The core fundamentals of distributed systems. Learn how some of these fundamentals can be used in other areas of your IT infrastructure. Learn how NGINX follows some of these characteristics and how it can help you in your Infrastructure.
Siauw Nam Khong's presentation at SGU Seminar and Focus Grup Discussion with theme 'Data Governance and Management for Digital Transformation, industry 4.0, and Internet of Thing'
HiveMQ Webinar: Lightweight and scalable IoT Messaging with MQTTDominik Obermaier
In this webinar HiveMQ CTO Dominik Obermaier will cover everything you need to know about creating a lightweight and scalable IoT message architecture. He will discuss the open source projects you need to deploy and manage an MQTT based IoT architecture.
Don't miss your chance to learn about HiveMQ and the concept of MQTT!
The recording of this webinar is available on Youtube:
Piotr Kędra – network consultant. Since 2007 Piotr has been working as Systems Engineer in Polish entity of Juniper Networks. He is responsible for network solutions for enterprise sector and technical support for channel. Previously he work in Solidex and NextiraOne as presales enginner. He participated in number of audits and many projects in area of LAN, WAN and network security.
Topic of Presentation: The role of information in modern security systems
Language: Polish
Abstract: TBD
This session examines how Legal Counsel can help software development teams create an automated compliance process to make daily decisions related to open source licenses.
Siauw Nam Khong's presentation at SGU Seminar and Focus Grup Discussion with theme 'Data Governance and Management for Digital Transformation, industry 4.0, and Internet of Thing'
HiveMQ Webinar: Lightweight and scalable IoT Messaging with MQTTDominik Obermaier
In this webinar HiveMQ CTO Dominik Obermaier will cover everything you need to know about creating a lightweight and scalable IoT message architecture. He will discuss the open source projects you need to deploy and manage an MQTT based IoT architecture.
Don't miss your chance to learn about HiveMQ and the concept of MQTT!
The recording of this webinar is available on Youtube:
Piotr Kędra – network consultant. Since 2007 Piotr has been working as Systems Engineer in Polish entity of Juniper Networks. He is responsible for network solutions for enterprise sector and technical support for channel. Previously he work in Solidex and NextiraOne as presales enginner. He participated in number of audits and many projects in area of LAN, WAN and network security.
Topic of Presentation: The role of information in modern security systems
Language: Polish
Abstract: TBD
This session examines how Legal Counsel can help software development teams create an automated compliance process to make daily decisions related to open source licenses.
When you're building a solution to support 40,000 Department of Defense personnel from a central command center, one of the most demanding and security conscious customers in the world, you'd better know what's happening on your network. Join us for this webinar as we profile a recent use case where ensuring the validity of the data traveling on the network, and delivering time-sensitive information without delays was absolutely critical. Net Optics Tap technology provided the answer this Defense Contractor was looking for and proved mighty enough to conquer the needs of this demanding customer.
In this Webinar:
Understand the immediate impact and business value of deploying Network Taps
Learn how the ability to monitor and troubleshoot network issues remotely increases end-user satisfaction
Identify key points in your network where 100% visibility is critical to reducing mean-time-to-repair (MTTR) and improving network uptime
About Net Optics, Inc.
Net Optics is the leading provider of Intelligent Access and Monitoring Architecture solutions that deliver real-time IT visibility, monitoring and control. As a result, businesses achieve peak performance in network analytics and security. More than 7,500 enterprises, service providers and government organizations—including 85 percent of the Fortune 100—trust Net Optics’ comprehensive smart access hardware and software solutions to plan, scale and future-proof their networks through an easy-to-use interface. Net Optics maintains a global presence through leading OEM partner and reseller networks.
Web: http://www.netoptics.com
Phone: 408-737-7777
Twitter: @netoptics
Facebook: http://www.facebook.com/netoptics
LinkedIn: http://www.linkedin.com/company/net-optics-inc.
Security Advantages of Software-Defined NetworkingPriyanka Aash
Current practices using wide-area routing over Internet infrastructure decentralize the control of how information is transferred. Software-Defined Networking (SDN) centralizes network control functions, offering more holistic network security management and allowing for dynamic divisioning, multivendor end-to-end security and reduced dependence on the traditional perimeter approach.
