VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMware
VMware IT implemented micro-segmentation using NSX Distributed Firewall to secure production applications and deployed NSX in a large-scale internal private cloud environment. We will review use cases for micro-segmentation such as SAP and discuss design considerations. We will outline our approach for finalizing the firewall policy model using Log Insight for firewall traffic monitoring and analytics and discuss roles and responsibilities and lessons learned. Please join us to learn how VMware secured its business services by leveraging NSX and scaled its internal private cloud deployment using NSX features. We will discuss the design, technical and organizational considerations of one of the world’s largest deployments of NSX for vSphere (hosting over 20,000 VMs). We will review the decisions involved in deploying new NSX environments and how VMware’s internal private cloud leverages NSX edge firewalling to achieve a scalable, multi-tenant security model.
New Solutions for Security and Compliance in the CloudOnline Tech
This webinar reviews data security challenges in cloud environments as well as introduce new solutions for meeting security and compliance in virtualized and cloud infrastructure.
VMware’s Private Cloud has grown to be one of the world’s largest private clouds with over 100K virtual machines! Come and join us and discover how EVO SDDC is shaping the future of our private cloud and why we’ve made key decisions at various inflection points through our journey to SDDC. We’ll provide you an operations perspective of the pains and gains that EVO SDDC can bring to your private cloud. The session speakers are directly responsible for the day-to-day management of building and operating VMware’s internal private cloud. The session’s commentary is based on recent, real world experiences in dealing with the practicalities of managing a large and complex private cloud to allow for agility to meet today’s IT challenges.
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...Jürgen Ambrosi
La piattaforma di virtualizzazione NSX sta già aiutando centinaia di clienti a sfruttare tutte le potenzialità di un Software-Defined Data Center. NSX sposta la rete nel software, creando livelli di flessibilità mai raggiunti prima d'ora. In altre parole, trasforma il modello operativo della rete deldata center così come la virtualizzazione del server ha fatto 10 anni fa. NSX inoltre integra la sicurezza con policy granulari e automatizzate legate alle macchine virtuali, funzionalità chiamata micro-segmentazione, che consente di ridurre in modo significativo la diffusione delle minacce. Rendendo la micro-segmentazione della rete possibile dal punto di vista operativo, NSX introduce un modello di sicurezza di livello superiore, impossibile da realizzare con tecniche tradizionali. Questa sessione da l’opportunità di approfondire il tema della virtualizzazione della rete possibile con VMware NSX, evidenziandone i benefici: riduzione dei tempi di provisioning, semplificazione del delivery dei servizi di rete, incremento della sicurezza con la micro-segmentazione.
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMware
VMware IT implemented micro-segmentation using NSX Distributed Firewall to secure production applications and deployed NSX in a large-scale internal private cloud environment. We will review use cases for micro-segmentation such as SAP and discuss design considerations. We will outline our approach for finalizing the firewall policy model using Log Insight for firewall traffic monitoring and analytics and discuss roles and responsibilities and lessons learned. Please join us to learn how VMware secured its business services by leveraging NSX and scaled its internal private cloud deployment using NSX features. We will discuss the design, technical and organizational considerations of one of the world’s largest deployments of NSX for vSphere (hosting over 20,000 VMs). We will review the decisions involved in deploying new NSX environments and how VMware’s internal private cloud leverages NSX edge firewalling to achieve a scalable, multi-tenant security model.
New Solutions for Security and Compliance in the CloudOnline Tech
This webinar reviews data security challenges in cloud environments as well as introduce new solutions for meeting security and compliance in virtualized and cloud infrastructure.
VMware’s Private Cloud has grown to be one of the world’s largest private clouds with over 100K virtual machines! Come and join us and discover how EVO SDDC is shaping the future of our private cloud and why we’ve made key decisions at various inflection points through our journey to SDDC. We’ll provide you an operations perspective of the pains and gains that EVO SDDC can bring to your private cloud. The session speakers are directly responsible for the day-to-day management of building and operating VMware’s internal private cloud. The session’s commentary is based on recent, real world experiences in dealing with the practicalities of managing a large and complex private cloud to allow for agility to meet today’s IT challenges.
