The unique and intrinsic methods by which Linux application containers are created, deployed, networked, and operated do not lend themselves well to the conventional application of methods for conducting intrusion detection and analysis in traditional physical and virtual machine networks. While similarities exist in some of the methods used to perform intrusion detection and analysis in conventional networks as compared to container networks, the effectiveness between the two has not been thoroughly measured and assessed: this presents a gap in application container security knowledge. By researching the efficacy of these methods as implemented in container networks compared to traditional networks, this research will provide empirical evidence to identify the gap, and provide data useful for identifying and developing new and more effective methods to secure application container networks
Applied Security for Containers, OW2con'18, June 7-8, 2018, ParisOW2
There’s a constant rise of the container usage in the existing cloud ecosystem.
Most companies are evaluating how to migrate to newer, flexible and automated platform for content and application delivery.
The containers are building themselves alone across the business, but who's securing them?
This presentation discusses the evolution of infrastructure solutions from servers to containers, how can they be secured.
What opensource security options are available today?
Where is the future leading towards container security?
What will come after containers?
This 2nd version of the last year workshop will shed light on a modern solution to solve application portability, building, delivery, packaging, and system dependency issues. Containers especially Docker have seen accelerated adoption in the web, cloud and recently the enterprise. HPC environments are seeing something similar to the introduction of HPC containers Singularity and Shifter. They provide a good use case for solving software portability, not to mention ensure repeatability of results. Not to mention their ECO system provides for the better development, delivery, testing workflows that were alien to most of HPC environments. This workshop will cover the Theory and hands-on of containers and Its ecosystem. Introducing Docker and singularity containers; Docker as a general-purpose container for almost any app, Singularity as the particular container technology for HPC. The workshop will go over the foundations of the containers platform, including an overview of the platform system components: images, containers, repositories, clustering, and orchestration. The strategy is to demonstrate through "live demo, and hands-on exercises." The reuse case of containers in building a portable distributed application cluster running a variety of workloads including HPC workload.
On the Relation between Outdated Docker Containers, Severity Vulnerabilities,...Tom Mens
Presentation by Tom Mens of SANER 2019 paper that was awarded as best paper. The topic concerns Docker containers, and more in particular the relation between outdated packages, technical lag, security vulnerabilities and bugs.
The document discusses open source software definitions and cloud computing software. It provides definitions for open source software including requirements for free redistribution, access to source code, allowance for modifications, and non-discrimination. It then summarizes several open source cloud computing platforms like Xen Cloud Platform, Nimbus, OpenNebula, Eucalyptus, CloudStack, and OpenStack. These platforms provide infrastructure for building public and private clouds using open source virtualization and APIs.
Software Preservation: challenges and opportunities for reproductibility (Sci...Roberto Di Cosmo
The document discusses the challenges of preserving software to ensure reproducibility in science. It notes that 81% of computer science papers studied were found to be non-reproducible due to a lack of available source code and documentation. Preserving software is complex as it often has dependencies on other software and hardware. However, software embodies much of our scientific and technical knowledge, so efforts must be made to preserve and provide access to source code in order to establish reproducibility as the foundation of scientific inquiry.
Modern IoT and Embedded Linux Deployment - BerlinDjalal Harouni
This document discusses modern deployment techniques for embedded Linux and IoT devices. It covers topics like embedded Linux security, the Kernel Self Protection Project, lightweight containers using systemd, systemd's sandbox model, and software update mechanisms. The presenter argues that embedded Linux runtimes constitute a large attack surface due to complex open source code and lack of update mechanisms. Techniques like kernel hardening, systemd sandboxes, and atomic OTA updates can help secure embedded devices and allow safer deployment of applications. Adoption of these practices faces challenges due to embedded developers prioritizing small images over security.
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained by Offensive Security Ltd and supports x86, ARM, and Android platforms. Key features include NetHunter for porting Kali to Android devices, enabling wireless attacks and USB-based attacks from mobile devices. The Kali Linux logo has also appeared on the TV show Mr. Robot.
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Applied Security for Containers, OW2con'18, June 7-8, 2018, ParisOW2
There’s a constant rise of the container usage in the existing cloud ecosystem.
Most companies are evaluating how to migrate to newer, flexible and automated platform for content and application delivery.
The containers are building themselves alone across the business, but who's securing them?
This presentation discusses the evolution of infrastructure solutions from servers to containers, how can they be secured.
What opensource security options are available today?
Where is the future leading towards container security?
What will come after containers?
