Update CMDB Using Discovery Topology (BMC ADDM) Vyom Labs
Atrium Discovery and Dependency Mapping automatically discovers physical and virtual IT assets, applications, and the relationship between them. Learn how to keep CMDB updated.
The AWS Workshop Series Online is a series of live webinars designed for IT professionals who are looking to leverage the AWS Cloud to build and transform their business, are new to the AWS Cloud or looking to further expand their skills and expertise. In this series, we will cover:'Introduction to Cloud Computing with Amazon Web Services'.
Developing applications on Amazon Web Services (AWS) or moving your business into the cloud is more straightforward than you think.
This introductory session covers some of the most popular Amazon Web Services: Amazon Elastic Compute Service (EC2), Amazon Simple Storage Service (S3), Amazon CloudFront, Amazon Elastic Block Storage (EBS) and Amazon Relational Database Service (RDS).
Update CMDB Using Discovery Topology (BMC ADDM) Vyom Labs
Atrium Discovery and Dependency Mapping automatically discovers physical and virtual IT assets, applications, and the relationship between them. Learn how to keep CMDB updated.
The AWS Workshop Series Online is a series of live webinars designed for IT professionals who are looking to leverage the AWS Cloud to build and transform their business, are new to the AWS Cloud or looking to further expand their skills and expertise. In this series, we will cover:'Introduction to Cloud Computing with Amazon Web Services'.
Developing applications on Amazon Web Services (AWS) or moving your business into the cloud is more straightforward than you think.
This introductory session covers some of the most popular Amazon Web Services: Amazon Elastic Compute Service (EC2), Amazon Simple Storage Service (S3), Amazon CloudFront, Amazon Elastic Block Storage (EBS) and Amazon Relational Database Service (RDS).
Intelligent, Automatic Restarts for Unhealthy Kafka Consumers on Kubernetes w...HostedbyConfluent
At Cloudflare we are big Kafka adopters and we run Kafka at a massive scale. We deploy our microservices leveraging Kafka on Kubernetes and we have have some interesting experience on how to keep the latter operational to avoid downtime. To do so, we implemented our own Intelligent Smart Health checks for microservices leveraging Kafka. This has allowed our services to be much more self-healing, meaning there is much less manual intervention required. Before we used to get paged when applications got stuck and this also led to different incidents that were also customer impacting. We've implemented this in go, using the Shopify/sarama package but the same concepts can be adopted in different programming languages.
Running AWS services locally during development can improve developer productivity and reduce the risk of issues once code is deployed to remote environments. In this talk at the February 2018 AWS Leeds User Group, I outlined how we have started to achieve this.
AWS CloudFormation macros: Coding best practices - MAD201 - New York AWS SummitAmazon Web Services
With AWS CloudFormation macros, infrastructure-as-code developers can use AWS Lambda functions to empower template authors with utilities to improve their productivity. In this session, we review example use cases to teach you best practices when writing macros. You also learn deployment strategies so your teams can make the most of this functionality.
오토스케일링(Auto-scaling)은 AWS 클라우드를 통해 고확장성 서비스와 아키텍처를 구성하는 데 필요한 가장 중요한 요소 중 하나입니다. 이 강연에서는 효과적인 클라우드 인프라 구축을 위해 오토 스케일링을 활용하는 다양한 방법에 대해 자세히 소개해 드립니다.
오토 스케일링 그룹의 구성과 확장 계획에 따른 설정 방법, 오토 스케일링 라이프 사이클과 CloudWatch 및 알림을 이용한 관리 방법, 각종 오토스케일링 모범사례 등을 알아보실 수 있습니다.
