Are your cloud applications performing? How Application Performance Management can give you the insights that you need as you move your applications to the cloud.
This document discusses application modernization and why application performance monitoring (APM) is important during the modernization process. It provides an overview of common business reasons for modernizing applications, such as increasing flexibility, availability, scalability and portability. The document then discusses common challenges of modernization and provides examples of how companies approach modernizing applications. It emphasizes the importance of APM throughout the modernization lifecycle to deliver applications with speed, quality and control. The document concludes with examples of client experiences modernizing applications and lessons learned regarding monitoring tools in containerized/cloud environments.
Today’s IT organizations are being pressured to do more with less. Manage more applications, data, users, and devices with fewer internal resources. Execute complex IT initiatives on flat, year-over-year budgets. And above all, extract as much value from the IT investments they’ve already made.
It’s this last notion of getting more value that is the focus of our discussion today. Riverbed customers should always expect more value. And we’re committed to ensuring they get it.
An industry-leading analyst discusses how you can take control of application performance and provide superior end-user experiences. Then, you’ll hear how a major US healthcare provider eliminated sporadic performance outages that affected its public-facing website, and prevented revenue loss and many hundreds of hours in support costs. To learn more, watch the webcast replay: http://rvbd.ly/1JGz1ke
Or to learn more about AppInternals, visit: http://rvbd.ly/1IsjC5t
Examine common application performance problems hiding in plain sight. See how you can quickly remove the noise, pinpoint root cause and fix these problems once and for all. Watch the webinar replay: http://rvbd.ly/1QGxMBs
This was one the feature presentations in Riverbed's booth during Interop 14 in Las Vegas. Several Riverbed customers are spotlighted as using Riverbed Performance Management to get visibility into their network and application performance, enabling them to identify and resolve issues quickly.
Today’s IT organizations are being pressured to do more with less. Manage more applications, data, users, and devices with fewer internal resources. Execute complex IT initiatives on flat, year-over-year budgets. And above all, extract as much value from the IT investments they’ve already made.
It’s this last notion of getting more value that is the focus of our discussion today. Riverbed customers should always expect more value. And we’re committed to ensuring they get it.
An industry-leading analyst discusses how you can take control of application performance and provide superior end-user experiences. Then, you’ll hear how a major US healthcare provider eliminated sporadic performance outages that affected its public-facing website, and prevented revenue loss and many hundreds of hours in support costs. To learn more, watch the webcast replay: http://rvbd.ly/1JGz1ke
Or to learn more about AppInternals, visit: http://rvbd.ly/1IsjC5t
Examine common application performance problems hiding in plain sight. See how you can quickly remove the noise, pinpoint root cause and fix these problems once and for all. Watch the webinar replay: http://rvbd.ly/1QGxMBs
This was one the feature presentations in Riverbed's booth during Interop 14 in Las Vegas. Several Riverbed customers are spotlighted as using Riverbed Performance Management to get visibility into their network and application performance, enabling them to identify and resolve issues quickly.
Prioritizing Apps for Migration to Cloud Foundry - CF Summit 2016CGI
After the initial POCs and pilot projects, many enterprises face the challenge of choosing which applications to migrate to Cloud Foundry. How can you avoid the terrors of the "Application Migration Swamp"?
Collaborate 2018: Hyperion and PeopleSoft - Hands Off AutomationDatavail
In this presentation, we discuss automation tips and techniques that we implemented at Canadian Tire within our Hyperion and PeopleSoft systems. How we moved from manual loads into PeopleSoft to automated loads using DRM and Batch Scripting methods.
Customers and employees complaining about poor network performance or application delays? Want to put an end to the whining? Learn how combining visibility with WAN optimization delivers optimal performance for customers and employees regardless of location by watching this webinar from Riverbed. http://rvbd.ly/1OVbaQw
DevOps defines a set of roles and responsibilities focused on reducing risk in IT deployments and projects. By connecting development and operations, enterprise IT departments can begin to break down silos in order to:
- maximize automation;
- eliminate or significantly reduce human error;
- increase consistency; and
- reduce time spent on the outages, error detection and prevention caused by unstable environments
Gunnar Menzel, President of ODCA, Chief Architect of Capgemini Infra, outlines the ODCA perspective on the DevOps concept, focusing on key challenges it can help resolve and the benefits it can provide.
Download the white paper today http://opendatacenteralliance.org/article/devops-magnifying-business-value/
Raggiungere nuovi livelli di time-to market ed efficienza: dallo sviluppo, al test, alla produzone in un solo passo.
Gabriele Giacomelli, HP ALM Solution Consultant
Riverbed conducted a remote office/branch office IT survey at EMC World on May 3, 2016. The surveys were taken on the show floor and 183 people took part. The number of employees at their locations range from less than 500 to over 10,000. http://rvbd.ly/1YvjwTI
Beyond Monitoring | Leveraging Unified IT Performance Management for Patient ...eG Innovations
Application and desktop virtualization offer so much promise for smart growth, flexibility and cost savings in healthcare IT today, but along with this potential comes substantial risk. Poor performance and a bad end-user experience can degrade productivity, inflate management costs and, worst of all, negatively impact quality of care and patient satisfaction. At the same time, the healthcare IT infrastructure has increased in both scale and complexity. Hence, administrators struggle to determine when a slowdown happens what is the cause: Citrix? VMware? Storage? Windows? The application?