This 2nd version of the last year workshop will shed light on a modern solution to solve application portability, building, delivery, packaging, and system dependency issues. Containers especially Docker have seen accelerated adoption in the web, cloud and recently the enterprise. HPC environments are seeing something similar to the introduction of HPC containers Singularity and Shifter. They provide a good use case for solving software portability, not to mention ensure repeatability of results. Not to mention their ECO system provides for the better development, delivery, testing workflows that were alien to most of HPC environments. This workshop will cover the Theory and hands-on of containers and Its ecosystem. Introducing Docker and singularity containers; Docker as a general-purpose container for almost any app, Singularity as the particular container technology for HPC. The workshop will go over the foundations of the containers platform, including an overview of the platform system components: images, containers, repositories, clustering, and orchestration. The strategy is to demonstrate through "live demo, and hands-on exercises." The reuse case of containers in building a portable distributed application cluster running a variety of workloads including HPC workload.
On the Relation between Outdated Docker Containers, Severity Vulnerabilities,...Tom Mens
Presentation by Tom Mens of SANER 2019 paper that was awarded as best paper. The topic concerns Docker containers, and more in particular the relation between outdated packages, technical lag, security vulnerabilities and bugs.
The document discusses open source software definitions and cloud computing software. It provides definitions for open source software including requirements for free redistribution, access to source code, allowance for modifications, and non-discrimination. It then summarizes several open source cloud computing platforms like Xen Cloud Platform, Nimbus, OpenNebula, Eucalyptus, CloudStack, and OpenStack. These platforms provide infrastructure for building public and private clouds using open source virtualization and APIs.
Software Preservation: challenges and opportunities for reproductibility (Sci...Roberto Di Cosmo
The document discusses the challenges of preserving software to ensure reproducibility in science. It notes that 81% of computer science papers studied were found to be non-reproducible due to a lack of available source code and documentation. Preserving software is complex as it often has dependencies on other software and hardware. However, software embodies much of our scientific and technical knowledge, so efforts must be made to preserve and provide access to source code in order to establish reproducibility as the foundation of scientific inquiry.
Modern IoT and Embedded Linux Deployment - BerlinDjalal Harouni
This document discusses modern deployment techniques for embedded Linux and IoT devices. It covers topics like embedded Linux security, the Kernel Self Protection Project, lightweight containers using systemd, systemd's sandbox model, and software update mechanisms. The presenter argues that embedded Linux runtimes constitute a large attack surface due to complex open source code and lack of update mechanisms. Techniques like kernel hardening, systemd sandboxes, and atomic OTA updates can help secure embedded devices and allow safer deployment of applications. Adoption of these practices faces challenges due to embedded developers prioritizing small images over security.
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained by Offensive Security Ltd and supports x86, ARM, and Android platforms. Key features include NetHunter for porting Kali to Android devices, enabling wireless attacks and USB-based attacks from mobile devices. The Kali Linux logo has also appeared on the TV show Mr. Robot.
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Connecting microcontrollers to the cloud using MQTT, BLE, and HTTPAll Things Open
Presented by: Tanmoy Sen, Amazon Web Services
Presented at All Things Open 2020
Abstract: Connecting microcontroller-based devices to the cloud enables data collection, analysis and remote updates to deployed devices. Often, these devices need to cost-effectively connect to a mobile device for provisioning, reading, and security. This talk describes how to easily program, deploy, secure, connect, and manage small, low-power edge devices with the open source real-time OS, FreeRTOS, using different connectivity protocols. You learn how to authenticate microcontroller devices with iOS and Android devices and to monitor, manage, and update firmware using the over-the-air update functionality.
OpenHarmony's journey to Oniro - One year on
We introduced Openharmony at SFScon 2020. One year has passed and with it much water under the project’s bridge. The project is now officially an Eclipse project, with its own brand. Members and industry partners are joining and the version 1.0 release is behind the corner. This talk provides an update of the vision, objectives, ecosystem, governance model, technology, standards, compliance processes, and all progress made in one intense year of work inside the Oniro project.
A sentient network - How High-velocity Data and Machine Learning will Shape t...Wenjing Chu
Dell's Distinguished Engineer Wenjing Chu discusses innovations in applying Machine Learning to solve challenges in Telco/Communication Services, and predicts that the future is a Sentient Network powered by Machine Learning that can handle real-time high-velocity data.
