
Gen 3 8gbits per lane 1GB/sec
*There are now PCIe extensions for Storage
CONFIDENTIAL 32
31. Storage Fabrics
33
Server
PCI-e Bus
NIC iSCSI
over
TCP/IP
Server
PCI-e Bus
NIC FC
over
Ethernet
Server
PCI-e Bus
NIC NVMe
over
Ethernet
iSCSI
FCoE
NVMe over Fabrics (the future!)
Pros:
• Popular: Windows, Linux, Hypervisor friendly
• Runs over many networks: routeable. TCP
• Optional RDMA acceleration (iSER)
Cons:
• Limited protocol (SCSI)
• Performance
• Setup, naming, endpoint management
Pros:
• Runs on ethernet
• Can easily gateway between FC and FCoE
Cons:
• Not routable
• Needs special switches (lossless ethernet)
• Not popular
• No RDMA option?
Pros:
• Runs on ethernet
• Same rich protocol as NVMe
• In-band administraton & data
• Leverages RDMA for low latency
Cons:
CONFIDENTIAL
34. PCI-e Rack-Scale Compute+Storage
36
<- Storage-DMA, RDMA over PCIe ->
PCIe Fabric
Storage Box Storage Box
• PCIe Fabric:
• Share disk boxes
across hosts
• Storage-DMA:
• Host-Host RDMA
capability
• Leverages the same
PCI-e Fabric
Compute Compute Compute Compute
CONFIDENTIAL
35. NVMe – The New Kid on the Block
37
NVMe Core
Namespaces
NVMe Objects
PCIe
RDMA
IB Ethernet
FC
?
Read
Write
Create
Delete
SCSI-like: Block R/W Transport
NFS-like: Objects/Namespaces
vVol-like: Object + Metadata + Policy
NVMe over
Fabrics
CONFIDENTIAL
36. Now/Future
38
Interconnect Now Next
Future
(Richard’s Opinion)
SATA 6g - NVMe
SAS 12g 24g NVMe
PCI-e Proprietary 4 x 8g NVMe
SCSI Over FC/Virtual NVMe
FC 8g 32g NVMe over Fabrics
Ethernet 10g 20/40g 100g
CONFIDENTIAL
37. SDS Hardware Futures: Conclusions & Challenges
• Magnetic Storage is phasing out
– Better IOPS per $$$ with Flash since this year
– Better Space per $$$ after 2016
– Devices approaching 1M IOPS and extremely low latencies
• Device Latencies push for new interconnects and networks
– Storage (first cache) locality is important again
– Durability demands low-latency commits across the wire (think RDMA)
• The network is critical
– Flat 40G networks design point for SDS
39CONFIDENTIAL
40. Too Many Data Silos
42
Compute
Cloud
Block
Object
K-VManagement
DB
BigDataManagement
Management
Management
Management
HCLHCL HCL HCL HCL
API API API API API
Different HCLs
Different SW Stacks
Walled Resources
Lots of
Management
Developers
Are Happy
CONFIDENTIAL
41. All-in-one Software-defined Storage
Option 1: Multi-Protocol Stack
43
Compute
Cloud
Block
Object
K-V
DB
BigData
Management
HCL
API API API API API
Developers
Are Happy
One Stack
to
Manage
Shared
Resources
Least
Capable
Services
CONFIDENTIAL
42. Software Defined Storage Platform
Option 2: Common Platform + Ecosystem of Services
44
Block
CEPH
MongoDB
MySQL
Hadoop
Management
HCL
API API API API API One Platform
To
Manage
Shared
Resources
Richest
Services
Compute
Cloud
Developers
Are Happy
CONFIDENTIAL
43. Opportunities for SDS Platform
• Provide for needs of Cloud Native Data Services
– E.g. MongoDB, Cassandra, Hadoop HDFS
• Advanced Primitives in support of Distributed Data Services
– Policies for storage services: replication, raid, error handling
– Fault-domain aware placement/control
– Fine grained policies for performance: e.g. ultra-low latencies for database logs
– Placement control for performance: locality, topology
– Group snapshot, replication semantics
CONFIDENTIAL 45
46. The Future of Software-Defined Storage –
What Does It Look Like in 3 Years Time?
Richard McDougall, VMware, Inc
CTO6453
#CTO6453
Editor's Notes
To move faster, though, businesses end up implementing cultural, design, and engineering changes
This is a vision slide that depicts the ultimate goal of creating a big data shared infrastructure that incorporates Hadoop and non-hadoop workloads. Along with the Hadoop MapReduce framework there are other technologies that use HDFS as an underlying filesystem facilities for processing large sets of data, as well as those that use their own mechanism for storage. Among the technologies are
HBase : provides a distributed non-relational database-style mechanism for access to the data that is stored in HDFS. Users use Java APIs to get at the data in HBase. It is modeled on Google’s original BigTable and provides a fault tolerant way of storing large quantities of sparse data.
Big SQL technologies like Pivotal HAWQ and Impala that also present an SQL interface to the end user for access to the HDFS-based Data Tier
Non-HDFS technologies:
NoSQL (sometimes referred to as Not Only SQL) – data management mechanisms that use various technologies other relational for data, such as JSON documents in the MongoDB case.
Other technologies that come from the research communities. These have not emerged into the mainstream as Hadoop has done.