Containers are the next evolutionary step in how applications are managed and consumed. Allowing application teams to control and optimize their application deployment process. Along with the advantages provided to application teams, it's also a dynamic shift for data center design. Allowing for better resource utilization, and management resulting in both cost savings and faster IT. This session will explain how Cisco IT has delivered this new paradigm in Cloud Technology by using Cisco ACI, Cisco UCS and open-source solutions like Kubernetes.
Docker Enterprise Networking and Cisco Contiv - Cisco Live 2017 BRKSDN-2256Mark Church
An overview of Docker networking and how the network is impacted by the deployment of containers. This dives into the specifics of how container networking works and also how the Cisco Contiv networking plugin integrates Cisco networking policies with Docker Enterprise.
What network architects need to know about the evolving software lifecycle (S...Marco Coulter
As our applications transform to cloud-native-first architectures, policy replaces configuration files to define infrastructure at all layers; networking, compute, storage, and of course application. Developers now have almost unlimited choices in how to solve their architecture, agility and scale challenges using the software defined infrastructure that powers our cloud-native world. Prescriptive topologies for networks are too rigid to support the needed agile iterations of today’s application. The software development lifecycle (SDLC) evolved to support multiple iterations for innovation and has some lessons for all of us. This session describes SDLC evolutions to help network and infrastructure experts as they strive to connect business value to applications to infrastructure while constructing the networks of the future.
Microservices and containers networking: Contiv, an industry leading open sou...Codemotion
This document summarizes a presentation about Contiv, an open source container networking solution. It introduces Contiv as a way to define and enforce network policies across infrastructure to integrate application intent with operational intent. Key features of Contiv highlighted include providing container networking for schedulers like Kubernetes and Docker, distributed policy enforcement, integration with physical infrastructure, and supporting rich network policies, tenants, and microservices. The presentation concludes with a demo of Contiv's network isolation and policy capabilities.
Beyond the Operating System: Red Hat's Open Strategy for the Modern EnterpriseJames Falkner
Red Hat is a leading provider of open source solutions and has been involved in open source since 1993. It offers a wide range of products and services across cloud, middleware, applications, operating systems, and more. Red Hat believes that open source allows for greater flexibility, faster innovation, better quality and security, and more cost-effective solutions for customers. The company is a major contributor to many open source projects and helps customers adopt new technologies like cloud, containers and microservices.
Cics ts v5.4 continuous delivery and v5.5 what's newMark Cocker
CICS Transaction Server is an unparalleled mixed language application server – grand words but what is the underlying capability that is delivering this value? Come to this session and learn how you can realize performance improvements, utilize the WebSphere Liberty Server, extend CICS applications to mobile devices, run more in less regions and so much more. With regular quarterly continuous delivery drops, you will be disappointed if you miss this overview of what's new in CICS.
Presentation + demo at Triangle Kubernetes and Openshift Meetup June 2017. Architecture overview and live demo of Contiv open container networking project working with Red Hat Openshift Container platform.
Cloud-Native Patterns and the Benefits of MySQL as a Platform Managed ServiceVMware Tanzu
You can’t have cloud-native applications without a modern approach to databases and backing services. Data professionals are looking for ways to transform how databases are provisioned and managed.
In this webinar, we’ll cover practical strategies you can employ to deliver improved business agility at the data layer. We’ll discuss the impact that microservices are having in the enterprise, and what this means for MySQL and other popular databases. Join us and learn the answers to these common questions:
● How can you meet the operational challenge of scaling the number of MySQL database instances and managing the fleet?
● Adding to this scale challenge, how can your MySQL instances maintain availability in a world where the underlying IT infrastructure is ephemeral?
● How can you secure data in motion?
● How can you enable self-service while maintaining control and governance?
We’ll cover these topics and share how enterprises like yours are delivering greater outcomes with our Pivotal Platform managed MySQL.
Now you can scale without fear of failure.
Presenters:
Judy Wang, Product Management
Jagdish Mirani, Product Marketing
OpenStack-Based NFV Cloud at Swisscom: challenges and best practicesAvi Networks
Considering moving your data and applications to the cloud? Tune in to learn why Swisscom can deploy services within minutes instead of weeks, using OpenStack and Avi Networks. Learn how Swisscom overcame challenges such as ensuring HA with no single point of failure, achieving zero packet loss in the NFV cloud with multicast traffic and low jitter, and more.
View this webinar on-demand to:
- Hear about Swisscom’s IT journey with OpenStack and the Avi Vantage Platform
- Understand key features that Avi Vantage delivered for Swisscom, such as load balancing, elastic scale, an iWAF and security, analytics with a distributed architecture
- See a live demo of the Avi Vantage Platform in action
Watch the full webinar: https://info.avinetworks.com/webinars-swisscom-and-avi-networks
Docker Enterprise Networking and Cisco Contiv - Cisco Live 2017 BRKSDN-2256Mark Church
An overview of Docker networking and how the network is impacted by the deployment of containers. This dives into the specifics of how container networking works and also how the Cisco Contiv networking plugin integrates Cisco networking policies with Docker Enterprise.
