SlideShare une entreprise Scribd logo
1  sur  83
Télécharger pour lire hors ligne
1 © 2016 Citrix | Confidential
2 © 2016 Citrix | Confidential
3 © 2016 Citrix | Confidential
4 © 2016 Citrix | Confidential
Believe it or not XenServer 6.5 was a “minor” release
5 © 2016 Citrix | Confidential
http://www.shutterstock.com/pic.mhtml?id=345772928 (Standard License purchased by
Enzo Raso)
6 © 2016 Citrix | Confidential
http://www.shutterstock.com/pic.mhtml?id=345772928 (Standard License purchased by
Enzo Raso)
7 © 2016 Citrix | Confidential
8 © 2016 Citrix | Confidential
And an even greater pain to maintain
9 © 2016 Citrix | Confidential
10 © 2016 Citrix | Confidential
11 © 2016 Citrix | Confidential
12 © 2016 Citrix | Confidential
One or two VMs, OK.
But it’s a lot harder for a big deployment!
13 © 2016 Citrix | Confidential
http://www.shutterstock.com/pic.mhtml?id=344677877 (Standard License purchased by
Enzo Raso)
14 © 2016 Citrix | Confidential
15 © 2016 Citrix | Confidential
Windows Update to the rescue!
For New VMs:
• Install Windows.
• Windows Update will install the drivers and the light agent (storage optimised, network
optimised but not management optimised)
• Will then need Tools ISO or MSI to install the full agent
• After which the VM will have the full agent too
16 © 2016 Citrix | Confidential
17 © 2016 Citrix | Confidential
http://www.shutterstock.com/pic.mhtml?id=132074954 (Standard License purchased by
Enzo Raso)
18 © 2016 Citrix | Confidential
Who knows what this logo is?
• TaaS/CIS/AutoSupport.
Customers manually upload their log files, the system analyses them, then provides a
report on the health of the system.
19 © 2016 Citrix | Confidential
Customers can automate the process of uploading Server Status Reports to Citrix Insight
Services and will receive notifications in XenCenter, regarding the health of their systems,
based on the reports that CIS generates
Upload schedule is user configurable, default is random per machine
Can provide a different RBAC user’s credentials for connecting to XenServer
No need to keep typing same details in for Citrix upload service
Key points of the architecture:
A service runs on every machine that XenCenter is installed on. This means that we don’t
need XenCenter open all the time.
Communications are on standard HTTP ports.
Can configure a proxy (use the standard one setup in XenCenter)
20 © 2016 Citrix | Confidential
XenServer Dundee’s new partition layout:
• Dedicated logging partition, to avoid logs filling disk, regardless of logrotate
configuration.
• Dedicated disk swap partition.
• Primary and Backup partitions grown by 14 GB each
21 © 2016 Citrix | Confidential
TCO reduction as Admins can add any class of server to a pool without command line (or
esoteric programs)
No more reboots of hosts when adding or removing servers or VMs running on them
• After boot, features never disappear from a VM
• Different CPUs appear similar
22 © 2016 Citrix | Confidential
TCO reduction as Admins can add any class of server to a pool without command line (or
esoteric programs)
No more reboots of hosts when adding or removing servers or VMs running on them
• After boot, features never disappear from a VM
• Different CPUs appear similar
23 © 2016 Citrix | Confidential
Today on XenServer, you can achieve shared nothing live migration, where VMs do not
share any storage.
The disk blocks are copied between the hosts.
24 © 2016 Citrix | Confidential
Today on XenServer, you can achieve shared nothing live migration, where VMs do not
share any storage.
The disk blocks are copied between the hosts.
25 © 2016 Citrix | Confidential
However, when a VM is offline, VM storage migration (shared-nothing) is blocked
26 © 2016 Citrix | Confidential
However, when a VM is offline, VM storage migration (shared-nothing) is blocked
27 © 2016 Citrix | Confidential
However, when a VM is offline, VM storage migration (shared-nothing) is blocked
28 © 2016 Citrix | Confidential
Previously only supported for running VMs, now adds stopped and suspended VMs
No limit on number of snapshots that can be migrated
Supports Checkpoints
Allows for a copy as well as migration
Enables far more flexibility for admins
29 © 2016 Citrix | Confidential
• Available for Linux VMs only when XenCenter can determine the VM’s network address. This
requires VM Tools to be installed on the VM.
30 © 2016 Citrix | Confidential
http://www.shutterstock.com/pic.mhtml?id=303592118 (Standard License purchased by
Enzo Raso)
31 © 2016 Citrix | Confidential
Chart depicts VDI, but storage is a major cost component of any solution
We deliver reduced TCO, added features and increased coverage
32 © 2016 Citrix | Confidential
Surveys indicate that – just as customers don’t want to be locked into one virtualisation
technology – neither do they use one storage technology
33 © 2016 Citrix | Confidential
XenServer now supports SMB3 storage as an SR type
Customers with existing Microsoft Windows-based storage arrays can now utilise SMB as
their XenServer SR
Enables significant potential cost savings and re-use of existing infrastructure
Supports Read Cache that will radically reduce IOPS for your MCS XenDesktop VDI solution
• Tested this on Server2012R2 Storage Server and NetApp (should work on any platform that
supports SMBv3)
• If using NetApp ensure you’re using ONTAP v8.3 or later
34 © 2016 Citrix | Confidential
Includes Boot from SAN, uses a new installer for Boot from SAN (F10)
ovs and Bridge
35 © 2016 Citrix | Confidential
XenServer can be installed to, booted from, and run from a LUN provided by an iSCSI
target, which is specified in the iSCSI Boot Firmware Table (iBFT)
Support for ISCSI means customers can avoid the expense of purchasing a FC expansion
card for the UCS or requiring FC on their SAN
36 © 2016 Citrix | Confidential
37 © 2016 Citrix | Confidential
38 © 2016 Citrix | Confidential
Yes, there are applications used by designers which need a high-performance vGPU profile
(or even an entire GPU passed-through to them)
But for every 1 designer there are many more power users who run certain applications
that need significant GPU power (otherwise it’s offloaded to the CPU)
And for every power user there are _lots_ of task workers who use Office, web browsers
(e.g. HTML5 applications), and view increasingly complex PDFs. Yes, everything can be
done by the CPU, but at that point desktop density (and user experience) will drop. This is
where vGPU comes into its own. A small slice of GPU goes a long way
Case in point: try PowerPoint with transitions or diagrams that involve 3-D and you’ll
experience it for yourself
39 © 2016 Citrix | Confidential
Once users experience GPU acceleration – there is no going back
40 © 2016 Citrix | Confidential
In XS6.5 we delivered Intel GPU pass-through as well as other NVIDIA GPU innovations
With Intel GVT-g, we’re announcing Intel’s GPU virtualisation technology
Importantly, it provides an option for GPU virtualisation that does _not_ require an
additional graphics card to be purchased: the capability will be present on the CPU(s)
when you purchase the server
41 © 2016 Citrix | Confidential
GVT-g is scale out, Nvidia vGPU is scale up
Enables amongst other things video compression/decompression
42 © 2016 Citrix | Confidential
43 © 2016 Citrix | Confidential
128 vGPUs available on Tesla generation of NVIDIA cards only
44 © 2016 Citrix | Confidential
