F5 Networks presentation on protocol normalization, given at OpenStack Summit 2016 in Barcelona, Red Hat NFV Mini Summit. Includes F5/Red Hat collaboration description.
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
Mike Herbet, Principal Engineer, Cisco, Dave Cole, Consulting Systems Engineer, Cisco, Sean Comrie, Technical Solutions Architect, Cisco focused on the application centric infrastructure (ACI) at Cisco Connect Toronto.
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
Mike Herbet, Principal Engineer, Cisco, Dave Cole, Consulting Systems Engineer, Cisco, Sean Comrie, Technical Solutions Architect, Cisco focused on the application centric infrastructure (ACI) at Cisco Connect Toronto.
Cisco® Application Centric Infrastructure (ACI) is an innovative architecture that radically simplifies, optimizes, and accelerates the entire application deployment lifecycle. Cloud, mobility, and big data applications are causing a shift in the data center model. Cisco ACI redefines the power of IT, enabling IT to be more responsive to changing business and application needs, enhancing agility, and adding business value. Cisco ACI delivers a transformational operating model for next-generation data center and cloud applications. This Cisco ACI hands lab will step you through from the ACI Fabric concepts to deployment. • Cisco ACI Overview • ACI Fabric Discovery • ACI Building Basic Network Constructs • ACI Building Policy Filters and Contracts • : Deploying a 3-Tier Application Network Profile • ACI Integrating with VMware • Deploying a Service Graph with Application Network Profile • Exploring Monitoring and Troubleshooting
A day in the life of an enterprise CIO can be daunting—challenges such as managing complex environments, security and ongoing TCO pressures face us everyday. Addressing these challenges offer opportunities to significantly improve operations, productivity and have an impact on the bottom line if done successfully. To learn more please visit our website here: http://www.cisco.com/web/CA/index.html
Hosted Security as a Service - Solution Architecture DesignCisco Canada
he Hosted Security as a Service session provides in depth discussion on cloud based security services leveraging Cisco security solutions. This session is appropriate for service providers who are interested in delivering managed security services to their customer from their cloud infrastructure. We will provide detailed designs and guidance on: - cloud security services including FW, VPN, web and email services - architecture layers through influence of NfV and SDN - KVM and VMware based solutions - orchestration flexibility and options - Day 0 and Day 1 provisioning - Day 2 monitoring and reporting.
The journey to the digital enterprise requires new thinking. What have you done to modernize your data center network?
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA) and Steven Shalita, vice president of marketing and business development at Pluribus Networks--highlights how the most forward-thinking enterprises are leveraging software-defined technologies to make their data centers more agile, programmable, resilient, and visible.
Application Policy Enforcement Using APIC Cisco Canada
Problems in current Data Center are mostly surrounding policy around applications. The presentation is designed to help students get a jump start on configuring and troubleshooting basic policy model as well as providing valuable hands-on experience with how the APIC integrates into existing network environments
Security and Virtualization in the Data CenterCisco Canada
The evolving complexity of the data center is placing increased demand on the network and security teams to come up with inventive methods for enforcing security policies in these ever-changing environments. The goal of this session is to provide participants with an understanding of features and design recommendations for integrating security into the data center environment. This session will focus on recommendations for securing next-generation data center architectures. Areas of focus include security services integration, leveraging device virtualization, and considerations and recommendations for server virtualization. The target audience are security and data center administrators.
The realities of insider threats and determined attackers have made it necessary to implement security technologies on the network interior. This session will discuss leveraging network telemetry, such as NetFlow and Cisco ISE, in combination with the Cisco StealthWatch System and in order to monitor the network interior to detect and respond to threats. Use cases on how to best organize and query NetFlow data will be presented as well as how to drive an investigation in order to identify an attacker's presence on the network based on the statistical analysis of network telemetry. The target audience for this session are network and security administrators and analysts interested in learning how to best leverage NetFlow, ISE, and StealthWatch as a component of their security operations center.