(Source: RSA USA 2016-San Francisco)
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware
http://www.radware.com/Products/DefenseFlow/
Learn about the industry's first SDN application that enables network operators to program the network to provide DDoS protection as a native network service.
As evolving security concerns have prevailed, the network time synchronization protocol community has been actively engaged in the development of improved security mechanisms for both the IEEE 1588 Precision Time Protocol (PTP) and the IETF Network Time Protocol (NTP). These activities have matured to the point where this year should see the finalization of the first new security mechanisms for time protocols in ten years. This paper provides an overview of the two solutions being developed, compares and contrasts those solutions, and discusses relevant use cases and deployment scenarios.
HiveMQ CTO Dominik Obermaier will present the new features of MQTT 5 and tell why you need them for your IoT project. Additionally, he will uncover the common pitfalls and show how MQTT deployments can be seamlessly upgraded to the new standard.
Don't miss your chance to learn why you should upgrade to MQTT 5!
Also available on Youtube: https://www.youtube.com/watch?v=Q8nQ2J27r0c
MQTT is the most popular IoT protocol for connecting devices at scale and a modern alternative for lightweight backend (microservice) communication. This session covers everything you need to know about scalable pub/sub communication with MQTT for up to millions of devices and shows the available software options in the (open source) ecosystem. We also address the brand new features of MQTT 5 as well as advanced microservice integration topics.
Software Defined Networking: Network VirtualizationNetCraftsmen
SDN has the potential to revolutionize the way networks are designed, sold, and operated. This presentation describes SDN, discusses what it can do, and presents use cases. It also talks about the current and potential impact of SDN on the networking industry.
Webinar topic: Cloud Security Introduction
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Cloud Security Introduction
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)Gabriella Davis
Two years ago enabling your site with SSL was a simple affair, buy a certificate or create your own, install it, then just remember to renew it every couple of years. Then, suddenly security holes are being found in SSL virtually every month , popular browsers stop connecting to your site to protect themselves, and you’re continually being told your users data is at risk. In this session we will discuss how it all went wrong and can go wrong again, then go through each step of requesting, generating and deploying a 4096 SHA-2 certificate to use in a keyfile by Domino, IBM Connections, IBM Sametime and other WebSphere products. If you work with these IBM products and need to secure them with confidence this session will show you how!
For a college course at Coastline Community College taught by Sam Bowne. Details at https://samsclass.info/125/125_F17.shtml
Based on: "CISSP Study Guide, Third Edition"; by Eric Conrad, Seth Misenar, Joshua Feldman; ISBN-10: 0128024372
The Potential Impact of Software Defined Networking SDN on SecurityBrent Salisbury
The Potential Impact of Software Defined Networking SDN on Security. The video of the presentation is at http://networkstatic.net/the-potential-impact-of-software-defined-networking-sdn-on-security/ by Brent Salisbury. It is the first cut so a lot is not in the deck yet on the example use case front.
When you're building a solution to support 40,000 Department of Defense personnel from a central command center, one of the most demanding and security conscious customers in the world, you'd better know what's happening on your network. Join us for this webinar as we profile a recent use case where ensuring the validity of the data traveling on the network, and delivering time-sensitive information without delays was absolutely critical. Net Optics Tap technology provided the answer this Defense Contractor was looking for and proved mighty enough to conquer the needs of this demanding customer.
In this Webinar:
Understand the immediate impact and business value of deploying Network Taps
Learn how the ability to monitor and troubleshoot network issues remotely increases end-user satisfaction
Identify key points in your network where 100% visibility is critical to reducing mean-time-to-repair (MTTR) and improving network uptime
About Net Optics, Inc.
Net Optics is the leading provider of Intelligent Access and Monitoring Architecture solutions that deliver real-time IT visibility, monitoring and control. As a result, businesses achieve peak performance in network analytics and security. More than 7,500 enterprises, service providers and government organizations—including 85 percent of the Fortune 100—trust Net Optics’ comprehensive smart access hardware and software solutions to plan, scale and future-proof their networks through an easy-to-use interface. Net Optics maintains a global presence through leading OEM partner and reseller networks.