by Brent Rabowsky, Solutions Architect & Itzik Paz, Solutions Architect, AWS
As serverless architectures become more popular, customers need a framework of patterns to help them identify how they can leverage AWS to deploy their workloads without managing servers or operating systems. This session describes re-usable serverless patterns while considering costs. For each pattern, we provide operational and security best practices and discuss potential pitfalls and nuances. We also discuss the considerations for moving an existing server-based workload to a serverless architecture. The patterns use services like AWS Lambda, Amazon API Gateway, Amazon Kinesis Streams, Amazon Kinesis Analytics, Amazon DynamoDB, Amazon S3, AWS Step Functions, AWS Config, AWS X-Ray, and Amazon Athena. This session can help you recognize candidates for serverless architectures in your own organizations and understand areas of potential savings and increased agility. What’s new in 2017: using X-Ray in Lambda for tracing and operational insight; a pattern on high performance computing (HPC) using Lambda at scale; how a query can be achieved using Athena; Step Functions as a way to handle orchestration for both the Automation and Batch patterns; a pattern for Security Automation using AWS Config rules to detect and automatically remediate violations of security standards; how to validate API parameters in API Gateway to protect your API back-ends; and a solid focus on CI/CD development pipelines for serverless –that includes testing, deploying, and versioning (SAM tools).
The webinar based on this presentation discussed strategies that you can adopt to help you save money in the AWS Cloud. From turning systems off at night, to implementing bidding strategies on the spot market, there are many ways in which you can manage and reduce your costs with AWS.
Dive into the differences between instance types; explain how you can reduce costs with Reserved Instances, the spot market and by architecting to reduce costs. We'll discuss how to combine on-demand pricing with spot pricing to perform cost effective big data analysis, and introduce customer examples to illustrate how AWS customers gain the most from AWS whilst at the same time managing their spend.
Topics include:
• Understand different cost optimisation strategies you can employ in the AWS Cloud
• Learn how to take advantage of different instance types
• Discover architectural principles behind cost optimisation in AWS
• Learn about tools to help you keep on top of your AWS spend
You can find a recording of this webinar on YouTube here: http://youtu.be/kId90Q7b6kY
Exposing and Controlling Kafka Event Streaming with Kong Konnect Enterprise |...HostedbyConfluent
Event streaming allows companies to build more scalable and loosely coupled real-time applications supporting massive concurrency demands and simplifying the construction of services.
At the same time, API management provides capabilities to securely control the upstream services consumption, including the event processing infrastructure.
This session shows how Kong Konnect Enterprise can complement Kafka Event Streaming, exposing it to new and external consumers while applying specific and critical policies to control its consumption, including API key, OAuth/OIDC and others for authentication, rate limiting, caching, log processing, etc.
Amazon Relational Database Service (Amazon RDS) is a web service that makes it easier to set up, operate, and scale a relational database in the cloud. It provides cost-efficient, re-sizable capacity for an industry-standard relational database and manages common database administration tasks
Why does application Modernization in the form of decomposing monoliths result in so many microservices ? Why has microservices become the default deployment model for applications. In this talk we will add some sanity to the process of constructing microservices and provide guidelines and design heuristics on structuring microservices. We will look at life after running microservices architectures in production and learn from the mistakes committed over the past five years. We will analyze real life systems on the criteria for consolidating microservices into monoliths or moduliths based on technical and business heuristics as illustrated In [4]. The techniques - a combination of mapping microservices to core technical attributes [2] reduced by affinity mapping and business domain context distillation [3] - have emerged from working with a number of customers where the value of microservices has not been realized despite leveraging Domain Driven Design.
References:
1 https://hackmd.io/10j-7DfqSIu1C8GQjHa1Bw?view
2 https://content.pivotal.io/blog/should-that-be-a-microservice-keep-these-six-factors-in-mind
3 https://bit.ly/2VFwDr1
4 https://twitter.com/RKela/status/1227188151887843329/photo/1
Intelligent, Automatic Restarts for Unhealthy Kafka Consumers on Kubernetes w...HostedbyConfluent
At Cloudflare we are big Kafka adopters and we run Kafka at a massive scale. We deploy our microservices leveraging Kafka on Kubernetes and we have have some interesting experience on how to keep the latter operational to avoid downtime. To do so, we implemented our own Intelligent Smart Health checks for microservices leveraging Kafka. This has allowed our services to be much more self-healing, meaning there is much less manual intervention required. Before we used to get paged when applications got stuck and this also led to different incidents that were also customer impacting. We've implemented this in go, using the Shopify/sarama package but the same concepts can be adopted in different programming languages.
