DATA ED EDINBURGH DATA SCIENCE AND MANAGING NATIONAL DATA SERVICES AT EDINBURGH PROF MARK PARSONS
|
|
|
- Theresa Burke
- 10 years ago
- Views:
Transcription
1 Data Edinburgh 1 DATA ED EDINBURGH DATA SCIENCE AND MANAGING NATIONAL DATA SERVICES AT EDINBURGH PROF MARK PARSONS EPCC Executive Director Associate Dean for e-research
2 Data Edinburgh 2 Edinburgh Data Science An initiative spanning all of the University to bring together all of the world-class research on, and using, Data Science techniques Goals for next 3 years Set the pace for strategic activities Be at the hub of the UK Data Science network Develop a safe haven for unique data assets Be deeply integrated in pursuit of bold goals Be recognised as a world centre
3 Data Edinburgh 3 Accumulating success Alan Turing Institute Edinburgh Genomics 2.0 Higgs Centre April 2015 Data Lab CDT in Data Science Administrative Data Research Centre Farr Institute Digital Health Institute April 2014
4 Data Edinburgh 4 EDS networks and I don t mean wiring Turing Farr ADRC ICs ICT Labs Networks hold > 150M UK funding in next 4 years Will influence distribution of further funding
5 Data Edinburgh 5 Example of EDS stimulating research integration Bold New Foundations for medicine Modernise healthcare Transformational research Molecular Pathology Precision Medicine Real-time analytics Telehealth Telecare + Appropriate computational methods Machine learning Natural language Data cleaning Image analysis + Key data with unique curation/linkage PACS Generation Scotland UK Biobank Edinburgh Genomics
6 Physical Presence Data Edinburgh 6 Building 9 BioQuarter Healthcare/administrative data Higgs Innovation Centre Physics/engineering data Data Technology Institute Advanced Computing Facility HPC and Big Data Easter Bush Innovation Centre Bio/genomics data
7 Executive Data Edinburgh 7 What EDS is and isn t An amplifier An integrator between centres A promoter of Data Science Quick to act Lightweight EDS is Research Education Innovation Architecture Policy EDS isn t A source of direct funding An integrator within centres A replacement for existing efforts A source of frequent committees Rich!
8 Data Edinburgh 8 Advanced Computing Facility The ACF Opened 2005 Purpose built, secure, world-class facility Houses wide variety of leading edge systems and infrastructures National services ARCHER 118,080 cores (Cray XC30) DiRAC 98,304 cores (IBM BlueGene/Q) RDF (25Pb Disk / 50Pb Tape) Local services INDY industry machine ULTRA SGI UV2000 HYDRA research system 12m expansion in 2013: 6MW, 850m 2 plant room, 550m 2 machine
9 Data Edinburgh 9 ARCHER Cray XC30 National HPC service contract managed by EPSRC 26 frames 118,080 cores Comes with large 5Pb work filesystem Directly linked to 25Pb Research Data Facility for storage of simulation results EPCC won Service Provision contract in August 2013 service opened in November 2013 for ~3,800 users
10 Data Edinburgh 10 Data management is very challenging Our ability to store data is out-stripping our ability to manage data Large supercomputers today are always slightly broken but managing this is well understood It s less clear with regard to data All EPCC s system challenges today are data related Disk and enclosure failures Unexpectedly poor performance Difficulties with software tools But...
11 Data Edinburgh 11 Data services On the RDF we guarantee to look after your data for a minimum of 10 years We have a 50Pb tape-based disaster recover system at KB But how should we provide data access? Today the RDF is a large data store Limited data services on top Big growth area will be proper user focussed - data services But everyone is struggling with this
12 Data Edinburgh 12 Example: Farr Institute Scotland has a nicely sized population ~5.5m Has a good history of archiving data E.g. 25m image sets from PACS system Joining unique resources for medical and social research data sets from Farr Institute Administrative Data Research Centre Urban Big Data Centre Pseudonymised unconsented public data for research
13 Internet/JA NET Firewall U1: Approved Researcher U2: Data Provider U4: Indexer U5: Research Coordinator U6: Internet User DMZ U3: Tech Support U7: Vendor Support PACS Caching Service MFT Proxy Netscaler SSL Gateway IDZ V10 PACS copy DICOM Cache Live Catalogue MFT Server Citrix Storefront Server Active Directory Server DICOM Quarantine DLE Staging Catalogue HPS Server (CIFS) SMS Radius Server Identifier DB Logging Database Management Citrix VMs VDI Nodes (Mgmt) SAFE Server For Analysis DB Private Tags DB Structured Report Text DB U3: Tech Support U7: Vendor Support PACS DICOM Archive U8: Linkage Team GPFS Project Work Spaces ANZ Analysis Desktop Citrix VDI VMs Nodes (Analysis) VDZ Data Edinburgh U3: Tech Support 13 U7: Vendor Support DR? Archive? SMZ
14 Data Edinburgh 14 Summary Edinburgh Data Science EPCC and its ACF data centre Data management is really hard Edinburgh has a unique set of resources and skills to work in the Big Data area Questions?