The concept of service mesh is one of the new technologies that have grown up around the container and micro-service model over the last couple of years, and Istio is the latest entry into this space. As Istio was recently included as an incubated project in the CNCF, many companies are now looking to it to provide a set of key functions to accelerate their micro-service application management model. Istio enables bi-directional authentication and security of service communication via TLS based authentication and encryption, and at the same time is able to capture application level communication statistics, improving the application development team's visibility into the otherwise difficult to track communication patterns. In this way, Istio acts like an application level network, riding across the underlying capabilities of Kubernetes CNI based networks and network policy. We will implement Istio on a GKE kubernetes cluster, and instrument a simple application to get better insight into how Istio provides its capabilities.
Speaker Bio:
With over 20 years of experience as a systems reliability engineer, and a focus on automating not only application deployments but the underlying infrastructure as well, Robert Starmer brings a wealth of knowledge to the full application enablement stack. He has applied this knowledge in fields from high-performance computing to high-frequency trading environments, and everything in between. Robert also holds patents in network, data center, and application performance and scale enhancements. He is a Founder and the CTO at Kumulus Technologies, a DevOps, Systems Reliability Engineering and cloud computing consultancy. Additionally, Robert is an incurable photography nerd and has been known to stay up until dawn in remote locations to capture celestial time-lapses.
You Can Build Your OpenStack and Consume it TooPLUMgrid
The power of the community is what makes open source initiatives extremely transformational—like OpenStack. On the other hand, enterprise users who are looking at adopting this solution need to go through a steep learning curve and deep transformation of their internal team structure. The power of OpenStack is actually greatly amplified by the ecosystem of vendors around it that look at important aspects like support and hardening as well as augmentation of specific aspects (e.g. scalability and performance) that are needed in production environments bringing the most value to users. Join Rackspace and PLUMgrid product specialists to learn how we jointly enable our Private Cloud enterprise users to consume OpenStack and Software Defined Networks (SDN) as ONE solution that brings comprehensive security, scalability and performance and a rich set of operational tools.
SDN & NFV: Driving Additional Value into Managed ServicesTBI Inc.
From offering seamless scalability to providing best-in-class security, SDN and NFV are driving value into managed services. Discover how these technologies combine to build a simple, more agile infrastructure at a significantly lower cost. Offer NFV, SDN, and other products from best-of-breed provider NTT through TBI.
Watch the replay: http://cs.co/90028sLgC
We’re going to make this as simple as Cisco’s new Software-Defined Access makes building and managing more secure enterprise networks:
Do you want to streamline device provisioning and host onboarding? Automate policy and segmentation? Get performance insights you didn’t think possible? Of course you do.
Register for the workshop today to get performance insights you didn’t think possible.
Resources:
Watch the New Era of Networking playlist: http://cs.co/90058sI1U
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVNAIM Networks, Inc.
[Open & Virtual Networking Conference 2015]
- THE NEW IP - Open Networking Architecture with SDN & NFV (Brocade Orcun Tezel 시스템 엔지니어링 아태지역 수석이사)
- 2015.02.05 (목) 09:10~17:50
- 양재동 엘타워
Delivering Composable NFV Services for Business, Residential and Mobile EdgePLUMgrid
In this talk, Principal architects will share considerations in designing virtual infrastructure to deliver vCPE and vPE based services. The speakers will provide some background on service function chaining, service edge routing, Openstack clouds and discuss virtualized architectures that can solve Service Provider problems to achieve agility and richness of cloud based services
Network Function Virtualization (NFV) using IOS-XRCisco Canada
Network Function Visualization (NFV) is being heavily adapted in Service Providers, Enterprise Network, and data center market segments. IOS-XRv 9000 and IOS XRv offer NFV functionality leveraging Cisco IOS-XR's already proven and time-tested deployment of this network OS in the field. The session will go over the fundamentals of NFV, introduces virtual flavors of IOS-XR and their use cases as virtual Route Reflector (vRR) and virtual Provider Edge (vPE), as well as demonstrate how these use-cases bring improvement and efficiency to the network implementation. In this session the attendees will be offered a hands-on experience of deploying IOS-XRv 9000 in a virtual environment, explore its basics, and configure it as a virtual device.
