Virtual Volumes provide a more efficient operational model for external storage management in vSphere. They integrate storage capabilities directly into virtual machines at the individual disk level through Storage Policy-Based Management. This simplifies operations by removing the need for static LUN/volume provisioning and allows storage services to be applied non-disruptively on a per-virtual machine basis according to policies. A key component is the VASA Provider, which is used to publish an array's storage capabilities and manage the creation of VM-level objects called Virtual Volumes on behalf of vSphere.
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
Policy based management greatly simplifies the work of IT Administrators making it easy to ensure that applications and VMs receive the resources, protection and functionality required. Learn about the latest enhancements of Site Recovery Manager in this space, which represent a huge step towards providing policy based DR. In this session we'll dive deep into how this approach works and how to work with them.
VMworld 2016: The KISS of vRealize Operations! VMworld
This presentation introduces new features in vRealize Operations 6.3 that simplify operations management. It begins with an overview of the vRealize Operations architecture and dashboard. New features are then demonstrated, including a recommended actions page, cluster resource dashboard, data collection notifications, workload balancing through rebalancing containers, guided remediation through alerts, integration with vRealize Log Insight, capacity management of clusters and projections, and extensibility with management packs. Finally, related VMworld sessions are listed that provide further information on capacity planning, troubleshooting, intelligent operations management, log insight, and network insight.
VMworld 2015: Managing Users: A Deep Dive into VMware User Environment ManagerVMworld
Take a deep dive into UEM, including an architectural overview, available settings and configurations, user environment management options, UEM deployment considerations and best practices, and UEM integration with Horizon 6.
VMworld 2015: Automating Everything VMware with PowerCLI- Deep DiveVMworld
This document provides an agenda for a presentation on automating VMware environments using PowerCLI. The presentation will cover desired state configuration, best practices for using the REST API and regular expressions in PowerCLI, and new features in the PowerCLI technical preview including support for vRealize Operations, updated storage and vCloud Air cmdlets, and listing host hardware information. It disclaims that details represent current development and are subject to change.
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...VMworld
This session discusses the lessons learned from VMware Professional Services Engineering during development of collateral for customers. It brings real world experiences to light, so that common issues can be addressed prior to deployment of the solution, rather than after the fact.
VMworld 2015: VMware vSphere Certificate Management for Mere MortalsVMworld
VMware vSphere 6.0 introduces new capabilities for managing certificates throughout the virtual infrastructure lifecycle. It includes the VMware Certificate Authority (VMCA) and VMware Endpoint Certificate Store (VECS) to provision and manage certificates for ESXi hosts, vCenter Server services, and other VMware components. Administrators can choose to use VMCA as the root CA, as an enterprise CA subordinate to an external root, or bring their own custom CA certificates. The presentation demonstrates how to replace the VMCA signing certificate with an enterprise CA-issued certificate as well as how to renew ESXi host certificates after the change.
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld
This document provides an overview and introduction to PowerShell and PowerCLI for managing VMware environments. It discusses what PowerShell and PowerCLI are, important terminology like modules and functions, how to set them up and configure profiles, and examples of how to start coding with PowerShell including gathering data, writing logic statements, and using cmdlets safely. The presenters are introduced and an agenda is provided covering these topics at a high level to get started with PowerShell and PowerCLI.
VMworld 2015: Troubleshooting for vSphere 6VMworld
The document provides an overview of troubleshooting tools and techniques for vSphere 6. It discusses gathering diagnostic information, identifying potential causes, and resolving problems. The vSphere ESXi Shell and vCLI commands can be used to troubleshoot issues locally or remotely via SSH. An example troubleshooting process is provided to demonstrate defining a vMotion failure problem, gathering logs, testing connectivity, and resolving an incorrect VMkernel interface IP address.
VMworld 2015: Managing vSphere 6 Deployments and Upgrades VMworld
1. The document discusses upgrading vSphere environments from older versions to vSphere 6.0, including upgrading ESXi, virtual machines, and post-upgrade considerations.
2. It provides an overview of the upgrade process and choices for upgrading ESXi, such as using VUM for rolling upgrades with no VM downtime.
3. Recommendations are given for upgrading virtual machines, including first upgrading VMware tools and understanding compatibility levels.
4. Post-upgrade topics covered include VMFS upgrades and the vSphere distributed switch. The document aims to help make the upgrade process less complex and time-consuming.
VMworld 2015: Extreme Performance Series - vSphere Compute & MemoryVMworld
This presentation provides an overview of new vSphere CPU and memory management technologies:
- It discusses VM CPU sizing and the meaning of %RDY time, highlighting that the same %RDY can have different performance impacts depending on the workload. It also cautions against oversizing VMs.
- It reviews ESXi's NUMA-aware scheduling and importance of adhering to vNUMA defaults.
- It covers memory terminology and techniques like reservation, preallocation, page sharing, and large pages. Guidance is provided on memory overcommitment.
This document provides an overview and update on the latest NSX network virtualization capabilities from VMware. It discusses both current NSX features such as physical network integration, encapsulations, service chaining, and multi-site network virtualization as well as potential future directions. Key points covered include using Geneve as a tunneling protocol, handling elephant flows, and challenges around multi-site network virtualization across geographically dispersed data centers.
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
Active Directory Domain Services (ADDS) allows organizations to deploy a scalable and secure directory service for managing users, resources and applications. Virtualization of ADDS has been supported for many years now, however has required careful management to avoid pitfalls around replication, time management, and access. Windows Server 2012 provides greater support for virtualization by including virtualization-safe features and support for rapid domain controller deployment.
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
This year VMware vSphere 6 combined with vRealize Operations 6.1 (vR Ops 6) adds critical features to increase technical agility in the infrastructure, and reduce Mean time to Repair. With a new Automated remediation action framework in vR Ops, vSphere 6’s ability to vMotion Physical Raw Device mappings (RDMs), and a complete Management Pack Ecosystem for monitoring Infrastructure to applications, administrators have the tools needed to get to maintain 5 9’s uptime, shorten Mean Time to Repair (MTTR), and predict capacity requirements as and when the business requires.. This session will be a deep technical explanation, and live demonstration of these tools. It will give administrators a solid understanding of how they can use these tools to monitor and manage their application clusters, keep applications running during Infrastructure maintenance, and get deep holistic visibility into the entire Application ecosystem, from Storage to Networking.
Get a technical understanding of the components of NSX, including how switching, routing, firewalling, load-balancing and other services work within NSX.
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld
vSphere with Operations Management takes virtualization to the next level by providing enhanced visibility, automation, and intelligence for virtualized environments. It combines vSphere with vRealize Operations for unified monitoring, capacity planning, and predictive analytics. Key innovations in vSphere 6 include increased scale, long-distance vMotion, multi-processor fault tolerance, and NVIDIA GRID vGPU support. vRealize Operations Insight adds log analytics and application dependency mapping. The solution helps customers optimize resources, reduce costs, and improve availability.
VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...VMworld
This document discusses integrating VMware's cloud orchestration and desktop virtualization products. It begins with an agenda for the presentation and then discusses the goal of using cloud and automation to enable organizations. It describes how integrating vCloud Automation Center (vCAC) and VMware Horizon View can provide workflow control, approval tracking, and self-service for end users and delegated administrators. The rest of the document covers prerequisites, configuring workflows in vCenter Orchestrator, lessons learned, and frequently asked questions about the integration.
STO7535 Virtual SAN Proof of Concept - VMworld 2016Cormac Hogan
This document provides an overview of tools that can help administrators successfully conduct a Virtual SAN proof of concept. It discusses the Virtual SAN Health Check plugin, capacity views, performance service, HCIbench, and Virtual SAN Observer for monitoring and validating Virtual SAN configurations. Validation scenarios covered include successfully deploying Virtual SAN, deploying VMs on VSAN storage, VM availability during host and storage failures, and measuring rebuild activity.
VMworld Europe 2014: A DevOps Story - Unlocking the Power of Docker with the ...VMworld
This document discusses new technologies that are currently under development by VMware and subject to change. It provides an overview of trends in development practices, containers, and DevOps. It then summarizes VMware's approach to supporting containers and DevOps workflows through tools that integrate building, running, and managing containerized applications across the application lifecycle. A new technology called Project Fargo is introduced that allows for rapid cloning of virtual machines for improved provisioning and portability of applications.
Horizon 7 introduces several new features including just-in-time desktops that instantly provision desktops and applications when users log in using VMware's instant clone technology. It also features smart policies that dynamically change desktop configurations based on user location or device. Infrastructure updates improve scalability and failover capabilities. The user experience is enhanced with support for 3D graphics, new protocols like Blast Extreme for optimized mobile access, and expanded capabilities for hosted applications and RDS desktops.
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld
1. This document provides an overview and agenda for a presentation on vSphere 6.x host resource deep dive topics including compute, storage, and network.
2. It introduces the presenters, Niels Hagoort and Frank Denneman, and provides background on their expertise.
3. The document outlines the topics to be covered under each section, including NUMA, CPU cache, DIMM configuration, I/O queue placement, driver considerations, RSS and NetQueue scaling for networking.
VMworld 2016: Advanced Network Services with NSXVMworld
NSX provides network virtualization and security services including distributed firewalling, load balancing, and VPN connectivity. It reproduces traditional network and security functions in software throughout the virtual infrastructure for improved performance, agility, and security compared to physical appliances. Over 1700 customers use NSX across various industries, with growth of 100% year-over-year. NSX services can be distributed across hypervisors for massive scalability. The platform also integrates with security and application delivery partners to enhance its native capabilities.
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld
Virtualizing Active Directory domain controllers provides benefits like increased availability, scalability, and manageability. However, there are some technical challenges to address like ensuring proper time synchronization. This presentation provides best practices for virtualizing domain controllers including using host-guest affinity rules, disabling time synchronization settings, and ensuring the ESXi host clock is correct. It also introduces new "safety" features in Windows Server 2012 like VM GenerationID that help address issues from restoring or reverting snapshots like USN rollback.
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld
This document is a disclaimer stating that the presentation may include features still under development and not committed to be delivered in final products. Any features discussed are subject to change based on technical feasibility and market demand, and pricing and packaging have not been determined for any new technologies presented. The document is confidential.
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
Iain Leiter from A.T. Still University discussed their organization's migration from a hardware-based firewall to NSX to improve performance and compliance. Some key advantages of NSX include distributed firewalling for high performance and scalability, pay-as-you-grow flexibility, and advanced security features like microsegmentation. Their deployment process involved installing NSX, defining security groups, building security policies using syslog data from "recon rules", and applying a common services policy. Discoveries included many backdoors, application architecture issues, and the security benefits of microsegmentation.
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld
This document provides an overview of how to deploy VMware NSX with Cisco infrastructure, including:
- NSX has minimal requirements of 1600 MTU and IP connectivity and is agnostic to the underlying network topology.
- When using Cisco Nexus switches, VLANs must be configured for various traffic types and SVIs created with consistent IP subnets. Jumbo MTU is required across all links.
- NSX is also compatible with Cisco ACI fabrics using Fabric Path or DFA topologies, with the VXLAN VLAN spanning multiple pods/clusters across the fabric.
VMworld 2015: Building a Business Case for Virtual SANVMworld
This presentation discusses building a business case for VMware Virtual SAN. It provides an overview of Virtual SAN and its benefits for customers like choice, integration, cost savings and performance. A case study is presented of how Dominos Pizza implemented Virtual SAN which resulted in roughly 40% lower costs compared to a traditional storage array. The presentation concludes by demonstrating the Virtual SAN assessment tool and various ways customers can try Virtual SAN.
VMworld 2015: Containers without Compromise - Persistent Storage for Docker C...VMworld
This presentation discussed persistent storage options for Docker containers using VMware technologies:
- VMware has released a vSphere driver for Flocker to enable migration of containers and their data volumes between ESXi hosts while preserving data on VMware vSphere and Virtual SAN storage.
- VMware's vSphere Integrated Containers and Photon Platform provide unified hybrid platforms for running containers with persistence and leveraging existing VMware infrastructure investments.
- Future developments may include a distributed file system for cloud-native applications to provide high availability, scalability and access control across multiple backend storage clusters.
The document provides an overview of troubleshooting methodology for VMware NSX. It discusses that NSX implements logical switching and routing services on top of an IP transport network. The key things to check when troubleshooting include validating the IP transport connectivity using tools like ping, and examining the VTEP tables and MAC tables on the NSX controller and hosts for a given virtual network identifier (VNI) to understand virtual machine connectivity and forwarding. An example is provided where pinging between VMs populates the MAC tables on hosts, demonstrating how NSX forwarding works based on these tables.
Virtualization 101: Everything You Need To Know To Get Started With VMwareDatapath Consulting
This document provides an overview of virtualization and VMware's virtualization platform vSphere. It begins with defining virtualization as using software to run multiple virtual machines on a single physical machine, sharing resources to improve utilization. It then discusses VMware's history and role as the market leader in virtualization. The document outlines the key benefits of virtualization such as reducing costs, increasing flexibility and enabling business agility. It provides an overview of vSphere's capabilities to deliver high availability, live migration, storage efficiency and faster disaster recovery. Overall, the document promotes virtualization and vSphere as a way to simplify IT operations and lower costs while increasing business agility.
S3 Deduplication with StorReduce and CloudianCloudian
Deduplication appliances today support the CIFS & NFS protocols. What about your cloud based applications that use the S3 API? How do you deduplicate S3 data to save on storage and network bandwidth? Leverage your backup systems S3 API and get the deduplication needed!
VMware vSphere Version Comparison 4.0 to 6.5Sabir Hussain
VMware vSphere leverages the power of virtualization to transform datacenters into simplified cloud computing infrastructures and enables IT organizations to deliver flexible and reliable IT services VMware vSphere virtualizes and aggregates the underlying physical hardware resources across multiple system and provides pools off virtual resources to the datacenter.
VM Virtualization
VMGate.com
Cloudian and Rubrik - Hybrid Cloud based Disaster RecoveryCloudian
This document provides an agenda for a presentation on challenges facing IT, Rubrik and Cloudian solutions, and reasons to build a hybrid cloud infrastructure. It introduces Rubrik and Cloudian, highlighting their growth and partnerships. It discusses challenges around complexity, backup windows and flat budgets. The presentation will demonstrate how Rubrik and Cloudian can provide protection at scale through their scale-out architectures, rapid ingest, predictive search, instant recovery and always-on availability. It argues their solution lowers TCO compared to traditional solutions through reduced hardware, licensing and support costs.
V sphere virtual volumes technical overviewsolarisyougood
This document discusses VMware vSphere Virtual Volumes (VVols), which provide a management and integration framework for external storage. VVols virtualize SAN and NAS devices by representing virtual disks natively on arrays. Key points include:
VVols are enabled through a VASA provider that communicates between vSphere and storage arrays. Storage containers on arrays house VVols and can apply storage policies. Protocol endpoints provide access between ESXi hosts and arrays. Operations like provisioning and migration can be offloaded to arrays for improved efficiency. Snapshots create point-in-time copies of VVols for tasks like backup and testing.
VMworld 2014: Virtual Volumes Technical Deep DiveVMworld
This document provides an overview of virtual volumes (VVols) presented at the STO1965 conference. It begins with an introduction to VVols and the high-level architecture, including storage containers, protocol endpoints, and the VASA provider. The document then covers managing storage capacity with storage containers, ensuring service level objectives through storage policies, and the different types of virtual machine objects that can be VVols. It concludes by discussing data services like snapshots and replication that can be offloaded to arrays, and the transition process from traditional storage to VVols.
Experts Round Table Webinar: Why should you care about VVOLs?NetApp
This deck is from a webinar on June 3, 2015, presented by SolidFire and VMware. Learn what you haven’t heard about vSphere Virtual Volumes (VVOLs). The purpose of this webinar is to provide a deep dive into the technical aspects and overall benefits of implementing VVOLs. This will be a slide-driven virtual roundtable, with a panel of participants including Rawlinson Rivera and Ken Werneburg from VMware, Josh Atwell and Andy Banta from SolidFire, moderated by Keith Norbie from SolidFire. Watch the recording here: https://www.youtube.com/watch?v=uYWL2UDNdFs
What is coming for VMware vSphere?
Delivered at VMUG DK/UK/BE in November 2014. Session is all about vSphere futures, what can be expected in the near future.
VMware introduced several new features in vSphere 6 including increased scalability limits, usability improvements to the vSphere Web Client, enhanced vMotion capabilities such as cross-vCenter and long distance vMotion, expanded fault tolerance support, and the introduction of vSphere Virtual Volumes and its policy-based management framework. Key networking updates included Network I/O Control version 3 and multiple TCP/IP stacks. Storage features focused on Virtual SAN enhancements, Storage DRS integration, and support for VASA 2.0 storage capabilities.
VMworld 2014: VMware Vision and Strategy for Software-Defined StorageVMworld
VMware's vision is for software-defined storage that abstracts and pools infrastructure to make virtual disks the primary data management unit. This will be achieved through storage policy-based management that provides a common consumption model and granular control of storage services for individual VMs across all storage tiers. Key VMware technologies for software-defined storage include virtual volumes, which natively represent virtual disks on external storage arrays, and VMware Virtual SAN, which pools server-attached storage and provides a shared datastore for VMs.
VMworld 2014: Advanced SQL Server on vSphere Techniques and Best PracticesVMworld
This document provides an overview of advanced SQL Server techniques and best practices when running SQL Server in a virtualized environment on vSphere. It covers topics such as storage configuration including VMFS, block alignment, and I/O profiling. Networking techniques like jumbo frames and guest tuning are discussed. The document also reviews memory management and optimization, CPU sizing considerations, workload consolidation strategies, and high availability options for SQL Server on vSphere.
- vSphere 5.0 introduces several new platform enhancements including support for 2TB of host memory, 160 logical CPUs, and 512 VMs per host. ESXi now runs exclusively as the hypervisor.
- Storage features are improved with VMFS-5, which supports volumes over 2TB and faster operations. Storage DRS allows for initial placement and load balancing of VMs across datastores.
- Networking features include support for multiple vMotion NICs for faster migration. The new web client allows remote administration from any browser.
Virtual SAN (VSAN) is a hypervisor-converged storage solution from VMware that radically simplifies storage. It pools server-attached flash, SSD, and HDD storage and manages it through storage policies from the vSphere client. VSAN is integrated with vSphere and provides high performance, resilience against hardware failures, and linear scalability. It can reduce both capital and operating expenses compared to traditional external storage arrays.
VMworld Europe 2014: Advanced SQL Server on vSphere Techniques and Best Pract...VMworld
This document provides an overview and agenda for a presentation on virtualizing SQL Server workloads on VMware vSphere. The presentation will cover designing SQL Server virtual machines for performance in production environments, consolidating multiple SQL Server workloads, and ensuring SQL Server availability using vSphere features. It emphasizes understanding the workload, optimizing for storage and network performance, avoiding swapping, using large memory pages, and accounting for NUMA when configuring SQL Server virtual machines.
VMworld 2013
Christos Karamanolis, VMware
Kiran Madnani, VMware
James Streit, Thomson Reuters
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Presentation v mware cloud infrastructure - success in virtualizationsolarisyourep
This document provides an overview of VMware's cloud infrastructure products and capabilities. It discusses VMware's journey to the cloud model, highlighting cost efficiency, quality of service, and business agility. It then covers the key components and features of vSphere 5, including enhanced compute, storage, network, and application services. Specific capabilities like larger virtual machines, storage I/O controls, and the vSphere storage appliance are summarized. The document concludes by emphasizing how vSphere 5 can accelerate virtualization and help customers achieve their cloud goals.
This document provides an overview and introduction to VMware Virtual SAN (VSAN). It discusses the VSAN architecture which uses SSDs for caching and HDDs for storage. It also covers how VSAN can be configured through storage policies assigned at the VM level. The document outlines how VSAN provides a software-defined storage solution that is hardware agnostic and can elastically scale storage performance and capacity by adding servers and disks.
VMware: Enabling Software-Defined Storage Using Virtual SAN (Business Decisio...VMware
VMware's Virtual SAN 6.0 software enables software-defined storage using the hypervisor. It provides a simplified storage solution that pools server-side storage and manages it through storage policies at the virtual machine level. Virtual SAN delivers high performance, scale, and availability while reducing costs through server-side economics and linear scalability. It is well-integrated with the VMware software stack and supports a variety of use cases including virtual desktop infrastructure, test/development environments, and disaster recovery.
Windows Server 2012 Deep-Dive - EPC GroupEPC Group
Windows Server 2012 Deep-Dive - EPC Group
Web: www.epcgroup.net | E-mail: contact@epcgroup.net | Phone: (888) 381-9725 | Twitter: @epcgroup
* SharePoint Server 2013, Office 365, Windows Azure, Amazon Web Services (AWS), SharePoint Server 2010 & SharePoint 2007: Review, Architecture Development, Planning, Configuration & Implementations, Upgrades, Global Initiatives, Training, and Post Go-live Support with Extensive Knowledge Transfer | Custom Branding and Responsive Web Design (RWD)
* Health Check & Assessments (Roadmap Preparation to Upgrade to 2013 or 2010) - Including Custom Code & Solution Review
* Enterprise Content Management Systems based on Microsoft SharePoint 2013, Office 365 Hybrid Cloud (Both On-premises and cloud)
* Enterprise Metadata Design, Taxonomy | Retention Schedule Dev | Disposition Workflow, and Records Management | eDiscovery | Microsoft Exchange 2013 Migration \ Integration | Roadmap, Requirements Gathering, Planning, Designing & Performing the Actual Implementation
* Best Practices Consulting on SharePoint 2013, Office 365, SharePoint 2010, 2007 | EPC Group has completed over 900+ initiatives
* Intranet, Knowledge Management, Internet & Extranet-Facing as Well as Mobility (BYOD Roadmap), Cloud, Hybrid, and Cross-Browser | Cross-Platform Solutions for SharePoint 2013 with Proven Past-performance
*Upgrades or Migrations of Existing Deployments or Other LOB Systems (Documentum, LiveLink, FileNet, SAP, etc.)