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...Jürgen Ambrosi
La piattaforma di virtualizzazione NSX sta già aiutando centinaia di clienti a sfruttare tutte le potenzialità di un Software-Defined Data Center. NSX sposta la rete nel software, creando livelli di flessibilità mai raggiunti prima d'ora. In altre parole, trasforma il modello operativo della rete deldata center così come la virtualizzazione del server ha fatto 10 anni fa. NSX inoltre integra la sicurezza con policy granulari e automatizzate legate alle macchine virtuali, funzionalità chiamata micro-segmentazione, che consente di ridurre in modo significativo la diffusione delle minacce. Rendendo la micro-segmentazione della rete possibile dal punto di vista operativo, NSX introduce un modello di sicurezza di livello superiore, impossibile da realizzare con tecniche tradizionali. Questa sessione da l’opportunità di approfondire il tema della virtualizzazione della rete possibile con VMware NSX, evidenziandone i benefici: riduzione dei tempi di provisioning, semplificazione del delivery dei servizi di rete, incremento della sicurezza con la micro-segmentazione.
Introduction to Microservices Architecture - SECCOMP 2020Rodrigo Antonialli
This presentation gives an high-level overview of what is a Microservices Architecture, as a summary from well-known sources about the topic regarding it's characteristics, advantages and challenges, along with some enabling technologies.
As more organizations turn to virtual private networks (VPNs) based on Secure Sockets Layer (SSL)
technology to meet their remote access needs, it’s becoming clear that SSL VPN solutions based on
a general purpose computing platform are not equipped to meet the demanding requirements of
medium to large enterprises and service providers.
Such customers have stringent demands for security, user experience, response time, throughput,
and scalability. At the same time, they want to become more efficient by consolidating a plethora of
access control lists (ACLs)—from firewalls, LAN switches, wireless LAN devices and application security
proxies—onto a single VPN system.
Only a purpose-built SSL VPN platform can satisfy these demands.
This paper will discuss the attributes of such a purpose-built SSL VPN platform—the Array Networks
SPX— and how it cost-effectively delivers real-world benefits to enterprises and service providers
including:
• Improved security, flexibility and control
• Improved performance, productivity and user experience
• Reduced total cost of ownership (TCO)
Security and Virtualization in the Data CenterCisco Canada
This presentation will discuss, effectively integrating security, core Data Center fabric technologies and features, secutiry as part of the core design, designs to enforce micro segmentation in the data center, enforce separation of duties in virtualized and cloud environments and security to enforce continuous compliance.
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Control and secure your applications on IBM SmartCloud Enterprise with Software Defined Networking from CohesiveFT.
An IBM SmartCloud ready partner, CohesiveFT address issues of security and control to allow customers to take full advantage of cloud computing. Cohesive FT’s VNS3 Software Defined Networking is an overlay network which allows you to extend your data centers into the cloud, join clouds together and have control over end to end 256 bit encryption, IP addressing, topology and multicast protocols.
The joint IBM and Cohesive webinar aired on June 20
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld
VMworld 2013
Merritte Stidston, McKesson
James Wiese, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
S102 cics the future is closer abridgednick_garrod
GSE Nordic 2015 - Future of CICS is closer than you think. There is a lot going on behind that mysterious curtain. Recently, the CICS development organization has adopted a new practice called ‘IBM Design Thinking’, which will forever change the way CICS products are developed. The core principle of this approach is to make sure we get as much feedback as possible on our future ideas. This is a quite unique opportunity to participate in a discussion regarding the future of IBM CICS technology. We will be sharing our views. And we will be hoping for lots for interactive feedback. Please don’t be shy!
