VMware’s Private Cloud has grown to be one of the world’s largest private clouds with over 100K virtual machines! Come and join us and discover how EVO SDDC is shaping the future of our private cloud and why we’ve made key decisions at various inflection points through our journey to SDDC. We’ll provide you an operations perspective of the pains and gains that EVO SDDC can bring to your private cloud. The session speakers are directly responsible for the day-to-day management of building and operating VMware’s internal private cloud. The session’s commentary is based on recent, real world experiences in dealing with the practicalities of managing a large and complex private cloud to allow for agility to meet today’s IT challenges.
VMware vRealize Network Insight delivers intelligent operations for software-defined networking and security across virtual, physical and multiple-clouds with micro-segmentation planning, 360 visibility and NSX operations.
An overview of Whats New in VMware vRealize Network Insight 3.4. vRealize Network Insight provides micro-segmentation planning, 360 visibility and troubleshooting and VMware NSX day 2 operations management.
VMware vRealize Network Insight Frequently Asked Questions FAQRichard Common
General Q&A
Q: What is Arkin (now vRealize Network Insight)?
Q: What is the new Arkin product name?
Q: How will vRealize Network Insight be integrated into VMware?
Q: Where can I find more information about vRealize
Network Insight?
Q: Who can sell vRealize Network Insight?
Q: Who can purchase vRealize Network Insight?
Q. When can I begin selling vRealize Network Insight?
Q: Will I be compensated for selling vRealize Network
Insight?
Q: Is there an Academic or Federal SKU?
Q: Can I add vRealize Network Insight to my existing NSX
Opportunities?
Q: How to get licenses?
VMware’s Private Cloud has grown to be one of the world’s largest private clouds with over 100K virtual machines! Come and join us and discover how EVO SDDC is shaping the future of our private cloud and why we’ve made key decisions at various inflection points through our journey to SDDC. We’ll provide you an operations perspective of the pains and gains that EVO SDDC can bring to your private cloud. The session speakers are directly responsible for the day-to-day management of building and operating VMware’s internal private cloud. The session’s commentary is based on recent, real world experiences in dealing with the practicalities of managing a large and complex private cloud to allow for agility to meet today’s IT challenges.
VMware vRealize Network Insight delivers intelligent operations for software-defined networking and security across virtual, physical and multiple-clouds with micro-segmentation planning, 360 visibility and NSX operations.
An overview of Whats New in VMware vRealize Network Insight 3.4. vRealize Network Insight provides micro-segmentation planning, 360 visibility and troubleshooting and VMware NSX day 2 operations management.
VMware vRealize Network Insight Frequently Asked Questions FAQRichard Common
General Q&A
Q: What is Arkin (now vRealize Network Insight)?
Q: What is the new Arkin product name?
Q: How will vRealize Network Insight be integrated into VMware?
Q: Where can I find more information about vRealize
Network Insight?
Q: Who can sell vRealize Network Insight?
Q: Who can purchase vRealize Network Insight?
Q. When can I begin selling vRealize Network Insight?
Q: Will I be compensated for selling vRealize Network
Insight?
Q: Is there an Academic or Federal SKU?
Q: Can I add vRealize Network Insight to my existing NSX
Opportunities?
Q: How to get licenses?
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMware
VMware IT implemented micro-segmentation using NSX Distributed Firewall to secure production applications and deployed NSX in a large-scale internal private cloud environment. We will review use cases for micro-segmentation such as SAP and discuss design considerations. We will outline our approach for finalizing the firewall policy model using Log Insight for firewall traffic monitoring and analytics and discuss roles and responsibilities and lessons learned. Please join us to learn how VMware secured its business services by leveraging NSX and scaled its internal private cloud deployment using NSX features. We will discuss the design, technical and organizational considerations of one of the world’s largest deployments of NSX for vSphere (hosting over 20,000 VMs). We will review the decisions involved in deploying new NSX environments and how VMware’s internal private cloud leverages NSX edge firewalling to achieve a scalable, multi-tenant security model.
VMware vSphereTM 5.0 (“vSphere”) brings many new capabilities to extend the benefits of vSphere 4.1. These new features and enhancements to core capabilities in vSphere provide more performance optimization and easier provisioning, monitoring and troubleshooting. This paper focuses on the storage-specific features and enhancements that are available in vSphere 5.0 and provides an overview of how they optimize storage utilization, ease monitoring, and increase operational efficiency. Wherever possible, we will also provide use cases and requirements that might apply to these new functions.