Cisco® Application Centric Infrastructure (ACI) is an innovative architecture that radically simplifies, optimizes, and accelerates the entire application deployment lifecycle. Cloud, mobility, and big data applications are causing a shift in the data center model. Cisco ACI redefines the power of IT, enabling IT to be more responsive to changing business and application needs, enhancing agility, and adding business value. Cisco ACI delivers a transformational operating model for next-generation data center and cloud applications. This Cisco ACI hands lab will step you through from the ACI Fabric concepts to deployment. • Cisco ACI Overview • ACI Fabric Discovery • ACI Building Basic Network Constructs • ACI Building Policy Filters and Contracts • : Deploying a 3-Tier Application Network Profile • ACI Integrating with VMware • Deploying a Service Graph with Application Network Profile • Exploring Monitoring and Troubleshooting
A day in the life of an enterprise CIO can be daunting—challenges such as managing complex environments, security and ongoing TCO pressures face us everyday. Addressing these challenges offer opportunities to significantly improve operations, productivity and have an impact on the bottom line if done successfully. To learn more please visit our website here: http://www.cisco.com/web/CA/index.html
Hosted Security as a Service - Solution Architecture DesignCisco Canada
he Hosted Security as a Service session provides in depth discussion on cloud based security services leveraging Cisco security solutions. This session is appropriate for service providers who are interested in delivering managed security services to their customer from their cloud infrastructure. We will provide detailed designs and guidance on: - cloud security services including FW, VPN, web and email services - architecture layers through influence of NfV and SDN - KVM and VMware based solutions - orchestration flexibility and options - Day 0 and Day 1 provisioning - Day 2 monitoring and reporting.
The journey to the digital enterprise requires new thinking. What have you done to modernize your data center network?
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA) and Steven Shalita, vice president of marketing and business development at Pluribus Networks--highlights how the most forward-thinking enterprises are leveraging software-defined technologies to make their data centers more agile, programmable, resilient, and visible.
Application Policy Enforcement Using APIC Cisco Canada
Problems in current Data Center are mostly surrounding policy around applications. The presentation is designed to help students get a jump start on configuring and troubleshooting basic policy model as well as providing valuable hands-on experience with how the APIC integrates into existing network environments
Security and Virtualization in the Data CenterCisco Canada
The evolving complexity of the data center is placing increased demand on the network and security teams to come up with inventive methods for enforcing security policies in these ever-changing environments. The goal of this session is to provide participants with an understanding of features and design recommendations for integrating security into the data center environment. This session will focus on recommendations for securing next-generation data center architectures. Areas of focus include security services integration, leveraging device virtualization, and considerations and recommendations for server virtualization. The target audience are security and data center administrators.
The realities of insider threats and determined attackers have made it necessary to implement security technologies on the network interior. This session will discuss leveraging network telemetry, such as NetFlow and Cisco ISE, in combination with the Cisco StealthWatch System and in order to monitor the network interior to detect and respond to threats. Use cases on how to best organize and query NetFlow data will be presented as well as how to drive an investigation in order to identify an attacker's presence on the network based on the statistical analysis of network telemetry. The target audience for this session are network and security administrators and analysts interested in learning how to best leverage NetFlow, ISE, and StealthWatch as a component of their security operations center.
The concept of service mesh is one of the new technologies that have grown up around the container and micro-service model over the last couple of years, and Istio is the latest entry into this space. As Istio was recently included as an incubated project in the CNCF, many companies are now looking to it to provide a set of key functions to accelerate their micro-service application management model. Istio enables bi-directional authentication and security of service communication via TLS based authentication and encryption, and at the same time is able to capture application level communication statistics, improving the application development team's visibility into the otherwise difficult to track communication patterns. In this way, Istio acts like an application level network, riding across the underlying capabilities of Kubernetes CNI based networks and network policy. We will implement Istio on a GKE kubernetes cluster, and instrument a simple application to get better insight into how Istio provides its capabilities.
Speaker Bio:
With over 20 years of experience as a systems reliability engineer, and a focus on automating not only application deployments but the underlying infrastructure as well, Robert Starmer brings a wealth of knowledge to the full application enablement stack. He has applied this knowledge in fields from high-performance computing to high-frequency trading environments, and everything in between. Robert also holds patents in network, data center, and application performance and scale enhancements. He is a Founder and the CTO at Kumulus Technologies, a DevOps, Systems Reliability Engineering and cloud computing consultancy. Additionally, Robert is an incurable photography nerd and has been known to stay up until dawn in remote locations to capture celestial time-lapses.
