Improve and simplify securing Red Hat OpenShift containerized environments by leveraging CyberArk’s secrets management solutions and out-of-the-box certified integrations. This demo heavy technical session expands on the prior webinar and uses demos and examples to give practical guidance on how to improve securing your organization’s containerized applications. All while avoiding impacting developer velocity.
This session will provide:
A clear understanding of the challenges and requirements for securing Kubernetes and Red Hat OpenShift containerized environments at enterprise scale
The benefits of enhancing the native secrets management and security capabilities of OpenShift with CyberArk’s certified integrations
Guidance to address common security challenges, including achieving enterprise scale and availability, minimizing the time spent on audit and compliance requests, avoiding problems with developer adoption
Practical steps to get started using Conjur Open Source and next steps
CyberArk, the global leader in privileged access management, offers the industry’s most complete solution for securing both the credentials and secrets used by applications, Playbooks, scripts and other non-human identities, as well as human users. CyberArk solutions are deployed at many of the world’s largest enterprises including over half the Fortune 500.
The adoption of DevOps practices and tools for mainframe-native and cross-platform apps is gaining traction.
This session will present findings from a recent IDC study on the current state with a close examination of where leaders are finding the most value. Learn about the exciting trends with IDC Research Vice President Mary Johnston Turner and Sujay Solomon, Broadcom’s Chief Z DevOps Advocate. This session is a must for both Mainframe leaders and DevOps champions.
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
In the past decade, IDC has seen IBM Z evolve first from a siloed platform to what they call a "connected" platform, and then to a "transformative" platform. This transition has been driven by IBM, by the IBM Z software vendors, like Rocket Software, and by businesses themselves.
IDC research shows that businesses that choose to modernize IBM Z achieve higher satisfaction than re-platformers and many are using open source software (OSS) in their modernization initiatives. Employing OSS makes it possible to crack the platform open and enable it to connect to the rest of the datacenter and the outside world. Join IDC guest speaker, Al Gillen and Peter Fandel as they take a deeper look at the value proposition associated with using commercially supported OSS in mission-critical environments, like IBM Z. In this webinar we’ll discuss:
How OSS can neutralize the disparity between seasoned IBM Z and emerging developers
The modernization initiatives that involve OSS
What to consider before bringing OSS to IBM Z
How Rocket Software is delivering commercially supported OSS to IBM Z
Application Asset Management with ThreadFixDenim Group
Too many organizations have an incomplete picture of their application portfolios. Because you are unable to protect attack surfaces that you don’t know about, this leaves them vulnerable. In this webinar, we will cover the capabilities that ThreadFix has to allows security teams to manage their application asset portfolios. We will also take a deeper dive into several tools such as nmap and OWASP Amass that can help security analysts better enumerate all of the applications in their organization’s portfolio.
Extending Jenkins to the Mainframe. A Simpler Approach.DevOps.com
Wouldn’t it be great to use familiar tools when you’re needing to integrate mainframe applications into your DevOps pipeline?
Mainframe applications have historically required specialized tools and knowledge to build, maintain and integrate with distributed systems. Existing tool integrations are designed for vendor-specific tool chains and they require a great deal of specialized knowledge and expertise to set up.
CA Technologies engineering decided to break with tradition and utilize advancements on the zOS platform to provide a Command Line Interface that turns Mainframe into “just” another deployment target for the DevOps pipeline.
In this webinar the presenters will show how to integrate, build and test COBOL applications into a modern DevOps pipeline managed by Jenkins Continuous Integration software.
Static Application Security Testing Strategies for Automation and Continuous ...Kevin Fealey
Static Application Security Testing (SAST) introduces challenges with existing Software Development Lifecycle Configurations. Strategies at different points of the SDLC improve deployment time, while still improving the quality and security of the deliverable. This session will discuss the different strategies that can be implemented for SAST within SDLC—strategies catering to developers versus security analysts versus release engineers. The strategies consider the challenges each team may encounter, allowing them to incorporate security testing without jeopardizing deadlines or existing process.