How to Enable vSphere with tanzu Supervisor ClusterAdam Alhafid
vSphere with Tanzu is a developer-ready infrastructure, that delivers a method to start with Kubernetes in infrastructure leveraging existing networking and storage using Tanzu Kubernetes Grid clusters. Kubernetes can be managed through vSphere. This allows vSphere admins to leverage their existing tooling and skillsets to manage Kubernetes-based applications, it provides vSphere admins with the ability to easily grow their skillset in and around the Kubernetes ecosystem.
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
Protect Your End-of-Life Windows Server 2003 Operating SystemSymantec
End of Support is Not the End of Business When software vendors announce a product end-of-life (EOL), customers typically have 24 to 30 months to plan and execute their migration strategies. This period is typically referred to as limited support. After the last day of support (also known as “end of support life date”), the product becomes obsolete, and the vendor will no longer automatically issue security patches. Customers have the option to purchase “extended or custom support” from the vendor after this date.
In many instances, the window for the availability of vendor support for the EOL product could be shorter than the time it would take for the customer to effectively migrate applications and processes to a new platform.
Customers may also be running custom applications that may not be compatible with the new platform. These gaps potentially expose unsupported systems to zero-day threats and new malware attacks. In order to address these potential risks, businesses will need to make some hard decisions:
• Run the applications in the unsupported platform.
• Execute an aggressive migration strategy for the mission-critical applications.
• Purchase an expensive extended support contract from the software vendor.
• Implement a security solution to harden and monitor the unsupported systems.
We have discussed about the azure VMs Inventory management,Change management,tracking and update management. Discussed on Azure VMs. scaling on demand and how to increase the same. Disk addition and deletion as well.
On March 23, TD Azlan held the "Build 4 the Cloud" seminar at De Olifant in Breukelen, Utrecht.
By organizing this seminar, TD Azlan was able to show her resellers which opportunities TD Azlan can offer to their enterprise, for virtualization and datacenter solutions.
Speakers Marc Samsom (Cisco) and Jan Smit (VMWare), among others, shared very useful information about upcoming changes in the datacenter market.
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMware
VMware IT implemented micro-segmentation using NSX Distributed Firewall to secure production applications and deployed NSX in a large-scale internal private cloud environment. We will review use cases for micro-segmentation such as SAP and discuss design considerations. We will outline our approach for finalizing the firewall policy model using Log Insight for firewall traffic monitoring and analytics and discuss roles and responsibilities and lessons learned. Please join us to learn how VMware secured its business services by leveraging NSX and scaled its internal private cloud deployment using NSX features. We will discuss the design, technical and organizational considerations of one of the world’s largest deployments of NSX for vSphere (hosting over 20,000 VMs). We will review the decisions involved in deploying new NSX environments and how VMware’s internal private cloud leverages NSX edge firewalling to achieve a scalable, multi-tenant security model.
VMware vSphereTM 5.0 (“vSphere”) brings many new capabilities to extend the benefits of vSphere 4.1. These new features and enhancements to core capabilities in vSphere provide more performance optimization and easier provisioning, monitoring and troubleshooting. This paper focuses on the storage-specific features and enhancements that are available in vSphere 5.0 and provides an overview of how they optimize storage utilization, ease monitoring, and increase operational efficiency. Wherever possible, we will also provide use cases and requirements that might apply to these new functions.
How to Enable vSphere with tanzu Supervisor ClusterAdam Alhafid
vSphere with Tanzu is a developer-ready infrastructure, that delivers a method to start with Kubernetes in infrastructure leveraging existing networking and storage using Tanzu Kubernetes Grid clusters. Kubernetes can be managed through vSphere. This allows vSphere admins to leverage their existing tooling and skillsets to manage Kubernetes-based applications, it provides vSphere admins with the ability to easily grow their skillset in and around the Kubernetes ecosystem.
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
Protect Your End-of-Life Windows Server 2003 Operating SystemSymantec
End of Support is Not the End of Business When software vendors announce a product end-of-life (EOL), customers typically have 24 to 30 months to plan and execute their migration strategies. This period is typically referred to as limited support. After the last day of support (also known as “end of support life date”), the product becomes obsolete, and the vendor will no longer automatically issue security patches. Customers have the option to purchase “extended or custom support” from the vendor after this date.