Delivering 2D acceleration (especially useful for web browsers, support for bigger displays
(>1024x768), H264 encoding/decoding and support for CUDA (note CUDA requires M60
and an entire GPU)
For Linux VDA this requires HDX 3D Pro support which enables higher frame rates and
lossless operation
Supported on Linux PV/HVM guests
45 © 2016 Citrix | Confidential
46 © 2016 Citrix | Confidential
Traditional full guest agent is installed as a privileged application to scan disk/memory to
remove known malware.
• Problems:
• Each machine has an agent that requires maintenance
• Doesn’t play nicely in virtualized environments (AV storms)
• Security agent is a target for attack
47 © 2016 Citrix | Confidential
Lite Agent is the traditional approach optimized for virtualized environments – each VM
has either a small dedicated ‘lite’ agent, or solutions make use of the hypervisor tools
agent/kernel module. Single point on the network manages these lite agents, and allows
offloading of disk/memory activity scanning
• Problems:
• Offloading limits the extent to which memory can be protected, relies mostly on disk scanning
• Lite security agent is still a target for attack
48 © 2016 Citrix | Confidential
Agentless requires an equivalent agent provided by the hypervisor vendor, installed as part
of it’s guest OS tools. The security vendor now integrates with an API provided by the
hypervisor
• Problems:
• Constrains innovation and performance, all vendors are now constrained by the intelligence of
the hypervisor provided agent
49 © 2016 Citrix | Confidential
All agent based AV solutions have the same problem, they are designed to combat
common malware
Yet the threat of advanced malware continues to grow with exploits of zero-day
vulnerabilities and kernel bugs
50 © 2016 Citrix | Confidential
All agent based AV solutions have the same problem, they are designed to combat
common malware
Yet the threat of advanced malware continues to grow with exploits of zero-day
vulnerabilities and kernel bugs
51 © 2016 Citrix | Confidential
Both full and lite agent based AV have the same problem, they are designed to combat
common malware
Yet the threat of advanced malware continues to grow with exploits of zero-day
vulnerabilities and kernel bugs
With X-ray Guard enabled, a supported security solution is able to watch guest memory in
real time, detecting malware as it executes inside the VM.
• By virtue of the isolation the hypervisor provides, the security solution can no longer be
attacked by the malware.
• In fact, the system can be and will be assumed to have been infected – rather than
relying on an initial clean state.
Only on XenServer
52 © 2016 Citrix | Confidential
Both full and lite agent based AV have the same problem, they are designed to combat
common malware
Yet the threat of advanced malware continues to grow with exploits of zero-day
vulnerabilities and kernel bugs
With X-ray Guard enabled, a supported security solution is able to watch guest memory in
real time, detecting malware as it executes inside the VM.
• By virtue of the isolation the hypervisor provides, the security solution can no longer be
attacked by the malware.
• In fact, the system can be and will be assumed to have been infected – rather than
relying on an initial clean state.
Only on XenServer
53 © 2016 Citrix | Confidential
Both full and lite agent based AV have the same problem, they are designed to combat
common malware
Yet the threat of advanced malware continues to grow with exploits of zero-day
vulnerabilities and kernel bugs
With X-ray Guard enabled, a supported security solution is able to watch guest memory in
real time, detecting malware as it executes inside the VM.
• By virtue of the isolation the hypervisor provides, the security solution can no longer be
attacked by the malware.
• In fact, the system can be and will be assumed to have been infected – rather than
relying on an initial clean state.
Only on XenServer
54 © 2016 Citrix | Confidential
55 © 2016 Citrix | Confidential
56 © 2016 Citrix | Confidential
57 © 2016 Citrix | Confidential
58 © 2016 Citrix | Confidential
Support the running of Windows Docker containers on Windows Server 2016, where
Windows Server 2016 is running as a VM on XenServer.
Same model as for Linux Docker containers running inside Linux VMs – containers are
shown in the XenCenter tree view from where a number of management and monitoring
functions are available
59 © 2016 Citrix | Confidential
This feature automates connecting to the container’s console or log stream by launching
PuTTY with arguments to connect to the VM’s IP address and a command to connect to
the container – this saves the administrator manually extracting both pieces of
information and setting up a connection manually.
The user can set up a private key, or use normal username/password authentication
60 © 2016 Citrix | Confidential
Enables customers to better sweat assets, and realise economies of scale
61 © 2016 Citrix | Confidential
Resume of huge VMs may take a while!
62 © 2016 Citrix | Confidential
vCPUs increase to 32 for both Linux and Windows
63 © 2016 Citrix | Confidential
VM stop / start time is impacted linearly by number of VBDs
64 © 2016 Citrix | Confidential
65 © 2016 Citrix | Confidential
66 © 2016 Citrix | Confidential
67 © 2016 Citrix | Confidential
It is now safer to run many I/O intensive VMs on a single host
Easier to run 16 hosts in a pool
No need to preclude poolmaster from running VM workloads
• Enables greater VM densities across deployments
68 © 2016 Citrix | Confidential
Reasons for improvement
Aggregate intrahost network throughput
• Grant-table locking scalability
• Increased number of dom0 vCPUs
VM-to-bare-metal (8 threads)
• Multi-queue netif protocol
Sequential storage read IOPS
• Polling in tapdisk3
69 © 2016 Citrix | Confidential
PBIS (Power Broker Identity Services) 8.2 replaced the Likewise 5.4 used within XenServer
6.x
Improved Performance, scale and reliability, especially for complex or nested directory
structures
70 © 2016 Citrix | Confidential
71 © 2016 Citrix | Confidential
Microsoft Server 2016 is not for production use as it has not yet been released!
XenServer 6.5 was based on Centos 5
72 © 2016 Citrix | Confidential
The WLB appliance supports XenServer 6.0, 6.1, 6.5 and 7.0
73 © 2016 Citrix | Confidential
http://www.shutterstock.com/lightboxes/44840275 (Standard License purchased by Enzo
Raso)
TLSv1.2 is the latest and safest protocol version.
• XenServer 6.x uses SSLv3 outgoing, and accepts SSLv3 and TLSv1.0 incoming
Drop support for weaker ciphersuites.
74 © 2016 Citrix | Confidential
Supports legacy and UEFI boot
Future replacement for legacy PC BIOS (which will eventually be phased out)
75 © 2016 Citrix | Confidential
76 © 2016 Citrix | Confidential
77 © 2016 Citrix | Confidential
We strive to ensure every release is of higher quality than the previous one
This graph shows the cumulative number of unique defects in XenServer (y axis) over time
(x axis) since release.
The metric used is the “CRUD”, Customer Reported Unique Defects
78 © 2016 Citrix | Confidential
Our most extensive test program to date
The Dundee Tech Preview Program (Ran from Q4 2015 through Q1 2016)
79 © 2016 Citrix | Confidential
http://www.shutterstock.com/pic.mhtml?id=139780882 (Standard License purchased by
Enzo Raso)
80 © 2016 Citrix | Confidential
81 © 2016 Citrix | Confidential
82 © 2016 Citrix | Confidential
83 © 2016 Citrix | Confidential

