Citrix BranchRepeater provides WAN optimization and acceleration for virtual desktop and application traffic between branch offices and data centers. It uses various techniques like compression, protocol acceleration, and TCP flow control to reduce bandwidth usage and improve performance. The BranchRepeater product family includes physical appliances, a virtual appliance called BranchRepeater VPX, and a software plugin. It provides flexibility in deployment with options for inline, virtual inline, and high availability modes. The latest release added capabilities like SSL traffic acceleration and encryption of appliance disk history.
Slides der Präsentation von Simeon Bosshard, Citrix, am Citrix Day 2014 von Digicomp.
Entdecken Sie mit uns die neuen Funktionen der CloudBrige Version 7.3. Unter anderem: Unterstützung für HDX Inisght, Optimierung für RPC über HTTPS, Video Caching Pre-Population sowie Erweiterungen in den Bereichen IPv6 und Logging-Möglichkeiten.
2015 03-26 cloud platform master class for cloudplatform 4 5 - publicCitrix
In this session you will learn about the new features of Citrix CloudPlatform 4.5:
Learn about new support for 3D graphics
See step-by-step demonstrations of GPU/vGPU, Bare metal and Linux Containers (LXC)
Hear about installation/configuration/deployment considerations
Slides der Präsentation von Simeon Bosshard, Citrix, am Citrix Day 2014 von Digicomp.
Entdecken Sie mit uns die neuen Funktionen der CloudBrige Version 7.3. Unter anderem: Unterstützung für HDX Inisght, Optimierung für RPC über HTTPS, Video Caching Pre-Population sowie Erweiterungen in den Bereichen IPv6 und Logging-Möglichkeiten.
2015 03-26 cloud platform master class for cloudplatform 4 5 - publicCitrix
In this session you will learn about the new features of Citrix CloudPlatform 4.5:
Learn about new support for 3D graphics
See step-by-step demonstrations of GPU/vGPU, Bare metal and Linux Containers (LXC)
Hear about installation/configuration/deployment considerations
Citrix continues to innovate our desktop and application virtualization technology to keep pace with customer needs, such as improved printer driver management. Learn how the latest Citrix XenDesktop and Citrix XenApp features improve the user experience and administrator flexibility and build upon the latest Microsoft platform capabilities. This session will also discuss cloud automation and management technologies designed to improve the use of private and public clouds for delivering desktops and apps as a service.
Hvordan administrerer og bruker du din VDI-løsning best mulig? Hva kan Microsoft tilby av VDI-drift og hvordan benyttes det i praksis? Vi ser på hvordan bl.a. System Center kan benyttes i en VDI-løsning.
Configuring and Troubleshooting XenDesktop SitesDavid McGeough
Citrix XenDesktop introduced a number of new concepts and processes for desktop administrators. The goal of this session is to demystify these concepts and provide a tactical approach to deployment and troubleshooting of a XenDesktop environment. In this session we will demonstrate the core configuration that is required, and also cover proven troubleshooting approaches to the top three problems we see in customer deployments.
Citrix continues to innovate our desktop and application virtualization technology to keep pace with customer needs, such as improved printer driver management. Learn how the latest Citrix XenDesktop and Citrix XenApp features improve the user experience and administrator flexibility and build upon the latest Microsoft platform capabilities. This session will also discuss cloud automation and management technologies designed to improve the use of private and public clouds for delivering desktops and apps as a service.
Hvordan administrerer og bruker du din VDI-løsning best mulig? Hva kan Microsoft tilby av VDI-drift og hvordan benyttes det i praksis? Vi ser på hvordan bl.a. System Center kan benyttes i en VDI-løsning.
Configuring and Troubleshooting XenDesktop SitesDavid McGeough
Citrix XenDesktop introduced a number of new concepts and processes for desktop administrators. The goal of this session is to demystify these concepts and provide a tactical approach to deployment and troubleshooting of a XenDesktop environment. In this session we will demonstrate the core configuration that is required, and also cover proven troubleshooting approaches to the top three problems we see in customer deployments.
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
O Citrix NetScaler é um appliance de entrega de aplicativos Web totalmente integrado, disponível como um dispositivo de rede de hardware ou como um appliance virtualizado. Implementado diante de servidores da Web, o NetScaler envolve gerenciamento do tráfego de alta velocidade via balanceamento de carga e switching de conteúdo com aceleração de aplicativos, cache de conteúdo, aceleração SSL, firewall de aplicativos Web, otimização de rede e monitoramento do desempenho dos aplicativos.