HPC and Big Data. EPCC The University of Edinburgh. Adrian Jackson Technical Architect [email protected]
HPC and Big Data EPCC The University of Edinburgh Adrian Jackson Technical Architect [email protected] EPCC Facilities Technology Transfer European Projects HPC Research Visitor Programmes Training
Data management challenges in todays Healthcare and Life Sciences ecosystems
Data management challenges in todays Healthcare and Life Sciences ecosystems Jose L. Alvarez Principal Engineer, WW Director Life Sciences [email protected] Evolution of Data Sets in Healthcare
Citrix XenApp 6.5 Advanced Administration (CXA-301)
Citrix XenApp 6.5 Advanced Administration (CXA-301) In this course, you will learn the skills necessary to monitor, maintain, optimize, and troubleshoot Citrix XenApp 6.5 environments running on Windows
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
Big Data for health. Farr Institute, Administrative Data Research Centres, Medical Bioinformatics. 9 July 2015. Jacky Pallas, UCL
Big Data for health Farr Institute, Administrative Data Research Centres, Medical Bioinformatics 9 July 2015 Jacky Pallas, UCL Overview UK Research Council funding for big data in health, medical and administrative
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Outgoing VDI Gateways:
` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents
GE Measurement & Control. Cyber Security for Industrial Controls
GE Measurement & Control Cyber Security for Industrial Controls Contents Overview...3 Cyber Asset Protection (CAP) Software Update Subscription....4 SecurityST Solution Options...5 Centralized Account
Amazon Web Services. 2015 Annual ALGIM Conference. Tim Dacombe-Bird Regional Sales Manager Amazon Web Services New Zealand
Amazon Web Services 2015 Annual ALGIM Conference Tim Dacombe-Bird Regional Sales Manager Amazon Web Services New Zealand 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda Who
Virtualization Essentials
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide Published July 2015 This document covers steps to configure Citrix VDI on Pulse Secure s SA Series SSL VPN platforms. It also covers brief
Citrix XenDesktop Modular Reference Architecture Version 2.0. Prepared by: Worldwide Consulting Solutions
Citrix XenDesktop Modular Reference Architecture Version 2.0 Prepared by: Worldwide Consulting Solutions TABLE OF CONTENTS Overview... 2 Conceptual Architecture... 3 Design Planning... 9 Design Examples...
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions
CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions Overview The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure,
Experience of Data Transfer to the Tier-1 from a DIRAC Perspective
Experience of Data Transfer to the Tier-1 from a DIRAC Perspective Lydia Heck Institute for Computational Cosmology Manager of the DiRAC-2 Data Centric Facility COSMA 1 Talk layout Introduction to DiRAC?
