Istio 1.3 includes several key updates such as allowing all outbound traffic by default, improving the multicluster configuration for non-flat networks, and various improvements to commands like istioctl. It also features new capabilities like intelligent protocol sniffing and initial operator support. Istio aims to provide more predictable quarterly releases with new versions in February, June, and September of each year to improve the project's sustainability.
Goodbye CLI, hello API: Leveraging network programmability in security incid...Joel W. King
Automation and Orchestration has been the purview of cloud computing and system administration, but now is increasingly important to security operations and network administration. By automating the data collection and corrective action component of incident response, significant time savings can be realized. Corrective actions often need be applied to multiple assets in the organization and automation improves consistency and time savings as well. This talk describes how security and IT orchestration can be integrated through code reuse and integration with APIs.
We demonstrate how Phantom and Ansible can be integrated to automate the incident response data collection, corrective action, and notification.
Goodbye CLI, hello API: Leveraging network programmability in security incid...Joel W. King
Automation and Orchestration has been the purview of cloud computing and system administration, but now is increasingly important to security operations and network administration. By automating the data collection and corrective action component of incident response, significant time savings can be realized. Corrective actions often need be applied to multiple assets in the organization and automation improves consistency and time savings as well. This talk describes how security and IT orchestration can be integrated through code reuse and integration with APIs.
We demonstrate how Phantom and Ansible can be integrated to automate the incident response data collection, corrective action, and notification.
Using Ansible Tower to implement security policies and telemetry streaming fo...Joel W. King
Network analytics provides insight to the traffic flow between applications and endpoints. Telemetry data is streamed in real-time from software sensors and network devices to big-data clusters. Implementing the policy to create a whitelist-based segmentation and zero-trust model requires automation when dealing with tens of thousands of workloads and complex rules.
This session examines how Cisco Tetration Analytics provides an accurate inventory of devices, software packages and version information to detect software vulnerabilities and implement a zero-trust policy model on network fabrics, firewalls and application delivery controllers.
How many iot technologies do you need to turn on a lightbulb (Kurt Claeys)Visug
IOT is no hype no more, a broad range of technologies are now supporting .NET developers to build great solutions. In this demo-only presentation I’ll show you such an IOT solution distributed over 3 different platforms (Android, Cloud and Raspberry) using 3 different messaging protocols (iBeacons/BLE, Azure Storage REST API and Zwave protocol). The solution shows how a tablet device can be aware of its distance to iBeacons, can send triggers on an Azure queue to be received on a Raspberry PI to remote control a lightbulb through Zwave. Talking cross platform! All with .NET and C#
Integrating Ansible Tower with security orchestration and cloud managementJoel W. King
Ansible Durham Meetup, 13 July 2017.
Our guest speaker will be Joel W. King, Principal Architect at World Wide Technology. His focused is on enterprise Software-Defined Networking and network programmability.
He will talk about how Ansible Tower, through the northbound APIs, is integrated into the security orchestration platform Phantom Cyber, and using the same code base, extends infrastructure provisioning to Cisco CloudCenter (formerly CliQr), an application-centric public and private cloud management solution.
Developing History at Amazon: From Monolith to Serverless
Speakers:
Richard Ainley, Financial Services Specialist Solutions Architect, AWS
Leo Drakopoulos, Financial Services Specialist Solutions Architect, AWS
In the FS industry we often observe very traditional monolithic architectures. Those architectures are hard to scale and as an application's code base grows, it often becomes complex to update, maintain and subsequently hinders the ability to deliver products to market. In this session we are going to examine the evolution of Amazon’s developing history from traditional monolithic architectures to microservices and how this evolution can dramatically accelerate and enable innovation.
HPE & Cloud Foundry @ CF Summit Berlin 2015Omri Gazitt
HPE's Cloud Foundry involvement and strategy, and HPE Business Value Dashboard and the Cape2Cape dashboard as a specific use case for the Cloud Foundry Platform.
stackArmor Security MicroSummit - Next Generation Firewalls for AWSGaurav "GP" Pal
stackArmor Security MicroSummit
How to select a Next Generation Firewall by Palo Alto Networks:
Ed Caswell from Palo Alto Networks will talk about how to select and deploy a next generation firewall. He will cover the topics described below.