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld
VMworld 2013
Arun Goel, VMware
Serge Maskalik, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld
VMworld 2013
Rajiv Krishnamurthy, VMware
Manish Mittal, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Digicomp Academy AG
Agil ist ein Buzzword, viele wissen aber nicht, was wirklich dahintersteckt. In diesem Vortrag erfahren Sie, warum es weder hilft, mal schnell Scrum einzuführen, die Inneneinrichtung eines Büros zu verändern oder einen Tischkicker aufzustellen. Sehen Sie, warum wir uns in der VUCA-Welt anders bewegen müssen und warum Themen wie Kreativität, Haltung und ein geänderter Mindset die Grundvoraussetzung für agiles Arbeiten sind.
Christian Botta war 15 Jahre als Projektmanager und Führungskraft in der IT beschäftigt. 2015 gründete er gemeinsam mit Daniel Reinold die Firma Visual Braindump, mit dem Ziel, die Themen Visualisierung und Management näher zusammenzubringen. Mit Visual Braindump verheiratete er seine beiden Leidenschaften: Zeichnen und Projektmanagement. Heute ist er als Trainer, Coach und Speaker für Projektmanagement, Design Thinking und visuelles Denken unterwegs – sowohl in Präsenztrainings für Digicomp als auch in Videotrainings bei LinkedIn. Ein weiteres Standbein ist die visuelle Begleitung von Veranstaltungen mit Hilfe von Graphic Facilitation bzw. Graphic Recording. Botta schreibt darüber hinaus regelmässig auf dem Visual Braindump Blog und für das Projektmagazin und Capterra.
Sein Buch: Business Visualisierung - ein Reiseführer für Neugierige und Visionäre
https://digicomp.ch/landingpages/personalswiss
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Digicomp Academy AG
Die Implementierung mit IPv6 in Container Plattformen wie Docker, Kubernets oder OpenShift bietet einige Möglichkeiten, aber auch Herausforderungen. In seinem Vortrag erklärt Aarno Aukia den aktuellen Stand der IPv6-Implementierung dieser Technologien.
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutDigicomp Academy AG
Die 7 Phasen des Digital Business Modelling
Wie schaffe ich den digitalen Wandel im Business-Modell? Im Referat zeigt Roger Basler anhand von 7 Phasen, wie der Wandel erfolgreich vollzogen werden kann.
Roger basler meetup_21082018_work-smarter-not-harder_handoutDigicomp Academy AG
Work Smarter Not Harder
Meetup: Work Smart – Digital Collaboration im Unternehmen
Lernen Sie das Potenzial mit der Verwendung von möglichen Smart-Work-Tools innerhalb Ihres Unternehmens kennen und seien Sie für die wichtigsten Anwendungsfälle gerüstet, um den Kulturwandel innerhalb Ihrer Organisation voranzutreiben.
Professor Richard H. Thaler hat Ende 2017 den Wirtschaftsnobelpreis für seine Forschung unter dem Begriff «Nudge - die psychologischen Faktoren, die hinter wirtschaftlichen Entscheidungen stehen» erhalten.
Der Kommunikations- und Marketingexperte Maurice Codourey der Neurokommunikationsagentur UNIT X zeigt eigene Experimente im Spitalwesen und internationale Best Practices.
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Digicomp Academy AG
Experte Artur Tomczak zeigte anhand von Praxisbeispielen der verschiedenen responsiven Frameworks auf, wie die nächsten Schritte Richtung Holacracy konkret aussehen könnten.
IPv6-Experte Joe Klein gab uns einen Überblick über den aktuellen Status der IPv6-Sicherheit, typische IPv6-Angriffspunkte, Auswirkungen von Technologien wie Cloud und Blockchain sowie Herausforderungen für effektive IoT-Sicherheitsmassnahmen (Internet of Things). Vor allem im Internet der Dinge, wenn es um Gesundheitsversorgung, selbstfahrende Autos, Flugzeugcockpits, Dämme, Kernkraftwerke und ähnliche kritische Infrastrukturen geht, ist es von entscheidender Bedeutung, dass Sicherheit gewährleistet werden kann.