The document discusses DevOps Indonesia, a DevOps community event happening on March 22, 2018 in Jakarta. It focuses on containers and Docker. It provides information about ticket prices, speakers including Yusuf Hadiwinata Sutandar. The document discusses the Open Container Initiative (OCI) and its role in driving innovation. It also discusses concerns with Docker and the container ecosystem including competing technologies like Kubernetes, rkt, and CRI-O. The conclusion emphasizes developing container-agnostic microservices.
GitOps est une combinaison de bonnes pratiques pour automatiser le déploiement de conteneurs et d'infrastructures. Au lieu de manipuler des changements de configuration en les poussant activement, ici les systèmes synchronisent leurs états automatiquement par rapport à un référentiel contrôlé. À travers de ce workshop, vous découvrirez comment mettre en œuvre cette méthode pour gérer automatiquement des clusters Kubernetes avec l'outil Flux qui vient récemment de sortir en version 2.
Evolution of Technical Lag in DockerHub images - Benevol20Ahmed Zerouali
This presentation was given during Benevol 2020.
https://benevol2020.github.io/
Abstract:
Container-based solutions, such as Docker, have become increasingly relevant in the software industry to facilitate deploying and maintaining software systems. Little is known, however, about how outdated such containers are at the moment of their release or when used in production. We address this question, by measuring and comparing five different dimensions of technical lag that Docker container images can face: package lag, time lag, version lag, vulnerability lag, and bug lag. We instantiate the formal technical lag framework from previous work to operationalise these different dimensions of lag on Docker Hub images based on the Debian Linux distribution. We carry out a large-scale empirical study of such technical lag, over a three-year period, in a large dataset of Debian images. We compare the differences between official and community images, as well as between images with different Debian distributions: OldStable, Stable or Testing. The analysis shows that the different dimensions of technical lag are complementary, providing multiple insights. Our research offers empirical evidence that developers and deployers of Docker images can benefit from identifying to which extent their containers are outdated according to the considered dimensions, and mitigate the risks related to such outdatedness.
Docker moves very fast, with an edge channel released every month and a stable release every 3 months. Patrick will talk about how Docker introduced Docker EE and a certification program for containers and plugins with Docker CE and EE 17.03 (from March), the announcements from DockerCon (April), and the many new features planned for Docker CE 17.05 in May.
This talk will be about what's new in Docker and what's next on the roadmap
Building specialized container-based systems with Moby: a few use cases
This talk will explain how you can leverage the Moby project to assemble your own specialized container-based system, whether for IoT, cloud or bare metal scenarios. We will cover Moby itself, the framework, and tooling around the project, as well as many of it’s components: LinuxKit, InfraKit, containerd, SwarmKit, Notary. Then we will present a few use cases and demos of how different companies have leveraged Moby and some of the Moby components to create their own container-based systems.
You can have your cake and eat it too
Open Source virtualization is sometimes perceived as being out of date. But cloud platforms as well as large scale deployments of containers ultimately rely on hypervisors and virtual machines to deliver both portability and abstraction from the bare metal. As such the conversation may have switched to containers, but it does not mean that virtualization has become irrelevant. Several initiatives highlight that it is quite the opposite, and the XCP-ng project has started to take advantage of the latest development effort to deliver isolation of containers and their runtimes.
Dockerized containers are the current wave that promising to revolutionize IT. Everybody is talking about containers, but a lot of people remain confused on how they work and why they are different or better than virtual machines. In this session, Black Duck container and virtualization expert Tim Mackey will demystify containers, explain their core concepts, and compare and contrast them with the virtual machine architectures that have been the staple of IT for the last decade.
HPE’s Erik Vogel on Key Factors for Driving Success in Hybrid Cloud Adoption ...Dana Gardner
A discussion on innovation around maturing hybrid cloud models and how proper common management of hybrid cloud operations makes or breaks the expected benefits.
When seeking to implement microservices architecture in an organization, these are the benefits of deploying Docker as the platform as a service (PaaS); Docker helps manage costs, complexity, service continuity and production times.
CNCF general introduction to beginners at openstack meetup Pune & Bangalore February 2018. Covers broadly the activities and structure of the Cloud Native Computing Foundation.
This paper presents container technology with a particular focus on Docker®, the company, its technology, comparing containers with the VM approach, its involvement in the DevOPs and Platform as a service model, and partnerships with other IT players. It also touches upon the emergence of microservices architecture along with challenges to enterprise adoption.
This paper presents container technology with a particular focus on Docker®, the company, its technology, comparing containers with the VM approach, its involvement in the DevOPs and Platform as a service model, and partnerships with other IT players. It also touches upon the emergence of microservices architecture along with challenges to enterprise adoption.