In many instances, the window for the availability of vendor support for the EOL product could be shorter than the time it would take for the customer to effectively migrate applications and processes to a new platform.
Customers may also be running custom applications that may not be compatible with the new platform. These gaps potentially expose unsupported systems to zero-day threats and new malware attacks. In order to address these potential risks, businesses will need to make some hard decisions:
• Run the applications in the unsupported platform.
• Execute an aggressive migration strategy for the mission-critical applications.
• Purchase an expensive extended support contract from the software vendor.
• Implement a security solution to harden and monitor the unsupported systems.
We have discussed about the azure VMs Inventory management,Change management,tracking and update management. Discussed on Azure VMs. scaling on demand and how to increase the same. Disk addition and deletion as well.
On March 23, TD Azlan held the "Build 4 the Cloud" seminar at De Olifant in Breukelen, Utrecht.
By organizing this seminar, TD Azlan was able to show her resellers which opportunities TD Azlan can offer to their enterprise, for virtualization and datacenter solutions.
Speakers Marc Samsom (Cisco) and Jan Smit (VMWare), among others, shared very useful information about upcoming changes in the datacenter market.
Industry's Best Multi Cloud Application Services from Avi Networks, Now part ...Avi Networks
Watch on-demand https://info.avinetworks.com/webinars/industry-best-multi-cloud-app-services
Join the fireside chat with Devyani Pisolkar, Sr. Manager of Networking and Security (NSX) from VMware and Ashish Shah, Sr. Director of Product Management from Avi Networks, Now part of VMware.
We will talk about the industry's only complete L2-L7 software-defined networking stack that delivers consistent application services (including load balancing) across multi-cloud environments. Together, we will help enterprises automate their application delivery, enable self-service and bring public cloud agility on-premises with intrinsic security.
At VMworld 2012, Symantec announced new solutions and technical integrations with VMware across its entire product portfolio to ensure higher levels of protection for virtualized environments. Together, Symantec and VMware enable SMBs and enterprises to use the benefits of virtualization without compromising protection.
My view on VMware approach to Hybrid- and Software-Defined Infrastructure: NSX, Hybrid Cloud and OpenStack. Get the agility of a startup with the guarantees of Enterprise-class IT. Session delivered at asLAN Congress 2015 in Madrid on April 15th.
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld
VMworld 2013
Merritte Stidston, McKesson
James Wiese, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
On August 27th, VMware dropped some big announcements at VMworld 2012 – Specifically around the new vSphere 5.1 changes, and how they’ll impact you. View this presentation where our VMware team takes our customers through these important changes.
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...Amazon Web Services
A key component of Cisco hybrid cloud portfolio is Cloud Connect. In this session, we review how Cloud Connect solutions can securely extend your private networks into the AWS Cloud and ensure the application experience. The products we cover include the CSR1000v and vEdge with Umbrella integration. This session is brought to you by AWS Partner, Cisco.
Privileged Access Management for the Software-Defined NetworkCA Technologies
New extensions to CA Privileged Access Manager significantly expand the ability of the product to protect and defend resources in VMware NSX virtualized network environments. In this session, we’ll examine and demonstrate those capabilities, which take advantage of new technologies and methods made available by the NSX infrastructure, in more detail.
For more information, please visit http://cainc.to/Nv2VOe
Enterprise-Grade Trust: Collaboration Without CompromiseRobb Boyd
In today’s agile work environment, customers need to collaborate in real time with partners, vendors, and customers, and they want the best collaboration tools possible. At the same time, they’re cognisant of potential accidental or intentional misuse of data and malicious attacks – and the ramifications they can have for their company’s finances and reputation.
Cisco provides best-in-class collaboration tools with true end-to-end encryption that enable secure cross-company collaboration. Find out more about the six considerations for collaboration security and the new Cisco Webex Extended Security Pack – which provides a full-functionality Cisco Cloudlock cloud access security broker for Webex Teams with native Webex anti-malware capabilities powered by Cisco Talos ClamAV.
Resources:
TechWiseTV: http://cs.co/9009DzrjN
TechWiseTV Workshop - Q&A - Cisco Catalyst 9600: Deep Dive and Design Conside...Robb Boyd
Cisco Catalyst 9600 Series Switches are the next-generation purpose-built 40/100G modular core/aggregation platform, providing resiliency at scale with the industry’s most comprehensive security while allowing the business to grow at a low total operational cost.