What network architects need to know about the evolving software lifecycle (S...Marco Coulter
As our applications transform to cloud-native-first architectures, policy replaces configuration files to define infrastructure at all layers; networking, compute, storage, and of course application. Developers now have almost unlimited choices in how to solve their architecture, agility and scale challenges using the software defined infrastructure that powers our cloud-native world. Prescriptive topologies for networks are too rigid to support the needed agile iterations of today’s application. The software development lifecycle (SDLC) evolved to support multiple iterations for innovation and has some lessons for all of us. This session describes SDLC evolutions to help network and infrastructure experts as they strive to connect business value to applications to infrastructure while constructing the networks of the future.
Microservices and containers networking: Contiv, an industry leading open sou...Codemotion
This document summarizes a presentation about Contiv, an open source container networking solution. It introduces Contiv as a way to define and enforce network policies across infrastructure to integrate application intent with operational intent. Key features of Contiv highlighted include providing container networking for schedulers like Kubernetes and Docker, distributed policy enforcement, integration with physical infrastructure, and supporting rich network policies, tenants, and microservices. The presentation concludes with a demo of Contiv's network isolation and policy capabilities.
Beyond the Operating System: Red Hat's Open Strategy for the Modern EnterpriseJames Falkner
Red Hat is a leading provider of open source solutions and has been involved in open source since 1993. It offers a wide range of products and services across cloud, middleware, applications, operating systems, and more. Red Hat believes that open source allows for greater flexibility, faster innovation, better quality and security, and more cost-effective solutions for customers. The company is a major contributor to many open source projects and helps customers adopt new technologies like cloud, containers and microservices.
Cics ts v5.4 continuous delivery and v5.5 what's newMark Cocker
CICS Transaction Server is an unparalleled mixed language application server – grand words but what is the underlying capability that is delivering this value? Come to this session and learn how you can realize performance improvements, utilize the WebSphere Liberty Server, extend CICS applications to mobile devices, run more in less regions and so much more. With regular quarterly continuous delivery drops, you will be disappointed if you miss this overview of what's new in CICS.
Presentation + demo at Triangle Kubernetes and Openshift Meetup June 2017. Architecture overview and live demo of Contiv open container networking project working with Red Hat Openshift Container platform.
Cloud-Native Patterns and the Benefits of MySQL as a Platform Managed ServiceVMware Tanzu
You can’t have cloud-native applications without a modern approach to databases and backing services. Data professionals are looking for ways to transform how databases are provisioned and managed.
In this webinar, we’ll cover practical strategies you can employ to deliver improved business agility at the data layer. We’ll discuss the impact that microservices are having in the enterprise, and what this means for MySQL and other popular databases. Join us and learn the answers to these common questions:
● How can you meet the operational challenge of scaling the number of MySQL database instances and managing the fleet?
● Adding to this scale challenge, how can your MySQL instances maintain availability in a world where the underlying IT infrastructure is ephemeral?
● How can you secure data in motion?
● How can you enable self-service while maintaining control and governance?
We’ll cover these topics and share how enterprises like yours are delivering greater outcomes with our Pivotal Platform managed MySQL.
Now you can scale without fear of failure.
Presenters:
Judy Wang, Product Management
Jagdish Mirani, Product Marketing
OpenStack-Based NFV Cloud at Swisscom: challenges and best practicesAvi Networks
Considering moving your data and applications to the cloud? Tune in to learn why Swisscom can deploy services within minutes instead of weeks, using OpenStack and Avi Networks. Learn how Swisscom overcame challenges such as ensuring HA with no single point of failure, achieving zero packet loss in the NFV cloud with multicast traffic and low jitter, and more.
View this webinar on-demand to:
- Hear about Swisscom’s IT journey with OpenStack and the Avi Vantage Platform
- Understand key features that Avi Vantage delivered for Swisscom, such as load balancing, elastic scale, an iWAF and security, analytics with a distributed architecture
- See a live demo of the Avi Vantage Platform in action
Watch the full webinar: https://info.avinetworks.com/webinars-swisscom-and-avi-networks
STANISLAV KOLENKIN, BAQ "K8S: network plugins - issues and performance compar...Dakiry
Knative is an open source framework that allows developers to build, deploy and manage serverless applications on Kubernetes. It inverts the concept of "native" by making serverless applications portable across any Kubernetes environment rather than locked to a specific cloud provider. Key features of Knative include serving, eventing and build capabilities that allow containerizing functions and connecting them through event streams. By using Kubernetes and Istio, Knative provides a platform for portable, scalable and reliable serverless development.
Ken Owens, the CTO of Cisco Intercloud Services, presented on Cisco's migration from MapReduce jobs to Spark jobs for processing customer interaction data. The document discussed Cisco's need to embrace both traditional and hyperscale application deployment across data centers, clouds, and edges. It also covered Cisco's analysis platform requirements, AWS and Cisco Intercloud sizing comparisons, and performance results from testing the migration of MapReduce jobs to Spark on the Cisco Intercloud.