View these slides from our webinar where, along with HiMSS, Wendy Howard, Infrastructure Engineer with St. Charles Healthcare and Bala Vaidhinathan, CTO with eG Innovations, discussed how implementing unified performance-management powered a transformation from difficult, slow and reactive performance troubleshooting to well-planned, strategic rollouts, proactive maintenance, simple executive reporting and rapid caregiver support.
Empowering SmartCloud APM - Predictive Insights and Analysis: A Use Case Scen...Prolifics
Abstract: You currently have SmartCloud APM. Now, it is time to empower and enhance APM with the power of SmartCloud Analytics - Predictive Insights and Log Analysis. We will be discussing an actual customer use case scenario involving WebSphere Application Server and MQ, understand how to integrate these components and how to use the integrated solution to make problem determination and root cause analysis significantly easier and faster. We will be doing a real-time demo as well to see the integrated solution in action.
As technology becomes obsolete and organization deploy new applications, many enterprise application end up outliving their usefulness and become known as “legacy applications”. When evaluating options for retiring such “legacy applications,” it’s important to evaluate vendor solutions and understand what each vendor offers and how the solutions can be used in your environment. This white paper examines how a new technology can transform the way organizations access and deliver information.
The cloud is here to stay, and companies are looking to their internal applications teams to provide strategic guidance on how best to take advantage of the cloud. Find out how your peers are using business applications in the cloud to their advantage.
Key take-aways:
- Ways cloud computing can drive process transformation for your organization;
- How companies are using business applications in the cloud for competitive advantage;
- How virtual private cloud computing eliminates risks commonly associated with public cloud environments.
You will learn about the technical approach the University of California, Office of the President pursued for one of the world’s largest PeopleSoft HCM 9.2 implementations hosted at Oracle Managed Cloud Services – UCPath.
Learn about their initiative, and hear their approach for an effective collaboration with Smart ERP Solutions, Inc. to meet many technical objectives in the design, implementation, and maintenance of the PeopleSoft HCM solution in this complex implementation. This includes how UCPath leveraged the PeopleSoft Selective Adoption Model.
Using Lean Thinking to identify and address Delivery Pipeline bottlenecksSanjeev Sharma
Using Lean Thinking to identify and address Delivery Pipeline bottlenecks: This session explores 'Lean Thinking' techniques to help identify 'bottlenecks' in your delivery pipeline that can be addressed by adopting DevOps
Prioritizing Apps for Migration to Cloud Foundry - CF Summit 2016CGI
After the initial POCs and pilot projects, many enterprises face the challenge of choosing which applications to migrate to Cloud Foundry. How can you avoid the terrors of the "Application Migration Swamp"?
Collaborate 2018: Hyperion and PeopleSoft - Hands Off AutomationDatavail
In this presentation, we discuss automation tips and techniques that we implemented at Canadian Tire within our Hyperion and PeopleSoft systems. How we moved from manual loads into PeopleSoft to automated loads using DRM and Batch Scripting methods.
Customers and employees complaining about poor network performance or application delays? Want to put an end to the whining? Learn how combining visibility with WAN optimization delivers optimal performance for customers and employees regardless of location by watching this webinar from Riverbed. http://rvbd.ly/1OVbaQw
DevOps defines a set of roles and responsibilities focused on reducing risk in IT deployments and projects. By connecting development and operations, enterprise IT departments can begin to break down silos in order to:
- maximize automation;
- eliminate or significantly reduce human error;
- increase consistency; and
- reduce time spent on the outages, error detection and prevention caused by unstable environments
Gunnar Menzel, President of ODCA, Chief Architect of Capgemini Infra, outlines the ODCA perspective on the DevOps concept, focusing on key challenges it can help resolve and the benefits it can provide.
Download the white paper today http://opendatacenteralliance.org/article/devops-magnifying-business-value/
Raggiungere nuovi livelli di time-to market ed efficienza: dallo sviluppo, al test, alla produzone in un solo passo.
Gabriele Giacomelli, HP ALM Solution Consultant
Riverbed conducted a remote office/branch office IT survey at EMC World on May 3, 2016. The surveys were taken on the show floor and 183 people took part. The number of employees at their locations range from less than 500 to over 10,000. http://rvbd.ly/1YvjwTI
Beyond Monitoring | Leveraging Unified IT Performance Management for Patient ...eG Innovations
Application and desktop virtualization offer so much promise for smart growth, flexibility and cost savings in healthcare IT today, but along with this potential comes substantial risk. Poor performance and a bad end-user experience can degrade productivity, inflate management costs and, worst of all, negatively impact quality of care and patient satisfaction. At the same time, the healthcare IT infrastructure has increased in both scale and complexity. Hence, administrators struggle to determine when a slowdown happens what is the cause: Citrix? VMware? Storage? Windows? The application?