System resource use is a big problem in the field of informatics. Developers are constantly looking for new ways to solve this problem. Virtualization of data centers and moving to cloud environments are some of the solutions produced. In these methods, virtualized servers are used to run and publish applications in isolation. Servers used for dedicated software in cloud computing environments are still not used with the desired efficiency. For this purpose, container technology has been developed so that many applications can be run isolated from each other in the same server environments. With this method, CPU, memory, network and disk volume can be defined for more than one application on the same server. Today, cloud computing companies and technology companies are rapidly turning to container technology. In this study, the development of container technology, its types and common usage methods are explained. Atilla Ergüzen | Ahmet Özcan "Container Ecosystem and Docker Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-1 , December 2021, URL: https://www.ijtsrd.com/papers/ijtsrd49102.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/49102/container-ecosystem-and-docker-technology/atilla-ergüzen
Using Docker container technology with F5 Networks products and servicesF5 Networks
This document discusses how Docker containerization technology can be used with F5 products and services. It provides an overview of Docker, comparing it to virtual machines. Docker allows for higher resource utilization and faster application deployment than VMs. The document outlines how F5 supports using containers and integrating with Docker for application delivery and security services. It describes Docker networking and how F5 solutions can provide services like load balancing within Docker container environments.
Early adopters report "easier replication, faster deployment and lower configuration and operating costs" of applications that involve Docker containers - an open platform that allows developers and sysadmins to build, ship and execute distributed applications.
Not surprisingly then, a groundswell of organizations are interested in evaluating Docker containers in proof-of-concept initiatives and/or pilot projects. The transition to production use, however, introduces additional requirements as Docker containers need to be incorporated into existing IT infrastructures and (ultimately) integrated into application workflows.
In answering the 5 Ws and one H, the aim of this webinar is to provide a technical overview and demonstration of Docker and to frame its use within the context of High Performance Computing and Big Data Analytics.
Learn all about Docker.
Agenda:
• What are Docker containers - relative to physical machines, VMs and other containers?
• Who is responsible for Docker containers?
• Why and when were Docker containers created?
• What is the container ecosystem?
• Where is use of containers appropriate and not appropriate?
▸ HPC applications?
▸ Big Data Analytics? Specifically, Spark-based applications?
▸ On premise and in the cloud?
▸ Is running Docker different in HPC versus microservice-based applications?
• How can I make use of Docker containers?
▸ How can I containerize my application?
▸ How can I create, or make use of, a Docker image?
▸ How can I run Docker containers as I do other types of workloads?
• Getting Started and Next Steps
Speaker:
Ian Lumb, System Architect, Univa Corporation.
As an HPC specialist, Ian Lumb has spent about two decades at the global intersection of IT and science. Ian received his B.Sc. from Montreal's McGill University, and then an M.Sc. from York University in Toronto. Although his undergraduate and graduate studies emphasized geophysics, Ian's current interests include workload orchestration and container optimization for HPC to Big Data Analytics in clusters and clouds.
Video Download
Video is available in .mp4 format from http://www.univa.com/resources/webinar-docker101.php.
Whether a startup or a large corporation, employing containerization technology can provide significant advantages in terms of agility, portability, flexibility, and speed. Here are some examples from the real world of how containers are used in various business use cases.
In this presentation, we talk about:
- Introduction to Containers
- Container Security Overview
You can watch the complete session here:
https://youtu.be/w2-NtdAkrOI?t=1901
Open Container Technologies and OpenStack - Sorting Through Kubernetes, the O...Daniel Krook
Presentation at the OpenStack Summit in Barcelona, Spain on October 25, 2016.
http://bit.ly/os-kub-oci-cncf
Containers along with next generation topics such as orchestration and serverless computing continue to draw interest across the application developer and data center operator communities because of the enormous potential of the technology and the rapid pace of change.
As the potential of Docker continues to evolve, Kubernetes emerges as the leading orchestration technology, and the OpenStack Magnum project has matured, many want to see shared governance over the baseline container specification and associated runtime and format/image to protect investments and enable confident adoption of this emerging technology.
Join this session to learn the latest about the Open Container Initiative (www.opencontainers.org) and the Cloud Native Computing Foundation (cncf.io) - both collaborative projects of the Linux Foundation - that drive the latest cloud native technologies and projects and see how they relate to Magnum and Kuryr.