Zero to 1000+ Applications - Large Scale CD Adoption at Cisco with Spinnaker ...DevOps.com
As part of its Cloud-native transformation, Cisco needed to modernize its software delivery process. Scalability, multi-cloud deployment to its OpenShift environment and public clouds, and the ability to support Cisco’s extensive policy, compliance, and security requirements made open source Spinnaker a logical choice for a modern continuous delivery platform.
As one of the world’s top technology providers with one of the largest and most diverse software development organizations, Cisco had to overcome some unique challenges to be able to onboard 10,000+ developers, 1000+ monolithic and non-cloud native applications, and achieve the high availability and reliability needed to support mission-critical production applications.
Join us for this new webinar as Balaji Siva, VP of Products at OpsMx engages Anil Anaberumutt, IT architect at Cisco, and Red Hat Sr. Solutions Architect, Vikas Grover, in a discussion about Cisco’s CD challenges and the lessons learned, best practices implemented, and key results achieved on their CD transformation journey from zero to over 1000 applications.
Red Hat OpenShift - a foundation for successful digital transformationEric D. Schabell
The usage of containers is exploding and according to a recent report Red Hat is the vendor best placed to capitalize on this. To us it is pretty simple - Containers are Linux and Red Hat is the leader on Linux. But we move beyond that, addressing the wider use-case - building a complete innovation platform, harnessing the power of the hottest open source projects on the planet, integrated into a complete end-end experience from development to production across any footprint - on-prem to cloud.
Red Hat Forum Finland, Eric D. Schabell, Global Technology Evangelist, Red Hat
This document discusses SDN innovations in WAN networks. It debates the meaning and importance of "white-box" hardware that is often associated with SDN cost savings. While SDN in data centers focuses on "white-boxes", SDN in WAN is mainly about enhancing service automation and traffic engineering optimization. Some exciting SDN technologies being developed for the programmable WAN include open source controllers, new protocols, and source packet routing. SDN innovations combined with network hardware advances may optimize WAN service delivery, automation, operations, and multi-layer transport.
Mikhail Filimonchik from Ericsson gave a presentation on NFV transformation at the 2016 OpenStack Birthday event in Moscow. The presentation discussed Ericsson's vision for NFV and cloud technologies, potential deployment scenarios, and Ericsson's capabilities and partnerships to support customers' network evolution. Ericsson has contracts with 30 telecom customers worldwide for NFV implementations including virtual EPC, IMS, and PCRF networks.
The future of you application development platforms, the ability to create applications that are cloud native with elastic services and network aware application policies, and microservices is strategic to your company. When the decision to build you next product is made, Openstack and Microservices became central to your application architectures and becomes strategic to your vision.
In this webinar we will be discussing how Orange Business Services, a global IT and communications services provider, and its large scale distributed cloud and edge network can achieve sovereignty with the hybrid EKS and Weave GitOps shared services platform.
Topics we are covering:
How EKSD (EKS on premise) and EKS (AWS managed Kubernetes) is used to establish common workflows that minimize operational overhead
How to lower operational costs with the use of ephemeral cloud environments for development and testing
How to achieve operational Sovereignty by enabling the operation of the shared services platform in on premise, air gapped and non-tethered configurations
Declarative Programming and a form of SDN Miya Kohno
The document discusses declarative programming as it relates to network programmability. It provides examples of declarative versus imperative code and explains key concepts of declarative programming like lack of side effects, referential transparency, and idempotence. It also discusses how declarative programming could be beneficial for networking given its robustness in complex distributed environments but may lack universal computational power. OpenDaylight and ETSI NFV architectures are presented as examples combining declarative and imperative approaches.
This document discusses how Citrix Application Delivery Management (ADM) can be used to manage Citrix ADC instances at scale in cloud-native environments. Key points include:
- Citrix ADM allows controlling and gaining insights from one to thousands of Citrix ADC instances (VPX, MPX, CPX), across container platforms like Mesos/Marathon and Kubernetes.
- Metadata from Citrix ADCs provides valuable information to Citrix ADM for an "App Health Score", including user experience metrics, security threats, and device health.
- Citrix ADM provides capabilities for app-centric lifecycles, configuration at scale, visibility, and security across Citrix ADC instances.
The rise of microservices details how the software infrastructure of the future are changing. As corporations strive for competitive advantage, they must redesign their brownfield legacy applications and move them to the cloud. Agile Cloud applications follow microservices and cloudnative development patterns. Microservices architectures are enabled by Docker and Kubernetes. Both software are hosted by CNCF.
microservices architectures are being enhanced with a service mesh layer which simplifies the communication and management of cloudnative applications.
The document discusses building IT teams for the future through automation, programmability, DevNet certifications, and community. It outlines challenges faced by modern IT infrastructure including edge computing, IoT, and multi-cloud. New job roles focused on automation, DevOps, and security are needed. Cisco's certification suite including DevNet certifications help develop skills for roles like Network Automation Developer and DevSecOps Engineer. Example automation projects and use cases are provided to demonstrate how teams can start automating network operations. Community engagement through communities of practice and study groups is also recommended for continuous learning.