View these slides from our webinar where, along with HiMSS, Wendy Howard, Infrastructure Engineer with St. Charles Healthcare and Bala Vaidhinathan, CTO with eG Innovations, discussed how implementing unified performance-management powered a transformation from difficult, slow and reactive performance troubleshooting to well-planned, strategic rollouts, proactive maintenance, simple executive reporting and rapid caregiver support.
Empowering SmartCloud APM - Predictive Insights and Analysis: A Use Case Scen...Prolifics
Abstract: You currently have SmartCloud APM. Now, it is time to empower and enhance APM with the power of SmartCloud Analytics - Predictive Insights and Log Analysis. We will be discussing an actual customer use case scenario involving WebSphere Application Server and MQ, understand how to integrate these components and how to use the integrated solution to make problem determination and root cause analysis significantly easier and faster. We will be doing a real-time demo as well to see the integrated solution in action.
As technology becomes obsolete and organization deploy new applications, many enterprise application end up outliving their usefulness and become known as “legacy applications”. When evaluating options for retiring such “legacy applications,” it’s important to evaluate vendor solutions and understand what each vendor offers and how the solutions can be used in your environment. This white paper examines how a new technology can transform the way organizations access and deliver information.
The cloud is here to stay, and companies are looking to their internal applications teams to provide strategic guidance on how best to take advantage of the cloud. Find out how your peers are using business applications in the cloud to their advantage.
Key take-aways:
- Ways cloud computing can drive process transformation for your organization;
- How companies are using business applications in the cloud for competitive advantage;
- How virtual private cloud computing eliminates risks commonly associated with public cloud environments.
You will learn about the technical approach the University of California, Office of the President pursued for one of the world’s largest PeopleSoft HCM 9.2 implementations hosted at Oracle Managed Cloud Services – UCPath.
Learn about their initiative, and hear their approach for an effective collaboration with Smart ERP Solutions, Inc. to meet many technical objectives in the design, implementation, and maintenance of the PeopleSoft HCM solution in this complex implementation. This includes how UCPath leveraged the PeopleSoft Selective Adoption Model.
Similar to Are your cloud applications performing? How Application Performance Management can give you the insights that you need as you move your applications to the cloud.
Using Lean Thinking to identify and address Delivery Pipeline bottlenecksSanjeev Sharma
Using Lean Thinking to identify and address Delivery Pipeline bottlenecks: This session explores 'Lean Thinking' techniques to help identify 'bottlenecks' in your delivery pipeline that can be addressed by adopting DevOps
This PDF provides an in-depth guide to application modernization, a process of transforming legacy applications into modern, cloud-native systems. It covers the various stages of this process, from assessing the existing application and its architecture to planning the modernization journey, to implementing the new architecture and deploy to production. It also provides best practices, tips, and technology recommendations to help you successfully execute the modernization project.
Visit at: https://successive.cloud/ebook-application-modernization/
AWS May Webinar Series - Industry Trends and Best Practices for Cloud AdoptionAmazon Web Services
If you are interested to know more about AWS Chicago Summit, please use the following to register: http://amzn.to/1RooPPL
Forrester estimates that cloud adoption will soar 91% from $100 billion to $191 billion in 5 years. The next phase of cloud adoption will feature more diverse workloads, more applications that bridge public clouds and private data centers, and a greater emphasis on cost efficiency. In this webinar, we’ll discuss the impact of cloud adoption on the industry and on your business, including realignment of tech budgeting and applications, retooled staffing to enhance the skill sets of your internal teams, and the role of specialist firms in accelerating your progress. Join Vikram Garlapati, Manager of Solutions Architect, AWS, Forrester Vice President and Principal Analyst John Rymer, along with Amit Khanna, VP of Cloud Services at Virtusa, to gain insight into the state of cloud adoption and to learn the lessons and best practices gained from multiple engagements that helped customers transform their application landscapes. Learning objectives: 1) Understand overall trends in cloud adoption 2) Learn best practices for migrating diverse workloads – to take full advantage of cloud services
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdfbasilmph
Taking outdated applications and upgrading its platform infrastructure, internal
systems, and the way of using is known as application modernization. The
advantages of application modernization can be summarized as increasing the
speed with which new features are delivered, exposing the functionality of existing
applications to be consumed via API by other services, and re-platforming applications from on-premises to cloud-native application modernization.
Best Practices for Managing IaaS, PaaS, and Container-Based Deployments - App...AppDynamics
Organizations are rapidly adopting Continuous Integration and Delivery (CI / CD) and DevOps processes to de-couple previously monolithic service delivery cycles, drive faster innovation, and reduce time to market. A key enabler of this shift software and infrastructure automation on top of increasingly progressive deployment environments including public/private cloud (IaaS), platform-as-a-service (PaaS), and lightweight containers (Docker).