Web: http://www.netoptics.com
Phone: 408-737-7777
Twitter: @netoptics
Facebook: http://www.facebook.com/netoptics
LinkedIn: http://www.linkedin.com/company/net-optics-inc.
Security Advantages of Software-Defined NetworkingPriyanka Aash
Current practices using wide-area routing over Internet infrastructure decentralize the control of how information is transferred. Software-Defined Networking (SDN) centralizes network control functions, offering more holistic network security management and allowing for dynamic divisioning, multivendor end-to-end security and reduced dependence on the traditional perimeter approach.
(Source: RSA USA 2016-San Francisco)
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware
http://www.radware.com/Products/DefenseFlow/
Learn about the industry's first SDN application that enables network operators to program the network to provide DDoS protection as a native network service.
As evolving security concerns have prevailed, the network time synchronization protocol community has been actively engaged in the development of improved security mechanisms for both the IEEE 1588 Precision Time Protocol (PTP) and the IETF Network Time Protocol (NTP). These activities have matured to the point where this year should see the finalization of the first new security mechanisms for time protocols in ten years. This paper provides an overview of the two solutions being developed, compares and contrasts those solutions, and discusses relevant use cases and deployment scenarios.
HiveMQ CTO Dominik Obermaier will present the new features of MQTT 5 and tell why you need them for your IoT project. Additionally, he will uncover the common pitfalls and show how MQTT deployments can be seamlessly upgraded to the new standard.
Don't miss your chance to learn why you should upgrade to MQTT 5!
Also available on Youtube: https://www.youtube.com/watch?v=Q8nQ2J27r0c
MQTT is the most popular IoT protocol for connecting devices at scale and a modern alternative for lightweight backend (microservice) communication. This session covers everything you need to know about scalable pub/sub communication with MQTT for up to millions of devices and shows the available software options in the (open source) ecosystem. We also address the brand new features of MQTT 5 as well as advanced microservice integration topics.
Software Defined Networking: Network VirtualizationNetCraftsmen
SDN has the potential to revolutionize the way networks are designed, sold, and operated. This presentation describes SDN, discusses what it can do, and presents use cases. It also talks about the current and potential impact of SDN on the networking industry.
Webinar topic: Cloud Security Introduction
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Cloud Security Introduction
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)Gabriella Davis
Two years ago enabling your site with SSL was a simple affair, buy a certificate or create your own, install it, then just remember to renew it every couple of years. Then, suddenly security holes are being found in SSL virtually every month , popular browsers stop connecting to your site to protect themselves, and you’re continually being told your users data is at risk. In this session we will discuss how it all went wrong and can go wrong again, then go through each step of requesting, generating and deploying a 4096 SHA-2 certificate to use in a keyfile by Domino, IBM Connections, IBM Sametime and other WebSphere products. If you work with these IBM products and need to secure them with confidence this session will show you how!
For a college course at Coastline Community College taught by Sam Bowne. Details at https://samsclass.info/125/125_F17.shtml
Based on: "CISSP Study Guide, Third Edition"; by Eric Conrad, Seth Misenar, Joshua Feldman; ISBN-10: 0128024372
The Potential Impact of Software Defined Networking SDN on SecurityBrent Salisbury
The Potential Impact of Software Defined Networking SDN on Security. The video of the presentation is at http://networkstatic.net/the-potential-impact-of-software-defined-networking-sdn-on-security/ by Brent Salisbury. It is the first cut so a lot is not in the deck yet on the example use case front.
Scriitorul francez Basile BARLOT, de origină română Vasile BARLOGEANU, este un representant al unui gen literar mai puțin obișnuit - aforismul - exprimând cu un minimum de cuvinte câteva din multiplele fațete ale existenței umane.
Asemenea scrieri bazate pe adevăruri existențiale care n-au nevoie de demonstrație, fiind - cum spune însusi autorul - extrema limită a unei certituni, chintensență a devenirii noastre temporale constitue latura forte a creației sale.
Aforismele sunt generate de interogații existențiale şi de răspunsuri pe care autorul le descoperă în propria-i devenire sau a celei a semenilor lui.