Running AWS services locally during development can improve developer productivity and reduce the risk of issues once code is deployed to remote environments. In this talk at the February 2018 AWS Leeds User Group, I outlined how we have started to achieve this.
AWS CloudFormation macros: Coding best practices - MAD201 - New York AWS SummitAmazon Web Services
With AWS CloudFormation macros, infrastructure-as-code developers can use AWS Lambda functions to empower template authors with utilities to improve their productivity. In this session, we review example use cases to teach you best practices when writing macros. You also learn deployment strategies so your teams can make the most of this functionality.
오토스케일링(Auto-scaling)은 AWS 클라우드를 통해 고확장성 서비스와 아키텍처를 구성하는 데 필요한 가장 중요한 요소 중 하나입니다. 이 강연에서는 효과적인 클라우드 인프라 구축을 위해 오토 스케일링을 활용하는 다양한 방법에 대해 자세히 소개해 드립니다.
오토 스케일링 그룹의 구성과 확장 계획에 따른 설정 방법, 오토 스케일링 라이프 사이클과 CloudWatch 및 알림을 이용한 관리 방법, 각종 오토스케일링 모범사례 등을 알아보실 수 있습니다.
by Brent Rabowsky, Solutions Architect & Itzik Paz, Solutions Architect, AWS
As serverless architectures become more popular, customers need a framework of patterns to help them identify how they can leverage AWS to deploy their workloads without managing servers or operating systems. This session describes re-usable serverless patterns while considering costs. For each pattern, we provide operational and security best practices and discuss potential pitfalls and nuances. We also discuss the considerations for moving an existing server-based workload to a serverless architecture. The patterns use services like AWS Lambda, Amazon API Gateway, Amazon Kinesis Streams, Amazon Kinesis Analytics, Amazon DynamoDB, Amazon S3, AWS Step Functions, AWS Config, AWS X-Ray, and Amazon Athena. This session can help you recognize candidates for serverless architectures in your own organizations and understand areas of potential savings and increased agility. What’s new in 2017: using X-Ray in Lambda for tracing and operational insight; a pattern on high performance computing (HPC) using Lambda at scale; how a query can be achieved using Athena; Step Functions as a way to handle orchestration for both the Automation and Batch patterns; a pattern for Security Automation using AWS Config rules to detect and automatically remediate violations of security standards; how to validate API parameters in API Gateway to protect your API back-ends; and a solid focus on CI/CD development pipelines for serverless –that includes testing, deploying, and versioning (SAM tools).
The webinar based on this presentation discussed strategies that you can adopt to help you save money in the AWS Cloud. From turning systems off at night, to implementing bidding strategies on the spot market, there are many ways in which you can manage and reduce your costs with AWS.
Dive into the differences between instance types; explain how you can reduce costs with Reserved Instances, the spot market and by architecting to reduce costs. We'll discuss how to combine on-demand pricing with spot pricing to perform cost effective big data analysis, and introduce customer examples to illustrate how AWS customers gain the most from AWS whilst at the same time managing their spend.
Topics include:
• Understand different cost optimisation strategies you can employ in the AWS Cloud
• Learn how to take advantage of different instance types
• Discover architectural principles behind cost optimisation in AWS
• Learn about tools to help you keep on top of your AWS spend
You can find a recording of this webinar on YouTube here: http://youtu.be/kId90Q7b6kY
Exposing and Controlling Kafka Event Streaming with Kong Konnect Enterprise |...HostedbyConfluent
Event streaming allows companies to build more scalable and loosely coupled real-time applications supporting massive concurrency demands and simplifying the construction of services.