Powerup & GCP | Workshop on Google Kubernetes EnginePowerup
Continuing our #powerupgrade series, expert practitioners at Powerup and GCP (Google Cloud Platform) organized a session on GKE - showcasing operational and cost efficiencies by completely eliminating the need to install, manage and operate one's own Kubernetes clusters. Do not miss being a part of this interactive learning and best-practice showcase. We also had domain experts and business leaders at the event who have successfully implemented GKE.
Next Generation Vulnerability Assessment Using Datadog and SnykDevOps.com
Vulnerability assessment for teams can often be overwhelming. The dependency graph could be thousands of packages depending on the application. Triaging vulnerability data and prioritizing actions has historically been a very manual process, until now. With Datadog and Snyk, learn how to trace security and performance issues by leveraging continuous profiling capabilities for actionable insight that help developers remediate problems.
Join us on Thursday, January 21 for a unique opportunity to learn more about continuous profiling, vulnerability management, and the benefit to customers from using both of these products. In this webinar, you will:
Bust some myths around continuous profiling and learn how Datadog differentiates itself
See decorated traces in action for sample Java applications and understand how Snyk + Datadog reduce time to triage supply chain vulnerabilities
Learn roadmap information for upcoming public announcements from both partners
Deliver your App Anywhere … Publicly or PrivatelyDevOps.com
Developers are increasingly adopting a microservices approach for their apps in order to gain rapid iteration capabilities required for delivering new services faster. However, delivering the App still requires multiple steps such as allocation of virtual IPs, provisioning the front load balancer, configuring firewall rules, configuring a public domain, and DDOS. At present, each of these steps requires coordination across multiple teams with multiple iterations per team. The time efficiencies gained by adopting microservices and cloud-native technologies is negated due to the time taken to deliver the App.
In this session, Pranav Dharwadkar, VP of products at Volterra, and Jakub Pavlik, director of engineering, will help you understand these challenges and introduce a distributed proxy architecture that can alleviate the challenges across different cloud environments. This webinar will include a live demo using a distributed proxy architecture to advertise an App publicly and privately.
In this webinar, you will learn:
The steps required to deliver an App using the current approaches
How a distributed proxy architecture can be used to deliver the app publicly and privately
The operational benefits of a distributed proxy architecture for delivering new services
Meet the Fourteen Most Popular Speakers Coming to Insight 2014NetApp Insight
This year NetApp Insight is bigger and better than ever. We are bringing over 200 speakers to Las Vegas and Berlin breakout sessions alone.
While all of our speakers are amazing, we want to highlight fourteen of the most popular to watch out for.
Enabling Microservices Frameworks to Solve Business ProblemsKen Owens
Opening keynote at Mesoscon 2015 with announcements on creating an ecosystem for developing solutions to business problems leveraging Mesos, Mantl.io, Mesosphere Infinity, ZoomData, and Project Calico to create Fog nodes for IoE use cases.
Cisco Live 2017: Container networking deep dive with Docker Enterprise Editio...Sanjeev Rampal
Container networking with Docker Enterprise Edition (EE) and Cisco Contiv allows for:
1) Defining network policies and security controls across virtual and container workloads using Contiv's open source software.
2) Deploying containerized applications on Docker EE across a swarm of nodes using network and security policies defined in Contiv.
3) Integrating Contiv with underlying data center infrastructure like Cisco Application Centric Infrastructure (ACI) to leverage physical network services and policy enforcement.
The document discusses hybrid collaboration solutions from Cisco. It describes how traditional on-premises solutions had high costs and infrastructure requirements, while cloud solutions improved flexibility but required specialized skills. Hybrid solutions allow choosing the optimal deployment option for meetings, calling, and media based on needs for cost, security, quality, scale and innovation. The document outlines Cisco's hybrid offerings that integrate on-premises and cloud services for directory, calendar, calling, and media through common connectors and architectures.
STANISLAV KOLENKIN, BAQ "K8S: network plugins - issues and performance compar...Dakiry
Knative is an open source framework that allows developers to build, deploy and manage serverless applications on Kubernetes. It inverts the concept of "native" by making serverless applications portable across any Kubernetes environment rather than locked to a specific cloud provider. Key features of Knative include serving, eventing and build capabilities that allow containerizing functions and connecting them through event streams. By using Kubernetes and Istio, Knative provides a platform for portable, scalable and reliable serverless development.
Ken Owens, the CTO of Cisco Intercloud Services, presented on Cisco's migration from MapReduce jobs to Spark jobs for processing customer interaction data. The document discussed Cisco's need to embrace both traditional and hyperscale application deployment across data centers, clouds, and edges. It also covered Cisco's analysis platform requirements, AWS and Cisco Intercloud sizing comparisons, and performance results from testing the migration of MapReduce jobs to Spark on the Cisco Intercloud.
Zero to 1000+ Applications - Large Scale CD Adoption at Cisco with Spinnaker ...DevOps.com
As part of its Cloud-native transformation, Cisco needed to modernize its software delivery process. Scalability, multi-cloud deployment to its OpenShift environment and public clouds, and the ability to support Cisco’s extensive policy, compliance, and security requirements made open source Spinnaker a logical choice for a modern continuous delivery platform.