* Custom Apps, Custom Application Development, Custom Feature, Master Pages, Web Parts, Security Model, Usability (UI) & Workflow Development (Visual Studio 2012, Visual Studio 2013)
* Migration Initiatives to SharePoint 2013 \ Office 365 and those organizations with both on-premises and cloud assets for a SharePoint Hybrid Architecture and Deployment
* Key Performance Indicators, Dashboard & Business Intelligence Reporting Solutions (PerformancePoint 2013, SQL Server 2012 R2, SQL Server 2014, BI, KPIs, PowerPivot, Scorecards, Big Data) and Power BI
* Experts in Global \ Enterprise Infrastructure, Security, Hardware Configuration & Disaster Recovery (Global performance considerations)
* Tailored SharePoint "in the trenches" Training on SharePoint 2013, 2010, 2007 + Office 365
* Support Contracts (Ongoing Support your Organization's 2013, 2010, or 2007 Implementations)
* .NET Development, Custom applications, BizTalk Server experts
* Project Server 2013, 2010, and 2007 Implementations
* SharePoint Roadmap & Governance Development: 6, 12, 18, 24 and 36 months (Steering Committee & Code Review Board Development)
* EPC Group's HybridCloudAdvisor.com - Navigating the Ever Changing World of the Hybrid Cloud to include SLA development & consulting services | advisory | best practices around PaaS, IaaS, SaaS, VDI, Windows Azure, AWS as well as security, compliance & and regulatory issues facing cloud and Hybrid Cloud deployments throughout the globe.
* Corporate Change Management & End User
Similar to VMworld 2016: Virtual Volumes Technical Deep Dive (20)
This presentation discusses the concept of a software-defined data center (SDDC) and its benefits. An SDDC virtualizes and automates all infrastructure, delivering it as a service. This ideal architecture can be used for private, hybrid, and public clouds. An SDDC can dramatically accelerate innovation, reduce costs, streamline operations, improve security and control, and deliver better IT outcomes. The presentation then introduces a panel of representatives from various organizations discussing their SDDC experiences. Attendees are polled to vote for the best SDDC.
VMworld 2015: Conversation with the VMware CIO Suggestions on being an IT LeaderVMworld
Bask Iyer, VMware's CIO, discusses how IT leaders can shift from a back office orientation to front office leadership focused on business outcomes and the customer experience. He emphasizes catching the right innovation waves like mobile and cloud computing. Iyer also outlines how the cloud can help businesses increase agility and flexibility while reducing costs over time. Lastly, he shares examples of how VMware has transformed its internal IT organization to operate like a business, focusing on customer experience and simplicity.
VMware 2015: Next Horizon for Cloud Networking and SecurityVMworld
Software Defined Networking (SDN) and network virtualization has become an accepted part of modern data center architecture. The transformation of networking into a software industry has accelerated innovation and given rise to a number of new technologies and use cases that were previously impossible. Network virtualization is starting to have profound impact on services, security, the underlying physical networks and the organization of the IT organizations that use them. How will network virtualization impact the next horizon for cloud networking and security?
In this session Guido Appenzeller presents a tech-preview of NSX working with Docker Containers and Amazon Web Services (AWS). Additional speakers include Scott Lowe, Mukesh Hira and Jacob Cherkas from VMware and Suneet Nandwani from eBay.
This document provides an overview and deep dive into VMware's NSX networking and security virtualization platform. It begins with a brief introduction to NSX's architecture, including its data plane, control plane, and management plane components. The presentation then covers key NSX capabilities like logical switching, distributed routing, microsegmentation using the distributed firewall, and network services. It aims to provide attendees with an in-depth understanding of the NSX platform and how it implements virtual networking and security functions.
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld
This document provides an overview and technical deep dive of new features in vSphere Distributed Switch 6.0. Key highlights include expanded use of Network I/O Control version 3.0 to set network guarantees on virtual machines and distributed port groups. It also details using multiple TCP/IP stacks to support routed vMotion traffic between vCenters. The presentation explores fully leveraging the vSphere Distributed Switch for all workloads, including vCenter server and other management dependencies.
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld
This presentation introduces application self-service with networking and security using VMware's vRealize Automation and NSX products. It discusses how these products allow for automated, on-demand provisioning of complete application environments including compute, networking, and security resources. Specifically, it shows how vRealize Automation blueprints and catalogs can be used to define reusable application topologies that dynamically configure NSX networking and security groups during deployment. This enables applications to be provisioned in minutes with all required infrastructure and policies.
VMworld 2015: How To Troubleshoot Using vRealize Operations Manager (Deep Liv...VMworld
See how vRealize Operations Manager can help you to quickly isolate and troubleshoot "My VM is slow!" issues. We'll look at three real-world performance and capacity problems and demonstrate how to troubleshoot them using vRealize Operations Manager on a live environment with real infrastructure issues..
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
7 Most Powerful Solar Storms in the History of Earth.pdfEnterprise Wired
Solar Storms (Geo Magnetic Storms) are the motion of accelerated charged particles in the solar environment with high velocities due to the coronal mass ejection (CME).
Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment.
How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecJames Anderson
The lecture titled "Automating AppSec" delves into the critical challenges associated with manual application security (AppSec) processes and outlines strategic approaches for incorporating automation to enhance efficiency, accuracy, and scalability. The lecture is structured to highlight the inherent difficulties in traditional AppSec practices, emphasizing the labor-intensive triage of issues, the complexity of identifying responsible owners for security flaws, and the challenges of implementing security checks within CI/CD pipelines. Furthermore, it provides actionable insights on automating these processes to not only mitigate these pains but also to enable a more proactive and scalable security posture within development cycles.
The Pains of Manual AppSec:
This section will explore the time-consuming and error-prone nature of manually triaging security issues, including the difficulty of prioritizing vulnerabilities based on their actual risk to the organization. It will also discuss the challenges in determining ownership for remediation tasks, a process often complicated by cross-functional teams and microservices architectures. Additionally, the inefficiencies of manual checks within CI/CD gates will be examined, highlighting how they can delay deployments and introduce security risks.
Automating CI/CD Gates:
Here, the focus shifts to the automation of security within the CI/CD pipelines. The lecture will cover methods to seamlessly integrate security tools that automatically scan for vulnerabilities as part of the build process, thereby ensuring that security is a core component of the development lifecycle. Strategies for configuring automated gates that can block or flag builds based on the severity of detected issues will be discussed, ensuring that only secure code progresses through the pipeline.