The Cisco Catalyst 9606R is a 6-slot 8RU chassis ready to support a wired switching capacity of up to 25.6 Tbps, with up to 6.4 Tbps of bandwidth per slot. Some salient features of the Cisco Catalyst 9606R chassis are:
- Supports a nonblocking 40/100G Quad Small Form-Factor Pluggable (QSFP+, QSFP28) line card
- Supports a line-rate 1/10/25G SFP and Enhanced SFP (SFP, SFP+, SFP28) line card
- Optimized for the enterprise with efficient side-to-side airflow
- Front accessibility for all removable components, such as the supervisor, line cards, power supply, and fan tray
- Dual accessible fan tray for easy removal
- Embedded RFID tag for easy asset tracking
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsRobb Boyd
Cisco Catalyst 9600 Series Switches are the next-generation purpose-built 40/100G modular core/aggregation platform, providing resiliency at scale with the industry’s most comprehensive security while allowing the business to grow at a low total operational cost.
The Cisco Catalyst 9606R is a 6-slot 8RU chassis ready to support a wired switching capacity of up to 25.6 Tbps, with up to 6.4 Tbps of bandwidth per slot. Some salient features of the Cisco Catalyst 9606R chassis are:
- Supports a nonblocking 40/100G Quad Small Form-Factor Pluggable (QSFP+, QSFP28) line card
- Supports a line-rate 1/10/25G SFP and Enhanced SFP (SFP, SFP+, SFP28) line card
- Optimized for the enterprise with efficient side-to-side airflow
- Front accessibility for all removable components, such as the supervisor, line cards, power supply, and fan tray
- Dual accessible fan tray for easy removal
- Embedded RFID tag for easy asset tracking
Resources:
TechWiseTV: http://cs.co/9009DzrjN
With users expecting an immersive experience, and with IoT becoming the new mobile, we are more dependent on Wi-Fi than ever before. The Cisco Catalyst 9100 Access Points, powered by Wi-Fi 6 (802.11ax) technology and supporting Cisco’s intent-based networking architecture, are ready for the growing user expectations, IoT devices, and next-generation cloud-driven applications. Cisco’s first Wi-Fi 6 access point can handle the increased mobile traffic as well as support IoT at scale. It has superior RF innovations and will expand wireless access with intelligence to provide a secure, reliable, high-quality wireless experience for all networks.
TechWiseTV Workshop - Q&A - Application Hosting on the Cisco Catalyst 9000 Sw...Robb Boyd
Enterprise networks are now dealing with massive volumes of data, with a critical need to collect and analyze this data to respond faster and deliver insightful context. Traditional approaches, in which data is processed in remote servers, will no longer work. Data can burden the network unless some context is known. Edge computing can greatly reduce the data sent to the cloud or a remote server. Collecting and analyzing the data at the edge and making decisions locally rather than in centralized servers significantly reduces the latency and bandwidth of the network.
Powered by an x86 CPU, the application hosting solution on the Cisco Catalyst 9000 switching family provides the intelligence required at the edge. Native Docker engine support on the switches will enable users to build and bring their own applications without additional packaging. Cisco DNA Center will provide consistent workflows to manage the entire application lifecycle across multiple Cisco Catalyst 9000 switches through the App Hosting dashboard.
With users expecting an immersive experience, and with IoT becoming the new mobile, we are more dependent on Wi-Fi than ever before. The Cisco Catalyst 9100 Access Points, powered by Wi-Fi 6 (802.11ax) technology and supporting Cisco’s intent-based networking architecture, are ready for the growing user expectations, IoT devices, and next-generation cloud-driven applications. Cisco’s first Wi-Fi 6 access point can handle the increased mobile traffic as well as support IoT at scale. It has superior RF innovations and will expand wireless access with intelligence to provide a secure, reliable, high-quality wireless experience for all networks.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9006ELWE6
TechWiseTV: http://cs.co/9009DzrjN
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesRobb Boyd
Watch the REPLAY right now: http://bit.ly/2YoLbt3
Enterprise networks are now dealing with massive volumes of data, with a critical need to collect and analyze this data to respond faster and deliver insightful context. Traditional approaches, in which data is processed in remote servers, will no longer work. Data can burden the network unless some context is known. Edge computing can greatly reduce the data sent to the cloud or a remote server. Collecting and analyzing the data at the edge and making decisions locally rather than in centralized servers significantly reduces the latency and bandwidth of the network.