At the same time, API management provides capabilities to securely control the upstream services consumption, including the event processing infrastructure.
This session shows how Kong Konnect Enterprise can complement Kafka Event Streaming, exposing it to new and external consumers while applying specific and critical policies to control its consumption, including API key, OAuth/OIDC and others for authentication, rate limiting, caching, log processing, etc.
Amazon Relational Database Service (Amazon RDS) is a web service that makes it easier to set up, operate, and scale a relational database in the cloud. It provides cost-efficient, re-sizable capacity for an industry-standard relational database and manages common database administration tasks
Why does application Modernization in the form of decomposing monoliths result in so many microservices ? Why has microservices become the default deployment model for applications. In this talk we will add some sanity to the process of constructing microservices and provide guidelines and design heuristics on structuring microservices. We will look at life after running microservices architectures in production and learn from the mistakes committed over the past five years. We will analyze real life systems on the criteria for consolidating microservices into monoliths or moduliths based on technical and business heuristics as illustrated In [4]. The techniques - a combination of mapping microservices to core technical attributes [2] reduced by affinity mapping and business domain context distillation [3] - have emerged from working with a number of customers where the value of microservices has not been realized despite leveraging Domain Driven Design.
References:
1 https://hackmd.io/10j-7DfqSIu1C8GQjHa1Bw?view
2 https://content.pivotal.io/blog/should-that-be-a-microservice-keep-these-six-factors-in-mind
3 https://bit.ly/2VFwDr1
4 https://twitter.com/RKela/status/1227188151887843329/photo/1
WebSphere Technical University: Top WebSphere Problem Determination FeaturesChris Bailey
Problem determination is an important focus area in the IBM WebSphere Application Server. Serviceability improvements have been added that have greatly improved the ability to find root causes of problems in both the full IBM WebSphere Application Server profile, and the newer Liberty profile. The session focuses on how to effectively use serviceability improvements added to the application server since V8.0. This includes high performance extensibe logging, cross-component trace, IBM Support Assistant data collector, timed operations, memory leak detection/prevention, and IBM Support Assistant 5.
Presented at the WebSphere Technical University 2014, Dusseldorf
Cloud computing transforms the way we can store, process and share our data. New applications and workloads are growing rapidly, which brings every day more sensitive data into the conversation about risk and what constitutes natural targets for bad actors. This presentation reflects on current best practices to address the most significant security concerns for sensitive data in the cloud, and offers participants a list of steps to achieve enterprise-grade safety with MongoDB deployments among the expanding service provider options.
Join Marc Trouard-Riolle from Citrix Cloud Product Marketing for the latest presentation in the Citrix Cloud Master Class series.
In this session you will hear about building private enterprise clouds with Citrix CloudPlatform:
Learn about hypervisor, storage and networking considerations within private cloud use cases
Build a tailored availability zone for traditional workloads
See a step-by-step demonstration of building an enterprise private cloud
This is my 75 minutes "highlights" presentation on what's new in WS2012 R2. It's not all encompassing - intended just to get across the key points of the core OS. It followed a "Cloud OS" keynote and preceded a "System Center hybrid cloud" presentation.
How to Get the Fastest Possible Citrix Logon Times? Optimization Tips for ...eG Innovations
Logon is a user's first interaction with the Citrix digital workspace service, and hence, a slow logon can influence a user's opinion of the service in a way that no other metric can. Therefore, logon time is the #1 key performance indicator (KPI) in Citrix environments.
Slow logons have an impact not just on user perception, but also productivity. When each logon takes minutes — maybe on multiple systems — it results in lost work time and costs the business. So, it is imperative that logons be as quick and non-intrusive as possible. But how can we make this happen?
Learn some of the best practices for Citrix logon time optimization.
How to Deploy WSO2 Enterprise Integrator in ContainersWSO2
This slide deck explores how WSO2 Enterprise Integrator can be deployed on a containerized deployment and the key configuration steps of successful production deployment and monitoring.
