I brief slide sequence about refactoring a monolithic Jenkins CI system into independent components: Foundation image, Build, Verify, Secrets, SSH, Workflow, Linked dependencies, Artifact “push” (deployment), Audit, and Notifications.
- Alfresco is the largest open source content management company in the world, founded in 2005 with offices in London and Atlanta. It has over 3 million community downloads and 250+ global channel partners.
- The Alfresco platform provides document management, records management, web content services, and enterprise collaboration across devices. It uses a open source model with RESTful APIs and open standards.
- Alfresco offers both on-premise subscription licenses for deployment on a company's own infrastructure as well as software-as-a-service subscriptions for easier installation and use. Training and certification are also available.
Get Rid of Visual SourceSafe Codemash 2010Joe Kuemerle
Are you still using Visual Source Safe? Have you heard about all the other version control systems that are out there but have not had the time or patience to evaluate them? Come and learn about the ins and outs, ups and downs of Team Foundation System, Subversion, and Git : what they offer and how to integrate them into your current environment.
Source Code Control for Microsoft Access DevelopersPhilipp Stiefel
A presentation about the benefits of source code control for Microsoft Access developers. Covers Add-Ins for Access to deal with the issues of managing Access projects in version control.
http://12factor.labianchin.me/ - Official presentation link
http://12fator.labianchin.me/ - Portuguese version
A quick overview of the 12 factor app.
Presented in conferences and inside company.
This document provides an agenda for a lesson on Windows Server security that includes performing evidence collection related to computer security incidents, discussing video auditing, and reviewing other monitoring tools like Task Manager, Resource Monitor, Local Server Services, and Performance Monitor.
The document discusses the challenges of scaling Jenkins enterprise-wide and how the CloudBees Jenkins Platform (CJP) addresses them. It presents CJP as providing centralized plugin management, administration, security, analytics, and support that overcome limitations of open source Jenkins in scaling. Specifically, CJP allows for centralized security policies, horizontal scaling, analytics of builds and performance, and shared resources across environments.
- Alfresco is the largest open source content management company in the world, founded in 2005 with offices in London and Atlanta. It has over 3 million community downloads and 250+ global channel partners.
- The Alfresco platform provides document management, records management, web content services, and enterprise collaboration across devices. It uses a open source model with RESTful APIs and open standards.
- Alfresco offers both on-premise subscription licenses for deployment on a company's own infrastructure as well as software-as-a-service subscriptions for easier installation and use. Training and certification are also available.
Get Rid of Visual SourceSafe Codemash 2010Joe Kuemerle
Are you still using Visual Source Safe? Have you heard about all the other version control systems that are out there but have not had the time or patience to evaluate them? Come and learn about the ins and outs, ups and downs of Team Foundation System, Subversion, and Git : what they offer and how to integrate them into your current environment.
Source Code Control for Microsoft Access DevelopersPhilipp Stiefel
A presentation about the benefits of source code control for Microsoft Access developers. Covers Add-Ins for Access to deal with the issues of managing Access projects in version control.
http://12factor.labianchin.me/ - Official presentation link
http://12fator.labianchin.me/ - Portuguese version
A quick overview of the 12 factor app.
Presented in conferences and inside company.
This document provides an agenda for a lesson on Windows Server security that includes performing evidence collection related to computer security incidents, discussing video auditing, and reviewing other monitoring tools like Task Manager, Resource Monitor, Local Server Services, and Performance Monitor.
The document discusses the challenges of scaling Jenkins enterprise-wide and how the CloudBees Jenkins Platform (CJP) addresses them. It presents CJP as providing centralized plugin management, administration, security, analytics, and support that overcome limitations of open source Jenkins in scaling. Specifically, CJP allows for centralized security policies, horizontal scaling, analytics of builds and performance, and shared resources across environments.
Securing application deployments in multi-tenant CI/CD environmentsBinu Ramakrishnan
The goal of the talk is to introduce you to, the security risks and challenges associated with operating or using a multi-tenant CI/CD platform, and offers security patterns and best practices to harden it.
Video: http://oreil.ly/2hVCilH
In diesem Meetup möchten wir über Service Meshes sprechen. Was ist ein Service Mesh genau und wie funktioniert es? Wir klären euch auf!
Wir starten den Abend mit einem Beispiel-Anwendung an der wir euch zeigen wie man Retry-, Timeout-Management sowie Circuit Breaker als Code implementiert um eine widerstandsfähige und belastbare Microservice zu erhalten. Des Weiteren zeigen wir auch die Implementierung von mutual TLS mit der eine sichere Kommunikation gewährleistet ist.