Understand key threats and use cases for NGFW : Understand the threat vectors and use cases that are driving NGFW adoption.
Key features and benefits of NGFW : Understand key capabilities and the protections that are delivered for cloud hosting environments.
NGFW Best Practices : Common deployment models and cloud-architecture best practices for security focused organizations leveraging cloud platforms such as AWS.
Max Körbächer - AWS EKS and beyond – master your Kubernetes deployment on AWS...Codemotion
Kubernetes (K8s) is on everyone’s lips, but it is easy to experience pitfalls during the development of a K8s cluster. In this talk we will give you an introduction of AWS EKS (Elastic Container Service for Kubernetes), the managed service for deploying and operate Kubernetes on AWS resources, and how you can reach a production readiness. This seamless integration of K8s into the AWS environment allows you a rapid application development assuming architectural concepts of microservice and serverless architecture.
Apponix has started providing AWS cloud training since 2014. All our trainers are working professionals with at least 10 years of experience in cloud technologies. Apponix provides AWS training in martahahlli, electronics city & BTM layout. We assure placement for all our AWS students. Getting a job in the AWS cloud is not a difficult task. If you study what is exactly required in a company then you can easily crack the interviews, our instructors will help you in getting placement.
Serverless is a hot trend but are you taking full advantage of all the productivity and scalability benefits serverless architectures have to offer? In this session you will learn about the best practices for building serverless applications – both for architectural patterns using various Azure services as well as for tools to accelerate development.
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Callon Campbell
Windows IoT is a family of products that enables rich edge devices and applications that can take full advantage of Azure IoT capabilities. We’ll explore the latest capabilities for Windows IoT, and then show how you can use all of your existing Windows development skills to create solutions ranging from fun hobby projects all the way through to critical Intelligent Edge solutions.
Agile Integration Architecture: A Containerized and Decentralized Approach to...Kim Clark
Microservices principles are revolutionizing the way applications are built, by enabling a more decoupled and decentralized approach to implementation, creating greater agility, scalability and resilience. These applications still need to be connected to one another, and to existing systems of record. Agile integration architecture brings the benefits of cloud-ready containerization to the integration space. It provides the opportunity to move from the heavily centralized ESB pattern to integration within more empowered and autonomous application teams. We look at the architectural differences in this approach compared to traditional integration, and also at how it enables more decentralized organizational structure better suited to digital transformation. You can read a more detailed paper on this approach at http://ibm.biz/AgileIntegArchPaper. This presentation was recorded for Integration Developer News (http://www.idevnews.com/) and is available here: http://ibm.biz/AgileIntegArchWebinar
Using Ansible Tower to implement security policies and telemetry streaming fo...Joel W. King
Network analytics provides insight to the traffic flow between applications and endpoints. Telemetry data is streamed in real-time from software sensors and network devices to big-data clusters. Implementing the policy to create a whitelist-based segmentation and zero-trust model requires automation when dealing with tens of thousands of workloads and complex rules.
This session examines how Cisco Tetration Analytics provides an accurate inventory of devices, software packages and version information to detect software vulnerabilities and implement a zero-trust policy model on network fabrics, firewalls and application delivery controllers.
How many iot technologies do you need to turn on a lightbulb (Kurt Claeys)Visug
IOT is no hype no more, a broad range of technologies are now supporting .NET developers to build great solutions. In this demo-only presentation I’ll show you such an IOT solution distributed over 3 different platforms (Android, Cloud and Raspberry) using 3 different messaging protocols (iBeacons/BLE, Azure Storage REST API and Zwave protocol). The solution shows how a tablet device can be aware of its distance to iBeacons, can send triggers on an Azure queue to be received on a Raspberry PI to remote control a lightbulb through Zwave. Talking cross platform! All with .NET and C#
Integrating Ansible Tower with security orchestration and cloud managementJoel W. King
Ansible Durham Meetup, 13 July 2017.
Our guest speaker will be Joel W. King, Principal Architect at World Wide Technology. His focused is on enterprise Software-Defined Networking and network programmability.
He will talk about how Ansible Tower, through the northbound APIs, is integrated into the security orchestration platform Phantom Cyber, and using the same code base, extends infrastructure provisioning to Cisco CloudCenter (formerly CliQr), an application-centric public and private cloud management solution.