Mi nombre es Jaime Guillermo González Gámez y actualmente vivo en Guadalajara, Jalisco, México.
Soy Medico Alergólogo e Inmunólogo, e imparto la materia de inmunología en la UVM Campus Zapopan, también tengo un consultorio privado y trabajo en el Hospital Regional Valentín Gómez Farías
No saben como me llena de alegría que bastantes personas puedan aprender de mis presentaciones, cualquier pregunta de los temas no duden en marcar a mis teléfonos, estoy a sus ordenes.
Mexicaltzingo #1979 (Col. Americana) 44160 Guadalajara
01 33 3825 3063
01 33 3836 3299
www.facebook.com/jaimeguillermo.gonzalezgamez
Istio Mesh – Managing Container Deployments at ScaleMofizur Rahman
The service mesh is an infrastructure component that helps manage services running within our clusters. Without any changes to service or application code, solutions like Istio and Linkerd provide features to manage container deployments at scale. With Istio we get traffic management, security, rate limiting, monitoring, and many more things out of the box. We will discuss these solutions and some of their features at a high level, then roll in some specific demonstrations of using a service mesh to route and shift service traffic, easily manage deployments and test our services with micro benchmarks and fault injection.
The service mesh is an infrastructure component that helps manage services running within our clusters. Without any changes to service or application code, solutions like Istio and Linkerd provide features to manage container deployments at scale. With Istio we get traffic management, security, rate limiting, monitoring, and many more things out of the box. We will discuss these solutions and some of their features at a high level, then roll in some specific demonstrations of using a service mesh to route and shift service traffic, easily manage deployments and test our services with micro benchmarks and fault injection. We will also look at some of the error scenarios you may encounter and how to deal with some of them while keeping your sanity.
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...InfluxData
Critical infrastructure, such as manufacturing facilities, power plants, dams, and chemical plants, has long experienced a phenomenon known as dark data – crucial information is locked away in disparate and proprietary systems. At Rose-Hulman Institute of Technology, we are teaching students to unlock this data with the help of tools such as Telegraf and InfluxDB to better make informed decisions. In addition, these tools allow our students to investigate best practices in data handling and critical infrastructure cybersecurity.
Zero to ten million daily users in four weeks: sustainable speed is kingplumbee
A successful social game can achieve very rapid growth to large scale during a short period of time, with extreme cases (CityVille, The Sims Social, Gardens of Time) achieving millions of daily active users and tens of millions of monthly active users within a few weeks of launch. In this presentation I will argue that achieving the fastest possible sustainable speed of development is the most important technical factor in launching and operating a successful social game, or indeed any large-scale web business -- whether at startup phase, during rapid growth, or established and mature. I will propose some techniques, both technical and non-technical, to optimize rapid development at large scale. Finally, I will describe some of the typical architecture, processes, and tools used in the development of both the transactional and analytical systems of social games.
SESSION TITLE
DevOps - IaC
SESSION THEME
DevOps
SESSION OVERVIEW
This is a hands-on experience workshop on "DevOps - IaC" and Automation from Infrastructure prospective. The session provides valuable insights on How "IaC" is going to be future for traditional DC, VM's and for Cloud, and How to setup or start with "IaC", what tool set and pipelines can be used and followed to move from traditional manual approach to automated DevOps approach.
SESSION AGENDA
What is DevOps? and Why you need DevOps?
What is DevOps - IaC?
Overview of some essential tools like Git, Jenkins, Docker/Ansible
Live Demo
Q&A
SESSION TAKEAWAYS
DevOps - IaC Framework
Overview of Tool Set
Pipeline Creation Overview
Automation Idea
And at last confidence to start a change towards DevOps
DURATION
45 Mins
Containers - Transforming the data centre as we know it 2016Keith Lynch
These innovative technologies are at the heart of the microservices and DevOps revolution currently sweeping through the IT industry. They are fuelling digital transformation and accelerating cloud adoption. They're helping organisations develop infrastructure agnostic applications that can be deployed anywhere i.e. Bare Metal, Virtualised Data Centres, Private and Public Cloud. They’re helping organisations to significantly reduce infrastructure costs and accelerating agile application delivery by automating application deployments and operational management. After this talk you’ll know what these open source technologies and open standards are, what they mean to you and your organisation and where you can go to try them out.