Contenu connexe

Tendances

Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper Networks
 
Common Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First TimeCommon Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First TimeDavid McGeough
 
Disaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacementsDisaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacementsOVHcloud
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 RecapKevin Groat
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301Kevin Groat
 
Why Nutanix for Enterprise Workloads
Why Nutanix for Enterprise WorkloadsWhy Nutanix for Enterprise Workloads
Why Nutanix for Enterprise WorkloadsNEXTtour
 
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMware
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data CenterVMware
 
Citrix Synergy 2014 - Syn227 Architecting your private cloud infrastructure f...
Citrix Synergy 2014 - Syn227 Architecting your private cloud infrastructure f...Citrix Synergy 2014 - Syn227 Architecting your private cloud infrastructure f...
Citrix Synergy 2014 - Syn227 Architecting your private cloud infrastructure f...Citrix
 
vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9VMware
 
[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...
[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...
[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...POST Telecom for Business
 
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXComment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXColloqueRISQ
 
Net scaler appfw customer technical presentation dec 2012f
Net scaler appfw customer technical presentation dec 2012fNet scaler appfw customer technical presentation dec 2012f
Net scaler appfw customer technical presentation dec 2012fxKinAnx
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use CasesKevin Groat
 
Experience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 PresentationExperience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 PresentationVeritas Technologies LLC
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudVMware
 
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...Veritas Technologies LLC
 
Cloud Whitepaper - Telco sp Cloud Market - Challenges
Cloud Whitepaper - Telco sp Cloud Market - ChallengesCloud Whitepaper - Telco sp Cloud Market - Challenges
Cloud Whitepaper - Telco sp Cloud Market - ChallengesThe World Bank
 
Presentation cloud, the whole offer
Presentation   cloud, the whole offerPresentation   cloud, the whole offer
Presentation cloud, the whole offerxKinAnx
 

Tendances (20)

Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
 
Common Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First TimeCommon Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First Time
 
Disaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacementsDisaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacements
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 Recap
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301
 
Why Nutanix for Enterprise Workloads
Why Nutanix for Enterprise WorkloadsWhy Nutanix for Enterprise Workloads
Why Nutanix for Enterprise Workloads
 
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data Center
 
Citrix Synergy 2014 - Syn227 Architecting your private cloud infrastructure f...
Citrix Synergy 2014 - Syn227 Architecting your private cloud infrastructure f...Citrix Synergy 2014 - Syn227 Architecting your private cloud infrastructure f...
Citrix Synergy 2014 - Syn227 Architecting your private cloud infrastructure f...
 
vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9
 
[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...
[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...
[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...
 