Developing History at Amazon: From Monolith to Serverless
Speakers:
Richard Ainley, Financial Services Specialist Solutions Architect, AWS
Leo Drakopoulos, Financial Services Specialist Solutions Architect, AWS
In the FS industry we often observe very traditional monolithic architectures. Those architectures are hard to scale and as an application's code base grows, it often becomes complex to update, maintain and subsequently hinders the ability to deliver products to market. In this session we are going to examine the evolution of Amazon’s developing history from traditional monolithic architectures to microservices and how this evolution can dramatically accelerate and enable innovation.
HPE & Cloud Foundry @ CF Summit Berlin 2015Omri Gazitt
HPE's Cloud Foundry involvement and strategy, and HPE Business Value Dashboard and the Cape2Cape dashboard as a specific use case for the Cloud Foundry Platform.
stackArmor Security MicroSummit - Next Generation Firewalls for AWSGaurav "GP" Pal
stackArmor Security MicroSummit
How to select a Next Generation Firewall by Palo Alto Networks:
Ed Caswell from Palo Alto Networks will talk about how to select and deploy a next generation firewall. He will cover the topics described below.
Understand key threats and use cases for NGFW : Understand the threat vectors and use cases that are driving NGFW adoption.
Key features and benefits of NGFW : Understand key capabilities and the protections that are delivered for cloud hosting environments.
NGFW Best Practices : Common deployment models and cloud-architecture best practices for security focused organizations leveraging cloud platforms such as AWS.
Max Körbächer - AWS EKS and beyond – master your Kubernetes deployment on AWS...Codemotion
Kubernetes (K8s) is on everyone’s lips, but it is easy to experience pitfalls during the development of a K8s cluster. In this talk we will give you an introduction of AWS EKS (Elastic Container Service for Kubernetes), the managed service for deploying and operate Kubernetes on AWS resources, and how you can reach a production readiness. This seamless integration of K8s into the AWS environment allows you a rapid application development assuming architectural concepts of microservice and serverless architecture.
Apponix has started providing AWS cloud training since 2014. All our trainers are working professionals with at least 10 years of experience in cloud technologies. Apponix provides AWS training in martahahlli, electronics city & BTM layout. We assure placement for all our AWS students. Getting a job in the AWS cloud is not a difficult task. If you study what is exactly required in a company then you can easily crack the interviews, our instructors will help you in getting placement.
Serverless is a hot trend but are you taking full advantage of all the productivity and scalability benefits serverless architectures have to offer? In this session you will learn about the best practices for building serverless applications – both for architectural patterns using various Azure services as well as for tools to accelerate development.
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Callon Campbell
Windows IoT is a family of products that enables rich edge devices and applications that can take full advantage of Azure IoT capabilities. We’ll explore the latest capabilities for Windows IoT, and then show how you can use all of your existing Windows development skills to create solutions ranging from fun hobby projects all the way through to critical Intelligent Edge solutions.
Agile Integration Architecture: A Containerized and Decentralized Approach to...Kim Clark
Microservices principles are revolutionizing the way applications are built, by enabling a more decoupled and decentralized approach to implementation, creating greater agility, scalability and resilience. These applications still need to be connected to one another, and to existing systems of record. Agile integration architecture brings the benefits of cloud-ready containerization to the integration space. It provides the opportunity to move from the heavily centralized ESB pattern to integration within more empowered and autonomous application teams. We look at the architectural differences in this approach compared to traditional integration, and also at how it enables more decentralized organizational structure better suited to digital transformation. You can read a more detailed paper on this approach at http://ibm.biz/AgileIntegArchPaper. This presentation was recorded for Integration Developer News (http://www.idevnews.com/) and is available here: http://ibm.biz/AgileIntegArchWebinar
Build an azure connected io t device in 45 minutes (or less)Marco Dal Pino
Build enterprise IoT devices it's not an easy work. If they also need to be connected or having some sort of data sync with Backend systems or Company's ERP the task become really hard. But it's here that the Azure IoT platform and ecosystem come to the rescue! Let's see how to design and build an enterprise device for mobile data management that will work either offline and online using some of the services specifically built for IoT
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsHarshitParkar6677
The Internet of Things (IoT) speeds up awareness and
response to events. It’s transforming whole industries, including
manufacturing, oil and gas, utilities, transportation, public safety,
and local government.