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with
Solutions for Web. Citrix NetScaler
Introduction to Citrix Solutions for Web Application Delivery Citrix NetScaler 2 Global Market Forces Driving Change User Experience Declining IT Responsiveness Declining 3 Application Delivery Success
CTS Advisory Council. CTS Disaster Recovery (DR) Project. August 6, 2014
CTS Advisory Council CTS Disaster Recovery (DR) Project August 6, 2014 Disaster Recovery Defined Disaster Recovery: The process, policies, and procedures to recover or continue technology infrastructure
The business value of improved backup and recovery
IBM Software Thought Leadership White Paper January 2013 The business value of improved backup and recovery The IBM Butterfly Analysis Engine uses empirical data to support better business results 2 The
Communication Ports Used by Citrix Technologies. April 2011 Version 1.5
Communication Ports Used by Citrix Technologies April 2011 Version 1.5 Overview Introduction This document provides an overview of ports that are used by Citrix components and must be considered as part
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide This document covers steps to configure Citrix VDI on Juniper Network s SA Series SSL VPN platforms. It also covers brief overview of
OBSERVEIT DEPLOYMENT SIZING GUIDE
OBSERVEIT DEPLOYMENT SIZING GUIDE The most important number that drives the sizing of an ObserveIT deployment is the number of Concurrent Connected Users (CCUs) you plan to monitor. This document provides
ICT budget and staffing trends in the UK
ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget
Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios
Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Overview Citrix XenApp, XenDesktop and NetScaler are commonly used in the creation of Payment Card Industry (PCI), Data Security
Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)
Introduction This document provides a summary of technical information security controls operated by Newcastle University s IT Service (NUIT). These information security controls apply to all NUIT managed
Performance, Reliability, and Operational Issues for High Performance NAS Storage on Cray Platforms. Cray User Group Meeting June 2007
Performance, Reliability, and Operational Issues for High Performance NAS Storage on Cray Platforms Cray User Group Meeting June 2007 Cray s Storage Strategy Background Broad range of HPC requirements
Quantum StorNext. Product Brief: Distributed LAN Client
Quantum StorNext Product Brief: Distributed LAN Client NOTICE This product brief may contain proprietary information protected by copyright. Information in this product brief is subject to change without
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG Publishing RD Web Access with RD Gateway Part one Abstract In this short
Planning and Designing Microsoft Virtualization Solutions
Planning and Designing Microsoft Virtualization Solutions 50273: Planning and Designing Microsoft Virtualization Solutions (5 days) About this Course This five-day instructor-led course provides students
ExamPDF. Higher Quality,Better service!
ExamPDF Higher Quality,Better service! Q&A Exam : 1Y0-A21 Title : Basic Administration for Citrix NetScaler 9.2 Version : Demo 1 / 5 1.Scenario: An administrator is working with a Citrix consultant to
Course 50273B: Planning and Designing Microsoft Virtualization Solutions. Level: 300. About this Course
Course 50273B: Planning and Designing Microsoft Virtualization Solutions Length: 5 Day(s) Level: 300 About this Course This five-day instructor-led course provides students with the knowledge and skills
Boas Betzler. Planet. Globally Distributed IaaS Platform Examples AWS and SoftLayer. November 9, 2015. 20014 IBM Corporation
Boas Betzler Cloud IBM Distinguished Computing Engineer for a Smarter Planet Globally Distributed IaaS Platform Examples AWS and SoftLayer November 9, 2015 20014 IBM Corporation Building Data Centers The
Extending FactoryTalk View Site Edition with Microsoft's Remote Desktop Services
Extending FactoryTalk View Site Edition with Microsoft's Remote Desktop Services FactoryTalk View Site Edition Lab PUBLIC INFORMATION A View for Every Manufacturing Scenario FactoryTalk View Machine Edition
Hyper-V Replica Broker Configuration Lab By Yung Chou, Microsoft Platform Evangelist, http://aka.ms/yungchou, @yungchou
Page 1 of 23 Hyper-V Replica Broker Configuration Lab By Yung Chou, Microsoft Platform Evangelist, http://aka.ms/yungchou, @yungchou Windows Server 2012 Hyper-V Replica is a built-in mechanism for replicating
Communication ports used by Citrix Technologies. July 2011 Version 1.5
Communication ports used by Citrix Technologies July 2011 Version 1.5 Overview Introduction This document provides an overview of ports that are used by Citrix components and must be considered as part
International High Performance Computing. Troels Haugbølle Centre for Star and Planet Formation Niels Bohr Institute PRACE User Forum
International High Performance Computing Troels Haugbølle Centre for Star and Planet Formation Niels Bohr Institute PRACE User Forum Why International HPC? Large-scale science projects can require resources
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA AWS Introduction Why are enterprises choosing AWS? What are enterprises using AWS for? How are enterprise getting
Seagate Lustre Update. Peter Bojanic 2015-04-13
Seagate Lustre Update Peter Bojanic 2015-04-13 Seagate Cloud Systems and Solutions Delivering next-generation workloads with Intelligent Information Infrastructure tion OEM Cloud Services HPC HPC HPC Information
IBM Grid Medical Archive Solution
IBM Grid Medical Archive Solution Ronald Watkins IBM Grid & Virtualization Grid@Asia Conference Seoul - December 2006 Agenda IBM Grid Computing & Healthcare Agenda Healthcare Market the growing need for
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
Customer Cloud Architecture for Mobile. http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile
Customer Cloud Architecture for Mobile http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile June, 2015 1 Presenters Heather Kreger CTO International Standards, IBM US SC38 mirror
MedBroker A DICOM and HL7 Integration Product. Whitepaper
MedBroker A DICOM and HL7 Integration Product Whitepaper Copyright 2009, Keymind Computing AS All trademarks and copyrights referred to are the property of their respective owners. Revision 1.0 Oct 19
Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014
Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014 Citrix Netscaler Advanced guide for SMS PASSCODE. This document outlines configuration scenarios with SMS PASSCODE and Citrix Netscaler.