This session will provide a deep-dive view into using AppDynamics in these next-generation environments that provide the backbone of the DevOps movement.
Key takeaways:
o How AppDynamics enables the shift to a CI/CD or DevOps culture
o The differences between IaaS, PaaS, and containerized deployments
o Examples of using automation platforms (Chef/Puppet/Ansible) to enable AppDynamics
o Best practices for using AppDynamics to manage a highly distributed, micro-services architecture
o Strategies for managing container-based deployments with AppDynamics
For more information go to: www.appdynamics.com
Converting from a three tier or monolithic application to microservices can be daunting, and often comes at a non-trivial cost or effort. So why are organizations doing it, and how do they justify the expense? We will discuss some of the practices and migration strategies used by organizations who undergo this sort of transformation, such as extracting functions through refactoring and converting them to microservices. As the journey progresses, we learn that there is no one-size-fits-all approach to making applications cloud-native… so the real question needs to be ‘how do I find the right approach for me?’ We can help you begin to answer that question for yourself, by discussing the facets of consideration such as technical, procedural, and risk tolerance to name a few.
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBMJules Pierre-Louis
DevOps has become a major enabler of business innovation that can drive digital transformation at an enterprise level if done well. Challenges remain, however. Crossing the chasm from successful DevOps pilots with "two-pizza" teams to full enterprise adoption, including cultural transformation, best practices and tools remains a challenge.
Join Alan Shimel as he hosts a panel discussion with Hertz' John LaFreniere, Kaiser Permanente's Raghunath Raman and IBM's Sanjeev Sharma on how traditional enterprises are accelerating innovation by adopting DevOps practices at scale across their organizations.
Find out how:
- Hertz is accelerating transformation of their platforms, business process and operating models with Cloud, DevOps and Agile.
- Kaiser Permanente is managing the cultural, process and integration challenges of multi-speed IT.
- IBM has embarked on a DevOps transformation that has engaged over 10,000 developers already -- including becoming one of the world's largest users of GitHub Enterprise.
Watch to learn how to assess your organization’s readiness for scaling DevOps, and to identify next steps.
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Dell World
Delivering IT services that keep the business running from day to day is always challenging. Delivering these services while simultaneously moving your IT infrastructure to the cloud can be almost impossible without the right tools and support. Attend this session to hear directly from leaders at Dell who specialize in application management and learn how Dell migration tools and services accelerate your move to the cloud while maintaining the high quality access to web and mobile services that your users demand.
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...HP Enterprise Italia
Toby Marsden - Director Application Development Management Solutions, EMEA HP Software - takes part to the HP EMEA Software Performance tour 2014 to talk about enterprise agility in the age of applications.
Comprehensive and coherent Agile perspective provide to AutoDesk, includes Product Discovery, Product delivery, DevOps
Similar to Are your cloud applications performing? How Application Performance Management can give you the insights that you need as you move your applications to the cloud. (20)
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
In the past decade, IDC has seen IBM Z evolve first from a siloed platform to what they call a "connected" platform, and then to a "transformative" platform. This transition has been driven by IBM, by the IBM Z software vendors, like Rocket Software, and by businesses themselves.
IDC research shows that businesses that choose to modernize IBM Z achieve higher satisfaction than re-platformers and many are using open source software (OSS) in their modernization initiatives. Employing OSS makes it possible to crack the platform open and enable it to connect to the rest of the datacenter and the outside world. Join IDC guest speaker, Al Gillen and Peter Fandel as they take a deeper look at the value proposition associated with using commercially supported OSS in mission-critical environments, like IBM Z. In this webinar we’ll discuss:
How OSS can neutralize the disparity between seasoned IBM Z and emerging developers
The modernization initiatives that involve OSS
What to consider before bringing OSS to IBM Z
How Rocket Software is delivering commercially supported OSS to IBM Z
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
With the growing adoption of Kubernetes, organizations want to take advantage of containerized Microsoft SQL Server 2019 to optimize transactional performance and accelerate time-to-insights from their business-critical data. However, as enterprises embrace hybrid cloud strategy, they need to consider several aspects based on the performance, cost and data protection requirements for running enterprise-grade SQL Server databases.
In this webinar, we will compare and contrast various cloud-native platforms for SQL Server that would help CIOs, DevOps engineers, database administrators and applications architects to determine the most suitable platform that fits their business needs.
Join us as we explore some exciting results from a recent performance benchmark study conducted by McKnight Consulting Group, an independent consulting firm, to compare the performance of Microsoft SQL Server 2019 on the best possible configurations of the following Kubernetes platforms:
Diamanti Enterprise Kubernetes Platform
Amazon Web Services Elastic Kubernetes Service (AWS EKS)
Azure Kubernetes Service (AKS)
Topics will include:
Platform considerations and requirements for running Microsoft SQL Server 2019
Performance comparison and analysis of running SQL Server on various platform
Best practices for running containerized SQL Server databases in Kubernetes environment
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
With the growing adoption of Kubernetes, organizations want to take advantage of containerized Microsoft SQL Server 2019 to optimize transactional performance and accelerate time-to-insights from their business-critical data. However, as enterprises embrace hybrid cloud strategy, they need to consider several aspects based on the performance, cost and data protection requirements for running enterprise-grade SQL Server databases.
In this webinar, we will compare and contrast various cloud-native platforms for SQL Server that would help CIOs, DevOps engineers, database administrators and applications architects to determine the most suitable platform that fits their business needs.
Join us as we explore some exciting results from a recent performance benchmark study conducted by McKnight Consulting Group, an independent consulting firm, to compare the performance of Microsoft SQL Server 2019 on the best possible configurations of the following Kubernetes platforms:
Diamanti Enterprise Kubernetes Platform
Amazon Web Services Elastic Kubernetes Service (AWS EKS)
Azure Kubernetes Service (AKS)
Topics will include:
Platform considerations and requirements for running Microsoft SQL Server 2019
Performance comparison and analysis of running SQL Server on various platform
Best practices for running containerized SQL Server databases in Kubernetes environment
Next Generation Vulnerability Assessment Using Datadog and SnykDevOps.com
Vulnerability assessment for teams can often be overwhelming. The dependency graph could be thousands of packages depending on the application. Triaging vulnerability data and prioritizing actions has historically been a very manual process, until now. With Datadog and Snyk, learn how to trace security and performance issues by leveraging continuous profiling capabilities for actionable insight that help developers remediate problems.
Join us on Thursday, January 21 for a unique opportunity to learn more about continuous profiling, vulnerability management, and the benefit to customers from using both of these products. In this webinar, you will:
Bust some myths around continuous profiling and learn how Datadog differentiates itself
See decorated traces in action for sample Java applications and understand how Snyk + Datadog reduce time to triage supply chain vulnerabilities
Learn roadmap information for upcoming public announcements from both partners
In the era of cloud generation, the constant activity around workloads and containers create more vulnerabilities than an organization can keep up with. Using legacy security vendors doesn't set you up for success in the cloud. You’re likely spending undue hours chasing, triaging and patching a countless stream of cloud vulnerabilities with little prioritization.
Join us for this live webinar as we detail how to streamline host and container vulnerability workflows for your software teams wanting to build fast in the cloud. We'll be covering how to:
Get visibility into active packages and associated vulnerabilities
Reduce false positives by 98%
Reduce investigation time by 30%
Spot a legacy vendor looking to do some cloud washing
2021 Open Source Governance: Top Ten Trends and PredictionsDevOps.com
If you work in software development, jumpstart your engineering team in 2021—get ahead of the engineering curve and your competitors—by attending this must-watch open source trends and predictions webinar.
Alex Rybak, Director of Product Management at Revenera, and Russ Eling, founder and CEO of OSS Engineering Consultants, share their top 10 open source usage, license compliance and security insights for the new year.
Just a few hints at what you’ll learn more about:
Where the adoption of shift-left is headed and the decisions you’ll face going forward
The impact of a lack of software developer security training relative to pandemic fallout
The broader role of the engineering team in open source management and governance
The expanding role and impact of open source marketplaces such as GitHub
Don’t miss the discussion for valuable insight and learning for software engineering teams
2020 was a brutal year for ransomware. Cybercriminals operated without any human decency, targeting the most vulnerable and at-risk parties, such as hospitals, scientists, and global manufacturers. The approach has become more sophisticated and life-threatening, shifting from individual targets to global enterprises, destroying backups, blackmailing victims with public leakage of exfiltrated data, and paralyzing critical systems and infrastructure.
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)DevOps.com
As containers and Kubernetes are adopted in production, security is a critical concern and DevOps teams need to go beyond image scanning. Use cases such as runtime security, network visibility and segmentation, incident response and compliance become priorities as your Kubernetes security framework matures.
In this talk, we’ll share an overview of runtime security, discuss approaches used by open source and commercial tools, and hear how users are getting started quickly without impacting developer productivity.
In any fast-paced engineering environment, unexpected incidents can arise and escalate without warning. Without strong leadership within teams, you get chaotic, stressful, and tiring situations that waste valuable engineering time, slow down resolution, and most importantly, impact your customers.
Operationally mature organisations use proven incident response systems led by Incident Commanders. Incident Commanders provide the leadership needed to help stabilize major incidents fast.
In this webinar, we’ll take lessons learned from formalized incident response, such as those used by first responders, and show you how to apply those same practices to your organization. By utilising these methods you’ll improve both the speed and effectiveness of your team’s response, reducing the amount of downtime experienced.
In this workshop, attendees will:
Be introduced to the Incident Command System and learn how it can be adapted to their organisation
Walk through the basics of incident response best practices
Discuss examples of formal incident response from multiple organisations
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureDevOps.com
Chaos engineering is becoming a critical part of the DevOps toolchain when adopting Site Reliability Engineering (SRE) practices. Every system is becoming a distributed system and chaos engineering proclaims many advantages for them.
It improves infrastructure automation, increases reliability and transforms incident management. However, an often-overlooked benefit of chaos engineering and SRE involves culture transformation. Culture is often touched upon when talking about chaos engineering and SRE but not as often as skills and process.
In this webinar, we will discuss how you can build out a chaos engineering practice and how you can adopt a true blameless culture and maximize the potential of your team.
You will learn how to:
Hold blameless postmortems
Share post mortems with other teams
Run regular fire drills and game days
Automate chaos experiments for continuous validation
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportDevOps.com
Enterprises are best served by leveraging an RBAC system to manage access to their SSH and Kubernetes resources. With Teleport, an open source software, employers are able to provide granular access controls to developers based on the access they need and when they need it. This makes it possible for employers to maintain secure access without getting in the way of their developers’ daily operations.
Join Steven Martin, solution engineer at Teleport, as he demonstrates how to assign access to developers and SRE’s across environments with Teleport through roles mapped from enterprises’ identity providers or SSOs.
Monitoring Serverless Applications with DatadogDevOps.com
Join Datadog for a webinar on monitoring serverless applications with AWS Lambda. You'll learn how to get the most of Datadog's platform, as well ask the following key takeaways:
Learn how to set up a Twitter bot that makes API calls with Node.js
Deploying Serverless Applications
What does observability look like with less infrastructure?
Deliver your App Anywhere … Publicly or PrivatelyDevOps.com
Developers are increasingly adopting a microservices approach for their apps in order to gain rapid iteration capabilities required for delivering new services faster. However, delivering the App still requires multiple steps such as allocation of virtual IPs, provisioning the front load balancer, configuring firewall rules, configuring a public domain, and DDOS. At present, each of these steps requires coordination across multiple teams with multiple iterations per team. The time efficiencies gained by adopting microservices and cloud-native technologies is negated due to the time taken to deliver the App.
In this session, Pranav Dharwadkar, VP of products at Volterra, and Jakub Pavlik, director of engineering, will help you understand these challenges and introduce a distributed proxy architecture that can alleviate the challenges across different cloud environments. This webinar will include a live demo using a distributed proxy architecture to advertise an App publicly and privately.
In this webinar, you will learn:
The steps required to deliver an App using the current approaches
How a distributed proxy architecture can be used to deliver the app publicly and privately
The operational benefits of a distributed proxy architecture for delivering new services
Securing medical apps in the age of covid finalDevOps.com
The COVID-19 pandemic has drastically altered the connected healthcare landscape, accelerating the usage of telemedicine and other remote healthcare delivery systems by as much as 11,000% for some populations. How has this unprecedented push affected healthcare and medical device application security? The security team at Intertrust recently analyzed 100 Android and iOS medical apps to find out.
In this webinar, we'll discuss:
Medical application and device threat trends
The top mHealth security vulnerabilities uncovered in our analysis
Strategies to keep your mHealth apps safe
Future advances in digital healthcare and how your security can evolve with it
Raise your hand if you enjoy being buried in alerts or woken up at 2 a.m. — yeah … thought so. Ever-rising customer expectations around high availability and performance put massive pressure on the teams who develop and support SaaS products. And teams are literally losing sleep over it. Until outages and other incidents are a thing of the past, organizations need to invest in a way of dealing with them that won’t lead to burn-out.
In this session, you’ll learn how to combine the latest tooling with DevOps practices in the pursuit of a sustainable incident response workflow. It’s all about transparency, actionable alerts, resilience and learning from each incident.
The Evolving Role of the Developer in 2021DevOps.com
The role of the developer continues to change as they sit on the front line of application and even cloud infrastructure security. Today, developers are focused on innovating fast and improving security, but how do high-performing teams accomplish this? They commit code frequently, release often and update dependencies regularly (608x faster than others).
In this webinar, we'll discuss the key traits of high-performing teams and how that impacts the role of the developer.
Key Takeaways:
Choose the best third party dependencies
Determine the lowest effort upgrades between open source versions
Solve for issues in both direct and transitive dependencies with a single-click
Block and quarantine suspicious open source components
Service Mesh: Two Big Words But Do You Need It?DevOps.com
Today, one of the big concepts buzzing in the app development world is service mesh. A service mesh is a configurable infrastructure layer for microservices application that makes communication flexible, reliable and fast. Let’s take a step back, though, and answer this question: Do you need a service mesh?
Join this webinar to learn:
What a service mesh is; when and why you need it — or when and why you may not
App modernization journey and traffic management approaches for microservices-based apps
How to make an informed decision based on cost and complexity before adopting service mesh
Learn about NGINX Service Mesh in a live demo, and how it provides the best service mesh option for container-based L7 traffic management
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
Red Hat OpenShift is enabling quicker adoption of DevOps practices. Containers are an essential component of DevOps and the OpenShift Kubernetes Container Platform is integral for orchestration within these environments. Data security is now challenged to keep pace with the size and scope of container usage. The migration from legacy in-house deployments to hybrid-cloud installations has created new attack surfaces as data is shared more freely in Kubernetes deployments.