You Can Build Your OpenStack and Consume it TooPLUMgrid
The power of the community is what makes open source initiatives extremely transformational—like OpenStack. On the other hand, enterprise users who are looking at adopting this solution need to go through a steep learning curve and deep transformation of their internal team structure. The power of OpenStack is actually greatly amplified by the ecosystem of vendors around it that look at important aspects like support and hardening as well as augmentation of specific aspects (e.g. scalability and performance) that are needed in production environments bringing the most value to users. Join Rackspace and PLUMgrid product specialists to learn how we jointly enable our Private Cloud enterprise users to consume OpenStack and Software Defined Networks (SDN) as ONE solution that brings comprehensive security, scalability and performance and a rich set of operational tools.
SDN & NFV: Driving Additional Value into Managed ServicesTBI Inc.
From offering seamless scalability to providing best-in-class security, SDN and NFV are driving value into managed services. Discover how these technologies combine to build a simple, more agile infrastructure at a significantly lower cost. Offer NFV, SDN, and other products from best-of-breed provider NTT through TBI.
Watch the replay: http://cs.co/90028sLgC
We’re going to make this as simple as Cisco’s new Software-Defined Access makes building and managing more secure enterprise networks:
Do you want to streamline device provisioning and host onboarding? Automate policy and segmentation? Get performance insights you didn’t think possible? Of course you do.
Register for the workshop today to get performance insights you didn’t think possible.
Resources:
Watch the New Era of Networking playlist: http://cs.co/90058sI1U
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVNAIM Networks, Inc.
[Open & Virtual Networking Conference 2015]
- THE NEW IP - Open Networking Architecture with SDN & NFV (Brocade Orcun Tezel 시스템 엔지니어링 아태지역 수석이사)
- 2015.02.05 (목) 09:10~17:50
- 양재동 엘타워
Delivering Composable NFV Services for Business, Residential and Mobile EdgePLUMgrid
In this talk, Principal architects will share considerations in designing virtual infrastructure to deliver vCPE and vPE based services. The speakers will provide some background on service function chaining, service edge routing, Openstack clouds and discuss virtualized architectures that can solve Service Provider problems to achieve agility and richness of cloud based services
Network Function Virtualization (NFV) using IOS-XRCisco Canada
Network Function Visualization (NFV) is being heavily adapted in Service Providers, Enterprise Network, and data center market segments. IOS-XRv 9000 and IOS XRv offer NFV functionality leveraging Cisco IOS-XR's already proven and time-tested deployment of this network OS in the field. The session will go over the fundamentals of NFV, introduces virtual flavors of IOS-XR and their use cases as virtual Route Reflector (vRR) and virtual Provider Edge (vPE), as well as demonstrate how these use-cases bring improvement and efficiency to the network implementation. In this session the attendees will be offered a hands-on experience of deploying IOS-XRv 9000 in a virtual environment, explore its basics, and configure it as a virtual device.
Test automation principles, terminologies and implementationsSteven Li
A general slides for test automation principle, terminologies and implementation
Also, the slides provide an example - PET, which is a platform written by Perl, but not just for Perl. It provides a general framework to use.
Finding a cost-effective solution that allows you to rapidly deliver cloud-based applications securely can be challenging. F5 on AWS offers a variety of solutions and licensing options, so organizations can choose the best fit for their business needs. Join our webinar to learn best practices for controlling access for your cloud-based applications.
Watch the F5 and AWS webinar to learn how to strengthen your security using strong access control and application-layer firewall services.
Running Secure Server Software on Insecure Hardware Without ParachuteCloudflare
In today’s world, you may not know if the hardware you are running software on is secure or not. How can you ensure that, regardless of the hardware security, the software stays protected? CloudFlare’s systems engineer, Nick Sullivan shares advanced techniques on how to protect your server software. These techniques include anti-reverse engineering methods, secure key management and designing a system for renewal.
CloudFlare - The Heartbleed Bug - WebinarCloudflare
An encryption flaw, called the Heartbleed bug, is already referred to as one of the biggest security threats on the Internet. The flaw, announced on April 7th, allows an attacker to pull bits of data from a server and potentially access sensitive information.
How did the Heartbleed bug happen? How does it affect your website? What can you do protect yourself?