The new trend of open source based hardware and software is disrupting the data center market unleashing unprecedented value to the customers. Come join us to see how the community based open source networking software OpenSwitch completes the all open sourced data center solution end to end, from the hardware layer to the cloud stack, and to see how HPE and its partners accelerating its adoption with the industry leading HPE Altoline, and OpenSwitch product line.”
DEVNET-1117 Open Source DevCenter Launched within DevNetCisco DevNet
Discover the Open Source DevCenter, your source for open source at Cisco. Experience how information is organized and accessed through microsites for major open source projects, and join communities with Cisco and non-Cisco developers who contribute to and use these projects.
This talk was done in Feb 2020. Sergey and I co-presented at CTO Forum on Microservices and Service Mesh (how they relate, requirements, goals, best practices and how DevOps and Agile has had convergence in the set of features for Service Mesh and gateways around observability, feature flags, etc.)
Whar are microservices and microservices architecture (MSA) How we reach them? Are they the same or SoA or not? When to use them? What are the key characteristics?
Slides of my talk given in #Gapand2017 in Andorra
DockerCon Live 2020 - Securing Your Containerized Application with NGINXKevin Jones
NGINX is one of the most popular images on Docker Hub and has been at the forefront of the web since the early 2000's. In this talk we will discuss how and why NGINX's lightweight and powerful architecture makes it a very popular choice for securing containerized applications as a sidecar reverse proxy within containers. We will highlight important aspects of application security that NGINX can help with, such as TLS, HTTP, AuthN, AuthZ and traffic control.Additional Sponsor InformationDuring our session we will be Raffling off a swag pack to live attendees. We'll also be offering 30% off our swag store that can be shared via social. Details below:URL: swag-nginx.com
Code: DOCKERCON30
Value: 30% off
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
Ricon 2015 final
1. Bringing Together the Core Fundamentals
of Distributed Systems
Kevin Jones @webopsx
11-5-2015
2. A Little about me
2
• My name is Kevin Jones
• Currently working as Sales Engineer for NGINX, Inc
• Previously worked as an SRE for YP - yellowpages.com
• Experience with production operations, large scale infrastructure and
automation
• Enjoy meeting new people, music and learning new technology
3. Objectives
3
• What is a Distributed System?
• What makes a Distributed System efficient and reliable?
• What are some of the core fundamentals of Distributed Systems and what
makes them great characteristics to implement in other areas of your IT
infrastructure?
• What qualities does NGINX have that reflect some of these core fundamentals
and how can NGINX help strengthen and improve your existing IT
infrastructure?
• Q&A
5. 5
• A program… is the code you write.
• A process… is what you get when you run it.
• A message… is used to communicate between processes.
• A packet… is a fragment of a message on a wire.
• A protocol… is a formal description of a message and its rules it must follow
in order to exchange those messages.
• A network… is the infrastructure that links computers, workstations, terminals
etc together.
• A component… can be a process or any piece of hardware required to run a
process.
Lets go back to the basics…
6. 6
Therefore…
• A distributed system… is an application that executes a
collection of protocols to coordinate the actions of multiple
processes on a network, such that all components cooperate
together to perform a single or small set of related tasks.
7. What Makes a Distributed System Efficient and Reliable?
7
• Scalable
• High Performing
• Highly Available
• Transparent
• Open
• Secure
It should be…
9. 9
• Plan for the future
• Think about user experience
• Start with thinking about SCALE!
Distributed Geometric Availability When Needed
10. 10
• Number of machines
• Number of users
• Number of tasks
• Connections or concurrency
Dealing with the Size of Your Infrastructure
11. 11
• Cost of maintenance
• Efficiency of maintenance
Administration and Dealing with
Maintenance of Systems
12. 12
Characterized by the amount of useful work accomplished by a computer system compared to
the time and resources that are used.
Performance
13. 13
Latency is the state of being latent; delay, a period between the initiation of
something and the occurrence.