But the IoT requires a new kind of infrastructure. The cloud by
itself can’t connect and analyze data from thousands and millions
of different kinds of things spread out over large areas. Capturing
the power of the IoT requires a solution that can:
● Connect new kinds of things to your network. Some of them
might be in harsh environments. Others might communicate
using industrial protocols, not IP.
● Secure the things that produce data. And secure the data as it
travels from the network edge to the cloud. This requires a
combination of physical security and cybersecurity.
● Handle an unprecedented volume, variety, and velocity of data.
Billions of previously unconnected devices are generating more
than two exabytes of data each day. Sending all of it to the cloud
for analysis and storage is not practical. Plus, in the time it takes
to send data to the cloud for analysis, the opportunity to act on it
might be gone.
This paper is a comprehensive survey of the various operating systems available for the Internet of Things environment. At first the paper introduces the various aspects of the operating systems designed for the IoT environment where resource constraint poses a huge problem for the operation of the general OS designed for the various computing devices. The latter part of the paper describes the various OS available for the resource constraint IoT environment along with the various platforms each OS supports, the software development kits
available for the development of applications in the respective OS’es along with the various protocols implemented in these OS’es for the purpose of communication and networking.
The Internet of Things (IoT) is a rapidly growing technology that is transforming the way we live and work. In this tutorial, we will provide a comprehensive overview of IoT and its various components. We will explore IoT devices, networking protocols, and cloud platforms that make up the IoT ecosystem. Additionally, we will discuss the challenges and opportunities presented by IoT and how businesses can leverage this technology to improve efficiency and competitiveness. The tutorial will also cover IoT application domains such as smart homes, wearables, and industrial IoT.
The tutorial will be delivered in a slide format, making it easy to follow and understand. The slides will include visual aids and illustrations to help explain complex concepts and ideas. The material will be presented in a clear and concise manner, ensuring that even those without a technical background can follow along.
Cisco’s Cloud Strategy, including our acquisition of CliQr Cisco Canada
At Partner Summit we made a series of exciting announcements in our Cloud portfolio, including our acquisition of CliQr. Join us to learn about these new announcements and an understanding of Cisco’s Cloud Strategy.
- How does CliQr fit into our existing Cloud portfolio (Metapod, APIC, Enterprise Cloud Suite, Cloud Consumption-as-a-Service)?
- How does our Cloud portfolio today meet the needs of our customers? What problems are we solving?
- How does our portfolio today position us for the world of Containers and Microservices?
Join us for a presentation of how these announcements fit into our current environment and what they mean to your longer-term strategy.
MIPI DevCon Seoul 2018: Evolving MIPI I3C for New Usages and IndustriesMIPI Alliance
Ken Foust of Intel Corporation focuses on the efforts MIPI is taking to evolve the capabilities and access of I3C℠ to allow broad, long-term adoption across multiple industries and usages.
Similar to All things open 2019 - Istio 1.3-new (20)
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
All things open 2019 - Istio 1.3-new
1. What is new with
Istio 1.3?
Lin Sun
Senior Technical Staff Member, IBM
@linsun_unc
Photo by Markos Mant on Unsplash
2. IBM Cloud
2019 Istio Themes
• Project Sustainability
• Layering and Extensibility
• Improved Experience
• Performance and Scalability
3. IBM Cloud
Istio 2019 Predictable Releases
Istio
1.0
Launch
-July
2018
2018 2019
Istio
1.1
February
Istio
1.2
June
Istio
1.3
Septem
ber
2020
Istio
1.4
Unreleased
4. IBM Cloud
2019 Istio Key Updates
• All outbound traffic is allowed by default
• Mixer-policy is not enabled by default
• Multicluster Istio for non flat networks
• Introduce Sidecar resource
• Various istioctl UX improvements (*)
• Intelligent Protocol Sniffing (*)
15. IBM Cloud
How to contribute
• Contribute via discuss or slack
• Gain membership Status
• Consult existing maintainers
• Gain maintainer status
• Attend WG Meetings
16. IBM Cloud
• Preview available around
KubeCon US 2019
• Final book available by
end of 2019