Zero to 1000+ Applications - Large Scale CD Adoption at Cisco with Spinnaker ...DevOps.com
As part of its Cloud-native transformation, Cisco needed to modernize its software delivery process. Scalability, multi-cloud deployment to its OpenShift environment and public clouds, and the ability to support Cisco’s extensive policy, compliance, and security requirements made open source Spinnaker a logical choice for a modern continuous delivery platform.
As one of the world’s top technology providers with one of the largest and most diverse software development organizations, Cisco had to overcome some unique challenges to be able to onboard 10,000+ developers, 1000+ monolithic and non-cloud native applications, and achieve the high availability and reliability needed to support mission-critical production applications.
Join us for this new webinar as Balaji Siva, VP of Products at OpsMx engages Anil Anaberumutt, IT architect at Cisco, and Red Hat Sr. Solutions Architect, Vikas Grover, in a discussion about Cisco’s CD challenges and the lessons learned, best practices implemented, and key results achieved on their CD transformation journey from zero to over 1000 applications.
The adoption of DevOps practices and tools for mainframe-native and cross-platform apps is gaining traction.
This session will present findings from a recent IDC study on the current state with a close examination of where leaders are finding the most value. Learn about the exciting trends with IDC Research Vice President Mary Johnston Turner and Sujay Solomon, Broadcom’s Chief Z DevOps Advocate. This session is a must for both Mainframe leaders and DevOps champions.
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
In the past decade, IDC has seen IBM Z evolve first from a siloed platform to what they call a "connected" platform, and then to a "transformative" platform. This transition has been driven by IBM, by the IBM Z software vendors, like Rocket Software, and by businesses themselves.
IDC research shows that businesses that choose to modernize IBM Z achieve higher satisfaction than re-platformers and many are using open source software (OSS) in their modernization initiatives. Employing OSS makes it possible to crack the platform open and enable it to connect to the rest of the datacenter and the outside world. Join IDC guest speaker, Al Gillen and Peter Fandel as they take a deeper look at the value proposition associated with using commercially supported OSS in mission-critical environments, like IBM Z. In this webinar we’ll discuss:
How OSS can neutralize the disparity between seasoned IBM Z and emerging developers
The modernization initiatives that involve OSS
What to consider before bringing OSS to IBM Z
How Rocket Software is delivering commercially supported OSS to IBM Z
Application Asset Management with ThreadFixDenim Group
Too many organizations have an incomplete picture of their application portfolios. Because you are unable to protect attack surfaces that you don’t know about, this leaves them vulnerable. In this webinar, we will cover the capabilities that ThreadFix has to allows security teams to manage their application asset portfolios. We will also take a deeper dive into several tools such as nmap and OWASP Amass that can help security analysts better enumerate all of the applications in their organization’s portfolio.
Extending Jenkins to the Mainframe. A Simpler Approach.DevOps.com
Wouldn’t it be great to use familiar tools when you’re needing to integrate mainframe applications into your DevOps pipeline?
Mainframe applications have historically required specialized tools and knowledge to build, maintain and integrate with distributed systems. Existing tool integrations are designed for vendor-specific tool chains and they require a great deal of specialized knowledge and expertise to set up.
CA Technologies engineering decided to break with tradition and utilize advancements on the zOS platform to provide a Command Line Interface that turns Mainframe into “just” another deployment target for the DevOps pipeline.
In this webinar the presenters will show how to integrate, build and test COBOL applications into a modern DevOps pipeline managed by Jenkins Continuous Integration software.
Static Application Security Testing Strategies for Automation and Continuous ...Kevin Fealey
Static Application Security Testing (SAST) introduces challenges with existing Software Development Lifecycle Configurations. Strategies at different points of the SDLC improve deployment time, while still improving the quality and security of the deliverable. This session will discuss the different strategies that can be implemented for SAST within SDLC—strategies catering to developers versus security analysts versus release engineers. The strategies consider the challenges each team may encounter, allowing them to incorporate security testing without jeopardizing deadlines or existing process.