As one of the world’s top technology providers with one of the largest and most diverse software development organizations, Cisco had to overcome some unique challenges to be able to onboard 10,000+ developers, 1000+ monolithic and non-cloud native applications, and achieve the high availability and reliability needed to support mission-critical production applications.
Join us for this new webinar as Balaji Siva, VP of Products at OpsMx engages Anil Anaberumutt, IT architect at Cisco, and Red Hat Sr. Solutions Architect, Vikas Grover, in a discussion about Cisco’s CD challenges and the lessons learned, best practices implemented, and key results achieved on their CD transformation journey from zero to over 1000 applications.
Red Hat OpenShift - a foundation for successful digital transformationEric D. Schabell
The usage of containers is exploding and according to a recent report Red Hat is the vendor best placed to capitalize on this. To us it is pretty simple - Containers are Linux and Red Hat is the leader on Linux. But we move beyond that, addressing the wider use-case - building a complete innovation platform, harnessing the power of the hottest open source projects on the planet, integrated into a complete end-end experience from development to production across any footprint - on-prem to cloud.
Red Hat Forum Finland, Eric D. Schabell, Global Technology Evangelist, Red Hat
This document discusses SDN innovations in WAN networks. It debates the meaning and importance of "white-box" hardware that is often associated with SDN cost savings. While SDN in data centers focuses on "white-boxes", SDN in WAN is mainly about enhancing service automation and traffic engineering optimization. Some exciting SDN technologies being developed for the programmable WAN include open source controllers, new protocols, and source packet routing. SDN innovations combined with network hardware advances may optimize WAN service delivery, automation, operations, and multi-layer transport.
Mikhail Filimonchik from Ericsson gave a presentation on NFV transformation at the 2016 OpenStack Birthday event in Moscow. The presentation discussed Ericsson's vision for NFV and cloud technologies, potential deployment scenarios, and Ericsson's capabilities and partnerships to support customers' network evolution. Ericsson has contracts with 30 telecom customers worldwide for NFV implementations including virtual EPC, IMS, and PCRF networks.
The future of you application development platforms, the ability to create applications that are cloud native with elastic services and network aware application policies, and microservices is strategic to your company. When the decision to build you next product is made, Openstack and Microservices became central to your application architectures and becomes strategic to your vision.
In this webinar we will be discussing how Orange Business Services, a global IT and communications services provider, and its large scale distributed cloud and edge network can achieve sovereignty with the hybrid EKS and Weave GitOps shared services platform.
Topics we are covering:
How EKSD (EKS on premise) and EKS (AWS managed Kubernetes) is used to establish common workflows that minimize operational overhead
How to lower operational costs with the use of ephemeral cloud environments for development and testing
How to achieve operational Sovereignty by enabling the operation of the shared services platform in on premise, air gapped and non-tethered configurations
Declarative Programming and a form of SDN Miya Kohno
The document discusses declarative programming as it relates to network programmability. It provides examples of declarative versus imperative code and explains key concepts of declarative programming like lack of side effects, referential transparency, and idempotence. It also discusses how declarative programming could be beneficial for networking given its robustness in complex distributed environments but may lack universal computational power. OpenDaylight and ETSI NFV architectures are presented as examples combining declarative and imperative approaches.
This document discusses how Citrix Application Delivery Management (ADM) can be used to manage Citrix ADC instances at scale in cloud-native environments. Key points include:
- Citrix ADM allows controlling and gaining insights from one to thousands of Citrix ADC instances (VPX, MPX, CPX), across container platforms like Mesos/Marathon and Kubernetes.
- Metadata from Citrix ADCs provides valuable information to Citrix ADM for an "App Health Score", including user experience metrics, security threats, and device health.
- Citrix ADM provides capabilities for app-centric lifecycles, configuration at scale, visibility, and security across Citrix ADC instances.
The rise of microservices details how the software infrastructure of the future are changing. As corporations strive for competitive advantage, they must redesign their brownfield legacy applications and move them to the cloud. Agile Cloud applications follow microservices and cloudnative development patterns. Microservices architectures are enabled by Docker and Kubernetes. Both software are hosted by CNCF.
microservices architectures are being enhanced with a service mesh layer which simplifies the communication and management of cloudnative applications.
The document discusses building IT teams for the future through automation, programmability, DevNet certifications, and community. It outlines challenges faced by modern IT infrastructure including edge computing, IoT, and multi-cloud. New job roles focused on automation, DevOps, and security are needed. Cisco's certification suite including DevNet certifications help develop skills for roles like Network Automation Developer and DevSecOps Engineer. Example automation projects and use cases are provided to demonstrate how teams can start automating network operations. Community engagement through communities of practice and study groups is also recommended for continuous learning.
Powerup & GCP | Workshop on Google Kubernetes EnginePowerup
Continuing our #powerupgrade series, expert practitioners at Powerup and GCP (Google Cloud Platform) organized a session on GKE - showcasing operational and cost efficiencies by completely eliminating the need to install, manage and operate one's own Kubernetes clusters. Do not miss being a part of this interactive learning and best-practice showcase. We also had domain experts and business leaders at the event who have successfully implemented GKE.