Triaging Issues with Automation:
This segment addresses how automation can be leveraged to intelligently triage and prioritize security issues. It will cover technologies and methodologies for automatically assessing the context and potential impact of vulnerabilities, facilitating quicker and more accurate decision-making. The use of automated alerting and reporting mechanisms to ensure the right stakeholders are informed in a timely manner will also be discussed.
Identifying Ownership Automatically:
Automating the process of identifying who owns the responsibility for fixing specific security issues is critical for efficient remediation. This part of the lecture will explore tools and practices for mapping vulnerabilities to code owners, leveraging version control and project management tools.
Three Tips to Scale the Shift Left Program:
Finally, the lecture will offer three practical tips for organizations looking to scale their Shift Left security programs. These will include recommendations on fostering a security culture within development teams, employing DevSecOps principles to integrate security throughout the development
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Chris Swan
Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge.
You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter.
The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
In this follow-up session on knowledge and prompt engineering, we will explore structured prompting, chain of thought prompting, iterative prompting, prompt optimization, emotional language prompts, and the inclusion of user signals and industry-specific data to enhance LLM performance.
Join EIS Founder & CEO Seth Earley and special guest Nick Usborne, Copywriter, Trainer, and Speaker, as they delve into these methodologies to improve AI-driven knowledge processes for employees and customers alike.
Video traffic on the Internet is constantly growing; networked multimedia applications consume a predominant share of the available Internet bandwidth. A major technical breakthrough and enabler in multimedia systems research and of industrial networked multimedia services certainly was the HTTP Adaptive Streaming (HAS) technique. This resulted in the standardization of MPEG Dynamic Adaptive Streaming over HTTP (MPEG-DASH) which, together with HTTP Live Streaming (HLS), is widely used for multimedia delivery in today’s networks. Existing challenges in multimedia systems research deal with the trade-off between (i) the ever-increasing content complexity, (ii) various requirements with respect to time (most importantly, latency), and (iii) quality of experience (QoE). Optimizing towards one aspect usually negatively impacts at least one of the other two aspects if not both. This situation sets the stage for our research work in the ATHENA Christian Doppler (CD) Laboratory (Adaptive Streaming over HTTP and Emerging Networked Multimedia Services; https://athena.itec.aau.at/), jointly funded by public sources and industry. In this talk, we will present selected novel approaches and research results of the first year of the ATHENA CD Lab’s operation. We will highlight HAS-related research on (i) multimedia content provisioning (machine learning for video encoding); (ii) multimedia content delivery (support of edge processing and virtualized network functions for video networking); (iii) multimedia content consumption and end-to-end aspects (player-triggered segment retransmissions to improve video playout quality); and (iv) novel QoE investigations (adaptive point cloud streaming). We will also put the work into the context of international multimedia systems research.
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
20240704 QFM023 Engineering Leadership Reading List June 2024
VMworld 2016: Virtual Volumes Technical Deep Dive
1. Virtual Volumes Technical Deep Dive
Patrick Dirks, VMware, Inc
Pete Flecha, VMware, Inc
STO7645
#STO7645
2. • This presentation may contain product features that are currently under development.
• This overview of new technology represents no commitment from VMware to deliver these
features in any generally available product.
• Features are subject to change, and must not be included in contracts, purchase orders, or
sales agreements of any kind.
• Technical feasibility and market demand will affect final delivery.
• Pricing and packaging for any new technologies or features discussed or presented have not
been determined.
Disclaimer
CONFIDENTIAL 2
4. Customers Face Several Challenges with Storage Today
4
Fragmentation of roles
Specific management tools
Specialized skillsets
Static classes of service
Lack of fine grained control
Frequent data migrations
Time consuming processes
Lack of automation
Slow reaction to request
Rigid Infrastructure Complex ProcessesSiloed Management
CONFIDENTIAL
5. Key Issues With Traditional Storage Management
5
Goal: Deliver Storage Requirements To Workloads Consistently And With Agility
Capacity
(per-Disk)
Capacity
Performance
Capabilities
Resiliency
(per-LUN)
Capabilities applied
at LUN/Volume level2.No visibility to storage
capabilities during provisioning1.
Vendor specific configuration required
in advance of workload demand3.
CONFIDENTIAL
6. Legacy Storage Model Introduces Lots of Complexity
6
Datastores
Datastore
Clusters
Reservations Finance
Gold
Finance
Silver
Finance
Bronze
Reservation
Policy
HR Gold HR Silver HR Bronze
Business
Groups Finance HR
vSphereVRA
CONFIDENTIAL
7. Align Application Requirements with Infrastructure
CONFIDENTIAL 7
Goal: Deliver Storage Requirements To Workloads Consistently And With Agility
Capabilities applied at Virtual
Disk level via SPBM Storage
Policies
2.Storage capabilities integrated via
Storage Policy-Based Management1.
Consumed on demand
via VVols/VSAN/VAIO3.
Capacity
Performance
Capabilities
Resiliency
(per-VM/Disk)
11. VMware vSphere Virtual Volumes
11
Integration Framework for VM-Aware Storage
Virtual
Volumes
Overview
• Virtual disks are natively represented on arrays
• Enables VM granular storage operations using
array-based data services
• Extends vSphere Storage Policy-Based
Management to the storage ecosystem
• Supports existing storage I/O protocols (FC, iSCSI,
NFS)
• Based on T10 industry standards
• Industry-wide initiative supported by major storage
vendors
• Included with vSphere
CONFIDENTIAL
12. Virtual Volumes Introduces a New Architecture
12
• Arrays logically partitioned into
Storage Containers (i.e. Separate
HR, Finance)
• Bi-directional out of band
communication with VASA Provider
• VASA Provider specific to vendor
• No Filesystem
• VM-granular storage policy-based
management via SPBM and VASA
• Data Services offloaded to the Array
• Protocol Endpoint (PE) directs IO
from VM to Virtual Volume
• Non disruptive – data path follows
standard T10/NFS industry standards
VVol-enabled array
PE VP
Data Path
NFS, iSCSI, FC
Control Path
VASA APIs
Protocol
Endpoint
VASA
Provider
vSphere
Storage Policy-Based Management
IO Device
Finance
HR
CONFIDENTIAL
13. vSphere Virtual Volumes
vSphere Web Client View
vvol
CONFIG
DATA
SWAP
MEM
• Virtual Volumes
– Virtual machine objects stored natively
on the array.
– No Filesystem on-disk formatting
required
• There are five different types of
recognized Virtual Volumes:
– CONFIG – vmx, logs, nvram, log files, etc
– DATA – VMDKs
– MEM – Snapshots
– SWAP – Swap files
– Other – vSphere solution specific type
CONFIDENTIAL 13
15. Storage Container
Storage Containers
• Logical storage constructs for allocating array
resources
• Typically defined and setup by storage
administrators on the array in order to define:
– Storage capacity allocations and restrictions
– Capabilities to be presented
• Minimum one storage container per array
• Maximum depends on the array
vSphere Virtual Volumes
SAN / NAS
Storage Containers
HR Finance
CONFIDENTIAL 15
16. Differences Between Storage Containers and LUNs
CONFIDENTIAL 16
• Fixed size mandates greater number of LUNs
• Formatted with a fixed-size file system on every LUN
• Changing LUN size requires reformatting
• Provisioned using file system commands
• Can only apply homogeneous capability on all VMs
(VMDKs) provisioned in that LUN.
• Size limit selected by Storage administrator
• Size can be adjusted up/down as needed on the fly
• Max number of Storage Containers depend on the
array ability and capacity
• Can support different capabilities for different VMs
or VVols in that Storage Container using SPBM
Storage Containers
LUNs
17. Discovery Procedures – Storage Container
CONFIDENTIAL 17
Virtual Datastore
Virtual Volumes
HR Finance
vCenter
VASA
Provider
Storage Container Discovery Process
• Storage admin sets up Storage Container with
desired capacity limit and selection of capabilities
• VASA Provider presents Storage Container and
container’s capabilities to vCenter
• vSphere admin creates “Virtual Datastores” on
each host to grant access to Storage Container
• Any new VMs that are created will subsequently
be provisioned in the Virtual Datastore depending
on match with storage policies
18. Protocol Endpoints Protocol Endpoints
• Access points that enables communication
between ESXi hosts and storage array systems.
– Part of the physical storage fabric
– Created by Storage administrators
Scope of Protocol Endpoints
• Compatible with all SAN and NAS Protocols:
- iSCSI
- NFS v3
- FC
- FCoE
• A Storage Container’s PEs must all be either
SAN or NAS
• Existing multi-path policies and NFS topology
requirements can be applied to the PE
SAN / NAS
Virtual Datastore
Data
Path
Protocol
Endpoint
vSphere
Virtual Volumes
Storage Container
PEPE Protocol
Endpoint
CONFIDENTIAL 18
19. Protocol Endpoints
• Today, there are different types of logical management
constructs to store VMDKs/objects:
– NFS Mount Points
– IP or block based datastores
• Datastores serve two purposes today:
– Endpoints – receive SCSI or NFS reads, write
commands
– Storage Container – for large number of VMs
metadata and data files
• Differences between Protocol Endpoints
and Datastores:
– PEs no longer stores VMDKs but it only becomes the
access point.
– Now you wont need as many datastores or mount
point as before
• Certain offloading operation will be done via VASA and
other will be done using the standard protocol commands
vSphere
storage fabric
PE
Protocol Endpoint
SCSI: proxy LUN
NFS: mount-point
storage system
1 VVol (storage container)
Per VMDK
One entity on the fabric
CONFIDENTIAL 19
20. Discovery Procedures – Protocol Endpoint
Protocol Endpoint discovery process
• SCSI PEs are discovered by hosts during
an ESX rescan as usual
• NFS PEs are configured using IP addresses
or file paths and stored on hosts
• Hosts inform array’s VP about PEs found
and accessible
SAN / NAS
Virtual Datastore
Data
Path
Protocol
Endpoint
vSphere
Virtual Volumes
Storage Container
PE PE Protocol
Endpoint
CONFIDENTIAL 20
22. Storage Policy-Based Management – App Centric Automation
22
Overview
• Intelligent placement
• Fine control of services at VM
or even individual disk level
• Automation at scale through policy
• Need new services for VM?
• Change current policy on-the-fly
• Attach new policy on-the-fly
Virtual Machine Storage policy
Reserve Capacity 40GB
Deduplication On
Disk Type SSD
Disk Encryption Off
Storage Policy-Based Management
vSphere
Virtual SAN Virtual Volumes
Virtual Datastore
CONFIDENTIAL
23. VASA Provider (VP)
CONFIDENTIAL 23
SAN / NAS
Virtual Datastore
Data
Path
vSphere
Virtual Volumes
Storage Container
VASA Provider
(VASA)
Control
Path
Control
Path
PE PE
• Software component developed by
Storage Array Vendors
• ESX and vCenter Server connect to
VASA Provider
• Provides Storage awareness
services
• Single VASA Provider can manage
multiple arrays
• Supports VASA API Suite
• VASA Provider can be implemented
within the array’s management
server or firmware or as a VM
• Responsible for creating and
managing Virtual Volumes
24. Storage Capabilities and VM Storage Policies
SPBM
object
manager
virtual disk
Datastore Profile
VM Storage Policy
vSphere VM Storage Policy Management Framework
Storage Capabilities for Storage Array
Access
Capacity
Published Capabilities
Compression
Replication
Deduplication
QoS
Virtual Datastore
• Storage Capabilities – are array based
features and data services specifications that
capture storage requirements that can be
satisfied by a storage arrays advertised as
capabilities.
• Storage capabilities define what an array can
offer to storage containers as opposed to
what the VM requires.
• Arrays Storage Capabilities are advertises to
vSphere through the Vendor Provider and
VASA APIs
• In vSphere Storage Capabilities are
consumed via VM Storage Policy constructs.
• VM Storage Policies is a component of the
vSphere Storage Policy-based management
framework (SPBM)
CONFIDENTIAL 24
25. Array Capabilities and Storage Policies
Storage Capabilities
to Storage Policies
• Storage Admin creates Storage
Containers, selecting
• size limit
• capabilities
• VI Admin registers VP
• VP presents Storage
Containers and associated
capabilities to vSphere
• VI Admin authors VM Storage
Polices based on presented
capabilities to match expected
VM needs
• VI Admin assigns policies as
VMs are provisioned
• Storage policies determine
selection of datastore
Storage Policy
Capacity
Availability
Performance
Data Protection
Security
Published Capabilities
Compression
Replication
Deduplication
Encryption
vSphere
Storage Policy-Based Mgmt.
Virtual Volumes
VASA
ProviderPE PE
CONFIDENTIAL 25
27. Management Workflow
• What do the Admins see?
• How are the storage
containers setup?
• What does the vSphere
Admins see?
• Why are we still creating
datastores in this new model?
CONFIDENTIAL 27
Storage policies
vSphere Web
Client
Storage Management UI
Datastore
Storage
Container
Storage Capabilities
virtual volumes
virtual machines
29. Storage Container
vvol
DATA
vvol
CONF
vvol
SWAP
vvol
DATA
vvol
CONF
vvol
SWAP
Provisioning Workflow
storage arrays
PE
vSphere Admin
1. Create Virtual Machines
2. Assign a VM Storage Policy
3. Choose a suitable Datastore
Under the Covers
Provisioning operations are
translated into VASA API calls
in order to create the individual
virtual volumes, passing
storage policies to array
Under the Covers
Provisioning operations are
offloaded to the array for the
creation of virtual volumes on
the storage container that are
stored based on capabilities
defined in the VM Storage
Policies
offloadtoarray
Virtual Datastore
vSphere
Virtual Volumes
PE
PE
CONFIDENTIAL 29
30. Binding Operations
create bind
unbinddelete
VM Creation VM power-on
open (2)
I/O read (2)
I/O write (2)
VM power-off
close (2)
VM destroy
VP rebalance
REBIND
I/O
Virtual Volume Lifecycle
• Bindings are data path coordinating
mechanisms that occurs between VASA
providers and ESXi hosts for accessing
virtual volume.
• Different Binding Mechanism:
• Binding – allows array create I/O channels
for a virtual volume
• Unbind – destroys the I/O channel for
a virtual volume to a given ESXi host
• Rebind – provides the ability to change
the I/O path (i.e. choice of PE) for a
given virtual volumes run time using
array-generated events.
CONFIDENTIAL 30
31. Snapshots
• Snapshots are a fixed point in time image of a
Virtual Volume with a different ID from the original.
• Snapshots may be read-only or read/write
• Virtual Volumes snapshots are useful in the
contexts of creating:
– a quiesced copy for backup or archival purposes,
creating a test and rollback environment for
applications.
• Two type of snapshots supported:
– Managed Snapshot – Created and managed by
vSphere.
• A maximum of 32 vSphere managed snapshot are
supported for linked clones of an individual VM
– Unmanaged Snapshot – Created and managed by
the storage array.
Managed Snapshot - vSphere
Unmanaged Snapshot - Array
CONFIDENTIAL 31
32. Snapshots: Files vs VVols
32
main.vmdk
VMFS VVol
VVol ID 42
main.vmdk
snap.vmdk
VVol
ID 42
Flat file
snap.vmdk
Redo log
Redo log
snap.vmdk
VVol
ID 86
CONFIDENTIAL
35. Integrate
Data Services
Simplify Management Support Industry Leading
Virtualization Platform
Replication
Encryption
Device advancements
Usability
Operate at scale
Virtual disk level control
Scalability
Performance
Integration
Future Themes for Storage Management
35CONFIDENTIAL
36. VASA Replication Model
36
Overview
• Replication is modeled as relationship
(“Replication Group”) between “Fault
Domains”
• Topology Discovery (Fault Domains,
Replication Groups) through VASA APIs
• Replication operations defined on
“Replication Groups” such as
– Synchronize
– Failover
– TestFailover
– Reverse Replication
Future Considerations
New
York
Boston
Palo
Alto
HR Replication Group
Marketing Replication Group
Finance
Replication Groups
CONFIDENTIAL
37. What Do Customers Want?
37
Application
Compute
Storage
Optimize Infrastructure Simplify OperationsDeliver Agility
CONFIDENTIAL
38. What Do Customers Like About Virtual Volumes
38
Application driven provisioning
Rapid automation
Faster VM operations
Streamlined administration
Policy driven offerings
Flexible levels of control
Better storage utilization
Avoid over provisioning
VM-aware space reclamation
Application
Compute
Storage
Optimize Infrastructure Simplify OperationsDeliver Agility
CONFIDENTIAL
39. Certified Partners with Solutions
vSphere Virtual Volumes is an Industry-wide Initiative
39
All
Industry
Leaders
>30
Partners
Involved
>40
VVol-Enabled
Arrays
CONFIDENTIAL
40. Come Join the Discussion
STO10719-GD
Group Discussion: Meet the Virtual
Volumes Product and Engineering
Team
Today at 1:00 PM
Virtual
Volumes
CONFIDENTIAL 40
41. Come Join the Discussion
Virtual
Volumes
STO8619
Transitioning to VVols: Partner Panel
Wednesday at 4:00 PM
CONFIDENTIAL 41
42. Subscribe to the vSpeaking Podcast
vSpeakingPodcast.com
CONFIDENTIAL 42