Daniel Krook, Senior Software Engineer, IBM
Jeffrey Borek, Program Director, Open Tech, IBM
Sarah Novotny, Senior Kubernetes Community Manger, Google
Connecting microcontrollers to the cloud using MQTT, BLE, and HTTPAll Things Open
Presented by: Tanmoy Sen, Amazon Web Services
Presented at All Things Open 2020
Abstract: Connecting microcontroller-based devices to the cloud enables data collection, analysis and remote updates to deployed devices. Often, these devices need to cost-effectively connect to a mobile device for provisioning, reading, and security. This talk describes how to easily program, deploy, secure, connect, and manage small, low-power edge devices with the open source real-time OS, FreeRTOS, using different connectivity protocols. You learn how to authenticate microcontroller devices with iOS and Android devices and to monitor, manage, and update firmware using the over-the-air update functionality.
OpenHarmony's journey to Oniro - One year on
We introduced Openharmony at SFScon 2020. One year has passed and with it much water under the project’s bridge. The project is now officially an Eclipse project, with its own brand. Members and industry partners are joining and the version 1.0 release is behind the corner. This talk provides an update of the vision, objectives, ecosystem, governance model, technology, standards, compliance processes, and all progress made in one intense year of work inside the Oniro project.
A sentient network - How High-velocity Data and Machine Learning will Shape t...Wenjing Chu
Dell's Distinguished Engineer Wenjing Chu discusses innovations in applying Machine Learning to solve challenges in Telco/Communication Services, and predicts that the future is a Sentient Network powered by Machine Learning that can handle real-time high-velocity data.
The document discusses DevOps Indonesia, a DevOps community event happening on March 22, 2018 in Jakarta. It focuses on containers and Docker. It provides information about ticket prices, speakers including Yusuf Hadiwinata Sutandar. The document discusses the Open Container Initiative (OCI) and its role in driving innovation. It also discusses concerns with Docker and the container ecosystem including competing technologies like Kubernetes, rkt, and CRI-O. The conclusion emphasizes developing container-agnostic microservices.
GitOps est une combinaison de bonnes pratiques pour automatiser le déploiement de conteneurs et d'infrastructures. Au lieu de manipuler des changements de configuration en les poussant activement, ici les systèmes synchronisent leurs états automatiquement par rapport à un référentiel contrôlé. À travers de ce workshop, vous découvrirez comment mettre en œuvre cette méthode pour gérer automatiquement des clusters Kubernetes avec l'outil Flux qui vient récemment de sortir en version 2.
Evolution of Technical Lag in DockerHub images - Benevol20Ahmed Zerouali
This presentation was given during Benevol 2020.
https://benevol2020.github.io/
Abstract:
Container-based solutions, such as Docker, have become increasingly relevant in the software industry to facilitate deploying and maintaining software systems. Little is known, however, about how outdated such containers are at the moment of their release or when used in production. We address this question, by measuring and comparing five different dimensions of technical lag that Docker container images can face: package lag, time lag, version lag, vulnerability lag, and bug lag. We instantiate the formal technical lag framework from previous work to operationalise these different dimensions of lag on Docker Hub images based on the Debian Linux distribution. We carry out a large-scale empirical study of such technical lag, over a three-year period, in a large dataset of Debian images. We compare the differences between official and community images, as well as between images with different Debian distributions: OldStable, Stable or Testing. The analysis shows that the different dimensions of technical lag are complementary, providing multiple insights. Our research offers empirical evidence that developers and deployers of Docker images can benefit from identifying to which extent their containers are outdated according to the considered dimensions, and mitigate the risks related to such outdatedness.
Docker moves very fast, with an edge channel released every month and a stable release every 3 months. Patrick will talk about how Docker introduced Docker EE and a certification program for containers and plugins with Docker CE and EE 17.03 (from March), the announcements from DockerCon (April), and the many new features planned for Docker CE 17.05 in May.
This talk will be about what's new in Docker and what's next on the roadmap
Building specialized container-based systems with Moby: a few use cases
This talk will explain how you can leverage the Moby project to assemble your own specialized container-based system, whether for IoT, cloud or bare metal scenarios. We will cover Moby itself, the framework, and tooling around the project, as well as many of it’s components: LinuxKit, InfraKit, containerd, SwarmKit, Notary. Then we will present a few use cases and demos of how different companies have leveraged Moby and some of the Moby components to create their own container-based systems.