Zero to 1000+ Applications - Large Scale CD Adoption at Cisco with Spinnaker ...DevOps.com
As part of its Cloud-native transformation, Cisco needed to modernize its software delivery process. Scalability, multi-cloud deployment to its OpenShift environment and public clouds, and the ability to support Cisco’s extensive policy, compliance, and security requirements made open source Spinnaker a logical choice for a modern continuous delivery platform.
As one of the world’s top technology providers with one of the largest and most diverse software development organizations, Cisco had to overcome some unique challenges to be able to onboard 10,000+ developers, 1000+ monolithic and non-cloud native applications, and achieve the high availability and reliability needed to support mission-critical production applications.
Join us for this new webinar as Balaji Siva, VP of Products at OpsMx engages Anil Anaberumutt, IT architect at Cisco, and Red Hat Sr. Solutions Architect, Vikas Grover, in a discussion about Cisco’s CD challenges and the lessons learned, best practices implemented, and key results achieved on their CD transformation journey from zero to over 1000 applications.
Running on Amazon EKS – How Greenlight Gets Security RightDevOps.com
Like so many FinTech innovators, Greenlight has turned to containers and Kubernetes to enable rapid application development. It’s also turned to AWS to host many of its apps, so the company can focus internal resources on teaching financial literacy to the next generation.
Deliver your App Anywhere … Publicly or PrivatelyDevOps.com
Developers are increasingly adopting a microservices approach for their apps in order to gain rapid iteration capabilities required for delivering new services faster. However, delivering the App still requires multiple steps such as allocation of virtual IPs, provisioning the front load balancer, configuring firewall rules, configuring a public domain, and DDOS. At present, each of these steps requires coordination across multiple teams with multiple iterations per team. The time efficiencies gained by adopting microservices and cloud-native technologies is negated due to the time taken to deliver the App.
In this session, Pranav Dharwadkar, VP of products at Volterra, and Jakub Pavlik, director of engineering, will help you understand these challenges and introduce a distributed proxy architecture that can alleviate the challenges across different cloud environments. This webinar will include a live demo using a distributed proxy architecture to advertise an App publicly and privately.
In this webinar, you will learn:
The steps required to deliver an App using the current approaches
How a distributed proxy architecture can be used to deliver the app publicly and privately
The operational benefits of a distributed proxy architecture for delivering new services
Dave Meurer currently serves as the Senior Technical Alliances Manager at Synopsys' Software Integrity Group’s Business Development team, where he leads technical planning, solution development, enablement, and evangelism with existing and potential strategic alliances and partners of Synopsys. Dave joined Synopsys through the acquisition of Black Duck, where he served in a similar role as the director of sales engineering for North America. Before coming to Black Duck Software, Dave worked for Skyway Software, HSN.com, and Accenture in various management and development roles. When he’s not thinking about joint partner solutions, he plays Uber driver for his five kids’ sports activities. Follow him on Twitter at @davemeurer.
Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to mobile to cloud.
We are one of the largest pure-play software companies in the world, focused from the ground up on building, selling, and supporting software. This focus allows us to deliver on our mission to put customers at the center of innovation and deliver high-quality, enterprise-grade scalable software that our teams can be proud of. We help customers bridge the old and the new by maximizing the ROI on existing software investments and enabling innovation in the new hybrid model for enterprise IT.
We believe that organizations don't need to eliminate the past to make way for the future. Everything we do is based on a simple idea: The quickest, safest way to get results is to build on what you have. Our software does just that. It bridges the gap between existing and emerging technologies—so you can innovate faster, with less risk, in the race to digital transformation.
Troubleshooting the Most Common Citrix Complaints for Remote WorkerseG Innovations
When remote workers complain that Citrix is slow, where do you initially focus your investigations? What do you analyze and how do you triage now that there are remote working factors to consider?
Join us as George Spiers, Citrix CTP, and Barry Schiffer, Citrix CTP, share their real-world experience to provide you with tips on troubleshooting in the new normal.
In this webinar you'll learn how to:
• Understand the most common issues and how to troubleshoot them like slow logons, slow app/desktop sessions, connectivity issues, and more
• Methodically go about finding the scope, magnitude of impact, and source of the problem
• Investigate issues in the supporting infrastructure (network, AD, virtualization, etc.)