Watch webinar here: https://wso2.com/library/webinars/2018/10/how-to-deploy-wso2-enterprise-integrator-in-containers/
SQLSaturday je jednodňová konferencia určená pre SQL Server profesionálov a aj pre tých, ktorí sa chcú dozvedieť niečo o SQL Servri. Na konferencii budú prednášať domáci aj zahraniční prednášatelia a vďaka našim sponzorom je vstup na konferenciu voľný. Podmienkou je len registrácia. Konferencia sa uskutoční dňa 20. júna 2015 v priestoroch spoločnosti Microsoft Slovakia, Apollo Business Center II, Prievozská 4D, 821 09 Bratislava.
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...WSO2
To view recording please use below URL:
http://wso2.com/library/webinars/2016/06/west-interactives-deployment-approach-and-devops-practices/
For nearly 30 years West Interactive Services has been creating communication solutions that empower enterprises worldwide to strengthen customer engagement. As a customer of WSO2 since 2012, WEST has built solutions using WSO2 API Manager, WSO2 Business Activity Monitor (WSO2 BAM), WSO2 Enterprise Service Bus (WSO2 ESB), WSO2 Data Services Server (WSO2 DSS), WSO2 Application Server and WSO2 Identity Server which facilitate nearly 300 million unique customer interactions each month.
The most recent deployment with WSO2 allows WEST interactive to expose client connections, data sources and application logic through a common protocol and messaging architecture. This is achieved using a combination of WSO2 API Manager, WSO2 ESB, WSO2 DSS, WSO2 Application Server and WSO2 Message Broker. This webinar will discuss the DevOps related theories and practices that have been followed by WEST during the process of designing, building and maintaining this part of the solution. These will address the following areas:
Design process of the solution
Deployment and production hardening practices
Runtime artifacts and lifecycle management
DevOps, virtualization and automation
Troubleshooting and debugging practices
This presentation highlights why customers should care about the looming deadline for Windows Server 2003 End of Support and how you can help your customer migrate their infrastructure to cloud or to a hybrid environment. It also discusses the design considerations for various upgrade scenarios from pure cloud to hybrid to on-premise. Finally, it reviews migration tools and technologies to migrate a 32-bit application to Windows Server 2012 or Azure environment.
It also shows Azure’s unique value proposition to your customers and some of the new announcement such as ASR, EMS and RemoteApp. It will describe product features that is relevant to SMB customer segment along with sizing information based on Azure calculator. Finally it will also touch upon when to think about using Azure or to your own hosted environment.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
4. BMC Discovery
◦ Formerly known as Tideway
◦ Bought by BMC (2009), renamed ADDM (Atrium
Discovery and Dependency Mapping)
◦ Renamed to BMC Discovery (2016)
Clean and Transparent
◦ Agentless
◦ Minimum effort for end-client resource
◦ Immediate results
◦ Platform agnostic – web-based UI
◦ Full visibility to ‘how and why’ things were
inferred
Fully Automated
◦ Servers (physical, virtual), desktops, clusters,
databases, software, network devices, storage…
◦ Dependencies and relationships
◦ Software and hardware lifecycle reporting
◦ Atrium CMDB integration
Dashboards and Reporting
◦ Search for anything in the data store
◦ Powerful analytics
◦ Dependency visualizations
◦ Custom reporting
◦ “Deep Dive” navigation
What is BMC Discovery?
5. Visibility of Your Infrastructure
Discovery captures and provides automatically
discovered configuration and relationship data, providing
many different views.