Data Center Security Now and into the FutureCisco Security
Understand all the latest Data Center trends and Data Center security requirements. Take a deep dive on Cisco’s value-added integrated approach on Data Center Security Strategy.
Tomáš Michaeli, VMware
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
Virtualization is one of the hottest trends occurring in the IT industry. We dive into what virtualization is and why you should be thinking about implementing it into your network plan.
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013Jaroslav Prodelal
Dokážete si představit, že byste provozovali své datacentrum v prostředí kanceláře? Ano, je to možné. Společnost Dell uvedla na trh novinku v podobě tzv. datacenter-in-a-box (vše-v-jednom), které je optimalizované (odhlučnění, napájení) pro provoz i v kanceláři, samozřejmě jej můžete dát i do samostatné místnosti.
Dell VRTX kombinuje v jediném 5U šasí výpočetní výkon (až 4 2-CPU servery), diskové úložiště (až 24 HDD) a síť.
Ve webináři vás seznámíme s touto cenově velmi zajímavou novinkou a ukážeme rozdíl mezi tímto řešením a případnými alternativami v době samostaných serverů, diskového pole a síťových switchů.
Agenda:
* co je Dell VRTX?
* segment zákazníků pro VRTX
* co VRTX nabízí
* řešení provozované na VRTX
* technické specifikace
* možná použití
* cena
* aktuální nabídky a promo akce
Increasing Business Value Through High-Availability TechnologyNexenta Systems
This Webinar features Jessie Bryan (Dir. of Systems Engineering at Impulse Advanced Communications) and discusses the high-availability capabilities in NexentaStor, including:
- eliminating a single point of failure with active-active fail-over to a standby system
- establishing fail-over groups and implementing highly cost-effective disaster recovery
- achieving zero data loss and downtime with half the complexity
- automating and non-disruptively testing fail-over / fail-back via NexentaStor
- setting up manual and automated fail-over of critical applications and services in a clustered environment
Finally, learn how Impulse - a communications provider focused on voice and data services - leverages the Nexenta-certified Pogo Linux StorageDirector Z2 HA Cluster SAN solution to deliver continuity of their services to customers.
Webinar Date: March 15th, 2011
Is Your Data Secure?
Odds are good that your data is extremely important to you. Now consider how one secures that data. Typical approaches address access, authentication, integrity, non-repudiation and confidentiality concerns at the domain and link layers, implicitly securing the data. The challenge and need is to move these security specifications to the data itself, and provide explicit security policies on each element of system-identified data.
Why is this level of finesse needed? As you build out your systems, and systems of systems, how do you manage security when individually element of data, the communication links, and domain boundaries have different behaviors? With this level of complexity and risk, it's critical to have awareness at the level that matters – the data level – so you can make the right design and implementation decisions.
At this webinar, learn how to achieve an assured and predictable security footprint by minimizing the leak of information or exploitation of data through unintended consequences. Secure DDS offers data-centric configuration policies for content and behaviors. Recognizing that security isn't one-size fits all, a standards-based optional plugin SDK allows developers to create custom security plugins.
Connext Secure DDS is the world's first turnkey DDS security solution that conforms to the OMG specification and provides an essential security infrastructure that is data-focused for DDS and legacy systems.
Watch On-Demand: http://ecast.opensystemsmedia.com/478
Introduction to Microservices Architecture - SECCOMP 2020Rodrigo Antonialli
This presentation gives an high-level overview of what is a Microservices Architecture, as a summary from well-known sources about the topic regarding it's characteristics, advantages and challenges, along with some enabling technologies.
As more organizations turn to virtual private networks (VPNs) based on Secure Sockets Layer (SSL)
technology to meet their remote access needs, it’s becoming clear that SSL VPN solutions based on
a general purpose computing platform are not equipped to meet the demanding requirements of
medium to large enterprises and service providers.