Kein Command & Control, sondern Servant-Leadership. Flache Hierarchien, intrinsische Motivation, Kundenfokus – jede Firma möchte heutzutage agil sein. Offen bleibt jedoch meistens folgende Frage: «Was bedeutet das für unsere Führungskräfte?»
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattDigicomp Academy AG
Sachliche Argumente funktionieren im Alltag oft nicht. Erst wer einmal erkannt hat, dass und wie er auf der irrationalen Ebene punkten muss, dem eröffnen sich neue Möglichkeiten bei seinen Mitmenschen
Querdenken mit Kreativitätsmethoden – XING ExpertendialogDigicomp Academy AG
Kreatives Chaos ist Quatsch. Kreativität kann hoch systematisch sein und dabei maximal originell. Querdenken macht gute Laune und holt selbst die Neue-Ideen-Belächler, Kreativitätsbekämpfer und Ideen-Kopierer bei ihrer produktiven Laune ab.
Am vergangenen XING Expertendialog zeigte Referent Jiri Scherer von Denkmotor, wie das Ausbrechen aus Denkmustern funktioniert und warum jede Kreativitätsmethode einen roten Punkt hat.
Die digitale Transformation wirkt sich nicht nur auf Prozesse, sondern insbesondere auch auf ganze Geschäftsmodelle von Unternehmen aus.
Roger Basler zeigt in seinem Referat auf, was ein digitales Geschäftsmodell ist und welche Schritte ein Unternehmen tätigen muss, um sich dorthin zu entwickeln. Zentral dabei ist, dass nicht einfach ein bestehendes Geschäftsmodell digitalisiert wird, sondern Unternehmen anfangen im neuen Kundennutzen und Kundenverhalten zu denken.
Gerne stellen wir Ihnen die Slides von Roger Basler zur Verfügung:
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingDigicomp Academy AG
Die monatlichen Anlässe in Zusammenarbeit mit dem Swiss IPv6 Council behandeln verschiedene technische Themenbereiche von IPv6.
Ist Dual-Stack ein guter Weg? Was sind Erfahrungen mit reinen IPv6-Netzwerken? Viele Unternehmen kämpfen mit diesen Fragen. Genau aus diesem Grund hat Cisco in San Jose einen reinen IPv6-Campus eingerichtet und sucht Antworten auf solche Fragen.
In seinem Referat präsentierte Khalid Jawaid die Bemühungen zur Einführung von IPv6 in einem einzelnen Campusgebäude und die Hürden, die dies mit sich bringt. Im Weiteren sprach er über die Herausforderungen, die sich aus der Erstellung des Business Case im Jahr 2010 und der Bereitstellung von mehr als 400 Remote-Standorten und den daraus gezogenen Lehren ergaben.
Die Inputs von Khalid Jawaid haben bei vielen Teilnehmern neue Perspektiven und Ideen für die Einführung von IPv6 geweckt.
Gerne stellen wir Ihnen die Slides von Manuel Schweizer zur Verfügung:
Vielleicht haben Sie schon einmal ein Zugbillett mit der SBB-App gekauft, per Smartphone eine Doodle-Umfrage verschickt oder in Google Docs eine Textdatei erstellt. Haben Sie sich dabei jemals gefragt, was diese Apps so erfolgreich macht?
Simon Raess, Gründer & Design Strategist bei Ginetta, weiss es. Er war massgeblich an der Kreation genau dieser Produkte beteiligt. Mit seiner Digitalagentur hat er zahlreichen Firmen – darunter Swisscom, Twint und Helsana – zum Erfolg in der digitalen Geschäftswelt verholfen.
In seiner Präsentation am Xing LearningZ vom 4. Juli 2017 zeigte Simon Raess, wie gutes UX Design nicht nur dafür sorgt, dass Webistes und Apps schön aussehen, sondern wie es digitale Produkte auch nachhaltig erfolgreich macht. Sehr spannend war auch der Einblick in die systematische Arbeitsweise, welche zu benutzerfreundlichem Design führt.
Design Thinking ist in aller Munde. Aber was ist Design Thinking denn nun genau? Lernen Sie in dieser Session die agile Innovationsmethode der Stanford University anhand eines kleinen Praxisbeispiels kennen. Tauchen Sie ein in die Welt der Kunden, generieren Sie Lösungsansätze und Prototypen. Ein interaktiver Kurzworkshop mit vielen Erkenntnissen.
Dieser Event des Swiss IPv6 Council befasste sich mit dem spannenden Case der ETH Zürich. Dort sind die IPV4-Adressen schon seit Jahren knapp.
Derk Valenkamp, Gruppenleiter der ID-Datennetze der ETH Zürich, zeigte auf, was er und sein Team seit 2007 unternommen haben. So mussten und müssen daher immer mehr NAT/PAT-Lösungen implementiert werden, die aus betrieblicher und Sicherheitssicht grosse Anforderungen an das Logging stellen. Damit die Netzwerkanforderungen auch langfristig das Wachstum der ETH Zürich und deren IT erfüllen können, wird schon seit Jahren auf IPv6 gesetzt. Besonders spannend für die engagierten Teilnehmer waren auch die Stolpersteine und Hürden, welche Derk Valenkamp aufgezeigt hat.
Gerne stellen wir Ihnen die Slides von Derk Valenkamp zur Verfügung.
Berät Sie bald ein Bot über die neusten Winterschuhe, weil Ihr Handy festgestellt hat, dass Sie zu kalte Zehen haben, wonach eine Drohne das Schuhwerk an Ihren über GPS georteten Standort fliegt?
Roger Basler ging in seinem Referat vom 2. Mai 2017 auf Trends und einige bereits existierende Pilot-Versuche ein. Seine Einschätzung der Wahrscheinlichkeit des Impacts dieser Trends auf unser Online-Shopping-Verhalten soll nicht in erster Linie die Wahrheit widerspiegeln, sondern die Basis für eine gute Diskussion und den Erfahrungsaustausch untereinander legen.
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudDigicomp Academy AG
Zahlen & Fakten zur Entwicklung des Werbemarkts Schweiz: Michael Göldi (Digital Focus) & Michel Bächtiger (Media Focus) kreuzen die Klinge und klären die Frage aller Fragen: klassische Werbung oder Online-Werbung? Mögen die besseren Daten-Fakten gewinnen!
Zeit für ein Privacy-Programm. Datenschutz-Entwicklung in Europa (GDPR) und das neue Datenschutzgesetz in der Schweiz: Was bedeutet das für mein Unternehmen?
In diesem Referat zeigten wir Ihnen auf, was die Entwicklung des Datenschutzes in Europa für uns bedeutet und was auf die Schweiz zukommt.
Im Mai 2018 tritt die EU Datenschutz-Grundverordnung (GDPR – general data protection regulation) in Kraft. Über die enthaltenen Neuerungen wurden bereits in verschiedenen Veranstaltungen berichtet. An diesem Referat gaben wir Ihnen als Erstes eine kurze Zusammenfassung der Geschehnisse zur Orientierung.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
2. Branch Offices Across WAN Present Obstacles
• Inefficient use and bandwidth-
hungry applications
• Tradeoffs between data center
consolidation and branch user
experience
• High cost of branch office IT
3. Network costs are a key part of desktop virtualization
Servers
Storage 20%
30%
Clients
20%
Networks
30%
“Networking alone makes desktop virtualization cost-prohibitive”
4. Citrix Branch Repeater | The Big Picture
Repeater Plug-in for Citrix Receiver Data Center
Applications:
XenDesktop
XenApp
Web apps
Email
Mobile Users Tele-workers File Servers
Repeater SharePoint
Branch Repeater VPX
WAN Redundant Datacenter or
Branch Offices Disaster Recovery Site
Branch Repeater
Branch Repeater VPX Repeater
Branch Repeater with Windows Server Branch Repeater VPX
5. Citrix Branch Repeater Product Family
Flexibility to Meet All Your Needs
NEW!
Repeater Branch Repeater with Branch Repeater VPX
Appliances Windows Server Repeater Plug-in – Virtual Appliance
and – Software Client Software
Branch Repeater
Appliances
6. What is Branch Repeater VPX?
Branch Repeater
… is software that VPX
Print
offers Branch Repeater Server Branch
Services
functionality in a virtual
appliance form factor
…
7. HDX WAN Optimization in Branch Repeater
… also in Branch Repeater VPX
Traffic
Adaptive Prioritization
Compression And QoS
Adaptive
TCP Flow
Control
Adaptive
Protocol
Acceleration
8. Deliver a high-definition user
experience at the branch
Accelerate print, video, launch
Reduce desktop delivery network
costs
Cut bandwidth, energy, power & setup costs
9. Accelerate XenDesktop traffic across the WAN
Reduce bandwidth consumption
by 89%
Reduce XenDesktop launch times
by 40%
Deliver up to 2X the number of
users on existing bandwidth
Accelerate printing
by 2X
11. Requirements
Citrix VPX Minimum Requirements
XenServer • 1 GB RAM
• 60 GB Disk
• 2 Virtual NICs
• 1 Virtual CPU
ESX / ESXi In Tech
Preview!
Off-the-shelf server
Hyper-V
Citrix Confidential - Do Not Distribute
12. Grow as you Need!
Express • 1 GB RAM, 60 GB Disk
• Recommended for VPX Express
• 1 GB RAM, 100 GB Disk
Small • Recommended for up to 2 Mbps
• 1000 Accelerated TCP connections, 50 Plug-ins
• 4 GB RAM, 250 GB Disk
Medium • Recommended for up to 45 Mbps
• 15,000 Accelerated TCP connections, 400 Plug-ins
• 8 GB RAM, 500 GB Disk
Large • Recommended for up to 45 Mbps
• 25,000 Accelerated TCP connections, 500 Plug-ins
Citrix Confidential - Do Not Distribute
13. VPX Sizing and Scaling
One physical NIC with two virtual NICs are required.
Each virtual NIC must be connected to a separate virtual network in XenCenter.
Out of band management can be handled by a third and/or fourth virtual NIC.
The VPX cannot use the fail-to-wire functionality (a dual port card is seen as 2 NICs
with no special hardware support)
15. Full Network Transparency Means
Plug-n-play for Any Network
Branch Repeater Repeater
Datacenter
Proprietary Tunnel
Branch Office
Users
Non-Citrix Non-Citrix
WAN Op WAN Op
16. No dials, self-tuning approach to WAN optimization
Application Mix
Network Conditions
AutoOptimizer Engine
TCP Flow Compression Protocol
QoS
Control De-duplication Acceleration
17. Flexible deployment modes for joining the branch
network
Branch Repeater
Inline WAN
• Optional Bypass NIC LAN Switch Router
Virtual Inline Branch Repeater
• WCCPv2
• Policy-based Routing
WAN
LAN Switch Router
18. Modes – Physical Deployments
Inline Mode (most common)
Network will need to go down, while unit is cabled inline directly inline between WAN Router and LAN
Switch
Simplest Configuration (no Router/Switch configuration required)
No traffic is allowed to bypass the Branch Repeater appliance
Traffic flows as soon as its cabled (bypass card)
Data flows from one accelerated eth port and is forwarded through a second port (Accelerated Pair A
illustrated below)
19. Modes – Physical Deployments
Virtual Inline Mode
Can be deployed with no network disruption
Uses only one Ethernet port on the BR (apA port)
Requires Router knowledge (utilizes Policy Based Routing, rules to classify traffic and determine how its
forwarded).
The router redirects the packets that are destined as outbound WAN traffic
From any LAN port other than the one used by the BR Appliance, then route traffic to the BR Appliance
From the LAN port used by the BR Appliance, then route traffic to the WAN interface of the router
PBR – requires the use of another physical/logical interface on the router (if not available use WCCP)
20. Modes – Physical Deployments
WCCP – Web Cache Communication Protocol
Can be deployed with no network disruption
Requires Router knowledge (Route Policies to intercept desired traffic, route it to BR on the LAN)
Uses a GRE tunnel (virtual communication link) between the BR and Router
Only requirement is IP connectivity between BR and Router
Mode contains all acceleration features
Uses only one Ethernet port on the BR (apA port)
21. Modes – Physical Deployments
HA – High Availability
Provides protection in event of failover
Provides two management IP addresses & one VIP address
The subnet of the VIP address is determined by the Management IP address of both WS.
Primary and Secondary – the primary unit handles all incoming and outgoing traffic. The secondary
appliance takes over in the even of a failover if the primary fails.
The first to initialize itself becomes the primary
22. Modes – Physical Deployments
Group Mode
Used for asymmetric networks
Two or more BR inline mode, combined into a single virtual unit
Uses forwarding rules to avoid random router packet assignment
GM units are identified by serial # & IP address
Individual appliances will own particular connections. If non-owning appliance receives a packet it will
forward it to the owning appliance via GRE tunnel.
24. Recent Accomplishments / Updates
• Branch Repeater 5.7
• SSL traffic acceleration and disk history
encryption
• Branch Repeater with Windows Server 2008
R2
• 64-bit Windows 7 Repeater Plug-in
• Branch Repeater VPX released! • Branch Repeater 5.5.2 and 5.5.3
• Virtual appliance software on
XenServer
• Notice of Status Change
• Branch Repeater VPX on Hyper-V • Branch Repeater with Windows Server (2003
R2 in Tech Preview! only) End of Sale July 31, 2010
• EoM / EoL July 31, 2013
25. Branch Repeater Product Line & Pricing
Price $K
Large Branch/Data center R 8820HS
100
$99,500
R 8820
50
$49,500
20 Branch/Regional office R 8540
$19,500
R 8520
BR 300 $12,000 VPX-45
10 $13,000
$10,000+
BR 200 VPX-10
6 $7000
$6,000+
BR 100
4 VPX-2
$4,000+ $4000
VPX-Express
$0
0
512Kbps 1 Mbps 2 Mbps 10 Mbps 20 Mbps 45 Mbps 155 Mbps 500 Mbps
Citrix Confidential - Do Not Distribute Bandwidth
27. Overview
What is the SSL Compression and Acceleration?
SSL compression allows standard SSL-based connections (HTTPS traffic, for example) to be
compressed using Branch Repeater’s multi-session compression engine as well as other protocol-
specific optimizations.
SSL compression utilizes SSL certificate exchange to decrypt and re-encrypt traffic between client and
server.
Standard SSL Connection
SSL Connection
28. What is SSL Compression
What is the SSL Compression and Acceleration?
SSL compression allows standard SSL-based connections (HTTPS traffic, for example) to be
compressed using Branch Repeater’s multi-session compression engine as well as other protocol-
specific optimizations.
SSL compression utilizes SSL certificate exchange to decrypt and re-encrypt traffic between client and
server.
Accelerated SSL Connection
Client Side Server Side
WAN
SSL Connection SSL Connection
SSL Tunnel
29. What is SSL Compression
Accelerated SSL Connection
Client Side Server Side
WAN
SSL Connection SSL Connection
SSL Tunnel
• Branch Repeater has access to the clear text data of the SSL connection because the sever-
side Branch Repeater Appliance acts as a security delegate of the endpoint server(s).
• The appliance is functioning as a security delegate of the server, therefore most configuration
is on the server-side Branch Repeater.
30. What is SSL Compression
What is SSL Signaling?
Peer Relationship and
SSL Signaling Connection
Client Side Server Side
SSL Connection SSL Connection
SSL Data Connection
• Signaling refers to the connection, authentication and configuration between two
appliances/endpoints.
• The Data Connection refers is the secure connection used to transmit encrypted data
between two appliances/endpoints.
31. How SSL Compression Works
SSL Split Proxy Mode Overview
The server-side Branch Repeater
Peer Relationship and is allowed to act on the server’s
SSL Signaling Connection
behalf.
SSL Data Connection
• Split Proxy Mode will be used in most deployment
scenarios where Temp RSA or Diffie-Hellman key •SSL Credentials (certificate and
exchange is required. public key) from either an local
enterprise CA or the server itself
• The server-side Branch Repeater masquerades as the are installed on the server-side
server to the client and proxies the connection. Repeater.
• Client authentication is not supported.
32. How SSL Compression Works
SSL Transparent Proxy Mode Overview
Peer Relationship and
SSL Signaling Connection
SSL Data Connection
• The server-side Branch Repeater acts on behalf of the
server, decrypting and re-encrypting on the fly, using the •The server’s SSL credentials
server’s private key(s). (public and private keys)
must be installed on both the
• Client authentication is supported. server and the Branch
Repeater.
• The client sees the connection as if it is connection directly
to the server.
33. How SSL Compression Works
SSL Transparent Proxy Mode Overview
Peer Relationship and
SSL Signaling Connection
SSL Data Connection
• Temp RSA and Diffie-Helman key exchange is not
supported. •The server’s SSL credentials
(public and private keys)
• TLS Session tickets and SSL v2 is not supported in this must be installed on both the
mode. server and the Branch
Repeater.
• Any session renegotiation will result in a connection
termination.