7. Largest Reference Library
◦ 40,000+ SW & OS versions
◦ 3000 network devices, 1000 relationship types
◦ 20 Storage brands
◦ 100 Middleware types
Enabler for Application/Service Mapping
◦ Simplified ‘Start Anywhere’ tool
◦ More complex/deep application/service modelling
Ease of Integration
◦ REST API
◦ CSV, XML, PDF Export
◦ CMDB Integration
◦ Email
Reporting
◦ Single click ‘provenance’ reporting
◦ End of Life/Support reports and dashboards
◦ 200+ customizable out of the box reports
Visibility
◦ Visibility of overall utilisation of infrastructure
◦ Instant view of virtualization
◦ Software audits
◦ Cloud readiness
Risk Reduction
◦ Assess impact of change/migration
◦ Identify Single Points of Failure
Why BMC Discovery?
8. Return on Investment
◦ 5-Year ROI of 470%
◦ $128K Business benefits over 5 years per 100
servers
◦ 8 month payback period
◦ 7,000 Pounds of hardware cleared off data
centre floor
Increased Visibility
◦ 80% Reduced effort to map applications
◦ 60% Reduction in audit prep time from 90 to 30
days
Plan Transitions
◦ 66% Reduced time to plan and approve changes
More Effective ITSM
◦ 80% Reduction in incidents caused by change
◦ 28% Reduction in volume of events
More Info:
http://media.cms.bmc.com/documents/BMC-
Discovery-Updated-May-2017.pdf
IDC Report
10. How Discovery Works
User
Discovery Appliance
Discovery scan is run
on ip range...
IP ranges and credentials entered into
appliance...
• Ships as self contained virtual image
• Hosted on customer virtual platform
• ESX/ESXi 4.1 and later
• Disk allocation only – no requirement for OS install
• BMC supports the appliance and platform (RHEL)
11. User
Discovery Appliance
Discovery scan is run
on ip range...
How Discovery Works
Administrator accesses the appliance via UI
(HTTP/HTTPS) and CLI (SSH) via local login or
AD/LDAP
Ports used for initial sweep scan:
• TCP: 4, 22, 80, 135, 139, 514
• TCP/UDP: 161 (SNMP)
• TCP: 23 (telnet) (optional)
• TCP: 513 (rlogin) (optional)
• ICMP Type 8 Echo Request (ping)
Discovery performs an initial sweep to determine
what endpoints respond (if ip range/subnet entered)
and will use the port configuration to determine
what type of device is discovered.
12. How Discovery Works – Servers and Network
Devices
If Discovery determines there is a valid device on the endpoint it will attempt to
log in with supplied credentials and run standard commands to retrieve CI data:
• Hardware
• OS
• Software
• Communication
Default ports required for successful (full) Host discovery:
• Linux/Unix
• 22 – SSH
• 23 – Telnet
• 413 – rlogin
• SNMP
• 161
• VMWare
• 443 – HTTPS
• 902 –vSphere API
• Ports can be customised
Discovery Appliance
13. Discovery
Windows Proxy
How Discovery Works - Windows
Default ports required for successful (full) Host discovery:
Appliance:
• ICMP Type 8 “ping”
• 135 – DCOM Service Control
• 1024-1030 – Restricted DCOM, used after initial negotiation
Used by Proxy:
• 135 – DCOM Service Control
• 139 – NetBIOS (NT4 RemQuery)
• 445 – SMB (RemQuery)
• 1024-65535 – Unrestricted DCOM (WMI), used after initial negotiation
A Windows proxy is needed for discovery of Windows servers.
The service (Active Directory/Local Admin) is hosted on a standard
Windows server.
• Windows 2008 SP2 – 2012 R2
• Server supplied and supported by end-client
Multiple proxies can be configured
for one or more appliances.
Appliance and Proxy
communicate on ports 4321-4323
14. Discovery
Windows Proxy
How Discovery Works - Consolidation
Where there is a requirement for other appliances
(and proxies) it is possible to consolidate data to
another appliance.
Consolidation uses port 25032
Consolidator
Scanner
15. How Discovery Works - Clustering
In order to improve performance on larger estates, clustering can be enabled
to share the discovery workload.