You can have your cake and eat it too
Open Source virtualization is sometimes perceived as being out of date. But cloud platforms as well as large scale deployments of containers ultimately rely on hypervisors and virtual machines to deliver both portability and abstraction from the bare metal. As such the conversation may have switched to containers, but it does not mean that virtualization has become irrelevant. Several initiatives highlight that it is quite the opposite, and the XCP-ng project has started to take advantage of the latest development effort to deliver isolation of containers and their runtimes.
Dockerized containers are the current wave that promising to revolutionize IT. Everybody is talking about containers, but a lot of people remain confused on how they work and why they are different or better than virtual machines. In this session, Black Duck container and virtualization expert Tim Mackey will demystify containers, explain their core concepts, and compare and contrast them with the virtual machine architectures that have been the staple of IT for the last decade.
HPE’s Erik Vogel on Key Factors for Driving Success in Hybrid Cloud Adoption ...Dana Gardner
A discussion on innovation around maturing hybrid cloud models and how proper common management of hybrid cloud operations makes or breaks the expected benefits.
When seeking to implement microservices architecture in an organization, these are the benefits of deploying Docker as the platform as a service (PaaS); Docker helps manage costs, complexity, service continuity and production times.
CNCF general introduction to beginners at openstack meetup Pune & Bangalore February 2018. Covers broadly the activities and structure of the Cloud Native Computing Foundation.
This paper presents container technology with a particular focus on Docker®, the company, its technology, comparing containers with the VM approach, its involvement in the DevOPs and Platform as a service model, and partnerships with other IT players. It also touches upon the emergence of microservices architecture along with challenges to enterprise adoption.
This paper presents container technology with a particular focus on Docker®, the company, its technology, comparing containers with the VM approach, its involvement in the DevOPs and Platform as a service model, and partnerships with other IT players. It also touches upon the emergence of microservices architecture along with challenges to enterprise adoption.
System resource use is a big problem in the field of informatics. Developers are constantly looking for new ways to solve this problem. Virtualization of data centers and moving to cloud environments are some of the solutions produced. In these methods, virtualized servers are used to run and publish applications in isolation. Servers used for dedicated software in cloud computing environments are still not used with the desired efficiency. For this purpose, container technology has been developed so that many applications can be run isolated from each other in the same server environments. With this method, CPU, memory, network and disk volume can be defined for more than one application on the same server. Today, cloud computing companies and technology companies are rapidly turning to container technology. In this study, the development of container technology, its types and common usage methods are explained. Atilla Ergüzen | Ahmet Özcan "Container Ecosystem and Docker Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-1 , December 2021, URL: https://www.ijtsrd.com/papers/ijtsrd49102.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/49102/container-ecosystem-and-docker-technology/atilla-ergüzen
Using Docker container technology with F5 Networks products and servicesF5 Networks
This document discusses how Docker containerization technology can be used with F5 products and services. It provides an overview of Docker, comparing it to virtual machines. Docker allows for higher resource utilization and faster application deployment than VMs. The document outlines how F5 supports using containers and integrating with Docker for application delivery and security services. It describes Docker networking and how F5 solutions can provide services like load balancing within Docker container environments.
Early adopters report "easier replication, faster deployment and lower configuration and operating costs" of applications that involve Docker containers - an open platform that allows developers and sysadmins to build, ship and execute distributed applications.
Not surprisingly then, a groundswell of organizations are interested in evaluating Docker containers in proof-of-concept initiatives and/or pilot projects. The transition to production use, however, introduces additional requirements as Docker containers need to be incorporated into existing IT infrastructures and (ultimately) integrated into application workflows.
In answering the 5 Ws and one H, the aim of this webinar is to provide a technical overview and demonstration of Docker and to frame its use within the context of High Performance Computing and Big Data Analytics.
Learn all about Docker.
Agenda:
• What are Docker containers - relative to physical machines, VMs and other containers?
• Who is responsible for Docker containers?
• Why and when were Docker containers created?
• What is the container ecosystem?
• Where is use of containers appropriate and not appropriate?
▸ HPC applications?
▸ Big Data Analytics? Specifically, Spark-based applications?
▸ On premise and in the cloud?
▸ Is running Docker different in HPC versus microservice-based applications?
• How can I make use of Docker containers?
▸ How can I containerize my application?
▸ How can I create, or make use of, a Docker image?
▸ How can I run Docker containers as I do other types of workloads?
• Getting Started and Next Steps
Speaker:
Ian Lumb, System Architect, Univa Corporation.