Next Generation Vulnerability Assessment Using Datadog and SnykDevOps.com
Vulnerability assessment for teams can often be overwhelming. The dependency graph could be thousands of packages depending on the application. Triaging vulnerability data and prioritizing actions has historically been a very manual process, until now. With Datadog and Snyk, learn how to trace security and performance issues by leveraging continuous profiling capabilities for actionable insight that help developers remediate problems.
Join us on Thursday, January 21 for a unique opportunity to learn more about continuous profiling, vulnerability management, and the benefit to customers from using both of these products. In this webinar, you will:
Bust some myths around continuous profiling and learn how Datadog differentiates itself
See decorated traces in action for sample Java applications and understand how Snyk + Datadog reduce time to triage supply chain vulnerabilities
Learn roadmap information for upcoming public announcements from both partners
Deliver your App Anywhere … Publicly or PrivatelyDevOps.com
Developers are increasingly adopting a microservices approach for their apps in order to gain rapid iteration capabilities required for delivering new services faster. However, delivering the App still requires multiple steps such as allocation of virtual IPs, provisioning the front load balancer, configuring firewall rules, configuring a public domain, and DDOS. At present, each of these steps requires coordination across multiple teams with multiple iterations per team. The time efficiencies gained by adopting microservices and cloud-native technologies is negated due to the time taken to deliver the App.
In this session, Pranav Dharwadkar, VP of products at Volterra, and Jakub Pavlik, director of engineering, will help you understand these challenges and introduce a distributed proxy architecture that can alleviate the challenges across different cloud environments. This webinar will include a live demo using a distributed proxy architecture to advertise an App publicly and privately.
In this webinar, you will learn:
The steps required to deliver an App using the current approaches
How a distributed proxy architecture can be used to deliver the app publicly and privately
The operational benefits of a distributed proxy architecture for delivering new services
Meet the Fourteen Most Popular Speakers Coming to Insight 2014NetApp Insight
This year NetApp Insight is bigger and better than ever. We are bringing over 200 speakers to Las Vegas and Berlin breakout sessions alone.
While all of our speakers are amazing, we want to highlight fourteen of the most popular to watch out for.
Enabling Microservices Frameworks to Solve Business ProblemsKen Owens
Opening keynote at Mesoscon 2015 with announcements on creating an ecosystem for developing solutions to business problems leveraging Mesos, Mantl.io, Mesosphere Infinity, ZoomData, and Project Calico to create Fog nodes for IoE use cases.
Cisco Live 2017: Container networking deep dive with Docker Enterprise Editio...Sanjeev Rampal
Container networking with Docker Enterprise Edition (EE) and Cisco Contiv allows for:
1) Defining network policies and security controls across virtual and container workloads using Contiv's open source software.
2) Deploying containerized applications on Docker EE across a swarm of nodes using network and security policies defined in Contiv.
3) Integrating Contiv with underlying data center infrastructure like Cisco Application Centric Infrastructure (ACI) to leverage physical network services and policy enforcement.
The document discusses hybrid collaboration solutions from Cisco. It describes how traditional on-premises solutions had high costs and infrastructure requirements, while cloud solutions improved flexibility but required specialized skills. Hybrid solutions allow choosing the optimal deployment option for meetings, calling, and media based on needs for cost, security, quality, scale and innovation. The document outlines Cisco's hybrid offerings that integrate on-premises and cloud services for directory, calendar, calling, and media through common connectors and architectures.
The document provides an overview of Cisco Spark hybrid services and architectural designs. It discusses the benefits of hybrid cloud models for collaboration including flexibility, reduced physical footprint, and improved user experiences. It describes key hybrid services like directory synchronization, calendar integration with on-premises calendars, and hybrid calling and media capabilities. The document also covers hybrid security and encryption models to ensure content is encrypted both in transit and at rest across cloud and on-premises environments.
The document discusses Cisco Spark hybrid services, which extend the value of Cisco Spark collaboration services by connecting on-premises and cloud-based services. It describes hybrid directory, calendar, media, and call services that integrate user data, calendars, media, and calling between on-premises and cloud environments. The hybrid services are designed to provide flexibility in deploying Cisco Spark both in cloud-only or hybrid cloud/on-premises models.
The document discusses Cisco Spark hybrid services, which allow organizations to integrate Cisco Spark collaboration tools with their existing on-premises infrastructure. It describes the architectural designs for hybrid calendar, calling, media, and security features. Key benefits of the hybrid model include flexibility, reduced costs from using cloud services, and ensuring security and performance by keeping some workloads on-premises. The document provides diagrams of how the hybrid architectures for calendar, calling, media, and security would connect cloud and on-premises systems to deliver Cisco Spark features.
The document discusses Cisco Spark hybrid services, which allow organizations to integrate Cisco Spark collaboration tools with their existing on-premises infrastructure. It describes the architectural designs for hybrid calendar, calling, media, and security features. Key benefits of the hybrid model include flexibility, reduced costs, improved security and media quality, and the ability to scale globally while meeting an organization's individual deployment needs. The document provides diagrams and explanations of how the various hybrid services connect cloud and on-premises systems to deliver unified collaboration experiences.