Such customers have stringent demands for security, user experience, response time, throughput,
and scalability. At the same time, they want to become more efficient by consolidating a plethora of
access control lists (ACLs)—from firewalls, LAN switches, wireless LAN devices and application security
proxies—onto a single VPN system.
Only a purpose-built SSL VPN platform can satisfy these demands.
This paper will discuss the attributes of such a purpose-built SSL VPN platform—the Array Networks
SPX— and how it cost-effectively delivers real-world benefits to enterprises and service providers
including:
• Improved security, flexibility and control
• Improved performance, productivity and user experience
• Reduced total cost of ownership (TCO)
Security and Virtualization in the Data CenterCisco Canada
This presentation will discuss, effectively integrating security, core Data Center fabric technologies and features, secutiry as part of the core design, designs to enforce micro segmentation in the data center, enforce separation of duties in virtualized and cloud environments and security to enforce continuous compliance.
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Control and secure your applications on IBM SmartCloud Enterprise with Software Defined Networking from CohesiveFT.
An IBM SmartCloud ready partner, CohesiveFT address issues of security and control to allow customers to take full advantage of cloud computing. Cohesive FT’s VNS3 Software Defined Networking is an overlay network which allows you to extend your data centers into the cloud, join clouds together and have control over end to end 256 bit encryption, IP addressing, topology and multicast protocols.
The joint IBM and Cohesive webinar aired on June 20
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld
VMworld 2013
Merritte Stidston, McKesson
James Wiese, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
S102 cics the future is closer abridgednick_garrod
GSE Nordic 2015 - Future of CICS is closer than you think. There is a lot going on behind that mysterious curtain. Recently, the CICS development organization has adopted a new practice called ‘IBM Design Thinking’, which will forever change the way CICS products are developed. The core principle of this approach is to make sure we get as much feedback as possible on our future ideas. This is a quite unique opportunity to participate in a discussion regarding the future of IBM CICS technology. We will be sharing our views. And we will be hoping for lots for interactive feedback. Please don’t be shy!
Data Center Security Now and into the FutureCisco Security
Understand all the latest Data Center trends and Data Center security requirements. Take a deep dive on Cisco’s value-added integrated approach on Data Center Security Strategy.
Tomáš Michaeli, VMware
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
Virtualization is one of the hottest trends occurring in the IT industry. We dive into what virtualization is and why you should be thinking about implementing it into your network plan.
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013Jaroslav Prodelal
Dokážete si představit, že byste provozovali své datacentrum v prostředí kanceláře? Ano, je to možné. Společnost Dell uvedla na trh novinku v podobě tzv. datacenter-in-a-box (vše-v-jednom), které je optimalizované (odhlučnění, napájení) pro provoz i v kanceláři, samozřejmě jej můžete dát i do samostatné místnosti.
Dell VRTX kombinuje v jediném 5U šasí výpočetní výkon (až 4 2-CPU servery), diskové úložiště (až 24 HDD) a síť.
Ve webináři vás seznámíme s touto cenově velmi zajímavou novinkou a ukážeme rozdíl mezi tímto řešením a případnými alternativami v době samostaných serverů, diskového pole a síťových switchů.
Agenda:
* co je Dell VRTX?
* segment zákazníků pro VRTX
* co VRTX nabízí
* řešení provozované na VRTX
* technické specifikace
* možná použití
* cena
* aktuální nabídky a promo akce
Increasing Business Value Through High-Availability TechnologyNexenta Systems
This Webinar features Jessie Bryan (Dir. of Systems Engineering at Impulse Advanced Communications) and discusses the high-availability capabilities in NexentaStor, including:
- eliminating a single point of failure with active-active fail-over to a standby system
- establishing fail-over groups and implementing highly cost-effective disaster recovery
- achieving zero data loss and downtime with half the complexity
- automating and non-disruptively testing fail-over / fail-back via NexentaStor
- setting up manual and automated fail-over of critical applications and services in a clustered environment
Finally, learn how Impulse - a communications provider focused on voice and data services - leverages the Nexenta-certified Pogo Linux StorageDirector Z2 HA Cluster SAN solution to deliver continuity of their services to customers.