As an HPC specialist, Ian Lumb has spent about two decades at the global intersection of IT and science. Ian received his B.Sc. from Montreal's McGill University, and then an M.Sc. from York University in Toronto. Although his undergraduate and graduate studies emphasized geophysics, Ian's current interests include workload orchestration and container optimization for HPC to Big Data Analytics in clusters and clouds.
Video Download
Video is available in .mp4 format from http://www.univa.com/resources/webinar-docker101.php.
Whether a startup or a large corporation, employing containerization technology can provide significant advantages in terms of agility, portability, flexibility, and speed. Here are some examples from the real world of how containers are used in various business use cases.
In this presentation, we talk about:
- Introduction to Containers
- Container Security Overview
You can watch the complete session here:
https://youtu.be/w2-NtdAkrOI?t=1901
Open Container Technologies and OpenStack - Sorting Through Kubernetes, the O...Daniel Krook
Presentation at the OpenStack Summit in Barcelona, Spain on October 25, 2016.
http://bit.ly/os-kub-oci-cncf
Containers along with next generation topics such as orchestration and serverless computing continue to draw interest across the application developer and data center operator communities because of the enormous potential of the technology and the rapid pace of change.
As the potential of Docker continues to evolve, Kubernetes emerges as the leading orchestration technology, and the OpenStack Magnum project has matured, many want to see shared governance over the baseline container specification and associated runtime and format/image to protect investments and enable confident adoption of this emerging technology.
Join this session to learn the latest about the Open Container Initiative (www.opencontainers.org) and the Cloud Native Computing Foundation (cncf.io) - both collaborative projects of the Linux Foundation - that drive the latest cloud native technologies and projects and see how they relate to Magnum and Kuryr.
Daniel Krook, Senior Software Engineer, IBM
Jeffrey Borek, Program Director, Open Tech, IBM
Sarah Novotny, Senior Kubernetes Community Manger, Google
An operational view into docker registry with scalability, access control and...Conference Papers
This document discusses improvements to the Docker registry to address scalability, access control, and image vulnerability assessment. It proposes:
1) Using a proxy like NGINX in front of the registry to load balance requests and scale the registry across multiple servers.
2) Adding user authentication and authorization to the registry to restrict access to images based on user permissions.
3) Integrating the Anchore image scanning tool to analyze images pushed to the registry for vulnerabilities before use.
Together these changes aim to make the Docker registry more scalable, secure, and provide visibility into image vulnerabilities.
Docker is an open-source tool that packages applications and dependencies into containers that can run on any Linux server or soon Windows. Containers wrap up everything an app needs like code, runtime, tools and libraries to guarantee the app runs the same anywhere. Docker uses kernel features to allow containers to run in isolation on a single Linux instance for efficiency over virtual machines. Containers are lightweight, use shared resources efficiently and are based on open standards to run on major operating systems and infrastructures securely.
Docker is an open-source tool that packages applications and dependencies into containers that can run on any Linux server or soon Windows. Containers wrap up everything an app needs like code, runtime, tools and libraries to guarantee the app always runs the same regardless of the environment. Docker uses kernel features to allow independent containers to run within a single Linux instance avoiding overhead of virtual machines. Containers are lightweight, open, and secure.
How docker & kubernetes can optimize the cost of hosting9 series
Container orchestration and container technology are revolutionizing the management and deployment of applications in a multi-node distributed domain at scale.
Just as the roles of CIOs and CTOs have needed to rapidly evolve along with the pace of technology, it is now becoming critically important for lawyers to understand emerging software security challenges.
Docker allows creating isolated environments called containers from images. Containers provide a standard way to develop, ship, and run applications. The document discusses how Docker can be used for scientific computing including running different versions of software, automating computations, sharing research environments and results, and providing isolated development environments for users through Docker IaaS tools. K-scope is a code analysis tool that previously required complex installation of its Omni XMP dependency, but could now be run as a containerized application to simplify deployment.
This document discusses integrating Docker containers with the libvirt API to allow Docker management using libvirt. It begins by providing background on Docker, containers, and libvirt. It then proposes implementing the Docker API in C and integrating it with the libvirt API. This would allow clouds to provide a single libvirt API for managing both containers and virtual machines, without needing separate Docker APIs. It would also provide a generic Docker interface across clouds.
Similar to Container Intrusions - Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments (20)
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
20240609 QFM020 Irresponsible AI Reading List May 2024
Container Intrusions - Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments
1. Interested in learning
more about security?
SANS Institute
InfoSec Reading Room
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.
Container Intrusions: Assessing the Efficacy of
Intrusion Detection and Analysis Methods for Linux
Container Environments
The unique and intrinsic methods by which Linux application containers are created, deployed, networked, and
operated do not lend themselves well to the conventional application of methods for conducting intrusion
detection and analysis in traditional physical and virtual machine networks. While similarities exist in some
of the methods used to perform intrusion detection and analysis in conventional networks as compared to
container networks, the effectiveness between the two has not been thoroughly measured and asses...
Copyright SANS Institute
Author Retains Full Rights
AD
32. Last Updated: January 14th, 2018
Upcoming SANS TrainingClick Here for a full list of all Upcoming SANS Events by Location
Northern VA Winter - Reston 2018 Reston, VAUS Jan 15, 2018 - Jan 20, 2018 Live Event
SANS Amsterdam January 2018 Amsterdam, NL Jan 15, 2018 - Jan 20, 2018 Live Event
SANS Dubai 2018 Dubai, AE Jan 27, 2018 - Feb 01, 2018 Live Event
SANS Las Vegas 2018 Las Vegas, NVUS Jan 28, 2018 - Feb 02, 2018 Live Event
Cyber Threat Intelligence Summit & Training 2018 Bethesda, MDUS Jan 29, 2018 - Feb 05, 2018 Live Event
SANS Miami 2018 Miami, FLUS Jan 29, 2018 - Feb 03, 2018 Live Event
SANS London February 2018 London, GB Feb 05, 2018 - Feb 10, 2018 Live Event
SANS Scottsdale 2018 Scottsdale, AZUS Feb 05, 2018 - Feb 10, 2018 Live Event
SANS SEC455: SIEM Design Beta One 2018 Arlington, VAUS Feb 12, 2018 - Feb 13, 2018 Live Event
SANS Secure India 2018 Bangalore, IN Feb 12, 2018 - Feb 17, 2018 Live Event
SANS Southern California- Anaheim 2018 Anaheim, CAUS Feb 12, 2018 - Feb 17, 2018 Live Event
SANS Secure Japan 2018 Tokyo, JP Feb 19, 2018 - Mar 03, 2018 Live Event
SANS Dallas 2018 Dallas, TXUS Feb 19, 2018 - Feb 24, 2018 Live Event
Cloud Security Summit & Training 2018 San Diego, CAUS Feb 19, 2018 - Feb 26, 2018 Live Event
SANS Brussels February 2018 Brussels, BE Feb 19, 2018 - Feb 24, 2018 Live Event
SANS New York City Winter 2018 New York, NYUS Feb 26, 2018 - Mar 03, 2018 Live Event
CyberThreat Summit 2018 London, GB Feb 27, 2018 - Feb 28, 2018 Live Event
SANS London March 2018 London, GB Mar 05, 2018 - Mar 10, 2018 Live Event
SANS Paris March 2018 Paris, FR Mar 12, 2018 - Mar 17, 2018 Live Event
SANS Secure Singapore 2018 Singapore, SG Mar 12, 2018 - Mar 24, 2018 Live Event
SANS Secure Osaka 2018 Osaka, JP Mar 12, 2018 - Mar 17, 2018 Live Event
SANS San Francisco Spring 2018 San Francisco, CAUS Mar 12, 2018 - Mar 17, 2018 Live Event
SANS Northern VA Spring - Tysons 2018 McLean, VAUS Mar 17, 2018 - Mar 24, 2018 Live Event
SANS Munich March 2018 Munich, DE Mar 19, 2018 - Mar 24, 2018 Live Event
SANS Pen Test Austin 2018 Austin, TXUS Mar 19, 2018 - Mar 24, 2018 Live Event
ICS Security Summit & Training 2018 Orlando, FLUS Mar 19, 2018 - Mar 26, 2018 Live Event
SANS Secure Canberra 2018 Canberra, AU Mar 19, 2018 - Mar 24, 2018 Live Event
SANS Boston Spring 2018 Boston, MAUS Mar 25, 2018 - Mar 30, 2018 Live Event
SANS 2018 Orlando, FLUS Apr 03, 2018 - Apr 10, 2018 Live Event
SANS Abu Dhabi 2018 Abu Dhabi, AE Apr 07, 2018 - Apr 12, 2018 Live Event
Pre-RSA® Conference Training San Francisco, CAUS Apr 11, 2018 - Apr 16, 2018 Live Event
SEC599: Defeat Advanced Adversaries OnlineCAUS Jan 15, 2018 - Jan 20, 2018 Live Event
SANS OnDemand Books & MP3s OnlyUS Anytime Self Paced