CloudFlare security engineer Nick Sullivan answers these and more questions on this CloudFlare webinar. At the last portion of the webinar we have Ben Murphy (one of the winners of the CloudFlare Heartbleed challenge) on a Q&A session.
For more information on Heartbleed and the CloudFlare challenge, go to: http://bit.ly/1lVKy4O
For more information on CloudFlare, visit www.cloudflare.com or dial 888-99-FLARE.
The Heartbleed vulnerability was an information disclosure bug in OpenSSL unveiled to the world in April 2014. This talk will describe the impact of this bug on the Internet and CloudFlare's part in contributing to the research and education of the public about this issue.
This talk is about the creation of a new security tool, Red October. Red October can be used to enforce the two-person rule for access to critical data, helping keep company data protected from insider threats.
The security industry tends to be less open about the details of how their software works than other parts of the software industry. This project was created to tackle the practical challenges of traditional security compliance, but inspired by an open source mentality. By taking a vague set of regulatory requirements we devised a user-friendly tool that solves a broader problem that is an issue for many small organizations.
This talk will teach people about cryptography and division of responsibility in key management, a very important consideration when moving a business to the cloud. It will also help show where to draw the line between using existing cryptographic and security mechanisms, and building your own.
Overview of SSL: choose the option that's right for youCloudflare
Keeping communication between your visitors and your website secure and confidential has never been more important. Data can be vulnerable to theft as it’s transferred to and from your website. One simple solution to this security threat is to encrypt your traffic with SSL (Secure Sockets Layer).
SSL encryption ensures the data transferred between your visitors and your site is safe from data theft, and having SSL enabled can also boost your Google search rankings.
CloudFlare has made it simple and easy to add SSL to your site: you don’t have to purchase a separate certificate or install anything. In this webinar CloudFlare’s solution engineer Peter Griffin explains the key features of SSL, and walks you through the simple process of getting SSL running on your site.
CloudFlare looked at several NoSQL and SQL solutions and ended up with a hybrid model where many Kyoto Cabinet DBs are accessed via a Postgres wrapper. This presentation describes the resulting novel architecture which combines the horizontal scalability of NoSQL solutions with the flexibility and stability of SQL.
Managing Traffic Spikes This Holiday Season Cloudflare
The holiday season is just around the corner, and for many websites—especially online retailers—this means huge spikes in web traffic. For many sites, a sudden surge in visitors can overwhelm servers, taking your site offline. Having your site offline during peak season not only affects the business bottom line, but also the brand's reputation.
CloudFlare offers a host of services that will keep your site online, and lightning fast, throughout the holiday season no matter the size of the traffic. CloudFlare’s programer John Graham-Cumming explains how to fine tune CloudFlare to make sure your website is ready for traffic spikes this holiday season.
For more information, please visit:
www.cloudflare.com/overview
www.cloudflare.com/support
When organizations start using AWS, they may initially use a single VPC and a very simple network implementation. In many cases, however, companies are leveraging multiple VPCs, regions and accounts. Companies are also connecting cloud networks to corporate headquarters and remote locations. They may even be connecting different cloud providers. This presentation will consider some of these use cases and the implications of connecting different networks. Material covered will include security considerations, sample architectures and tools that can help protect your account and your data.
Trusted Environment. Blockchain for business: best practices, experience, tipsKaspersky
Have a look at the presentation created by Kaspersky and Waves Enterprise: “Trusted Environment. Blockchain for business: best practices, experience and tips”. It will prove valuable and thought-provoking to everyone who wants to learn more about how to ensure the security of blockchain-based projects.
Here you will find about:
- Modern enterprise blockchain platforms. We’ll tell you what they are, which tasks they solve, and what use cases are in demand.
- Security of corporate blockchain platforms. Let's analyze the main surfaces and attack vectors.
- Application Security Assessment based on the Waves Enterprise case study. You will see how the assessment works, what vulnerabilities were identified and how Waves Enterprise fixed them.
- How to design a secure solution based on a blockchain platform.