Webinar Date: March 15th, 2011
Is Your Data Secure?
Odds are good that your data is extremely important to you. Now consider how one secures that data. Typical approaches address access, authentication, integrity, non-repudiation and confidentiality concerns at the domain and link layers, implicitly securing the data. The challenge and need is to move these security specifications to the data itself, and provide explicit security policies on each element of system-identified data.
Why is this level of finesse needed? As you build out your systems, and systems of systems, how do you manage security when individually element of data, the communication links, and domain boundaries have different behaviors? With this level of complexity and risk, it's critical to have awareness at the level that matters – the data level – so you can make the right design and implementation decisions.
At this webinar, learn how to achieve an assured and predictable security footprint by minimizing the leak of information or exploitation of data through unintended consequences. Secure DDS offers data-centric configuration policies for content and behaviors. Recognizing that security isn't one-size fits all, a standards-based optional plugin SDK allows developers to create custom security plugins.
Connext Secure DDS is the world's first turnkey DDS security solution that conforms to the OMG specification and provides an essential security infrastructure that is data-focused for DDS and legacy systems.
Watch On-Demand: http://ecast.opensystemsmedia.com/478
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Codit
“Internet of Things” is changing our world and today the Internet of Things knows almost as many applications as there are types of devices connected. In this session, Sam and Glenn will give an overview of the latest IoT solutions, the different learnings from the field and explain which key components are instrumental to integrating your solutions to the Azure IoT platform to ensure they are robust, future-proof and secure.
This proposal incorporated a vision for the network architecture of a new platform Milliman was creating. It was based on research into what was then new technologies like SQL Server Failover and Catalyst (now Cisco) 6500 series switching.
With all the hype around Cloud and SDN, business decision makers are finding themselves trying to navigate through many new concepts and consequently needing to change the way they have traditionally selected their IT infrastructure. Technologies are now becoming more integrated and it is more important than ever to help your business be agile enough to keep up with the demands of your users and your customers. Come hear from Lisa Guess to learn how organizations can embrace Cloud technologies such as automation, SDN and Orchestration platforms to help you build next-generation networks.
It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. The advent of big data and analytics helps to enable better real-time decision making, automation, and efficiencies necessary to deliver such digitalized applications. Cisco DNA automation and assurance are built on a software-defined networking (SDN) controller, rich contextual analytics, network virtualization and the cloud.
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...FINOS
Technology leaders (CTO, VP Infrastructure, etc.) at most organisations are always looking for better and more efficient ways to address business needs. Performance is one of the critical attributes leaders consider while making data center infrastructure decisions, but with limited budgets, cost efficiency becomes an important criteria as well. This talk will discuss both CapEx and OpEx advantages of open networking, combined with technical benefits that lead to easier automation, scaling and troubleshooting.
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Codit
While working on several Internet of Things projects with different customers in Europe, it became clear that Integration matters more than ever. Building an overall IoT solution requires many different technologies and skills. The Architect role is crucial to combining different services into one solid solution. Integration skills are extremely important in building robust and scalable IoT solutions. Every phase of the IoT value chain requires integration, since IoT solutions are distributed and decoupled by nature. Retro-fitting existing devices? Routing of telemetry data? Or even exposing analytics results through secured APIs? All these challenges require integration skills. Skills that are very familiar to specialists in the Integration business. This presentation will explain why these are great times to be an Integration expert and how we can help tackling current challenges.
As you move your IT Infrastructure into the cloud, how secure can you expect your applications to be? Join Alert Logic and Internap on this webcast for an enlightening discussion on the state of cloud security and how it impacts security management decisions, especially in the context of deploying infrastructure to hosted and cloud environments.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SDN and NFV journey. This presentation has been presented at Conference Networks and Security (SCSR 2016) on 15th May 2016 (Sunday), University Teknology Malaysia
OVNC 2015-Software-Defined Networking: Where Are We Today?NAIM Networks, Inc.