Protecting data at rest and in motions is a necessity. Learn how you can keep data protected and securely share data in OpenShift environments with real-time data protection solutions.
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...DevOps.com
Managing access permissions in the public cloud can be a very complex process. In fact, by 2023, 75% of cloud security failures will result from the inadequate management of identities, access and privileges, according to Gartner.
Join us as Guy Flechter, CISO of AppsFlyer, presents a real-world case of how his company works to enforce least-privilege and to govern identities in their cloud. This webinar will also provide an overview of how to govern access and achieve least privilege by analyzing the access permissions and activity in your public cloud environment. With thousands of human and machine identities, roles, policies and entitlements, this webinar will give you the tools to examine the access open to people and services in your public cloud, and determine whether that access is necessary.
In this workshop, you will learn about:
The risks of IAM misconfiguration and excessive entitlements in cloud environments
The challenges in identifying and mitigating Identity and access risks for both human and machine identities
How to automate cloud identity governance and entitlement management with Ermetic
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...DevOps.com
Open-source machine learning can be transformative, but without the proper tools in place, enterprises struggle to balance the IT security and governance requirements with the need to deliver these powerpoint tools into the hands of their developers and modelers.
How can organizations get the latest technology from the open-source brain trust, while ensuring enterprise-grade management and security? In this webinar, we will discuss how Anaconda Team Edition, available on RedHat Marketplace, enables IT departments to mirror a curated set of packages into their organization in a safe and governed way.
Join Michael Grant, VP of services at Anaconda, to discuss:
How IT organizations are using Anaconda Team Edition to curate, govern and secure Python and R packages
Tips for how development and data science teams can get the most out of Team Edition, from uploading your own packages to building custom channels for groups or projects
How to distribute conda environments to desktops, servers and clusters:
GUI-based installers for desktop users
“Conda packs” for automated delivery to remote servers and distributed computing clusters
Conda-enabled Docker containers for application deployment
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Monitoring Java Application Security with JDK Tools and JFR Events
Are your cloud applications performing? How Application Performance Management can give you the insights that you need as you move your applications to the cloud.
1. Are your Cloud
Applications Performing?
Modernizing and Moving your applications to the cloud, and how Application
Performance Management gives you the insights that you need as you go.
Ken Rider, John Dinger – Executive Solutions Architects
Randy George – Distinguished Engineer, Chief Architect APM
2. Thread of the Discussion Today
• What is application modernization, and why is application
performance monitoring (APM) so important in the process?
• What are the critical business reasons that companies modernize
their apps?
• What have we seen regarding how companies do it?
• What are the key aspects of how companies apply APM to make the
process successful?
3. Most businesses today spend 70-80% of their IT budgets to maintain their
legacy applications and systems.
Desired Outcomes
• Flexible – address new business needs in hours
• Available – process transactions continually
• Scalable – flex capacity out or in, as business
volumes fluctuate
• Portable: Uncouple Applications from
Infrastructure
• Manageable – As a fundamental
characteristic
• 10x improvement in the IT application change
processes – with significant cost recovery!
• 99% faster update or patch deployments
• 50% savings in infrastructure costs vs. on-
prem
Organizations must shift IT spending from
“keeping their Apps running” to investments
that grow the business and support
innovation!
Challenges
Application solutions that are well monitored,
much easier to maintain, and much more
responsive to business needs.
• This gives you the business advantage
Capstone’s delivers these via Modernization of
Traditional Applications
• Cloud delivers dynamic, flexible, secure, and
reliable infrastructure.
• Dockerized cloud applications are
dramatically more efficient, and more nimble
Ideal Solution
And These Apps Are Here to Stay
Application Modernization works with
the current application estate
• According to Gartner: “By 2023, 90% of current
business applications will still be in use” (Gartner
ITxpo Conference, Oct. 2017)
Why Do Businesses Modernize their Apps
4. Source: Continuous Delivery: A Maturity Assessment Model, ThoughtWorks
A 2017 EMA Survey of Companies embracing
DevOps reports:
• 42% of Companies are now deploying new code at
least daily to production. (Compared to 31% in
2015)
• More than half deploy new code more than once a
week.
• Companies who increased deployment frequency
by >=25% are predicted to be 4x more likely to
have increased YoY revenue by >= 25%
But
• Most Companies have automated less than half
of their DevOps pipeline (only 6% automate
>90%)
Today:
Source: DevOps / Continuous Delivery Tooling
Enterprise Management Associates report, 2017
5. How do Businesses Modernize their Apps?
• Which approach to take in modernizing an application depends on
many factors including;
• Specific business priorities driving the modernization activity
• Current technical debt of application
• Environmental dependencies of application
• Authorship of application
• Budget, Resources, and Time
• Business and IT culture
6. How do Businesses Modernize their Apps?
• First, start by asking some of the following questions.
