In questa sessione saranno discusse le peculiarità dei due principali stack di virtualizzazione (VMware vSphere e Microsoft Hyper-V) partendo dai concetti chiave di ciascun prodotto, dalle diverse funzionalità (e degli equivalenti in ciascun mondo), fino a discutere delle problematiche di conversione Virtual to Virtual (V2V) tra un ambiente e l'altro. Infine saranno discusse alcune soluzioni di gestione e monitoraggio multi-hypervisor.
Over the last years, many customers have had to deal with cyber attacks targeted at intellectual property. We have entered a new phase in which criminals unleash destructive attacks, rendering IT environments unusable and effectively halting business. Consumerization of IT and the cloud add inherent tension and security implications to this new reality. How can one deal with data that moves in and out of your datacenters, to unmanaged devices and cloud services not directly under your control? How can you create a cost efficient architecture and plan for prevention, detection, and recovery in a time where cloud and consumerization of IT are high on every CxO's agenda? The presenters of this session have been on the Targeted Attack frontline with enterprise customers over the last years. They explain the threats of targeted attacks and share an architecture model using a data classification model, as well as their field experiences and services you can leverage to deal with prevention, detection and recovery.
Mostly, when we build enterprise applications, we’re not starting from scratch. Deciding what to build, what to reuse and what to keep is an important part of the enterprise software development decision process. In this session, Nick will explore the conditions and requirements that might lead you to decide which of these approaches to take. He’ll also demonstrate some techniques for taking an existing Line of Business application and lighting it up with a modern, touch-friendly UI.