[Open & Virtual Networking Conference 2015]
- Software-Defined Networking: Where Are We Today? (VMware Guido Appenzeller 네트워크 및 보안 부문 최고 기술전략책임자(CTSO))
- 2015.02.05 (목) 09:10~17:50
- 양재동 엘타워
Similar to infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja sieci to rewolucja w firmie?" (20)
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
2. Network Virtualization change areas
2
TechnologyPeople
Process
Best practices and guidance based on
production customers
3. The maturity model: the path to the vision
3
Blended
Cross-domain
and discipline
Siloed Specialization
Organization
(Structure)
People
(Roles &
Responsibilities)
People
Automated Modern
Manual Legacy
Processes Tooling
Process
Minimum
Maximum
Minimum
MaximumLeaf-spine fabric Virtual
3-tier Physical
Architecture Infrastructure
Architecture
5. Myth busters!
5
People
You will not be
automated out of a job.
MYTH #1
Software-defined data
center is going to automate
me out of a job
MYTH #2
Network functions will be
absorbed into the
virtualization team
MYTH #3
A virtual overlay is going to
make my job more difficult
MYTH
BUSTER #1
Your job will not go to
the virtualization team.
MYTH
BUSTER #2
Overlays do not make
your job more difficult.
MYTH
BUSTER #3
6. Private cloud | SDDC
Traditional network | HDDC
Hybrid cloud | SDDC
Org structures (simplified view)
6
Successfully operationalized in a variety of org structures
Compute Storage Networking
People
Minimum
Maximum
OperationsEngineeringArchitecture
Minimum
Maximum
• Blended
• Autonomous
• Intra-team training
Compute Storage Networking
7. Best practices
CONFIDENTIAL 7
Start with a small, cross-functional team
Select change agents
Define measures
of success
Communicate lessons
and wins
People
1
Network
SecurityCompute
Storage
Incubation team Tiger team
8. High impact
8
Unified team working together, sharing lessons learned, and continuously improving
People
Silos Specialization
Blended
Cross-domain
and discipline
A closely-knit team working in unison increases
company speed and agility
Team gains new expertise and experience, making
them more strategic and valuable to the company
Leadership opportunity during this networking
and security transformation
Avoid surprises!
New Cloud networking and security roles
Org structure People
9. 9
Network virtualization is based on networking
concepts that require networking expertise
Need network engineers to deploy and
operate it
Career growth and opportunity
Network engineers must learn network
virtualization to stay current
Learning network virtualization is
required for future career growth
People
11. Myth busters!
11
Process
& Tooling
Virtual networks bring
agility and simplicity
to processes.
MYTH #1
Virtual networks adds
complexity to existing
processes
MYTH #2
You need separate tools to
manage virtual and
physical networks
MYTH #3
Network virtualization
reduces visibility
MYTH
BUSTER #1
Existing management
tools can monitor both
networks.
MYTH
BUSTER #2
Provides more context
and visibility.
MYTH
BUSTER #3
13. CONFIDENTIAL 13
Start
COTS?