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
ICT budget and staffing trends in Healthcare
ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936
USING GENIE REMOTELY
USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.
OnX Big Data Reference Architecture
OnX Big Data Reference Architecture Knowledge is Power when it comes to Business Strategy The business landscape of decision-making is converging during a period in which: > Data is considered by most
Disaster Recovery Checklist Disaster Recovery Plan for <System One>
Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner
Mississippi State University High Performance Computing Collaboratory Brief Overview. Trey Breckenridge Director, HPC
Mississippi State University High Performance Computing Collaboratory Brief Overview Trey Breckenridge Director, HPC Mississippi State University Public university (Land Grant) founded in 1878 Traditional
How To Build A Call Center From Scratch
Design Guide Transforming Call Centers XenApp 7.5 Design Guide on vsphere 5.5 Table of Contents About FlexCast Services Design Guides 3 Project overview 3 Objective 3 Assumptions 4 Conceptual architecture
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Benefits of Image-Enabling the EHR
Benefits of Image-Enabling the EHR MU2 Implications for Hospitals, Imaging Providers and EHR Vendors A Merge Healthcare Whitepaper Introduction Meaningful Use (MU) Stage 2 has new requirements for imaging
Tim Tharratt, Technical Design Lead Neil Burton, Citrix Consultant
Tim Tharratt, Technical Design Lead Neil Burton, Citrix Consultant Replacement solution for aging heritage branch infrastructures (Co-op and Britannia) New unified app delivery platform for the bank to
Microsoft Azure Cloud oplossing als een extensie op mijn datacenter? Frederik Baert Solution Advisor
Microsoft Azure Cloud oplossing als een extensie op mijn datacenter? Frederik Baert Solution Advisor Mobile-first Cloud-first Cloud Platform Transform the datacenter 0 380.50 0 7.62.50 Unlock insight on
The safer, easier way to help you pass any IT exams. Exam : 000-115. Storage Sales V2. Title : Version : Demo 1 / 5
Exam : 000-115 Title : Storage Sales V2 Version : Demo 1 / 5 1.The IBM TS7680 ProtecTIER Deduplication Gateway for System z solution is designed to provide all of the following EXCEPT: A. ESCON attach
JASMIN/CEMS Services and Facilities
JASMIN/CEMS Services and Facilities 1 Overview Services/facilities available to users: Group Workspaces (large disk) Generic Virtual Machines (transfer, login, analysis) Dedicated Virtual Machines (for
VESZPROG ANTI-MALWARE TEST BATTERY
VESZPROG ANTI-MALWARE TEST BATTERY 2012 The number of threats increased in large measure in the last few years. A set of unique anti-malware testing procedures have been developed under the aegis of CheckVir
This course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise.