• Coordinator and Members act as one appliance (individual UIs – changes
are replicated across set)
• A cluster can still act as a consolidator/scanner
• A cluster can still connect to proxies
• Members need to be on the same subnet to gain the performance
advantage
User
Coordinator
Member
Member
Ports:
• 25030 – Cluster Manager
• 25031 – Datastore
communication
• 25032 – Reasoning
communication
16. How Discovery Works – Protocol Summary
Scanner
Consolidator
(Cluster)User Windows Proxy
Appliance Discovery:
• SSH
• ICMP (Ping)
• DCOM
Consolidation:
• CORBA
Clustering:
• CORBA
User Access:
• SSH
• HTTP
• HTTPS
• AD/LDAP
Proxy:
• AD/LDAP
• Local Admin Credential
Windows Discovery:
• DCOM
• NetBIOS (NT4 only)
• SMB
• WMI
17. How Discovery Works – Firewall Summary
Scanner
Consolidator
(Cluster)User Windows Proxy
1. Input target IP
ranges/subnets/address into
ADDM for scanning.
2. ADDM runs credential-less
“sweep scan” across network.
3. Add login credentials to
ADDM for relevant systems.
5. The raw discovery data is
reasoned by ADDM which
may also trigger additional
discovery patterns.
4. ADDM runs full discovery
scan across network.
19. What is a Business Application?
An enterprise software tool or the technical
architecture of a service
Typically comprised of a number of other
applications, software or databases.
Examples: Exchange, Payroll, Intranet, ITSM
May be split by environment and/or Line of
Business
Usually not provided by OOTB by BMC (TKU
updates)
20. What is a Business Application?
Part of a Service
Switches
Hosts
Software Instances & Database Servers
Processes, Services, Config Files, Runtimes Environments, Websites, etc…
Business Application Instance
Service
21. What is a Business Application?
Database
Server
Application
Server
Web
Server
Business
Application
Instance
Simplified Business Application Instance (BAI) Example
22. Application Models
Part of the Service Model
Represent your custom business applications made up of individual instances of software
◦ e.g. applications, databases, webservers
Helps in business impact analysis by showing direct relationships and dependencies in the
application/hardware stack
Helps in understanding what your business application is made up of
Application Models and Service Models are consumed by ITSM processes such as Incident,
Problem, Change for:
◦ Faster time to recovery
◦ Less incident escalations
◦ Planning changes
◦ Impact Analysis
24. Typical Security Concerns
Credentials
◦ Stored in an encrypted vault
◦ Can use SSH keys and Active Directory proxy
Client Data
◦ Discovery is currently NOT cloud hosted – data is stored within appliance datastore
◦ Access can be controlled via LDAP and limited RBAC
Platform Scripts
◦ Administrator access only
◦ ‘Read Only’ for other users if necessary
Security of Appliance
◦ Penetration tested and hardened
◦ https://docs.bmc.com/docs/display/DISCO111/Appliance+hardening
25. Secure Communications
Secure communications between elements of Discovery uses CORBA over TLS (Transport Layer
Security) with the following details:
◦ Protocol: TLSv1.2
◦ Encryption: AES_256_CBC
◦ Message hashing: SHA1
◦ Key Exchange: DHE_RSA (2048)
It is enabled using certificates in the following locations:
◦ Each Appliance (Scanning or Consolidation)
◦ Each Windows Proxy (Active Directory or Credential)
◦ Certificate Authority public certificate on each Appliance and Proxy
◦ Customer specific certificates can be used
27. Virtual Appliance
◦ Supplied in OVF (Open Virtualisation Format)
◦ Production Use: VMware ESX/ESXi 4.1 or above
◦ Test and Dev: VMware Workstation 8.0 and
above, VMware Player 4.0 and above
◦ 64-bit only
These recommendations differ from what BMC
publishes.