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUICisco Canada
This document provides an overview and agenda for a session on Cisco's Digital Network Architecture. The session will cover industry trends driving digital transformation, Cisco DNA and the importance of flexible hardware, the evolution of application specific integrated circuits (ASICs), DNA/Software-Defined Access, DNA Center, Encrypted Traffic Analytics, and the Catalyst 9000 series of switches. Attendees will learn how Cisco is innovating in silicon and software development and how these innovations are powering new platforms and solutions from the "gates to the GUI." The session aims to provide deeper insight into Cisco's latest switching silicon and how ASICs are designed and built to deliver advanced network capabilities.
Cisco Digital Network Architecture Deeper Dive From The Gates To The GuiCisco Canada
This document provides an overview of a Cisco session on the Cisco Digital Network Architecture. The session will cover Cisco's evolution from silicon gates to graphical user interfaces, including topics like Cisco DNA, Software-Defined Access, DNA Center, Encrypted Traffic Analytics, and the Catalyst 9000 family of switches. The session aims to provide insight into how Cisco is driving innovation through advances in programmable and flexible application specific integrated circuits (ASICs) and how this foundational technology enables new solutions.
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...NetworkCollaborators
The document discusses Cisco's HyperFlex hyperconverged infrastructure solution. It highlights how HyperFlex can support any application on any cloud at scale. It provides an overview of key HyperFlex features like its integration with Cisco UCS, data platform, scale-out architecture, and operational simplicity. Examples of benefits like accelerated deployment, increased utilization, and lower management costs are also summarized.
Cisco Spark and Tropo and the Programmable WebCisco DevNet
This document discusses integration platforms as a service (iPaaS) and provides examples of how Cisco Spark, Tropo, and Webex can be integrated using iPaaS solutions. It outlines key iPaaS concepts, popular iPaaS solutions like IFTTT, Zapier and Built.io, and use cases for both consumers and enterprises. It also describes an anatomy of a potential iPaaS solution using Built.io and highlights opportunities to learn more through Cisco DevNet labs and sessions.
Migrating from VMs to Kubernetes using HashiCorp Consul Service on AzureMitchell Pronschinske
DevOps tools became very popular with the adoption of public cloud, but Operational teams now realize that their benefits can be extended to enterprise data centers. In reality, cloud native tools can help bridge public clouds and private data centers by enabling a common framework to manage applications and their underlying infrastructure components.
In this session you’ll learn about the latest Cisco ACI integrations with Hashicorp Terraform and Consul to deliver a powerful solution for end-to-end on-prem and cloud infrastructure deployments.
Security and Virtualization in the Data CenterCisco Canada
The evolving complexity of the data center is placing increased demand on the network and security teams to come up with inventive methods for enforcing security policies in these ever-changing environments. The goal of this session is to provide participants with an understanding of features and design recommendations for integrating security into the data center environment. This session will focus on recommendations for securing next-generation data center architectures. Areas of focus include security services integration, leveraging device virtualization, and considerations and recommendations for server virtualization. The target audience are security and data center administrators.
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
Many organizations anticipate significant growth in WAN bandwidth and Public Cloud usage. Leveraging the Internet to provide extra WAN bandwidth and to offload Public Cloud traffic is compelling, however network reliability, application performance and security are the primary roadblocks. Cisco IWAN transport solution is the most full featured architecture to support the Software Defined Wide Area Network (SD-WAN) requirements that are emerging in standards bodies like the Open Networking User Group (ONUG) to address these issues. Many enterprises are looking for the benefits these technologies deliver, but without the costs associated with owning and operating those technologies. Here is where VMS for IWAN meets market need. Cisco VMS is a full featured management platform for both virtual and physical devices. This session will cover a full description of the VMS platform and how it can be used to deliver exceptional customer experience when supporting a managed offering of IWAN. The roles of Customer and Resource Facing Services will be covered, along with integration between the IWAN service and SP operations. This session will also cover the topic of how Virtual Network Functions (VNFs) can be placed optimally in the network from the CPE to SP datacenter, along with a demo of the end user and operator experience.
The document discusses demystifying security in Application Centric Infrastructure (ACI). It provides an overview of ACI and how it helps tackle data center security challenges by integrating security into applications, accelerating security deployment, and automating security insertion. ACI leverages Cisco security technologies to better protect the data center by providing leading security capabilities and integrating smoothly with the ACI architecture.
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
The document discusses Cisco's multi-cloud strategy and products. It introduces Cisco Container Platform (CCP) as a solution that automates deploying, running, and operating containers on physical or virtual machines. CCP is based on Kubernetes and provides integrated networking, management, security and analytics capabilities while allowing containers to run in hybrid cloud environments across VM, bare metal, Cisco HyperFlex, ACI and public clouds.
The document discusses Cisco Software Defined Access (SDA) and how it provides an automated and assured approach to network design, provisioning, and management compared to traditional network approaches. Some key benefits of SDA highlighted include simplifying network segmentation, automating policy provisioning across the network, providing real-time visibility and analytics into network and client health and performance, and supporting a wider range of Cisco platforms.
