#VMware Explore – Content Catalog and my top 5 picks

Whoop Whoop! The VMware Explore 2024 Content Catalog is now live! You can explore a wide range of sessions, workshops, and expert-led discussions tailored to all things VMware and beyond. Start building your agenda today and find my top picks for this year :)

Mastering Infrastructure As Code With VMware VSphere And Terraform [VCFB1813BCN]

Join us for an in-depth, in-person seminar to learn the essential skills to build and manage your virtual infrastructure using VMware vSphere and Terraform. This hands-on moment is designed for IT professionals and developers who want to better understand infrastructure as code (IaC) and how to leverage these powerful tools to streamline and automate their virtual environments.

Why Do I want to join the session? Infrastructure as a code is such a great concept used quite often in modern clouds. vSphere is still lacking this nowadays in my customer base :) Its time for a change

Supercharge Your Workloads On VCF: Unleashing The Power Of DPUs [VCFB1208BCN]

Offloading central processing unit (CPU) tasks to a network interface card has been around for years, but data processing unit (DPU) cards take this to a completely new level. They free up CPU resources and reduce the number of hosts needed in your data center. DPUs are pivotal in accelerating and offloading computational workloads, but their potential to enhance security, particularly in intrusion prevention and detection, remains unexplored. How can we leverage these cutting-edge advancements to ensure the utmost protection for sensitive data and critical systems? We explore how DPUs strengthen security for VMware VCF Workloads and virtual desktop infrastructure (VDI) platforms, e.g., firewalling and testing real-world performance-simulating attacks. Gain valuable insights into best practices for configuring DPUs in your VMware Cloud Foundation environment.

Why Do I want to join the session? CPU Core Count is key due to the new licesining model, all features that increase performance and decrease CPU requirements must be Analyzed and understood as an architect :) Besides that Philipp and Marvin are great guys I want to work more with in the future :)

Unlocking Your Data With VMware And NVIDIA—RAG Deep Dive [VCFB1881BCN]

Organizations today have acquired massive data sets, but getting the right information at the right moment can be a challenge. Enter retrieval augmented generation (RAG), an approach that combines the intelligence of a large language model with current, relevant and accurate data from trusted sources. Join us for a 300-level look into a RAG pipeline-architected using Private AI Foundation with NVIDIA. We review the end-to-end workflow and how it maps to virtual infrastructure. Then we dive deeper into the components, including the LLM, NVIDIA Inference Microservices and Vector DB. We also review best practices—including sizing considerations and when to leverage fractional, full, or multiple graphics processing units (GPUs).

Why Do I want to join the session? Adjusting LLM to organisational needs is something many mid- to large size organisations ask for nowadays. Getting a better understanding how that can be achieved in a private infrastructure is something I want to understand by heart.

VMware Cloud Foundation Networking Performance—Deep Dive [VCFB1646BCN]

What performance should I expect from VMware Cloud Foundation networking stack? What is enhanced data path? How does a data processing unit help? How can I tune to maximize throughput? Is it possible to lower the latency? If these are some of the questions you would like answers to, join this session. We take a close look at application traffic profiles, real-life performance expectations, tuning, design considerations, hardware choice and more, to achieve optimal performance when leveraging VMware NSX.

Why Do I want to join the session? DPU Network performance real-life data :)

Breaking Chains: Transforming Attack Chain Analysis Into Defender Strategy [ESGB1142BCN]

In this session, we delve into the anatomy of recent cyber attacks to uncover the strategic lessons they offer. By analyzing various attack chains, we have identified key tactics, techniques and procedures (TTPs) attackers use. We translate these insights into practical defensive strategies, equipping cybersecurity professionals with the knowledge to bolster their defenses. Leave with actionable tips and a deeper understanding of how to protect your organization from attacks based on lessons from real-world data.

Why Do I want to join the session? Security is everywhere nowadays and everyone needs to get a better understanding of attack vectors, tactics, techniques, etc. I am really looking forward to it.

If you haven’t registiered yet -> Do it here :) If you want to join our secret public friends & family dinner in Barcelona on Monday… Drop me a note and I can give you guidance how you might join the proper club :)

Leave a Reply

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

This site uses Akismet to reduce spam. Learn how your comment data is processed.