Im Anschluss schauen wir uns nach einer Einleitung zu den Grundlagen von Service Meshes an wie man mit Hilfe von Istio die oben beschriebenen Funktionen abstrahieren und vom Code in die Infrastruktur verlagern kann. Abschließen geben wir einen Ausblick auf weitere Funktionen von Istio wie A/B testing und Fault Injection.
Securing Application Deployments in CI/CD Environments (Updated slides: http:...Binu Ramakrishnan
In a multi-tenant CI/CD environment, developers trust and delegate CI/CD systems to deploy their applications to production. But, what is the basis of this trust? How the trust is enforced from commit-to-deploy? What is the trustworthiness of the application deployed by CI/CD through automation? This talk highlights security risks with CI/CD deployments and offer solutions to mitigate those risks
Visual Studio Team Services has some new integrations for your Xamarin mobile apps. We'll be taking an existing mobile app and adding Continuous Integration to ensure your app builds, connecting to build agents, and Continuous Deployment to HockeyApp. We will also discuss another CI/CD service, Bitrise, which has its own build agents. With all of the different platforms and integration points, there's no reason why these steps should be manual. Learn how to leverage your existing Microsoft tools and subscriptions to get your app out faster and with less human interaction.
This document discusses hybrid cloud networking challenges and solutions. It presents typical web application deployments on-premises and in the cloud. Architectural challenges with hybrid clouds include performance, reliability, and security. Implementation challenges involve using switched versus routed networks and managing IP addresses, routes, and network appliances across environments. The document proposes two approaches for hybrid cloud networking - a routed virtual private cloud using routing and firewalls, and a switched virtual private cloud using virtual switches and tunnels to simplify connectivity while maintaining security and performance.
This certificate certifies that Jeff Drake successfully completed the VMware vSphere: Install, Configure, Manage [V5.5] course taught by instructor Brigham Mirabelli on March 11, 2015. The certificate was issued by Patrick P. Gelsinger, President and CEO of VMware.
The document discusses the architecture of the GeneXus Deploy Engine. It describes the deployment architecture as having main object-based cross references with object and environment properties. It also discusses packages being installed on various platforms like WebSphere, JBoss, and Tomcat. The deployment uses MSBuild with disconnected, granular, declarative and extensible tasks defined in targets files. It provides links to join the community and find more information.
“Sh*^%# on Fire, Yo!”: A True Story Inspired by Real EventsVMware Tanzu
SpringOne 2020
“Sh*^%# on Fire, Yo!”: A True Story Inspired by Real Events
James Webb, MTS at T-Mobile
Brendan Aye, Technical Director, Platform Architecture at T-Mobile
O que é esse tal de OWIN e por que ele é tão importante para o futuro do ASP.NET? Venha conhecer como tirar proveito hoje mesmo de uma nova maneira de se desenvolver aplicações ASP.NET desacopladas e entender a base da próxima versão desse framework tão poderoso.
A session in the DevNet Zone at Cisco Live, Berlin. At the moment, this is the DoE: DevOps of Everything. DevOps is about culture first but many people take shortcuts to tools and workflow. They forgot the essence of DevOps which is about people and not only from Dev to Ops. In this session, we will show you how we are currently building a DevOps culture with a focus on continuous improvement.
Simple architecture principles expressed in twelve "factors" can prepare the application for simple deployment into diverse environments, infrastructures, platforms.
This document provides an agenda for a lesson on identifying and removing malware from Windows servers and clients. It lists several anti-malware software options for servers like Kaspersky, Bitdefender, and Windows Defender. It also lists options for clients like Kaspersky, MalwareBytes, and Windows Defender. The document outlines exercises for installing Kaspersky on a server, using Gmer and built-in antivirus tools to scan for malware, and downloading additional anti-malware software like Malwarebytes for testing. A link is also provided to share video instructions on the topics.
This document discusses WAF architecture on AWS. It begins by explaining what a WAF is and why they are used, particularly to address common attacks like SQL injection and cross-site scripting. It then covers traditional WAF architectures and their problems before detailing the AWS recommended architecture of placing a WAF like AWS WAF in front of a load balancer or CloudFront distribution. It also compares traditional, cloud-hosted, and AWS WAF options in terms of meeting compliance standards, maintenance/automation, and pricing. The document concludes with a demo of AWS WAF rules and features.
OpenStack has seen success with deployments, products, and services. To ensure long term health and success, Red Hat promotes an "upstream first" mindset where investments are prioritized in the OpenStack community. This includes designing, developing, testing, and contributing all code upstream. It brings benefits like influence, quality, security, and interoperability. Horizontal teams work across projects in areas like release management, infrastructure, documentation, and more. Individuals can help by becoming active contributors and serving as liaisons between teams.