• Troubleshoot with automated and built-for-Citrix monitoring tools
DevOps in the Real World: Know What it Takes to Make it WorkVMware Tanzu
DevOps Loop at VMworld
Session Title: DevOps in the Real World: Know What it Takes to Make it Work
Speaker: Bola Rotibi, Research Director, Software Development, CCS Insight
DevOps for Highly Regulated EnvironmentsDevOps.com
Financial institutions, medical groups, governmental organizations, automotive companies… these types of entities all have unique and sometimes difficult-to-meet regulations. You may be required to have fine-grained auditability of your SDLC or maintain specific third-party integrations. Security models may be heightened, or certain types of compliance processes maintained. So how are we supposed to “do the DevOps” when we have so many things to worry about? In this webinar, we’ll explore some ways that you can adopt DevOps best practices and even (gasp!) thrive when building your DevOps and DevSecOps pipelines in highly-regulated industries.
Easily Create Scalable Automation using SeleniumMicro Focus
We were delighted to be at STAREAST again, one of the longest-running and most respected conferences on software testing and quality assurance. Archie Roboostoff ran a session on how to easily create Scalable Test Automation using Selenium and here are his charts. To find out more about how we can help go to https://www.microfocus.com/products/silk-portfolio/silk-webdriver/
Using Collaboration to Make Application Vulnerability Management a Team SportDenim Group
Vulnerability management - especially application vulnerability management - is a challenging business function because it crosses disciplinary boundaries. Security teams find and adjudicate vulnerabilities, DevOps and server ops teams have to fix them, and GRC teams need to be kept apprised of status and progress. As has always been the case - but especially in a necessarily remote work environment - collaboration is key to making these business functions operate efficiently and effectively. This webinar looks at common bottlenecks that snarl vulnerability remediation workflows and discusses strategies to address these issues via collaboration. Examples are given of implementing these via the ThreadFix platform, but the strategies are universally-applicable for vulnerability management professionals looking to streamline their vulnerability remediation workflows.
This annual review will highlight the most significant legal developments related to open source software in 2019, including:
•Evolution of open source: control, sustainability, and politics
•Litigation update: Cambium and Artifex cases
•Patents and the open source community
•Impacts of government sanctions
•The shift left for compliance and rise of bug bounty programs
•And much, much more
For more information, please visit https://www.synopsys.com/software-integrity/managed-services/open-source-software-audit.html
DevOps For Everyone: Bringing DevOps Success to Every App and Every Role in y...Siva Rama Krishna Chunduru
Understand DevOps and it's fitment to various types of applications.
Understand various Organization Roles after Org-restructure.
Understand the way to measure the success.
Integrating SAP into DevOps Pipelines: Why and HowDevOps.com
Teams practicing DevOps don’t usually have to spend much time thinking about applications like SAP, and SAP often remains a DevOps-free zone that is resolutely difficult to change. But SAP systems enable critical operational processes and in an increasingly interconnected technology stack, need to adapt at high speed if a business is going to be truly agile.
DevOps expertise from outside SAP teams is helping to accelerate change in SAP so that digital transformation of products, processes and business models isn’t held back by dependence on slow, unresponsive ‘systems of record’. In this webinar we’ll look at why it’s important to include SAP in cross-application CI/CD pipelines, and how to do so. Join us to learn:
Why DevOps teams should care about SAP
Key SAP differences that DevOps teams need to understand
How to get started with DevOps for SAP and successfully integrate SAP into wider DevOps pipelines
Real-world examples of SAP DevOps adoption
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & InfostretchInfostretch
How can enterprises leverage cloud to deliver the most value to their customers?
In this webinar, the travel and lifestyle reward company, InterMiles, discusses its continuous modernization approach using AWS services. By leveraging its AWS expertise, Infostretch helped InterMiles cut costs, improve performance and optimize operations. With a robust application in place, users were able to leverage their core and trending loyalty features such as hyper-personalization, gamification and micro-redemption. InterMiles, AWS and Infostretch covered the strategic, technical and practical aspects of managing a successful app modernization in AWS cloud, including:
• Modernization in Cloud: Kickstarting your modernization journey, the importance of continuous modernization and how to adopt a microservices model with reusable components between the native mobile and web platform.