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXComment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
 
Net scaler appfw customer technical presentation dec 2012f
Net scaler appfw customer technical presentation dec 2012fNet scaler appfw customer technical presentation dec 2012f
Net scaler appfw customer technical presentation dec 2012f
 
NetScaler 11 Update
NetScaler 11 UpdateNetScaler 11 Update
NetScaler 11 Update
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use Cases
 
Experience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 PresentationExperience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 Presentation
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private Cloud
 
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
 
Cloud Whitepaper - Telco sp Cloud Market - Challenges
Cloud Whitepaper - Telco sp Cloud Market - ChallengesCloud Whitepaper - Telco sp Cloud Market - Challenges
Cloud Whitepaper - Telco sp Cloud Market - Challenges
 
Presentation cloud, the whole offer
Presentation   cloud, the whole offerPresentation   cloud, the whole offer
Presentation cloud, the whole offer
 

En vedette

Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix
 
How to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization TeamHow to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization TeamCitrix
 
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?Citrix
 
The Digital Disconnect in South Africa
The Digital Disconnect in South AfricaThe Digital Disconnect in South Africa
The Digital Disconnect in South AfricaCitrix
 
Synergy 2015 Session Slides: SYN409 Dissecting The XenApp/XenDesktop Logon Pr...
Synergy 2015 Session Slides: SYN409 Dissecting The XenApp/XenDesktop Logon Pr...Synergy 2015 Session Slides: SYN409 Dissecting The XenApp/XenDesktop Logon Pr...
Synergy 2015 Session Slides: SYN409 Dissecting The XenApp/XenDesktop Logon Pr...Citrix
 
Digital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformationDigital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformationCitrix
 
2016 Cyber Threat Defense Report
2016 Cyber Threat Defense Report2016 Cyber Threat Defense Report
2016 Cyber Threat Defense ReportCitrix
 
Highlights from 2015 Citrix Customer Case Studies
Highlights from 2015 Citrix Customer Case StudiesHighlights from 2015 Citrix Customer Case Studies
Highlights from 2015 Citrix Customer Case StudiesCitrix
 
SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix Citrix
 
DotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
DotCMS Bootcamp: Enabling Java in Latency Sensitivie EnvironmentsDotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
DotCMS Bootcamp: Enabling Java in Latency Sensitivie EnvironmentsAzul Systems Inc.
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentKaspersky
 
Synergy 2015 Session Slides: SYN414 Architecting Citrix on Microsoft Azure
Synergy 2015 Session Slides: SYN414 Architecting Citrix on Microsoft AzureSynergy 2015 Session Slides: SYN414 Architecting Citrix on Microsoft Azure
Synergy 2015 Session Slides: SYN414 Architecting Citrix on Microsoft AzureCitrix
 
Citrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery ContinuumCitrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery ContinuumCitrix
 
SYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobileSYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobileCitrix
 
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“Citrix
 
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...Citrix
 
Citrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health SystemCitrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health SystemCitrix
 
SYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + GatewaySYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + GatewayCitrix
 
SYN240: Next-Generation Management and Analytics
SYN240: Next-Generation Management and AnalyticsSYN240: Next-Generation Management and Analytics
SYN240: Next-Generation Management and AnalyticsCitrix
 
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...Citrix
 

En vedette (20)

Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
 
How to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization TeamHow to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization Team
 
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
 
The Digital Disconnect in South Africa
The Digital Disconnect in South AfricaThe Digital Disconnect in South Africa
The Digital Disconnect in South Africa
 
Synergy 2015 Session Slides: SYN409 Dissecting The XenApp/XenDesktop Logon Pr...
Synergy 2015 Session Slides: SYN409 Dissecting The XenApp/XenDesktop Logon Pr...Synergy 2015 Session Slides: SYN409 Dissecting The XenApp/XenDesktop Logon Pr...
Synergy 2015 Session Slides: SYN409 Dissecting The XenApp/XenDesktop Logon Pr...
 
Digital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformationDigital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformation
 
2016 Cyber Threat Defense Report
2016 Cyber Threat Defense Report2016 Cyber Threat Defense Report
2016 Cyber Threat Defense Report
 
Highlights from 2015 Citrix Customer Case Studies
Highlights from 2015 Citrix Customer Case StudiesHighlights from 2015 Citrix Customer Case Studies
Highlights from 2015 Citrix Customer Case Studies
 
SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix
 
DotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
DotCMS Bootcamp: Enabling Java in Latency Sensitivie EnvironmentsDotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
DotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Synergy 2015 Session Slides: SYN414 Architecting Citrix on Microsoft Azure
Synergy 2015 Session Slides: SYN414 Architecting Citrix on Microsoft AzureSynergy 2015 Session Slides: SYN414 Architecting Citrix on Microsoft Azure
Synergy 2015 Session Slides: SYN414 Architecting Citrix on Microsoft Azure
 
Citrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery ContinuumCitrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery Continuum
 
SYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobileSYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobile
 
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
 
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
 
Citrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health SystemCitrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health System
 
SYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + GatewaySYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + Gateway
 
SYN240: Next-Generation Management and Analytics
SYN240: Next-Generation Management and AnalyticsSYN240: Next-Generation Management and Analytics
SYN240: Next-Generation Management and Analytics
 
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
 

Similaire à SYN 103: Learn What’s New with XenServer

Citrix Portfolio Updates
Citrix Portfolio UpdatesCitrix Portfolio Updates
Citrix Portfolio UpdatesPawel Serwan
 
XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6
XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6
XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6Lee Bushen
 
Jump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentJump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentDavid McGeough
 
What’s new xen server 6.5 & xendesktop 7.6
What’s new xen server 6.5 & xendesktop 7.6What’s new xen server 6.5 & xendesktop 7.6
What’s new xen server 6.5 & xendesktop 7.6solarisyougood
 
Cit bip v3_7.17_ally_house
Cit bip v3_7.17_ally_houseCit bip v3_7.17_ally_house
Cit bip v3_7.17_ally_houseErica Price
 
Citrix Desktop Master Class – New in XA/XD 7.9, Skype for Business, HDX Raspb...
Citrix Desktop Master Class – New in XA/XD 7.9, Skype for Business, HDX Raspb...Citrix Desktop Master Class – New in XA/XD 7.9, Skype for Business, HDX Raspb...
Citrix Desktop Master Class – New in XA/XD 7.9, Skype for Business, HDX Raspb...Lee Bushen
 
2016 11-16 Citrix XenServer & Nutanix Master Class
2016 11-16 Citrix XenServer & Nutanix Master Class2016 11-16 Citrix XenServer & Nutanix Master Class
2016 11-16 Citrix XenServer & Nutanix Master ClassMarc Trouard-Riolle
 
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...Amazon Web Services
 
ENT208 Transform your Business with VMware Cloud on AWS
ENT208 Transform your Business with VMware Cloud on AWSENT208 Transform your Business with VMware Cloud on AWS
ENT208 Transform your Business with VMware Cloud on AWSAmazon Web Services
 
Citrix Desktop Master Class - Dec 2016 - Moving to Citrix Cloud
Citrix Desktop Master Class - Dec 2016 - Moving to Citrix CloudCitrix Desktop Master Class - Dec 2016 - Moving to Citrix Cloud
Citrix Desktop Master Class - Dec 2016 - Moving to Citrix CloudLee Bushen
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm Technologies
 
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2karanamsaibabu
 
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid CloudVMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid CloudVMworld
 
Citrix adc technical overview
Citrix adc   technical overviewCitrix adc   technical overview
Citrix adc technical overviewRoshan Dias
 
Citrix Cloud Master Class June 2014
Citrix Cloud Master Class June 2014Citrix Cloud Master Class June 2014
Citrix Cloud Master Class June 2014Citrix
 
Accelerating & Optimizing Machine Learning on VMware vSphere leveraging NVIDI...
Accelerating & Optimizing Machine Learning on VMware vSphere leveraging NVIDI...Accelerating & Optimizing Machine Learning on VMware vSphere leveraging NVIDI...
Accelerating & Optimizing Machine Learning on VMware vSphere leveraging NVIDI...inside-BigData.com
 
Pivotal Platform - December Release A First Look
Pivotal Platform - December Release A First LookPivotal Platform - December Release A First Look
Pivotal Platform - December Release A First LookVMware Tanzu
 
Cisco Connect 2018 Malaysia - 24.7.365 availability with veeam & cisco
Cisco Connect 2018 Malaysia - 24.7.365 availability with veeam & ciscoCisco Connect 2018 Malaysia - 24.7.365 availability with veeam & cisco
Cisco Connect 2018 Malaysia - 24.7.365 availability with veeam & ciscoNetworkCollaborators
 

Similaire à SYN 103: Learn What’s New with XenServer (20)

Citrix Portfolio Updates
Citrix Portfolio UpdatesCitrix Portfolio Updates
Citrix Portfolio Updates
 
XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6
XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6
XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6
 
ITE7_Chp9.pptx
ITE7_Chp9.pptxITE7_Chp9.pptx
ITE7_Chp9.pptx
 
Jump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentJump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 Deployment
 
What’s new xen server 6.5 & xendesktop 7.6
What’s new xen server 6.5 & xendesktop 7.6What’s new xen server 6.5 & xendesktop 7.6
What’s new xen server 6.5 & xendesktop 7.6
 
Cit bip v3_7.17_ally_house
Cit bip v3_7.17_ally_houseCit bip v3_7.17_ally_house
Cit bip v3_7.17_ally_house
 
Citrix Desktop Master Class – New in XA/XD 7.9, Skype for Business, HDX Raspb...
Citrix Desktop Master Class – New in XA/XD 7.9, Skype for Business, HDX Raspb...Citrix Desktop Master Class – New in XA/XD 7.9, Skype for Business, HDX Raspb...
Citrix Desktop Master Class – New in XA/XD 7.9, Skype for Business, HDX Raspb...
 
2016 11-16 Citrix XenServer & Nutanix Master Class
2016 11-16 Citrix XenServer & Nutanix Master Class2016 11-16 Citrix XenServer & Nutanix Master Class
2016 11-16 Citrix XenServer & Nutanix Master Class
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
 
ENT208 Transform your Business with VMware Cloud on AWS
ENT208 Transform your Business with VMware Cloud on AWSENT208 Transform your Business with VMware Cloud on AWS
ENT208 Transform your Business with VMware Cloud on AWS
 
Citrix Desktop Master Class - Dec 2016 - Moving to Citrix Cloud
Citrix Desktop Master Class - Dec 2016 - Moving to Citrix CloudCitrix Desktop Master Class - Dec 2016 - Moving to Citrix Cloud
Citrix Desktop Master Class - Dec 2016 - Moving to Citrix Cloud
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paper
 
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2
 
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid CloudVMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
 
Citrix adc technical overview
Citrix adc   technical overviewCitrix adc   technical overview
Citrix adc technical overview
 
Citrix Cloud Master Class June 2014
Citrix Cloud Master Class June 2014Citrix Cloud Master Class June 2014
Citrix Cloud Master Class June 2014
 
Accelerating & Optimizing Machine Learning on VMware vSphere leveraging NVIDI...
Accelerating & Optimizing Machine Learning on VMware vSphere leveraging NVIDI...Accelerating & Optimizing Machine Learning on VMware vSphere leveraging NVIDI...
Accelerating & Optimizing Machine Learning on VMware vSphere leveraging NVIDI...
 
Pivotal Platform - December Release A First Look
Pivotal Platform - December Release A First LookPivotal Platform - December Release A First Look
Pivotal Platform - December Release A First Look
 
Cisco Connect 2018 Malaysia - 24.7.365 availability with veeam & cisco
Cisco Connect 2018 Malaysia - 24.7.365 availability with veeam & ciscoCisco Connect 2018 Malaysia - 24.7.365 availability with veeam & cisco
Cisco Connect 2018 Malaysia - 24.7.365 availability with veeam & cisco
 

Plus de Citrix

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital WorkplaceCitrix
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Citrix
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideCitrix
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformCitrix
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?Citrix
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesCitrix
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?Citrix
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital WorkspaceCitrix
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesCitrix
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix PaddingtonCitrix
 

Plus de Citrix (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

SYN 103: Learn What’s New with XenServer

  • 1. 1 © 2016 Citrix | Confidential
  • 2. 2 © 2016 Citrix | Confidential
  • 3. 3 © 2016 Citrix | Confidential
  • 4. 4 © 2016 Citrix | Confidential Believe it or not XenServer 6.5 was a “minor” release
  • 5. 5 © 2016 Citrix | Confidential http://www.shutterstock.com/pic.mhtml?id=345772928 (Standard License purchased by Enzo Raso)
  • 6. 6 © 2016 Citrix | Confidential http://www.shutterstock.com/pic.mhtml?id=345772928 (Standard License purchased by Enzo Raso)
  • 7. 7 © 2016 Citrix | Confidential
  • 8. 8 © 2016 Citrix | Confidential And an even greater pain to maintain
  • 9. 9 © 2016 Citrix | Confidential
  • 10. 10 © 2016 Citrix | Confidential
  • 11. 11 © 2016 Citrix | Confidential
  • 12. 12 © 2016 Citrix | Confidential One or two VMs, OK. But it’s a lot harder for a big deployment!
  • 13. 13 © 2016 Citrix | Confidential http://www.shutterstock.com/pic.mhtml?id=344677877 (Standard License purchased by Enzo Raso)
  • 14. 14 © 2016 Citrix | Confidential
  • 15. 15 © 2016 Citrix | Confidential Windows Update to the rescue! For New VMs: • Install Windows. • Windows Update will install the drivers and the light agent (storage optimised, network optimised but not management optimised) • Will then need Tools ISO or MSI to install the full agent • After which the VM will have the full agent too
  • 16. 16 © 2016 Citrix | Confidential
  • 17. 17 © 2016 Citrix | Confidential http://www.shutterstock.com/pic.mhtml?id=132074954 (Standard License purchased by Enzo Raso)
  • 18. 18 © 2016 Citrix | Confidential Who knows what this logo is? • TaaS/CIS/AutoSupport. Customers manually upload their log files, the system analyses them, then provides a report on the health of the system.
  • 19. 19 © 2016 Citrix | Confidential Customers can automate the process of uploading Server Status Reports to Citrix Insight Services and will receive notifications in XenCenter, regarding the health of their systems, based on the reports that CIS generates Upload schedule is user configurable, default is random per machine Can provide a different RBAC user’s credentials for connecting to XenServer No need to keep typing same details in for Citrix upload service Key points of the architecture: A service runs on every machine that XenCenter is installed on. This means that we don’t need XenCenter open all the time. Communications are on standard HTTP ports. Can configure a proxy (use the standard one setup in XenCenter)
  • 20. 20 © 2016 Citrix | Confidential XenServer Dundee’s new partition layout: • Dedicated logging partition, to avoid logs filling disk, regardless of logrotate configuration. • Dedicated disk swap partition. • Primary and Backup partitions grown by 14 GB each
  • 21. 21 © 2016 Citrix | Confidential TCO reduction as Admins can add any class of server to a pool without command line (or esoteric programs) No more reboots of hosts when adding or removing servers or VMs running on them • After boot, features never disappear from a VM • Different CPUs appear similar
  • 22. 22 © 2016 Citrix | Confidential TCO reduction as Admins can add any class of server to a pool without command line (or esoteric programs) No more reboots of hosts when adding or removing servers or VMs running on them • After boot, features never disappear from a VM • Different CPUs appear similar
  • 23. 23 © 2016 Citrix | Confidential Today on XenServer, you can achieve shared nothing live migration, where VMs do not share any storage. The disk blocks are copied between the hosts.
  • 24. 24 © 2016 Citrix | Confidential Today on XenServer, you can achieve shared nothing live migration, where VMs do not share any storage. The disk blocks are copied between the hosts.
  • 25. 25 © 2016 Citrix | Confidential However, when a VM is offline, VM storage migration (shared-nothing) is blocked
  • 26. 26 © 2016 Citrix | Confidential However, when a VM is offline, VM storage migration (shared-nothing) is blocked
  • 27. 27 © 2016 Citrix | Confidential However, when a VM is offline, VM storage migration (shared-nothing) is blocked
  • 28. 28 © 2016 Citrix | Confidential Previously only supported for running VMs, now adds stopped and suspended VMs No limit on number of snapshots that can be migrated Supports Checkpoints Allows for a copy as well as migration Enables far more flexibility for admins
  • 29. 29 © 2016 Citrix | Confidential • Available for Linux VMs only when XenCenter can determine the VM’s network address. This requires VM Tools to be installed on the VM.
  • 30. 30 © 2016 Citrix | Confidential http://www.shutterstock.com/pic.mhtml?id=303592118 (Standard License purchased by Enzo Raso)
  • 31. 31 © 2016 Citrix | Confidential Chart depicts VDI, but storage is a major cost component of any solution We deliver reduced TCO, added features and increased coverage
  • 32. 32 © 2016 Citrix | Confidential Surveys indicate that – just as customers don’t want to be locked into one virtualisation technology – neither do they use one storage technology
  • 33. 33 © 2016 Citrix | Confidential XenServer now supports SMB3 storage as an SR type Customers with existing Microsoft Windows-based storage arrays can now utilise SMB as their XenServer SR Enables significant potential cost savings and re-use of existing infrastructure Supports Read Cache that will radically reduce IOPS for your MCS XenDesktop VDI solution • Tested this on Server2012R2 Storage Server and NetApp (should work on any platform that supports SMBv3) • If using NetApp ensure you’re using ONTAP v8.3 or later
  • 34. 34 © 2016 Citrix | Confidential Includes Boot from SAN, uses a new installer for Boot from SAN (F10) ovs and Bridge
  • 35. 35 © 2016 Citrix | Confidential XenServer can be installed to, booted from, and run from a LUN provided by an iSCSI target, which is specified in the iSCSI Boot Firmware Table (iBFT) Support for ISCSI means customers can avoid the expense of purchasing a FC expansion card for the UCS or requiring FC on their SAN
  • 36. 36 © 2016 Citrix | Confidential
  • 37. 37 © 2016 Citrix | Confidential
  • 38. 38 © 2016 Citrix | Confidential Yes, there are applications used by designers which need a high-performance vGPU profile (or even an entire GPU passed-through to them) But for every 1 designer there are many more power users who run certain applications that need significant GPU power (otherwise it’s offloaded to the CPU) And for every power user there are _lots_ of task workers who use Office, web browsers (e.g. HTML5 applications), and view increasingly complex PDFs. Yes, everything can be done by the CPU, but at that point desktop density (and user experience) will drop. This is where vGPU comes into its own. A small slice of GPU goes a long way Case in point: try PowerPoint with transitions or diagrams that involve 3-D and you’ll experience it for yourself
  • 39. 39 © 2016 Citrix | Confidential Once users experience GPU acceleration – there is no going back
  • 40. 40 © 2016 Citrix | Confidential In XS6.5 we delivered Intel GPU pass-through as well as other NVIDIA GPU innovations With Intel GVT-g, we’re announcing Intel’s GPU virtualisation technology Importantly, it provides an option for GPU virtualisation that does _not_ require an additional graphics card to be purchased: the capability will be present on the CPU(s) when you purchase the server
  • 41. 41 © 2016 Citrix | Confidential GVT-g is scale out, Nvidia vGPU is scale up Enables amongst other things video compression/decompression
  • 42. 42 © 2016 Citrix | Confidential
  • 43. 43 © 2016 Citrix | Confidential 128 vGPUs available on Tesla generation of NVIDIA cards only
  • 44. 44 © 2016 Citrix | Confidential Delivering 2D acceleration (especially useful for web browsers, support for bigger displays (>1024x768), H264 encoding/decoding and support for CUDA (note CUDA requires M60 and an entire GPU) For Linux VDA this requires HDX 3D Pro support which enables higher frame rates and lossless operation Supported on Linux PV/HVM guests
  • 45. 45 © 2016 Citrix | Confidential
  • 46. 46 © 2016 Citrix | Confidential Traditional full guest agent is installed as a privileged application to scan disk/memory to remove known malware. • Problems: • Each machine has an agent that requires maintenance • Doesn’t play nicely in virtualized environments (AV storms) • Security agent is a target for attack
  • 47. 47 © 2016 Citrix | Confidential Lite Agent is the traditional approach optimized for virtualized environments – each VM has either a small dedicated ‘lite’ agent, or solutions make use of the hypervisor tools agent/kernel module. Single point on the network manages these lite agents, and allows offloading of disk/memory activity scanning • Problems: • Offloading limits the extent to which memory can be protected, relies mostly on disk scanning • Lite security agent is still a target for attack
  • 48. 48 © 2016 Citrix | Confidential Agentless requires an equivalent agent provided by the hypervisor vendor, installed as part of it’s guest OS tools. The security vendor now integrates with an API provided by the hypervisor • Problems: • Constrains innovation and performance, all vendors are now constrained by the intelligence of the hypervisor provided agent
  • 49. 49 © 2016 Citrix | Confidential All agent based AV solutions have the same problem, they are designed to combat common malware Yet the threat of advanced malware continues to grow with exploits of zero-day vulnerabilities and kernel bugs
  • 50. 50 © 2016 Citrix | Confidential All agent based AV solutions have the same problem, they are designed to combat common malware Yet the threat of advanced malware continues to grow with exploits of zero-day vulnerabilities and kernel bugs
  • 51. 51 © 2016 Citrix | Confidential Both full and lite agent based AV have the same problem, they are designed to combat common malware Yet the threat of advanced malware continues to grow with exploits of zero-day vulnerabilities and kernel bugs With X-ray Guard enabled, a supported security solution is able to watch guest memory in real time, detecting malware as it executes inside the VM. • By virtue of the isolation the hypervisor provides, the security solution can no longer be attacked by the malware. • In fact, the system can be and will be assumed to have been infected – rather than relying on an initial clean state. Only on XenServer
  • 52. 52 © 2016 Citrix | Confidential Both full and lite agent based AV have the same problem, they are designed to combat common malware Yet the threat of advanced malware continues to grow with exploits of zero-day vulnerabilities and kernel bugs With X-ray Guard enabled, a supported security solution is able to watch guest memory in real time, detecting malware as it executes inside the VM. • By virtue of the isolation the hypervisor provides, the security solution can no longer be attacked by the malware. • In fact, the system can be and will be assumed to have been infected – rather than relying on an initial clean state. Only on XenServer
  • 53. 53 © 2016 Citrix | Confidential Both full and lite agent based AV have the same problem, they are designed to combat common malware Yet the threat of advanced malware continues to grow with exploits of zero-day vulnerabilities and kernel bugs With X-ray Guard enabled, a supported security solution is able to watch guest memory in real time, detecting malware as it executes inside the VM. • By virtue of the isolation the hypervisor provides, the security solution can no longer be attacked by the malware. • In fact, the system can be and will be assumed to have been infected – rather than relying on an initial clean state. Only on XenServer
  • 54. 54 © 2016 Citrix | Confidential
  • 55. 55 © 2016 Citrix | Confidential
  • 56. 56 © 2016 Citrix | Confidential
  • 57. 57 © 2016 Citrix | Confidential
  • 58. 58 © 2016 Citrix | Confidential Support the running of Windows Docker containers on Windows Server 2016, where Windows Server 2016 is running as a VM on XenServer. Same model as for Linux Docker containers running inside Linux VMs – containers are shown in the XenCenter tree view from where a number of management and monitoring functions are available
  • 59. 59 © 2016 Citrix | Confidential This feature automates connecting to the container’s console or log stream by launching PuTTY with arguments to connect to the VM’s IP address and a command to connect to the container – this saves the administrator manually extracting both pieces of information and setting up a connection manually. The user can set up a private key, or use normal username/password authentication
  • 60. 60 © 2016 Citrix | Confidential Enables customers to better sweat assets, and realise economies of scale
  • 61. 61 © 2016 Citrix | Confidential Resume of huge VMs may take a while!
  • 62. 62 © 2016 Citrix | Confidential vCPUs increase to 32 for both Linux and Windows
  • 63. 63 © 2016 Citrix | Confidential VM stop / start time is impacted linearly by number of VBDs
  • 64. 64 © 2016 Citrix | Confidential
  • 65. 65 © 2016 Citrix | Confidential
  • 66. 66 © 2016 Citrix | Confidential
  • 67. 67 © 2016 Citrix | Confidential It is now safer to run many I/O intensive VMs on a single host Easier to run 16 hosts in a pool No need to preclude poolmaster from running VM workloads • Enables greater VM densities across deployments
  • 68. 68 © 2016 Citrix | Confidential Reasons for improvement Aggregate intrahost network throughput • Grant-table locking scalability • Increased number of dom0 vCPUs VM-to-bare-metal (8 threads) • Multi-queue netif protocol Sequential storage read IOPS • Polling in tapdisk3
  • 69. 69 © 2016 Citrix | Confidential PBIS (Power Broker Identity Services) 8.2 replaced the Likewise 5.4 used within XenServer 6.x Improved Performance, scale and reliability, especially for complex or nested directory structures
  • 70. 70 © 2016 Citrix | Confidential
  • 71. 71 © 2016 Citrix | Confidential Microsoft Server 2016 is not for production use as it has not yet been released! XenServer 6.5 was based on Centos 5
  • 72. 72 © 2016 Citrix | Confidential The WLB appliance supports XenServer 6.0, 6.1, 6.5 and 7.0
  • 73. 73 © 2016 Citrix | Confidential http://www.shutterstock.com/lightboxes/44840275 (Standard License purchased by Enzo Raso) TLSv1.2 is the latest and safest protocol version. • XenServer 6.x uses SSLv3 outgoing, and accepts SSLv3 and TLSv1.0 incoming Drop support for weaker ciphersuites.
  • 74. 74 © 2016 Citrix | Confidential Supports legacy and UEFI boot Future replacement for legacy PC BIOS (which will eventually be phased out)
  • 75. 75 © 2016 Citrix | Confidential
  • 76. 76 © 2016 Citrix | Confidential
  • 77. 77 © 2016 Citrix | Confidential We strive to ensure every release is of higher quality than the previous one This graph shows the cumulative number of unique defects in XenServer (y axis) over time (x axis) since release. The metric used is the “CRUD”, Customer Reported Unique Defects
  • 78. 78 © 2016 Citrix | Confidential Our most extensive test program to date The Dundee Tech Preview Program (Ran from Q4 2015 through Q1 2016)
  • 79. 79 © 2016 Citrix | Confidential http://www.shutterstock.com/pic.mhtml?id=139780882 (Standard License purchased by Enzo Raso)
  • 80. 80 © 2016 Citrix | Confidential
  • 81. 81 © 2016 Citrix | Confidential
  • 82. 82 © 2016 Citrix | Confidential
  • 83. 83 © 2016 Citrix | Confidential