How to Enable vSphere with tanzu Supervisor ClusterAdam Alhafid
vSphere with Tanzu is a developer-ready infrastructure, that delivers a method to start with Kubernetes in infrastructure leveraging existing networking and storage using Tanzu Kubernetes Grid clusters. Kubernetes can be managed through vSphere. This allows vSphere admins to leverage their existing tooling and skillsets to manage Kubernetes-based applications, it provides vSphere admins with the ability to easily grow their skillset in and around the Kubernetes ecosystem.
This document summarizes Microsoft's efforts to support OpenStack on Hyper-V. Key points include:
- Microsoft is providing resources to enhance Hyper-V support in OpenStack, focusing on features for Essex and beyond like live migration and volume support.
- Supporting Hyper-V allows enterprises to utilize their existing Windows infrastructure and expertise while providing interoperability with public clouds.
- The initial Hyper-V driver provides basic VM management and Microsoft is working to improve it for Folsom with additional features and non-flat networking support.
- Developers are encouraged to get involved to further expand Hyper-V support in OpenStack.
The document describes a case study of CollabNet implementing a CI-as-a-Service solution for a large financial services company with over 4000 users across 100 teams developing over 150 applications using multiple technologies. The solution involved provisioning Jenkins servers on demand using Lab Management, integrating tools like TeamForge, Subversion, Nexus and SonarQube on a common platform to provide standardized CI tooling and processes managed by a dedicated build engineer. This helped establish a collaborative development culture, improve productivity and reduce costs.
VMware awarded Alecia Chrin the title of VSP 2015 in recognition of her successful completion of all accreditation requirements for the VMware Sales Professional program. As of October 5, 2015, Alecia Chrin is a certified VMware Sales Professional. VMware CEO Pat Gelsinger congratulates Alecia Chrin on this achievement and invites her to join VMware communities online.
Demystifying versioning in spfx solutionsJasjit Chopra
The document discusses an upcoming webinar on SharePoint Framework (SPFx) Deep Dive. The webinar will cover NodeJS, code editors, Yeoman, Gulp, the SPFx roadmap, understanding versioning in SPFx solutions, and working with CI/CD pipelines and versioning. It will also discuss migrations and upgrades when using SPFx. The presenter is Jasjit Chopra, a Microsoft Azure MVP, and the webinar will provide an in-depth look at SPFx.
How to build a self-documenting applicationconjur_inc
This document summarizes a workshop on building a self-documenting compliant application using Conjur and Chef. The workshop consists of several parts: (1) an introduction to DevOps and compliance; (2) an overview of Chef secrets management; (3) a practicum building a sample app; (4) a discussion of compliance, Chef best practices, and traceability/auditability; and (5) a wrap up. The goals of the workshop are for attendees to have a deeper understanding of how compliance, access to the Chef server, and secrets management are interrelated and how to implement a delivery pipeline that combines these topics in a self-documenting and automated fashion.
The document discusses best practices for managing secrets using a secrets server and Puppet. It recommends defining access policies, checking secrets into source control, creating "host factories" to provision machines, increasing deployment velocity, and integrating the secrets server with the DevOps toolchain. It then provides an example of obtaining secrets directly on nodes with Puppet by encrypting secrets in Hiera.
Securing application deployments in multi-tenant CI/CD environmentsBinu Ramakrishnan
The goal of the talk is to introduce you to, the security risks and challenges associated with operating or using a multi-tenant CI/CD platform, and offers security patterns and best practices to harden it.
Video: http://oreil.ly/2hVCilH
In diesem Meetup möchten wir über Service Meshes sprechen. Was ist ein Service Mesh genau und wie funktioniert es? Wir klären euch auf!
Wir starten den Abend mit einem Beispiel-Anwendung an der wir euch zeigen wie man Retry-, Timeout-Management sowie Circuit Breaker als Code implementiert um eine widerstandsfähige und belastbare Microservice zu erhalten. Des Weiteren zeigen wir auch die Implementierung von mutual TLS mit der eine sichere Kommunikation gewährleistet ist.
Im Anschluss schauen wir uns nach einer Einleitung zu den Grundlagen von Service Meshes an wie man mit Hilfe von Istio die oben beschriebenen Funktionen abstrahieren und vom Code in die Infrastruktur verlagern kann. Abschließen geben wir einen Ausblick auf weitere Funktionen von Istio wie A/B testing und Fault Injection.