Patterns and Pains of Migrating Legacy Applications to KubernetesQAware GmbH
Open Source Summit 2018, Vancouver (Canada): Talk by Josef Adersberger (@adersberger, CTO at QAware), Michael Frank (Software Architect at QAware) and Robert Bichler (IT Project Manager at Allianz Germany)
Abstract:
Running applications on Kubernetes can provide a lot of benefits: more dev speed, lower ops costs and a higher elasticity & resiliency in production. Kubernetes is the place to be for cloud-native apps. But what to do if you’ve no shiny new cloud-native apps but a whole bunch of JEE legacy systems? No chance to leverage the advantages of Kubernetes? Yes you can!
We’re facing the challenge of migrating hundreds of JEE legacy applications of a German blue chip company onto a Kubernetes cluster within one year.
The talk will be about the lessons we've learned - the best practices and pitfalls we've discovered along our way.
Patterns and Pains of Migrating Legacy Applications to KubernetesJosef Adersberger
Running applications on Kubernetes can provide a lot of benefits: more dev speed, lower ops costs, and a higher elasticity & resiliency in production. Kubernetes is the place to be for cloud native apps. But what to do if you’ve no shiny new cloud native apps but a whole bunch of JEE legacy systems? No chance to leverage the advantages of Kubernetes? Yes you can!
We’re facing the challenge of migrating hundreds of JEE legacy applications of a German blue chip company onto a Kubernetes cluster within one year.
The talk will be about the lessons we've learned - the best practices and pitfalls we've discovered along our way.
This hands on workshop for OpenContrail will be led by Sreelakshmi Sarva & Aniket Daptari.
This is a labs session so we will have hard RSVP limits. Please RSVP only if you are confident that you will be able to attend.
About Sreelakshmi Sarva
Sree is currently working as part of solution engineering team at Juniper’s Contrail team. She is responsible for delivering & managing SDN solutions & partnerships relating to Contrail. She has been with Juniper for the last 13 years working on various Routing, Switching, Network programmability & virtualization platforms. Prior to Juniper, She worked at Nortel networks in the Systems Engineering group. Sree received her Masters in Computer Science from University of Texas at Dallas and Bachelor’s in Computer Science from India.
About Aniket Daptari
Aniket is currently working as part of Juniper Networks' Contrail Cloud Solutions team. He is responsible for delivering SDN solutions and technology partnerships related to Contrail. He has been with Juniper for the last 3 years working on various Network programmability & virtualization platforms. Prior to Juniper, he worked at Cisco Systems in the Internet Systems Business Unit (Catalyst 6500). Aniket received his Masters in Computer Science from University of Southern California and a graduate certificate in Management Science and Engineering from Stanford University.
Course Abstract
This session will be the first of a series of OpenContrail hands-on tutorials for developers who want to get deep into OpenContrail code.
This “Basic OpenContrail Programming” Hands-on Session will focus on making developers proficient in writing and contributing code for our OpenContrail Project.
Session will cover the following areas
1) Contrail Overview
· Use Cases
· Architecture recap
2) Contrail Hands on
· Demo + Hands on - Configuration , VN, VM, Network Policies etc
· DevStack introduction
The Good, the Bad and the Ugly of Migrating Hundreds of Legacy Applications ...Josef Adersberger
Running applications on Kubernetes can provide a lot of benefits: more dev speed, lower ops costs, and a higher elasticity & resiliency in production. Kubernetes is the place to be for cloud native apps. But what to do if you’ve no shiny new cloud native apps but a whole bunch of JEE legacy systems? No chance to leverage the advantages of Kubernetes? Yes you can!
We’re facing the challenge of migrating hundreds of JEE legacy applications of a major German insurance company onto a Kubernetes cluster within one year. We're now close to the finish line and it worked pretty well so far.
The talk will be about the lessons we've learned - the best practices and pitfalls we've discovered along our way. We'll provide our answers to life, the universe and a cloud native journey like:
- What technical constraints of Kubernetes can be obstacles for applications and how to tackle these?
- How to architect a landscape of hundreds of containerized applications with their surrounding infrastructure like DBs MQs and IAM and heavy requirements on security?
- How to industrialize and govern the migration process?
- How to leverage the possibilities of a cloud native platform like Kubernetes without challenging the tight timeline?