Powered by an x86 CPU, the application hosting solution on the Cisco Catalyst 9000 switching family provides the intelligence required at the edge. Native Docker engine support on the switches will enable users to build and bring their own applications without additional packaging. Cisco DNA Center will provide consistent workflows to manage the entire application lifecycle across multiple Cisco Catalyst 9000 switches through the App Hosting dashboard.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9001EIbih
TechWiseTV: http://cs.co/9009DzrjN
Today’s WAN is a messy place. Users are more distributed. Internet of Things (IoT) devices want to connect. Applications are moving from the data center to the cloud. And not just one cloud, but multiple clouds. More businesses have realized that their traditional WAN architecture has become an impediment to achieving successful digital transformations. As organizations rearchitect their networks to enable software-defined WAN, they need consistent security across branches, clouds, and users.
That’s where Cisco SD-WAN Security comes in. As a leader in both SD-WAN and network security, Cisco integrates a full security stack and highly secure SD-WAN fabric to protect branch users, connected devices, and application usage at all direct Internet access breakouts and all traffic across the WAN. Cisco SD-WAN Security delivers four new layers of protection:
• Enterprise firewall with AppAware
• Intrusion prevention
• URL filtering
• Advanced Malware Protection along with cloud sandbox capabilities with Threat Grid
• DNS/web layer security
To learn more about SD-WAN Security and to see a demo, join Robb Boyd and Cisco product experts for this special TechWiseTV Live episode.
Technical Overview of Cisco Catalyst 9200 Series SwitchesRobb Boyd
TechWiseTV's Cisco Container Platform live workshop took place on July 18th.
For the first time in the industry, a single family of fixed, stackable, and modular switches are running on the same IOS-XE operating system along with a common ASIC.
Cisco’s Catalyst 9200 rounds out the lower end of its incredible Catalyst 9000 family of switches. The 9200 is designed for small, medium, and branch deployments, providing greater modularity, redundancy, and stackability than the Catalyst 2960 it replaces.
Register now.
TechWiseTV's Cisco Container Platform live workshop took place on July 17th. Explore new features of the Cisco Container Platform that make deploying and managing clusters more secure, versatile, and intuitive than ever before. This way, you can focus on running applications, not the underlying infrastructure.
Register now.
TechWiseTV Workshop: Improving Performance and Agility with Cisco HyperFlexRobb Boyd
Find out how organizations like yours are deriving business value from the HyperFlex HCI solution. Join us for a deep dive and Q&A at the TechWiseTV workshop.
TechWiseTV Hyperflex 4.0 Episode: http://cs.co/9009EW2Td
Today’s multicloud WAN environment is not only complicated–it can expose your business to an ever–expanding threat landscape. Learn how to provide consistent security across clouds, branches, and users. http://bit.ly/2DWBBX8
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerRobb Boyd
A new addition to the Catalyst 9000 family, the Cisco Catalyst 9800 Series Wireless Controllers are the next generation of controllers that bridge Cisco’s intent-based networking portfolio. Powered by the Cisco IOS XE operating system, the 9800 Series Wireless Controllers are always on, secure, and can be deployed anywhere.
Software updates with no disruptions and rolling access point upgrades completely change the definition of “always on.” “Secure” translates to increased threat detections in encrypted traffic and automated macro and micro segmentation. Finally, the ability to deploy in either a private or public cloud promises you the freedom that no other controller currently offers.
In this session we’ll cover the following aspects of Catalyst 9800:
Overview of the Cisco Catalyst 9800 Series Wireless Controller and its features and functionalities
Cisco Catalyst 9800 security, always-on functionality, and the ability to be deployed anywhere, and why these features create a stronger, more efficient wireless network
How the new 9800 controllers fit into the Cisco Catalyst family
Q&A
Protect Kubernetes Environments with Cisco Stealthwatch CloudRobb Boyd
TechWiseTV Workshop airing live on Wednesday Feb 13, 2019. Catch the replay (and more) at www.techwisetv.com
Description:
Kubernetes is the go-to orchestration solution for automating and scaling a container deployment, be it on premises or in the public cloud. While Kubernetes helps organizations reduce costs and become more agile, it can be difficult to gain east-west visibility into network traffic within containers. This creates visibility gaps that threats could use to avoid detection
Cisco Stealthwatch Cloud provides visibility, analytics, threat detection, and policy monitoring within containers, pods, and nodes. It easily integrates with Kubernetes deployments on premises, in private clouds, or in a public cloud, including Amazon Web Services (AWS), Google Cloud Platform, and Microsoft Azure.