Securing Application Deployments in CI/CD Environments (Updated slides: http:...Binu Ramakrishnan
In a multi-tenant CI/CD environment, developers trust and delegate CI/CD systems to deploy their applications to production. But, what is the basis of this trust? How the trust is enforced from commit-to-deploy? What is the trustworthiness of the application deployed by CI/CD through automation? This talk highlights security risks with CI/CD deployments and offer solutions to mitigate those risks
Visual Studio Team Services has some new integrations for your Xamarin mobile apps. We'll be taking an existing mobile app and adding Continuous Integration to ensure your app builds, connecting to build agents, and Continuous Deployment to HockeyApp. We will also discuss another CI/CD service, Bitrise, which has its own build agents. With all of the different platforms and integration points, there's no reason why these steps should be manual. Learn how to leverage your existing Microsoft tools and subscriptions to get your app out faster and with less human interaction.
This document discusses hybrid cloud networking challenges and solutions. It presents typical web application deployments on-premises and in the cloud. Architectural challenges with hybrid clouds include performance, reliability, and security. Implementation challenges involve using switched versus routed networks and managing IP addresses, routes, and network appliances across environments. The document proposes two approaches for hybrid cloud networking - a routed virtual private cloud using routing and firewalls, and a switched virtual private cloud using virtual switches and tunnels to simplify connectivity while maintaining security and performance.
This certificate certifies that Jeff Drake successfully completed the VMware vSphere: Install, Configure, Manage [V5.5] course taught by instructor Brigham Mirabelli on March 11, 2015. The certificate was issued by Patrick P. Gelsinger, President and CEO of VMware.
The document discusses the architecture of the GeneXus Deploy Engine. It describes the deployment architecture as having main object-based cross references with object and environment properties. It also discusses packages being installed on various platforms like WebSphere, JBoss, and Tomcat. The deployment uses MSBuild with disconnected, granular, declarative and extensible tasks defined in targets files. It provides links to join the community and find more information.
“Sh*^%# on Fire, Yo!”: A True Story Inspired by Real EventsVMware Tanzu
SpringOne 2020
“Sh*^%# on Fire, Yo!”: A True Story Inspired by Real Events
James Webb, MTS at T-Mobile
Brendan Aye, Technical Director, Platform Architecture at T-Mobile
O que é esse tal de OWIN e por que ele é tão importante para o futuro do ASP.NET? Venha conhecer como tirar proveito hoje mesmo de uma nova maneira de se desenvolver aplicações ASP.NET desacopladas e entender a base da próxima versão desse framework tão poderoso.
A session in the DevNet Zone at Cisco Live, Berlin. At the moment, this is the DoE: DevOps of Everything. DevOps is about culture first but many people take shortcuts to tools and workflow. They forgot the essence of DevOps which is about people and not only from Dev to Ops. In this session, we will show you how we are currently building a DevOps culture with a focus on continuous improvement.
Simple architecture principles expressed in twelve "factors" can prepare the application for simple deployment into diverse environments, infrastructures, platforms.
This document provides an agenda for a lesson on identifying and removing malware from Windows servers and clients. It lists several anti-malware software options for servers like Kaspersky, Bitdefender, and Windows Defender. It also lists options for clients like Kaspersky, MalwareBytes, and Windows Defender. The document outlines exercises for installing Kaspersky on a server, using Gmer and built-in antivirus tools to scan for malware, and downloading additional anti-malware software like Malwarebytes for testing. A link is also provided to share video instructions on the topics.
This document discusses WAF architecture on AWS. It begins by explaining what a WAF is and why they are used, particularly to address common attacks like SQL injection and cross-site scripting. It then covers traditional WAF architectures and their problems before detailing the AWS recommended architecture of placing a WAF like AWS WAF in front of a load balancer or CloudFront distribution. It also compares traditional, cloud-hosted, and AWS WAF options in terms of meeting compliance standards, maintenance/automation, and pricing. The document concludes with a demo of AWS WAF rules and features.
OpenStack has seen success with deployments, products, and services. To ensure long term health and success, Red Hat promotes an "upstream first" mindset where investments are prioritized in the OpenStack community. This includes designing, developing, testing, and contributing all code upstream. It brings benefits like influence, quality, security, and interoperability. Horizontal teams work across projects in areas like release management, infrastructure, documentation, and more. Individuals can help by becoming active contributors and serving as liaisons between teams.
How to Enable vSphere with tanzu Supervisor ClusterAdam Alhafid
vSphere with Tanzu is a developer-ready infrastructure, that delivers a method to start with Kubernetes in infrastructure leveraging existing networking and storage using Tanzu Kubernetes Grid clusters. Kubernetes can be managed through vSphere. This allows vSphere admins to leverage their existing tooling and skillsets to manage Kubernetes-based applications, it provides vSphere admins with the ability to easily grow their skillset in and around the Kubernetes ecosystem.
This document summarizes Microsoft's efforts to support OpenStack on Hyper-V. Key points include:
- Microsoft is providing resources to enhance Hyper-V support in OpenStack, focusing on features for Essex and beyond like live migration and volume support.