14. 14
Latent in latin terms means “hidden”. Existing or present but concealed or
inactive.
15. 15
What Are the Characteristics of High Performance?
• Short response time or low latency
• High throughput or rate of processing work
• Low utilization of computing resources
16. 16
The proportion of time a system is in a functioning condition. If a user cannot access the
system, it is said to be down.
Availability
17. 17
• Designing for failure
• Identifying weak points
• Implementing redundancy
High Availability Is All about Being Fault Tolerant
18. 18
• Network outages across the wire or inside your own private network
• Outages of other third party services or dependencies
• Anything that is out of control of the designer
Some Things Are out of Your Control
19. 19
Any form of a distributed system should hide its distributed nature from its users, appearing
and functioning as a normal centralized system.
Transparency
20. There Are Many Types of Transparencies in Distributed Systems
20
• Access - one single way to access
• Location - no matter where the user is
• Migration - physical location
• Relocation - moving of resources
• Replication - appear as a single resource
• Concurrent - competing for resources
• Failure - try to hide failure to the user
• Persistence - whether volatile or permanent
• Security - minimum user intervention
21. 21
This determines whether the system can be extended in various ways without disrupting
existing systems or services and be able to easily interact with other open services.
Openness
22. 22
• Conform to well-defined interfaces
• Support portability of applications
• Easily interoperate with other services
To Keep Your Distributed System Open It Must…
23. 23
The system should authenticate access to data and services,
be invulnerable to know threats and follow industry standard security guidelines.
Secureness
24. 24
• Security Audits
• Software patching maintenance or vulnerability management
• Try to use a security framework
• Encryption everywhere
• Integrity checking (Auth)
• Confidentiality through authorization (Resource Access)
• Monitoring of traffic, logins and requests
Common Measures to Help with Security
25. 25
ALL of them!
Which of These Core Fundamentals Can Be Implemented
in Other Areas of Your IT infrastructure?
26. 26
Many of these characteristics can be found in NGINX and can even help you
strengthen your existing IT infrastructure.
27. 27
Quick Intro to NGINX
• Open source version created in 2004
• NGINX, Inc. founded in 2011
• 140 million + known instances running
today on the internet
• #1 web server of choice on the top 100,000
busiest sites
Igor Sysoev, NGINX creator and founder
29. 29
Scalability
NGINX - Open Source
Layer 7 Software Load Balancer for HTTP(S) / TCP
Application Delivery Platform
API Gateway
10,000+ Virtual Servers Multi-tenancy
NGINX Plus - Commercial
Real Time Activity Monitoring API (status)
Dynamic Upstream Reconfiguration API (upstream_conf)
32. 32
Performance
NGINX - Open Source
High Throughput
High Number of Concurrent Connections (1 Million+)
Content Caching at Edge
Low CPU/Memory Utilization
Fine Tunable Configuration
HTTP2!!!
34. 34
Availability
NGINX - Open Source
HA Configurable with keepalived
(IP Syncronization over VRRP)
NGINX Plus - Commercial
NGINX HA Package for Easy Configuration
Application Aware Health Checks for Upstreams
35. 35
Transparency
NGINX - Open Source
Combined with Global DNS Can Handle
Global Load Balancing (Route53, Google, GoDaddy etc)
Reverse Proxy - Single Entry Point
NGINX Plus - Commercial
Session Persistence (Cookie, Session, Route)
36. 36
Openness
NGINX - Open Source
Open Source / Third Party Modules
nginScript - JavaScript Inside NGINX Configurations
Dynamic Loadable Modules COMING SOON!
NGINX Plus - Commercial
Simple HTTP Based APIs
API with JSON Interface
38. 38
Secureness
NGINX - Open Source
Authentication via auth_request Module
SSL Support
Client Certificate Based Authentication Support
Bandwidth Limiting
Connection Limiting
Access Control Lists (ACLs)
LDAP Support
Reverse Proxy - Easily ACL Backend Resources
NGINX Plus - Commercial
NTLM Support
39. 39
Thank you all again for coming!
Twitter @webopsx
Kevin Jones
http://www.slideshare.net/KevinJones62
Q&A?