Enabling Fast IT using Containers, Microservices and DAVROS models: an overviewCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. As IT strives to become Fast IT, application architectures are undergoing fundamental disruption to enable faster development to deployment lifecycles. As part of this trend, the number of applications being created using microservices architectures and container technologies like Docker is exploding. This new "cloud native" framework makes deployments on-prem or public cloud seamless. In this session, we will look at these evolving trends and how several open source technologies have converged to provide enterprises the ability to innovate at unprecedented levels.
Cisco HyperFlex is a hyperconverged infrastructure solution that combines compute, storage, networking and virtualization into an integrated system. It uses a distributed file system architecture that stripes data across all nodes simultaneously for high performance. HyperFlex offers flexible node configurations and continuous data optimization through inline deduplication and compression. It provides local and cloud-based management for easy deployment and monitoring of hyperconverged infrastructure from edge to core.
Similar to Cisco Live: Containers on Enterprise Compute and Networks (20)
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Welcome!
As you already know, containers are disrupting the way IT and data centers host and deliverer applications and services.
We have seen with past innovative technologies, it can be difficult to deploy new solutions like containers on compute and networking in a manageable way at enterprise scale.
Yet we as IT are placed In a position where if we don’t adopt containers, we will inevitably lose resources, money, and agility in our organizations.
We at Cisco IT using a combination of Cisco and Open Source products and technologies are delivering a container based cloud, that we feel can serve as a template in your own journey.
During our conversation this evening, my hope is that you will understand the core technologies and see in our demo the power of a container based cloud.
At the end of this talk, you should be able to leave this building with the foundation to deploy your own container cloud solution, while learning from our successes, and our hardships in our journey to our Container Cloud Solution.
My name is Mike Duarte
I’ve been working in IT for 15 Years
Been at Cisco since 2011
I’m the Lead Design Engineer for Containers
What do you want out of this Session?
I really want you to ask Questions!
I really would like this to be more of a dialog than just a monologue!
Going to talk first about Our Global Cloud Strategy
Second, will be looking at how containers are redefining application delivery
Third, I’m going to talk about how we are using UCS Compute for our container cloud
Then, will dive into ACI Networking and how Containers and Contiv really bring the Application into the ACI Fabric
Finally, I’ll show how all these pieces come together to build out our container platform, with a demo.
Compaq, in 1996 coined the term, it occurred while they were plotting the future of their Internet business.
https://www.technologyreview.com/s/425970/who-coined-cloud-computing/
So let’s start on this journey together by taking a 50,000 foot view of our, as in Cisco IT’s Global Cloud Strategy.
Need to introduce “legacy” to cloud tolerant slide. Should we have a slide for this alone?
Changes to Cloud Native applications are the norm: apps scale up/down, move around to accommodate operations and work around failures. This is in contrast to todays environment where change management is driving when and how changes are made. Difference: automation. Runtime policies replace pre-approvals.
What’s the use of programmability if we can’t automate and break away from manual intervention.
Vertical Scale
Application Teams
Responsible for uptime of application code.
How? Lifecycles, A/B Deployment Models
Infrastructure Teams
Responsible for uptime of infrastructure that the application utilizes.
How? Providing High Availability based data center verticals.
Horizontal Scale
Application Teams
Responsible for uptime of application code.
How? Lifecycles, A/B Deployment Models
Responsible for horizontal scalability.
How? Horizontal scale out of replicated services handled either by the application or the platform scheduler.
Infrastructure Teams
Responsible for providing spare capacity that the application or platform can utilize
How? Providing affordable, failure domain based data centers
Faster you can deliever hardware into your data center, the less you have to predict growth, and the less of a “runway” you need. Driving better efficency, aiming for just in time capacity for our application owners, just as just in time delivery has transformed manufacturing.
Distribution = Flexibility, Choice, and Resiliency
HA to Single Legged
Design to Fail (Failure Domains/Availability Zones)
Cluster of Failure Domains = Region
Unified control plane for all the elements in the system
Centralizing global policies, service profiles, inventory, ID pools and templates
Distributed Container Orchestration System
Cisco Systems was founded in December 1984 by Leonard Bosack and Sandy Lerner, two Stanford University computer scientists, who pioneered the concept of a local area network (LAN) being used to connect geographically disparate computers over a multiprotocol router system.
https://en.wikipedia.org/wiki/Cisco_Systems
Tim Berners-Lee hosted the first webserver at CERN on a NeXT Workstation (Specifically the NeXTcube)
https://commons.wikimedia.org/wiki/File:First_Web_Server.jpg
In conclusion, I hope you have seen that cisco IT is using a combination of cisco and open source products and technologies to deliver a container based cloud, that can serve as a template for you own journey.
Feel free to connect with me after this session, or on spark.
Hopefully now at the end of this discussion, you have the building blocks to deploy your own container cloud solution, while learning from our successes, and hardships from our own journey.
Thank You! Any Questions?
Should we standardize on a container format?
Should we standardize on a container scheduler
Should we prohibit 3rd party containers
Can we detect vulnerabilities and vulnerable containers?
Can we detect malicious behavior?
How to enforce security without minimizing the benefits of containers?