- Supporting Hyper-V allows enterprises to utilize their existing Windows infrastructure and expertise while providing interoperability with public clouds.
- The initial Hyper-V driver provides basic VM management and Microsoft is working to improve it for Folsom with additional features and non-flat networking support.
- Developers are encouraged to get involved to further expand Hyper-V support in OpenStack.
The document describes a case study of CollabNet implementing a CI-as-a-Service solution for a large financial services company with over 4000 users across 100 teams developing over 150 applications using multiple technologies. The solution involved provisioning Jenkins servers on demand using Lab Management, integrating tools like TeamForge, Subversion, Nexus and SonarQube on a common platform to provide standardized CI tooling and processes managed by a dedicated build engineer. This helped establish a collaborative development culture, improve productivity and reduce costs.
VMware awarded Alecia Chrin the title of VSP 2015 in recognition of her successful completion of all accreditation requirements for the VMware Sales Professional program. As of October 5, 2015, Alecia Chrin is a certified VMware Sales Professional. VMware CEO Pat Gelsinger congratulates Alecia Chrin on this achievement and invites her to join VMware communities online.
Demystifying versioning in spfx solutionsJasjit Chopra
The document discusses an upcoming webinar on SharePoint Framework (SPFx) Deep Dive. The webinar will cover NodeJS, code editors, Yeoman, Gulp, the SPFx roadmap, understanding versioning in SPFx solutions, and working with CI/CD pipelines and versioning. It will also discuss migrations and upgrades when using SPFx. The presenter is Jasjit Chopra, a Microsoft Azure MVP, and the webinar will provide an in-depth look at SPFx.
How to build a self-documenting applicationconjur_inc
This document summarizes a workshop on building a self-documenting compliant application using Conjur and Chef. The workshop consists of several parts: (1) an introduction to DevOps and compliance; (2) an overview of Chef secrets management; (3) a practicum building a sample app; (4) a discussion of compliance, Chef best practices, and traceability/auditability; and (5) a wrap up. The goals of the workshop are for attendees to have a deeper understanding of how compliance, access to the Chef server, and secrets management are interrelated and how to implement a delivery pipeline that combines these topics in a self-documenting and automated fashion.
The document discusses best practices for managing secrets using a secrets server and Puppet. It recommends defining access policies, checking secrets into source control, creating "host factories" to provision machines, increasing deployment velocity, and integrating the secrets server with the DevOps toolchain. It then provides an example of obtaining secrets directly on nodes with Puppet by encrypting secrets in Hiera.
Bio IT World 2015 - DevOps Security and TransparencyKevin Gilpin
As more companies adopt DevOps programs and build new infrastructure, the quantity and sensitivity of data being processed outside of the traditional IT stack are growing. Few organizations know where the access points into this information are, or how to secure them. We outline best practices for establishing visibility and control in this new space, drawing real-world examples from environments large and small.
Q Con New York 2015 Presentation - Conjurconjur_inc
This document discusses securing containers and microservices using a software-defined firewall (SDF) approach. It introduces the SDF pattern which uses gatekeeper and forwarder containers to validate and route traffic. The SDF ensures only authorized communication between containers. It also discusses embedding credentials during deployment using a host factory. Open source projects like Conjur and Summon can provide secrets and integrate with automation tools for continuous and secure deployment of containers.
This document discusses integrating security into modern development workflows. It begins by introducing the presenter and stating what topics will and will not be covered. Examples are then provided of how different user personas such as developers, operations staff, security teams, and business users can have their workflows negatively impacted when secrets are not properly managed. The talk suggests creating a cross-functional security UX team and provides recommendations to avoid issues like credential rotation schemes that require redeploys or cloud-specific solutions.
This floor plan diagram shows the layout of the Moscone Convention Center in San Francisco. It details the various halls, meeting rooms, lobbies, and other facilities. Key features are labeled, including exits, restrooms, storage areas, seating areas, and the locations of individual exhibit booths numbered from 100 to 2746. Dimensions of ceilings, aisles, and other spaces are provided. Target dates and times for move-in of exhibits are listed. A disclaimer notes that all dimensions should be verified on site.
Zero trust server management - lightningKevin Gilpin
The document discusses zero-trust server management as an alternative to traditional server access management using Active Directory and VPN. Zero-trust involves dividing systems into sub-systems with least privilege access for all users, machines, and code. It also recommends using public key authentication and bastion hosts to create security zones for access to servers rather than relying on Active Directory in cloud environments.
The 5 Stages of Secrets Management Grief, And How to Prevail Bryan Sterling
The document discusses the 5 stages of secrets management grief: denial, anger, bargaining, depression, and acceptance. It then provides examples of approaches organizations can take to securely manage secrets when using configuration management tools like Puppet, including storing secrets in source control versus alternative approaches. It emphasizes the importance of involving information security teams and considering both "masterful" and "masterless" options. The document recommends resources for further learning on tools that can help, like Conjur and Summon, and calls readers to evaluate their own organization's secrets management approach.
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...DynamicInfraDays
Slides from Jeff Mitchell's talk "Hiding in Plain Sight: Managing Secrets in a Container Environment" at ContainerDays Boston 2016: http://dynamicinfradays.org/events/2016-boston/programme.html#secrets
SecDevOps 2.0 - Managing Your Robot Armyconjur_inc
This document discusses SecDevOps 2.0, which involves managing secrets and access for DevOps environments through a security orchestration system called Cauldron. Cauldron uses a concept called "continuous secrets delivery" to securely provide secrets to applications and services through a pluggable interface. It aims to improve on the current state of SecDevOps 1.0 by providing high availability, role-based access control, and encryption across cloud and hybrid architectures. The document also covers hiring processes at Conjur and how to get involved with their open source Cauldron project.
The document discusses the Twelve Factors methodology for building cloud-native applications. The Twelve Factors emphasize agility, portability, and scalability through principles like codebase management, externalized configuration, statelessness, and treating logs as event streams. Adopting these best practices helps applications maximize benefits of modern cloud platforms like rapid deployment, continuous delivery, and horizontal scaling. The document provides an overview of each factor and examples to illustrate how they enable cloud-native architectures like microservices and containerization.
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsAmazon Web Services
Today’s cutting-edge companies have software release cycles measured in days instead of months. This agility is enabled by the DevOps practice of continuous delivery, which automates building, testing, and deploying all code changes. This automation helps you catch bugs sooner and accelerates developer productivity. In this session, we’ll share the processes that Amazon’s engineers use to practice DevOps and discuss how you can bring these processes to your company by using a new set of AWS tools (AWS CodePipeline and AWS CodeDeploy). These services were inspired by Amazon's own internal developer tools and DevOps culture.
Dev ops on aws deep dive on continuous delivery - TorontoAmazon Web Services
This document provides an overview of continuous delivery and the AWS developer tools that can be used to implement continuous delivery practices. It discusses how software delivery has changed and the need for tools to automate testing and deployment. It then describes AWS CodePipeline for modeling release processes, AWS CodeBuild for building code, AWS CodeDeploy for deploying applications, and how these services can be integrated. The document demonstrates how to build a continuous delivery pipeline using these tools and discusses best practices for testing and deploying applications.
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsAmazon Web Services
This document provides an overview of continuous delivery and the AWS developer tools that enable it. It begins with background on how software delivery has changed and the need for tools to support continuous integration, delivery, and deployment. It then discusses AWS CodePipeline for modeling software release processes with configurable workflows. CodePipeline integrates with AWS services like CodeCommit, CodeBuild, CodeDeploy, Lambda and third party tools. The document demonstrates CodePipeline with an example and discusses extensions using custom actions. It emphasizes how these tools help developers and organizations deliver software faster and improve quality.
12-Factor App is a methodology for building web applications, software-as-a-service apps. Software applications that are Easy to Setup, Portable, Cloud Platform Ready, CI/CD Ready and Scalable.
Adopting a PaaS Solution (Part 2) - Red Hat DevOps & Microservices Conference...Xpand IT
The document outlines the twelve-factor methodology for building cloud-ready applications. The twelve factors are: I) Codebase, II) Dependencies, III) Config, IV) Backing services, V) Build, release, run, VI) Processes, VII) Port binding, VIII) Concurrency, IX) Disposability, X) Dev/prod parity, XI) Logs, and XII) Admin processes. The twelve-factor methodology advocates building applications that are optimized to leverage benefits of the cloud such as scale, isolation and resilience.
Giving credit where credit’s due - myFICO’s cloud transformation - SVC204 - S...Amazon Web Services
Manish Sharma discusses Fair Isaac Corporation's migration of its myFICO consumer website to AWS. Key reasons for migrating included improving reliability by solving for multiple points of failure and improving security. The migration took 7 months and involved "lift and shift" of applications along with upgrades. Lessons included using small expert teams, automating processes, and designing for security and compliance from the start. Steps outlined for effective security and compliance on AWS included access control, network restrictions, auditing S3 buckets, patching, and using a web application firewall.
CloudBees Continuous Delivery Platform, fondandosi su Jenkins CI, lo strumento open source più diffuso di Continuous Delivery, fornisce una vasta gamma di soluzioni CD. Utilizzabili in locale o sul cloud, le soluzioni proposte da CloudBees e Jenkins soddisfano le necessità specifiche aziendali di sicurezza, affidabilità e facilità d’uso.
In questo webinar Cloudbees ed Emerasoft mostrano i grandi vantaggi e le funzionalità delle soluzioni di Continuous Delivery basate sulla tecnologia CloudBees Jenkins.
Guarda il webinar on demand: http://youtu.be/C-MYwLSwMz8
MongoDB World 2018: MongoDB and Cloud Foundry – A Match Made for the CloudMongoDB
The document discusses how MongoDB and Cloud Foundry can help address challenges with scaling applications in the cloud. It provides an overview of Cloud Foundry capabilities like service brokers and auto-scaling that help manage backing services and scale applications. It also outlines how integrating MongoDB with Cloud Foundry through Pivotal simplifies provisioning and managing MongoDB clusters in a cloud native way according to twelve factor app principles.
The document discusses The Twelve Factors for building software-as-a-service applications. It lists the twelve factors which are: I) Codebase, II) Dependencies, III) Config, IV) Backing services, V) Build, release, run, VI) Processes, VII) Port binding, VIII) Concurrency, IX) Disposability, X) Dev/prod parity, XI) Logs, and XII) Admin processes. The factors provide principles for building apps that are robust, scalable, and modular.
Codecoon is the next generation hosting portal from the punkt.de GmbH. In this talk we explain how we implemented the portal and its components using TYPO3 Flow, Opscode Chef, Vagrant and Sinatra. We give a detailed insight in why we used which technologies and which developer itches we want to tackle.
Docker Containers in the Enterprise DevOps JourneyTechWell
As technology moves from being a cost-center to a revenue generator in nearly every business, technologists are expected to deliver more with fewer resources. DevOps enables this efficiency through improved collaboration between product management, development, release management, quality assurance, information security, and operations. However, Aater Suleman says that the challenge of incorporating DevOps into a business is no small task. Improving this collaboration requires cross-functional technologies that benefit all departments. By this definition, Docker may well be the most important tool in the DevOps toolbox as it allows empowering and permeable interfaces to be built between different departments throughout the DevOps loop. Aater explores both the Dev and Ops tracks of three companies and examines advantages that were achieved using Docker containers. He shows how Docker containers can work in environments from development to production and shares how this effort can be empirically tracked using five key performance indicators.
According to the document:
1. Phillip Shipley of Cisco's WebEx business unit discussed a recent project using Zend and VMware to deploy a new free trials platform for WebEx products.
2. The previous free trials platform was developed over many years without standards and was difficult to maintain and scale. The new platform was built from scratch using Zend Framework, Zend Server, and VMware virtualization.
3. Key benefits of the new platform included a 68% reduction in sign-up time, an 800% increase in trial completion rates, and dramatically faster times to market and increased capacity. The project aligned WebEx development with business needs and delivered significant improvements.
According to the document:
1. Phillip Shipley of Cisco's WebEx business unit discussed a recent project using Zend and VMware to deploy a new free trials platform for WebEx products.
2. The previous free trials platform was developed over many years without standards and was difficult to maintain and scale. The new platform was built from scratch using Zend Framework, Zend Server, and VMware virtualization.
3. Key benefits of the new platform included a 68% reduction in sign-up time, an 800% increase in trial completion rates, and dramatically faster times to market and increased capacity. The project aligned the technical solution with business needs and priorities.
Kube con china_2019_7 missing factors for your production-quality 12-factor appsShikha Srivastava
This document discusses factors for building production-ready applications on Kubernetes. It describes the original 12 factors for building scalable apps and identifies 7 additional missing factors. The missing factors are: XIII) Observable, XIV) Schedulable, XV) Upgradable, XVI) Least Privileged, XVII) Auditable, XVIII) Access Control (Identity, Network, Scope, Certificates), and XIX) Measurable. Addressing all factors throughout the development and deployment process is key to building truly production-grade applications.
HP Helion European Webinar Series ,Webinar #3 BeMyApp
The document discusses building cloud native applications using the Helion Development Platform. It provides information on connecting applications to services like databases, using buildpacks to deploy different programming languages, and Windows support in Cloud Foundry including .NET applications and SQL Server. The presentation includes code examples and polls questions to engage webinar participants.
12 Ways to Supercharge Your Connect Add-onAtlassian
It's one thing for developers to write a Connect add-on. It's a whole different thing to run it in a production mode. When you consider both development and production, a series of questions emerges:
- How do I reduce the cost and overhead of administering environments (servers)?
- How can I build in scalability from the start?
- How can I enable continuous deployment?
The 12-factor application principles are often cited as the solution. Using the principles of 12-factor applications, it is much easier to go from rapid development iterations into production. And then to keep the pace of rapid iteration, even as each goes into production. From this talk, you will learn what the 12 factors are and how they can supercharge your Atlassian Connect add-on.
Peter Van de Voorde, Community Developer, Atlassian
Similar to CI - A Refactor Story - Boston DevOps Meetup March 2015 (20)
E-commerce Development Services- Hornet DynamicsHornet Dynamics
For any business hoping to succeed in the digital age, having a strong online presence is crucial. We offer Ecommerce Development Services that are customized according to your business requirements and client preferences, enabling you to create a dynamic, safe, and user-friendly online store.
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesQuickdice ERP
Explore the seamless transition to e-invoicing with this comprehensive guide tailored for Saudi Arabian businesses. Navigate the process effortlessly with step-by-step instructions designed to streamline implementation and enhance efficiency.
Most important New features of Oracle 23c for DBAs and Developers. You can get more idea from my youtube channel video from https://youtu.be/XvL5WtaC20A
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemPeter Muessig
Learn about the latest innovations in and around OpenUI5/SAPUI5: UI5 Tooling, UI5 linter, UI5 Web Components, Web Components Integration, UI5 2.x, UI5 GenAI.
Recording:
https://www.youtube.com/live/MSdGLG2zLy8?si=INxBHTqkwHhxV5Ta&t=0
WWDC 2024 Keynote Review: For CocoaCoders AustinPatrick Weigel
Overview of WWDC 2024 Keynote Address.
Covers: Apple Intelligence, iOS18, macOS Sequoia, iPadOS, watchOS, visionOS, and Apple TV+.
Understandable dialogue on Apple TV+
On-device app controlling AI.
Access to ChatGPT with a guest appearance by Chief Data Thief Sam Altman!
App Locking! iPhone Mirroring! And a Calculator!!
Hand Rolled Applicative User ValidationCode KataPhilip Schwarz
Could you use a simple piece of Scala validation code (granted, a very simplistic one too!) that you can rewrite, now and again, to refresh your basic understanding of Applicative operators <*>, <*, *>?
The goal is not to write perfect code showcasing validation, but rather, to provide a small, rough-and ready exercise to reinforce your muscle-memory.
Despite its grandiose-sounding title, this deck consists of just three slides showing the Scala 3 code to be rewritten whenever the details of the operators begin to fade away.
The code is my rough and ready translation of a Haskell user-validation program found in a book called Finding Success (and Failure) in Haskell - Fall in love with applicative functors.
What to do when you have a perfect model for your software but you are constrained by an imperfect business model?
This talk explores the challenges of bringing modelling rigour to the business and strategy levels, and talking to your non-technical counterparts in the process.
Artificia Intellicence and XPath Extension FunctionsOctavian Nadolu
The purpose of this presentation is to provide an overview of how you can use AI from XSLT, XQuery, Schematron, or XML Refactoring operations, the potential benefits of using AI, and some of the challenges we face.
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsPeter Muessig
The UI5 tooling is the development and build tooling of UI5. It is built in a modular and extensible way so that it can be easily extended by your needs. This session will showcase various tooling extensions which can boost your development experience by far so that you can really work offline, transpile your code in your project to use even newer versions of EcmaScript (than 2022 which is supported right now by the UI5 tooling), consume any npm package of your choice in your project, using different kind of proxies, and even stitching UI5 projects during development together to mimic your target environment.
Consistent toolbox talks are critical for maintaining workplace safety, as they provide regular opportunities to address specific hazards and reinforce safe practices.
These brief, focused sessions ensure that safety is a continual conversation rather than a one-time event, which helps keep safety protocols fresh in employees' minds. Studies have shown that shorter, more frequent training sessions are more effective for retention and behavior change compared to longer, infrequent sessions.
Engaging workers regularly, toolbox talks promote a culture of safety, empower employees to voice concerns, and ultimately reduce the likelihood of accidents and injuries on site.
The traditional method of conducting safety talks with paper documents and lengthy meetings is not only time-consuming but also less effective. Manual tracking of attendance and compliance is prone to errors and inconsistencies, leading to gaps in safety communication and potential non-compliance with OSHA regulations. Switching to a digital solution like Safelyio offers significant advantages.
Safelyio automates the delivery and documentation of safety talks, ensuring consistency and accessibility. The microlearning approach breaks down complex safety protocols into manageable, bite-sized pieces, making it easier for employees to absorb and retain information.
This method minimizes disruptions to work schedules, eliminates the hassle of paperwork, and ensures that all safety communications are tracked and recorded accurately. Ultimately, using a digital platform like Safelyio enhances engagement, compliance, and overall safety performance on site. https://safelyio.com/