Migrating Hundreds of Legacy Applications to Kubernetes - The Good, the Bad, ...QAware GmbH
CloudNativeCon North America 2017, Austin (Texas, USA): Talk by Josef Adersberger (@adersberger, CTO at QAware)
Abstract:
Running applications on Kubernetes can provide a lot of benefits: more dev speed, lower ops costs, and a higher elasticity & resiliency in production. Kubernetes is the place to be for cloud native apps. But what to do if you’ve no shiny new cloud native apps but a whole bunch of JEE legacy systems? No chance to leverage the advantages of Kubernetes? Yes you can!
We’re facing the challenge of migrating hundreds of JEE legacy applications of a major German insurance company onto a Kubernetes cluster within one year. We're now close to the finish line and it worked pretty well so far.
The talk will be about the lessons we've learned - the best practices and pitfalls we've discovered along our way. We'll provide our answers to life, the universe and a cloud native journey like:
- What technical constraints of Kubernetes can be obstacles for applications and how to tackle these?
- How to architect a landscape of hundreds of containerized applications with their surrounding infrastructure like DBs MQs and IAM and heavy requirements on security?
- How to industrialize and govern the migration process?
- How to leverage the possibilities of a cloud native platform like Kubernetes without challenging the tight timeline?
PLNOG 17 - Grzegorz Kornacki - F5 and OpenStackPROIDEA
F5 is a top Security and Application Delivery Controller vendor. OpenStack is a free and open-source software platform for cloud computing, mostly deployed as an infrastructure-as-a-service (IaaS).
This seemingly unrelated disciplines have a lot of in common. This session will explain what F5 can do for OpenStack, and what OpenStack can do for F5. We will touch upon: F5 platform virtualization, deployment automation, LBaaS and OpenStack security.
An overview of project Skyfall. A globally distributed fault tolerant event consumption framework used by AddThis.com to consume billions of events per day.
Platforms for Accelerating the Software Defined and Virtual Infrastructure6WIND
As network infrastructures evolve and selected elements shift from physical systems to virtual functions a new class of network appliance is required that provides high performance processing, balanced I/O and hardware or software acceleration. Such a platform must combine standard server technology and modular systems that can be configured to support line rate performance with network interfaces up to 100Gbit/s.
This webinar will discuss a class of network appliance that offers performance levels previously requiring more complex and costly architectures while integrating seamlessly with standard software frameworks such as Linux, Open vSwitch (OVS) and Intel® Data Plane Development Kit (DPDK).
Frank Brockners' presentation from the 2017 Open Networking Summit.
While troubleshooting or planning, did you ever wish to get full insight into which paths *all* your packets take in your network, understand whether your SLA is really in place, or were you ever asked to prove that your traffic really follows the path you specified by service chaining or traffic engineering? We approach this problem by adding meta-data to *all* packets. In-band OAM adds forwarding path information and other information/stats to every data packet - as opposed to relying on probe packets, which is the traditional method that tools like ping or traceroute use. This session will introduce In-band OAM, explain the technology and outline the reference implementation in FD.io/VPP and OpenDaylight using a example demos.
DV01 Ten Things You Always Wanted to Know About Windows Azure But Were Afraid...Ronald Widha
The session took a look at the Window Azure platform and asks the hard questions that everybody is thinking but nobody wants to ask. Is Windows Azure right for me? Should this application be migrated to Azure? Will Azure save me money? How do I manage my Azure implementations? Is Azure secure? The session look at real world implementations on the Windows Azure platform to try and answer some of these hard questions.
As presented on 1/31/2018 at Cisco NYC Security Open House. These slides describe how a proper Disaster Recovery infrastructure, with a proper an automated network integration can provide instant recovery from Ransomware attacks and can improve security of the production environment.
Similar to F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit (20)
Heavy Reading Research Study EXCERPT - OpenStack Summit 2016/Red Hat NFV Min...kimw001
Highlights of Heavy Reading study on NFV-I strategy, procurement status and platform feature priorities. Presented at Red Hat's NFV Mini Summit at OpenStack Summit 2016 in Barcelona. Please contact your Red Hat representative to view the full presentation.
Dell EMC - - OpenStack Summit 2016/Red Hat NFV Mini Summit kimw001
Dell EMC's carrier-grade open NFV solution - powered by Red Hat OpenStack Platform. Presented at Red Hat's NFV Mini Summit at OpenStack Summit 2016 in Barcelona.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath