SlideShare uma empresa Scribd logo
1 de 24
Robert Morris – rmorris@agsi.us Consultant Advantec Global Services Inc Life In The Virtual Trenches Здравствуйте!
General Project Guidelines Agenda Review real-world XenApp 70K user project Review real-world “VDI” project Questions & (hopefully) Answer Session
General Project Guidelines Hold Executive Technical Briefing PRIOR to creating of the SOW Have client write the SOW Ensure technical resources on both sides have reviewed the SOW Open up the SOW first day on-site Ensure both sides have firm understanding of project goals and success criteria Discuss terminology and different interpretations of same terms Ensure both sides have proper contacts in place for escalation
General Project Guidelines Hold Executive Technical Briefing PRIOR to creating of the SOW Have client write the SOW Ensure technical resources on both sides have reviewed the SOW Open up the SOW first day on-site Ensure both sides have firm understanding of project goals and success criteria Discuss terminology and different interpretations of same terms Ensure both sides have proper contacts in place for escalation
General Project Guidelines Hold Executive Technical Briefing PRIOR to creating the SOW
End-to-End VirtualizationArchitecture Domain Controller XS1 Web Interface Data Store XS2 Desktop Delivery Controller License Server Storage Secure Remote Access EdgeSight Virtual Machine Infrastructure Desktop Receiver Profile Store XenApp Virtual Desktop Agent Provisioning Services
General Project Guidelines Hold Executive Technical Briefing PRIOR to creating the SOW
General Project Guidelines Hold Executive Technical Briefing PRIOR to creating the SOW
General Project Guidelines Hold Executive Technical Briefing PRIOR to creating of the SOW Have client write the SOW
General Project Guidelines Hold Executive Technical Briefing PRIOR to creating of the SOW Have client write the SOW Ensure technical resources on both sides have reviewed the SOW
General Project Guidelines Hold Executive Technical Briefing PRIOR to creating of the SOW Have client write the SOW Ensure technical resources on both sides have reviewed the SOW Open up the SOW first day on-site Ensure both sides have firm understanding of project goals and success criteria Discuss terminology and different interpretations of same terms Ensure both sides have proper contacts in place for escalation
Sample 70K user XA project Project goals Determine the maximum user density per square foot attainable for a large Siebel roll-out Project constraints Timeline Internal resource assignments from other groups (Siebel team, proj mgmt group, nw team) Hardware provided (1) DL580 (2) DL380
Assumptions A solid Siebel back-end platform for high interactive would be readily available throughout, using the Call Center HI QA environment for testing Network connectivity would remain solid throughout Written scripts existed for the high interactive platform, defining different user types and mix of types in a typical day Number of total users expected would be made available Number of users connecting at any one time would be made available Unique user ids would be made available on the back-end AD user ids would be made available on the front-end
Assumptions A solid Siebel back-end platform for high interactive would be readily available throughout, using the Call Center HI QA environment for testing Network connectivity would remain solid throughout Written scripts existed for the high interactive platform, defining different user types and mix of types in a typical day Number of total users expected would be made available Number of users connecting at any one time would be made available Unique user ids would be made available on the back-end AD user ids would be made available on the front-end
Config A DL380 36GB MSTCTXAPP10 – Citrix PVS 5.6 DL380 36GB MSTCTXAPP11 - W2K8 R2, XA6, 32GB PVS image DL580 80GB MSTCTXAPP12 – XS 5.6 host running utility images   271 users can be achieved, and performance remains solid throughout. Memory appears to be the bottleneck, with the cpus showing very little stress, even during the mass logins.
Config B  DL380 36GB MSCTXAPP10 – Citrix PVS  DL380 36GB MSTCTXAPP11 – XS 5.6 host 		MSVTCTXAPP17,18,19,20,21,22,23,24– W2K8, XA5, 4GB PVS image guest DL580 80GB MSTCTXAPP12 – XS 5.6 host running utility images   342 users can be achieved, and performance remains solid throughout. Memory appears to be the bottleneck within a vm – 50 users appear to be a max number for reasonable performance of each vm. The cpus show no stress, even during the rapid logins.
Advantages Windows 2008 32-bit Windows 2008R2 64-bit ,[object Object]
Fewer images to manage
Fewer server lisc, both MS & 3rd party
Compatibility with most workstation applications
Staff more familiar with 32-bit OS
Staff more familiar with 32-bit applications

Mais conteúdo relacionado

Semelhante a RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны

A Software Factory Integrating Rational & WebSphere Tools
A Software Factory Integrating Rational & WebSphere ToolsA Software Factory Integrating Rational & WebSphere Tools
A Software Factory Integrating Rational & WebSphere Toolsghodgkinson
 
StreamBase version 7 - overview
StreamBase version 7 - overviewStreamBase version 7 - overview
StreamBase version 7 - overviewstreambase
 
Realizing the promise of portable data processing with Apache Beam
Realizing the promise of portable data processing with Apache BeamRealizing the promise of portable data processing with Apache Beam
Realizing the promise of portable data processing with Apache BeamDataWorks Summit
 
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...FIWARE
 
Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2
Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2
Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2Jaime Martin Losa
 
Confluent Partner Tech Talk with SVA
Confluent Partner Tech Talk with SVAConfluent Partner Tech Talk with SVA
Confluent Partner Tech Talk with SVAconfluent
 
Cyclone DDS Unleashed: ROS & Cyclone DDS.pdf
Cyclone DDS Unleashed: ROS & Cyclone DDS.pdfCyclone DDS Unleashed: ROS & Cyclone DDS.pdf
Cyclone DDS Unleashed: ROS & Cyclone DDS.pdfZettaScaleTechnology
 
Normalizing x pages web development
Normalizing x pages web development Normalizing x pages web development
Normalizing x pages web development Shean McManus
 
Software based video, audio, web conferencing - can standard servers deliver?
Software based video, audio, web conferencing - can standard servers deliver?Software based video, audio, web conferencing - can standard servers deliver?
Software based video, audio, web conferencing - can standard servers deliver?Anders Løkke
 
Neo4j Vision and Roadmap
Neo4j Vision and Roadmap Neo4j Vision and Roadmap
Neo4j Vision and Roadmap Neo4j
 
Node.js BFFs - our way to the better/micro frontends
Node.js BFFs - our way to the better/micro frontendsNode.js BFFs - our way to the better/micro frontends
Node.js BFFs - our way to the better/micro frontendsEugene Fidelin
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 ExternalSarah Thomas
 
SATISH NAKKA-04222015
SATISH NAKKA-04222015SATISH NAKKA-04222015
SATISH NAKKA-04222015Satish Nakka
 
2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source DayShawn Wells
 
InterConnect 2015 session 2825 cics_and_the_new soa
InterConnect 2015 session 2825  cics_and_the_new soaInterConnect 2015 session 2825  cics_and_the_new soa
InterConnect 2015 session 2825 cics_and_the_new soanick_garrod
 

Semelhante a RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны (20)

KIRANKUMAR_MV
KIRANKUMAR_MVKIRANKUMAR_MV
KIRANKUMAR_MV
 
A Software Factory Integrating Rational & WebSphere Tools
A Software Factory Integrating Rational & WebSphere ToolsA Software Factory Integrating Rational & WebSphere Tools
A Software Factory Integrating Rational & WebSphere Tools
 
StreamBase version 7 - overview
StreamBase version 7 - overviewStreamBase version 7 - overview
StreamBase version 7 - overview
 
Realizing the promise of portable data processing with Apache Beam
Realizing the promise of portable data processing with Apache BeamRealizing the promise of portable data processing with Apache Beam
Realizing the promise of portable data processing with Apache Beam
 
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
 
Fast RTPS
Fast RTPSFast RTPS
Fast RTPS
 
Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2
Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2
Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2
 
Confluent Partner Tech Talk with SVA
Confluent Partner Tech Talk with SVAConfluent Partner Tech Talk with SVA
Confluent Partner Tech Talk with SVA
 
Cyclone DDS Unleashed: ROS & Cyclone DDS.pdf
Cyclone DDS Unleashed: ROS & Cyclone DDS.pdfCyclone DDS Unleashed: ROS & Cyclone DDS.pdf
Cyclone DDS Unleashed: ROS & Cyclone DDS.pdf
 
Normalizing x pages web development
Normalizing x pages web development Normalizing x pages web development
Normalizing x pages web development
 
Software based video, audio, web conferencing - can standard servers deliver?
Software based video, audio, web conferencing - can standard servers deliver?Software based video, audio, web conferencing - can standard servers deliver?
Software based video, audio, web conferencing - can standard servers deliver?
 
Neo4j Vision and Roadmap
Neo4j Vision and Roadmap Neo4j Vision and Roadmap
Neo4j Vision and Roadmap
 
Voice browser
Voice browserVoice browser
Voice browser
 
Node.js BFFs - our way to the better/micro frontends
Node.js BFFs - our way to the better/micro frontendsNode.js BFFs - our way to the better/micro frontends
Node.js BFFs - our way to the better/micro frontends
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
 
SATISH NAKKA-04222015
SATISH NAKKA-04222015SATISH NAKKA-04222015
SATISH NAKKA-04222015
 
2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day2011-03-15 Lockheed Martin Open Source Day
2011-03-15 Lockheed Martin Open Source Day
 
FICO Open Shift presentation
FICO Open Shift presentationFICO Open Shift presentation
FICO Open Shift presentation
 
InterConnect 2015 session 2825 cics_and_the_new soa
InterConnect 2015 session 2825  cics_and_the_new soaInterConnect 2015 session 2825  cics_and_the_new soa
InterConnect 2015 session 2825 cics_and_the_new soa
 
optimizing_ceph_flash
optimizing_ceph_flashoptimizing_ceph_flash
optimizing_ceph_flash
 

Mais de Denis Gundarev

VMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingVMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingDenis Gundarev
 
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableDenis Gundarev
 
Citrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingCitrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingDenis Gundarev
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeDenis Gundarev
 
Citrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityCitrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityDenis Gundarev
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseDenis Gundarev
 
How to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSHow to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSDenis Gundarev
 
How to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityHow to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityDenis Gundarev
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUGDenis Gundarev
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevBriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevDenis Gundarev
 
Deep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDeep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDenis Gundarev
 
SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...Denis Gundarev
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDenis Gundarev
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDenis Gundarev
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDenis Gundarev
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDenis Gundarev
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI securityDenis Gundarev
 
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....Denis Gundarev
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5Denis Gundarev
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VDenis Gundarev
 

Mais de Denis Gundarev (20)

VMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingVMware App Volumes Troubleshooting
VMware App Volumes Troubleshooting
 
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usable
 
Citrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingCitrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & Troubleshooting
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternative
 
Citrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityCitrix Internals: ICA Connectivity
Citrix Internals: ICA Connectivity
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your Enterprise
 
How to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSHow to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWS
 
How to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityHow to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobility
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevBriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
 
Deep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDeep dive in Citrix Troubleshooting
Deep dive in Citrix Troubleshooting
 
SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo Murris
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris Rogers
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick Dehlinger
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI security
 
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны

  • 1. Robert Morris – rmorris@agsi.us Consultant Advantec Global Services Inc Life In The Virtual Trenches Здравствуйте!
  • 2. General Project Guidelines Agenda Review real-world XenApp 70K user project Review real-world “VDI” project Questions & (hopefully) Answer Session
  • 3. General Project Guidelines Hold Executive Technical Briefing PRIOR to creating of the SOW Have client write the SOW Ensure technical resources on both sides have reviewed the SOW Open up the SOW first day on-site Ensure both sides have firm understanding of project goals and success criteria Discuss terminology and different interpretations of same terms Ensure both sides have proper contacts in place for escalation
  • 4. General Project Guidelines Hold Executive Technical Briefing PRIOR to creating of the SOW Have client write the SOW Ensure technical resources on both sides have reviewed the SOW Open up the SOW first day on-site Ensure both sides have firm understanding of project goals and success criteria Discuss terminology and different interpretations of same terms Ensure both sides have proper contacts in place for escalation
  • 5. General Project Guidelines Hold Executive Technical Briefing PRIOR to creating the SOW
  • 6. End-to-End VirtualizationArchitecture Domain Controller XS1 Web Interface Data Store XS2 Desktop Delivery Controller License Server Storage Secure Remote Access EdgeSight Virtual Machine Infrastructure Desktop Receiver Profile Store XenApp Virtual Desktop Agent Provisioning Services
  • 7. General Project Guidelines Hold Executive Technical Briefing PRIOR to creating the SOW
  • 8. General Project Guidelines Hold Executive Technical Briefing PRIOR to creating the SOW
  • 9. General Project Guidelines Hold Executive Technical Briefing PRIOR to creating of the SOW Have client write the SOW
  • 10. General Project Guidelines Hold Executive Technical Briefing PRIOR to creating of the SOW Have client write the SOW Ensure technical resources on both sides have reviewed the SOW
  • 11. General Project Guidelines Hold Executive Technical Briefing PRIOR to creating of the SOW Have client write the SOW Ensure technical resources on both sides have reviewed the SOW Open up the SOW first day on-site Ensure both sides have firm understanding of project goals and success criteria Discuss terminology and different interpretations of same terms Ensure both sides have proper contacts in place for escalation
  • 12. Sample 70K user XA project Project goals Determine the maximum user density per square foot attainable for a large Siebel roll-out Project constraints Timeline Internal resource assignments from other groups (Siebel team, proj mgmt group, nw team) Hardware provided (1) DL580 (2) DL380
  • 13. Assumptions A solid Siebel back-end platform for high interactive would be readily available throughout, using the Call Center HI QA environment for testing Network connectivity would remain solid throughout Written scripts existed for the high interactive platform, defining different user types and mix of types in a typical day Number of total users expected would be made available Number of users connecting at any one time would be made available Unique user ids would be made available on the back-end AD user ids would be made available on the front-end
  • 14. Assumptions A solid Siebel back-end platform for high interactive would be readily available throughout, using the Call Center HI QA environment for testing Network connectivity would remain solid throughout Written scripts existed for the high interactive platform, defining different user types and mix of types in a typical day Number of total users expected would be made available Number of users connecting at any one time would be made available Unique user ids would be made available on the back-end AD user ids would be made available on the front-end
  • 15.
  • 16.
  • 17. Config A DL380 36GB MSTCTXAPP10 – Citrix PVS 5.6 DL380 36GB MSTCTXAPP11 - W2K8 R2, XA6, 32GB PVS image DL580 80GB MSTCTXAPP12 – XS 5.6 host running utility images   271 users can be achieved, and performance remains solid throughout. Memory appears to be the bottleneck, with the cpus showing very little stress, even during the mass logins.
  • 18. Config B  DL380 36GB MSCTXAPP10 – Citrix PVS DL380 36GB MSTCTXAPP11 – XS 5.6 host MSVTCTXAPP17,18,19,20,21,22,23,24– W2K8, XA5, 4GB PVS image guest DL580 80GB MSTCTXAPP12 – XS 5.6 host running utility images   342 users can be achieved, and performance remains solid throughout. Memory appears to be the bottleneck within a vm – 50 users appear to be a max number for reasonable performance of each vm. The cpus show no stress, even during the rapid logins.
  • 19.
  • 21. Fewer server lisc, both MS & 3rd party
  • 22. Compatibility with most workstation applications
  • 23. Staff more familiar with 32-bit OS
  • 24. Staff more familiar with 32-bit applications
  • 25.
  • 26. IE 32-bit does not operate as efficiently (think WOW or VDM on 32-bit Windows)
  • 27. Large potential load on help desk if server has issue
  • 28. Limited to 4GB natively, and 8GB with PAE
  • 29. Current version of Xenapp6 will not run on 32-bit
  • 30.
  • 31. Q&A
  • 32. “The Desktop is Dead. Long Live the Desktop”

Notas do Editor

  1. Explain to students that throughout the course of the week, they will be building the end-to-end virtualization solution that is depicted in this figure. Review this diagram with them, explaining how each component functions within the larger solution. In each module that focuses on a component piece, this figure will be revisited to provide context for that component technology within the bigger picture solution.The following steps describe the communication process for the end-to-end virtual solution. In this scenario, a user requests a virtual desktop and accesses their applications using XenApp.The endpoint device submits user credentials to a Web Interface site through the Citrix Access Gateway. Web Interface passes the user credentials to the Desktop Delivery Controller.The Desktop Delivery Controller performs a Microsoft Active Directory query to verify the user credentials. The Desktop Delivery Controller queries the Data Store for the user's assigned desktop group.The Desktop Delivery Controller queries the Virtual Machine Infrastructure about the status of the virtual machines in the desktop group.If the virtual machine requested by the user is powered down or suspended, the pool management service will power on the necessary virtual machine. If the requested desktop uses a vDisk, Provisioning Services binds a vDisk to the virtual desktop.This step will have already occurred if an available desktop is running in an idle pool when the user logs on.The Desktop Delivery Controller notifies the Web Interface of which desktop has been assigned for the session.Web Interface sends an .ICA file to the Desktop Receiver on the endpoint device.An ICA connection is established. The Virtual Desktop Agent verifies the license file with the Desktop Delivery Controller. The Desktop Delivery Controller queries the license server to verify that the user has a valid ticket. The Desktop Delivery Controller sends the session policies to the virtual desktop. The virtual desktop requests profile data. The virtual desktop is displayed to the user. Applications are delivered by XenApp and user configurations are applied using a profile management solution. EdgeSight Agents on the virtual desktop and XenApp server upload data to the EdgeSight Server.