Stealthwatch Cloud provides an unprecedented level of access into inter-pod and intra-pod communications with your distributed containerized applications.
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsRobb Boyd
Learn more on getting hands-on with Cisco DNA Center Platform APIs. Join us as we go over the brand new DNA Center Platform and show you how to start integrating and developing your own applications on DNA Center. The possibilities are endless!
Watch the replay: http://cs.co/9000DCie4
In today’s digital economy, getting ahead means crunching a lot of data. That’s why businesses of all sizes and industries are investing in high-performance computing. However, the last thing IT needs is another tech silo to manage.
Fortunately, the new Cisco UCS C4200 Series chassis and C125 M5 server node help you scale out compute-intensive workloads with ease—with the network fabric you already have. This TechWiseTV Workshop will get you up to speed fast.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9006DAVPC
TechWiseTV: http://cs.co/9009DzrjN
Watch the replay: http://cs.co/9000DCie4
In today’s digital economy, getting ahead means crunching a lot of data. That’s why businesses of all sizes and industries are investing in high-performance computing. However, the last thing IT needs is another tech silo to manage.
Fortunately, the new Cisco UCS C4200 Series chassis and C125 M5 server node help you scale out compute-intensive workloads with ease—with the network fabric you already have. This TechWiseTV Workshop will get you up to speed fast.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9006DAVPC
TechWiseTV: http://cs.co/9009DzrjN
The fourth-generation Cisco ASR 9000 Aggregation Services Routers series is our best yet. Not only does it sport high-density, 100-GE-port line cards; it also offers a flexible, pay-as-you-grow consumption model. Service providers can now use only the bandwidth they need and increase it at any time to meet traffic demands.
Learn the business and technical considerations of our latest ASR 9000, including:
• The pay-as-you-grow consumption model commercial terms
• Software license portability and permitting capacity
• Real-life customer case studies
Resources:
Watch the related TechWiseTV episode: http://cs.co/9008Dfyik
TechWiseTV: http://cs.co/9009DzrjN
TechWiseTV Workshop: Q&A Cisco Hybrid Cloud Platform for Google CloudRobb Boyd
Cisco and Google Cloud experts join TechWiseTV to demonstrate how you can use the Cisco Hybrid Cloud Platform for Google Cloud as a DevOps platform that works consistently across data center and public cloud environments. You’ll learn how to take advantage of containers, microservices, public cloud toolsets, and other modern cloud development innovations while having the flexibility to deploy your applications wherever they run best.
With integrated connectivity, security, management, and control, your applications will operate consistently from prem to cloud and back again.
Resources:
Watch the replay: http://cs.co/9007DawLd
TechWiseTV: http://cs.co/9009DzrjN
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
4. RSA Solution for VMware View Available Now RSA SecurID for remote authentication RSA DLP for protection of data in use Ionix SCM for security config and patch management RSA enVision for security monitoring and reporting RSA SecurID for ESX Service Console
5.
6.
7. RSA’s Approach to Securing Vblock Applications 1) Secure the core Vblock platform (VMware, Cisco, EMC components) 2) Secure each application validated with Vblock (e.g., VMware View, SAP) Central Security Management and Reporting
RSA Data Security System Briefing Feb 6, 2010 - Confidential -
Additional notes: -data center growing at unsustainable rates in terms of capex/opex, power, downtime and utilization -cost without benefit seen poorly; IT needs to be efficient and leverage scale -new technologies available (virtualization, cloud, SOA, SaaS): how does one make use of them
The RSA Solution for VMware View has been installed and tested at EMC’s Proven Solution Lab in Santa Clara, CA and is the only security solution for VMware View that has been certified for Vblock. We’ve taken great pains to capture the solution architecture, deployment guidance, operational guidance and trouble shooting guidance in a comprehensive document call the RSA SecurBook for Vmware. If you’re your strategy includes virtual desktops, you need this document. It’s free for the asking. I’ll share the URL at the end of the presentation. Title Month Year