• Do you know enough about your app to know what parts need modernizing?
• Does the application need a certain amount of rework due to technical debt?
• Is the organization having a hard time finding technical resources talented in
the technology stack that the application is built on?
• Is there sufficient budget for modernization? Or is the organization sacrificing
other initiatives just to get a few dollars to invest in modernization?
• Are there enough resources freed up to focus on a large modernization
initiative, or is it necessary to hire some outside consulting help?
7. How do Businesses Modernize their Apps?
Approaches:
• Lift-and-shift
• Docker’s Modernize Traditional Applications (MTA) program
• Incremental refactor to microservices
• Minimal refactor to 12-factor*
• Rewrite as a new 12-factor microservice app
* Or a 15 factor app – Beyond the Twelve-Factor App by Kevin Hoffman ; O’Reilly Media,
8. Existing
Application
Modern Methodologies
Integrate to CI/CD
and automation system
Convert to a
container
with Docker EE
Modern Infrastructure
Built on premise, in the cloud, or
as part of a hybrid environment.
Modern Microservices
Add new services or start
peeling off services from
monolith code base
App
How do Businesses Modernize their Apps?
• Graphic from Modernizing Traditional Applications with Docker EE
Establish Monitoring
Baseline for Business
and Technical KPIs:
Availability, End User
Experience, etc
Monitor the
infrastructure.
Understand the impact
to your services, e.g.
autoscaling, restarts, etc
Complexity and Scale
changes the way one
should monitor their
application.
Monitor the key
components of your
CD pipeline. It is a
critical component of
the application.
9. APM: A key part of the Modernization Process
• Different types of monitoring that are relevant for these scenarios:
• End User Experience
• Availability (Production SLAs): “three nines”, “five nines”
• Emulate consumers, e.g. global testing
• Responsiveness - Response time, experience score
• Impact of dependent services: 3rd party and cloud such as paypal or salesforce, local services such as LDAP…
• Resource consumption – how much infrastructure is your application consuming - $$$
• Changes to the application – blue/green deployment, elastic scale out(or in), services failing/restarting
(sometimes on another node), etc.
• Usage Analysis – enables data-driven decisions
• “Magic” Monitoring
• There is no magic… Despite what vendors may tell you, good monitoring requires instrumentation and some well thought out
collection and processing. As posited by Johannsen:, human intervention is required to produce “information” from data. *
* Johannsen, Wolfgang, 2016, Information und ihre Bedeutung in der Natur ; Springer-Verlag
ISBN 978-3-662-50254-9 ; ISBN 978-3-662-50255-6 (eBook)
10. Delivering the Modernized App to Production
• Select an orchestrator
• Impact on the application, e.g. scale in-out, restarts, restarts on new nodes
• Setup a CI/CD pipeline
• Monitor the key components of the pipeline
• Investigate deployment patterns for automated upgrades
• Leverage APM across Dev and Ops
• Communicate back to stakeholders
• Availability, user experience, usage, etc
11. Monitoring Approach Has to Change
Hierarchy How Many
Continents 3 to 5
Regions 2-4 per Continent
Zones 1-5 per Region
Services 100’s per Zone
Versions Many per Service
Containers 1000’s per Version
Instances 10,000s
Rate of change
Today - Deploy in months; Live for years
Containers- Deploy in secs; Live for mins/hours
Scale
Low Frequency Sampling * High Frequency Sampling *
* Lukasz Guminski, 2015, Monitoring Performance in Microservice Architectures.
12. Increased Complexity
• Moves from the monolithic application to the outside interactions
• Focus on the service interfaces (boundaries)
• Latency becomes an issue
• Many Moving Parts
• Monitor External Services in addition to the application
The larger the group of
components is, the
more stable the
collective group is.
13. Common tooling for the entire lifecycle
• Ensure Avail and Perf through Production
• Usage Feedback Loop
• Volume, by geo, by feature, recurring, api versions, etc
• Availability - Deploy Proactive Tests along with
application update (blue/green)
• Application-level responsiveness
• Bottleneck Analysis
• Application-level Resource Consumption
$$ - Fewer Problems Make it to Production
• Earlier Debugging
• w/detailed traces, logs, errors
• Availability Gate: Leverage Proactive Tests
• Tests are an artifact of the service
• Ensure Service responsiveness
• Incl Dependent Services
• Granular Resource Consumption (diff after push)
• Container-level Resource Consumption
13
Goal: Fewer problem
tickets, faster resolution
Goal: Deliver applications with
speed, quality and control Shift Right Shift Left
14. Experiences and Lessons Learned
• Client examples
• Pre-modernization at an insurance company
• Modernization at an agribusiness company
• Anti-pattern: No Modernization at a financial services company
• Keys for monitoring tools in a containerized / cloud environment
• Observed a change from baseline
• Benefits of putting monitoring into a container
• Increased expectations of all apps