10233A: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course Number: 10233A Course Length: 5 Day Course Overview This instructor-led course provides you with the knowledge
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
7i Imaging on Demand PACS Solution FAQ s
7i Imaging on Demand PACS Solution FAQ s Standards: 1. Do you use any proprietary software to manage the images? No, our image management software manages the images and is fully DICOM compliant with no
IAN MASSINGHAM. Technical Evangelist Amazon Web Services
IAN MASSINGHAM Technical Evangelist Amazon Web Services From 2014: Cloud computing has become the new normal Deploying new applications to the cloud by default Migrating existing applications as quickly
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
End-to-End Infrastructure Solutions
End-to-End Infrastructure Solutions Thakral One www.thakralone.com www.thakralone.com 1 Agenda 1 2 3 Maximizing Infrastructure Investments End-to-End Infrastructure Solutions Thakral One and Our Value
Unprecedented Malware Growth
McAfee epolicy Orchestrator 4.5 Best Practices Sumeet Gohri Mid-Atlantic Sales Engineer McAfee User Group meeting organized by MEEC Agenda 9:30 am 9:45 am Welcome 9:45 am - 11:00 am epo 11:00 am 11:15
WebSphere Portal 8 Using GPFS file sharing in a Portal Farm. Test Configuration
WebSphere Portal 8 Using GPFS file sharing in a Portal Farm Test Configuration Owner: Mark E. Blondell Configuration name: Test Infrastructure: WebSphere Portal 8 Using GPFS file sharing in a Portal Farm
Amazon Web Services. For Government, Education, and Nonprofit Organizations. Jakob Huhn. [email protected]. Partner Manager Benelux, Public Sector
Amazon Web Services For Government, Education, and Nonprofit Organizations Jakob Huhn Partner Manager Benelux, Public Sector [email protected] 2015, Amazon Web Services, Inc. or its Affiliates. All rights
Reclaiming Primary Storage with Managed Server HSM
White Paper Reclaiming Primary Storage with Managed Server HSM November, 2013 RECLAIMING PRIMARY STORAGE According to Forrester Research Inc., the total amount of data warehoused by enterprises is doubling
Deploying Exchange Server 2007 SP1 on Windows Server 2008
Deploying Exchange Server 2007 SP1 on Windows Server 2008 Product Group - Enterprise Dell White Paper By Ananda Sankaran Andrew Bachler April 2008 Contents Introduction... 3 Deployment Considerations...
Virtualized Disaster Recovery (VDR) Overview... 2. Detailed Description... 3
Service Description Virtualized Disaster Recovery (VDR) Terremark's Virtualized Disaster Recovery (VDR) service is a fully managed replication and Disaster Recovery (DR) service, where Terremark provides
Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide
WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About
Advanced Hosting Solutions from Interoute
Advanced Hosting Solutions from Interoute www.interoute.com Interoute - from the Ground to the Cloud Interoute provides customers with a comprehensive portfolio of solutions and services from the Ground
PROPALMS TSE 6.0 March 2008
PROPALMS March 2008 An Analysis of and Terminal Services: Contents System Administration... 2 Server Management... 3 Application Management... 5 Security... 7 End User Experience... 8 Monitoring and Reporting...
Symantec Backup Exec 2014
Symantec Backup Exec 2014 Maxim Tsvetaev Principal Systems Engineer Backup Exec 2014 1 Today s Top Backup and Recovery Challenges Reducing Costs and Complexity Protecting Virtual Machines Meeting Backup
Availability Acceleration Access Virtualization - Consolidation
Sales Guide straight to the point Availability Acceleration Access Virtualization - Consolidation F5 Battlecard Aligning business strategy and the IT infrastructure F5 provides strategic points of control
icrosoft TMG Replacement with NetScaler
icrosoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for secure VPN access Table of contents Introduction 3 Configuration details 3 NetScaler features to be enabled
BACKUP BEST PRACTICES FOR A XENSERVER & XENDESKTOP ENVIRONMENT
BACKUP BEST PRACTICES FOR A XENSERVER & XENDESKTOP ENVIRONMENT WHO WE ARE Who we are Established, HW Development Development of Logistics SW Logistic Software Relag Develop Backup and Data Protection Software
CVE-401/CVA-500 FastTrack
CVE-401/CVA-500 FastTrack Description The CVE-400-1I Engineering a Citrix Virtualization Solution course teaches Citrix engineers how to plan for and perform the tasks necessary to successfully integrate
Cray s Storage History and Outlook Lustre+ Jason Goodman, Cray LUG 2015 - Denver
Cray s Storage History and Outlook Lustre+ Jason Goodman, Cray - Denver Agenda Cray History from Supercomputers to Lustre Where we are Today Cray Business OpenSFS Flashback to the Future SSDs, DVS, and