Create
Network Data
flow diagram
Asset Discovery
vCenter
(Tags, notes)
Define List of
IP s & VM s
End
VMware
Infrastructure
Navigator
Existing Firewalls NetFflow Collectors
Existing
Documentation
Existing Asset and
Discovery
Monitoring
Dashboards
Potential Data Sources
Define
Grouping
Objects
Documentation
Security Groups
Vendor
Documentation
Services / Service
Groups
IPSETs
List of IP AddressesList of VM s
Define Security
Posture
Security Policies
Manual Firewall
Rules
Deploy
Performance /
Capacity
management
reports
14. Best practices
CONFIDENTIAL 14
Automate provisioning and management
Process
3
Start with IT automation
Quick win: security
automation
Self-service: portals and
catalogs
Security Policies & Groups
Development workload
Test workload
Production workload
Application type:
customer PCI
Groups
Finance
Sales
Engineering
Standards
Config #1
Config #2
Config #3
Config #4
Config #5
Config #6
16. Application
Dashboard
Best practices
CONFIDENTIAL 16
Create application-level visibility
Process
4
Start with existing tools
Use same instrumentation
and protocols
Using blend of tools is OKHealth
Utilization
Capacity
COMPUTE NETWORK STORAGE
Real-time
summary
Monitoring and
troubleshooting
Debugging
17. High impact
17
Automated processes and enhanced network management
Automated Modern
Manual Legacy
Process
& Tooling
Policy-based provisioning of networks and services
brings agility and eliminates common config. errors
Manual operations can be automated (e.g., self service
portals, scaling network services, rule management)
Single view providing highest level of visibility into virtual
and physical SDDC infrastructureProcesses Tooling
19. A tightly integrated
system from a single
vendor is not always
best.
Technology
MYTH #1
A tightly integrated system
from a single vendor is the
best approach.
MYTH #2
Network virtualization
requires a re-architecture
of the physical network.
MYTH #3
Overlay networks are
inherently difficult to
manage.
Myth busters!
MYTH
BUSTER #1
Network Virtualization
works on your existing
physical network.
MYTH
BUSTER #2
Overlay networks have
been proven to be flexible
and easy to manage.
MYTH
BUSTER #3
20. Define your initial use cases
20
Micro segmentation
DMZ anywhere
Secure end user
Security
IT automating IT
Multi-tenant
infrastructure
Developer cloud
IT automation
Disaster recovery
Metro pooling
Hybrid cloud
networking
Application continuity IT optimization
Server asset utilization
Price | performance
Hardware lifecycle
$
21. Best practices
CONFIDENTIAL 21
Implement network virtualization incrementally5
Focus on service quality
Collaborate with
stakeholders
Develop SLAs over time
Design the physical
network for simplicity
Technology
Use case #1
Micro-segmentation
Communicate
• Project wins
• Learnings
• KPI metrics
22. Best practices
CONFIDENTIAL 22
Design the network for simplicity and resiliency6
Technology
Add networking and
security to DR
Workload mobility
and portability
Throughput, scalability,
and robustness
23. Traditional VLAN network
VM1 VM2
Server 1
VM3
VM4 VM5
Server 2
VM6
VM7 VM8
Server 3
VM9
Physical switch
Virtual networks:
1 2
3
VLANs
Technology
24. Software Defined Data Center
VM1 VM2
Server 1
VM3
VM4 VM5
Server 2
VM6
VM7 VM8
Server 3
VM9
Controller
Technology
25. High impact
Decouple and abstract networking services for increased control
Leaf-spine
ECMP fabric Virtual
Access/aggregation
/core
Physical
Resilient and scalable leaf-spine architecture
increases reliability and performance
Centralized point of control for management
and monitoring of virtual networks and security
Distributed implementation of services means
fine-grained policies can be operationalized
Technology
Architecture Infrastructure
26. Next steps
26
Minimum
Maximum
Minimum
Maximum
Blended
Cross-domain
and discipline
Silos Specialization
People
Automated Modern
Manual Legacy
Process
Leaf-spine
ECMP fabric
Virtual
Access/Aggregation
/Core
Physical
Architecture
TransformationPilotLearning
Organization
(structure)
People
(roles and
responsibilities)
Processes Tooling Architecture Infrastructure
27. Things to remember
27
Operations transformation results in big outcomes and rewards
Leadership: set vision,
communicate, and
involve people
Grow: gain expertise
and achieve professional
and career growth
Incremental: start with
one use case and set of
applications
Many have done it. It’s not complicated. Minimal changes.