Hosting (Recommendations)
Resource POC Small (<500)
Datacentre
(<5000)
Enterprise
(20000+)
CPUs 2 4 8 8
RAM (GB) 2 8 16 32
Swap (GB) 4 16 32 32
Local Disk (GB) 37 100 100 100
Datastore (GB) 37 200 500 1TB
Backup (GB) N/A 200 500 1TB
28. Windows Proxy
Hosted on a virtual server with one of the following OS types:
◦ Windows 2008 SP2
◦ Windows 2008 R2
◦ Windows 2012
◦ Windows 2012 R2
Minimum host specification
◦ 2GHz Intel Pentium 4 CPU 512k cache (or equivelant)
◦ 4GB Memory
◦ 100GB Disk
29. Credentials
Windows
◦ Local Admin account with WMI rights
◦ Administrative shares should not be disabled (enabled by default)
◦ Netstat
Unix/Linux
◦ SSHD or SSH key
◦ Standard user account with non-root privileges
◦ Sudo or sudoers file for privileged commands
SNMP
◦ Community strings to logon to network devices/printers/etc.
30. Other Considerations for DC Deployment
Limited RBAC can be configured through Group mappings in the UI, but this can break
functionality if you are not careful
BMC Discovery is not a multi-tenanted solution – all data is visible to any administrator with
visibility to the data model.
◦ The appliance does however support multi-tenancy sync.
Overlapping IPs can be handled at a basic server level, but due to the nature of relationship
mapping, ownership can be mismatched.
◦ If your environment is not NAT’d then non-consolidated appliance deployment is recommended (with
direct integration to CMDB)
It is not possible to use Discovery as a typical ‘manual’ CMDB – i.e. you cannot add/edit CI’s and
attributes manually.
◦ The primary method of population is automated discovery, it is then possible to create custom patterns
to add additional custom CI’s and attributes through scanning.
31. Summary of Prerequisite Actions
Hosting for Discovery appliance(s)
Hosting for Windows Proxy(s)
Rollout of credentials – Linux/Unix, Windows, Virtual Containers
Network configuration – appliance, proxies, firewalls, ACLs, IDS, IDS
Obtain change approvals for above actions and for scanning environment
Identify target environments – IP/subnet ranges and exclude ranges
Access for consultant to
◦ The appliance and proxies via HTTP and SSH
◦ Use of tools such as PuTTy, WinSCP, Notepad++, Regex Coach, Chrome or Firefox
Administrators and Users must be able to access Discovery appliances through HTTP(S) and SSH
(administrators)
33. Infrastructure
What OSIs and Devices do you want to discover?
◦ OS/Device type
◦ Virtual/Physical
◦ How many (OS breakdown)
◦ How to access
◦ Additional commands needed beyond platform scripts?
Datacenters?
◦ How many
◦ Locations
Any firewall issues?
◦ Network zones, DMZ
General security issues?
◦ Credentials
◦ Access rights management
UNIX Credentials
sshd or ssh key or standard user account
Public-key cryptography where "encryption and decryption using separate keys
Not possible to derive the encryption key from the encryption key
Appliance holds private key publice key deployed to target hosts
Credentials stored in a vault
Blowfish encryption
Secured with a passphrase
Passwords never exposed ADDM team, operators or Users
Sudo used for privilege escalation
Commands and arguments specified to prevent spawning any arbitrary commands
Naming convention tends to be abstract, custom names designated by the business or high-level function.
1. A service is supported by one or more Business Applications2. A BAI depends on Software and Databases
3. Software and Databases depend on processes, services and other components running on Hosts
4. Hosts depend on switches for connectivity
===
This top down view in Discovery is referred to as ‘provenance’. Where a node within Discovery can be drilled down by it’s provenance to see underlying dependencies and associations.
BAM only requires us to look at the Hosts, Software and Application levels.
In Discovery terminology we refer to a discovered or inferred component as an “Instance”.
===
This is a fairly common example, many business applications take this form, with or without a webserver, but it should not always be assumed to be the case.
===
In some cases these may reside on the same server. Discovery has a Database (Berkley DB), Webserver (Apache) and Application (based on Python) – but these all run from 1 virtual machine.