• Cost Optimization and Operational Efficiency: The cost and operational benefits of optimizing your operations and infrastructure by consolidating web and mobile platforms on AWS.
• AWS Well-Architected Review (WAR): Building a resilient cloud architecture and infrastructure using AWS Well-Architected Review (WAR) and identifying and addressing critical challenges with custom solutions.
Speakers:
Ketan Phanse, VP & Head of Information and Digital Technology, InterMiles
Shabir Rupani, Sr. Partner Solutions Architect, AWS
Deven Samant, Head of Enterprise Data and Cloud Practice, Infostretch
The Developer is the New CIO: How Vendors Adapt to the Changing LandscapeLauren Cooney
CloudConnect presentation on the shifting developer ecosystem & changes in the market allowing for more rapid development, ease of product acquisition and demand for DX (developer UX). Details how vendors need to shift to address users, developers & customer needs that are changing and steps to consider while doing this.
Dependency Health: Removing the Barriers to Keeping Projects in ShapeDevOps.com
Enterprises and Developers already know the importance of managing vulnerabilities and dependencies, so why do so many still fall behind?
Like maintaining good physical health, software projects require more than just good intentions - there needs to be sensible and achievable process that developers want to follow, and the rewards must outweigh the demands.
In this webinar, David Habusha and Rhys Arkins from WhiteSource will discuss some of today's challenges that hold enterprises back from having great Open Source dependency management, and identify what the missing pieces are for a future in which updates and vulnerability patches can be applied intelligently, safely, and in many cases even automatically.
Title:
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Abstract:
With all the focus on DevSecOps and integrating security into Continuous Integration/Continuous Delivery (CI/CD) pipelines, some teams may be lured into thinking that the entirety of a Software Security Assurance (SSA) program can be baked into these pipelines. While integrating security into CI/CD offers many benefits, it is critical to understand that a full SSA program encompasses a variety of activities – many of which are incompatible with run time restrictions and other constraints imposed by these pipelines. This webinar looks at the breadth of activities involved in a mature SSA program and steps through the aspects of a program that can be realistically included in a pipeline, as well as those that cannot. It also reviews how these activities and related tooling have evolved over time as the application security discipline has matured and as development teams started to focus on cloud-native development techniques and technologies.
Speaker:
Dan Cornell
Bio:
A globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As Chief Technology Officer and Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process.
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel AvivAmazon Web Services
Session 1:"Git, Bitbucket, Jira, Chef an ALM DevOps demo by ManageWare"
In this session we will explore the method and tools for an end-to-end workflow, from Story to code Deployment.
Session 2: ""DevOps with Red Hat OpenShift and our offering on AWS""
Integrating the workflow between Development & Operations in an agile way through automation
Running on Amazon EKS – How Greenlight Gets Security RightDevOps.com
Like so many FinTech innovators, Greenlight has turned to containers and Kubernetes to enable rapid application development. It’s also turned to AWS to host many of its apps, so the company can focus internal resources on teaching financial literacy to the next generation.
Deliver your App Anywhere … Publicly or PrivatelyDevOps.com
Developers are increasingly adopting a microservices approach for their apps in order to gain rapid iteration capabilities required for delivering new services faster. However, delivering the App still requires multiple steps such as allocation of virtual IPs, provisioning the front load balancer, configuring firewall rules, configuring a public domain, and DDOS. At present, each of these steps requires coordination across multiple teams with multiple iterations per team. The time efficiencies gained by adopting microservices and cloud-native technologies is negated due to the time taken to deliver the App.
In this session, Pranav Dharwadkar, VP of products at Volterra, and Jakub Pavlik, director of engineering, will help you understand these challenges and introduce a distributed proxy architecture that can alleviate the challenges across different cloud environments. This webinar will include a live demo using a distributed proxy architecture to advertise an App publicly and privately.
In this webinar, you will learn:
The steps required to deliver an App using the current approaches
How a distributed proxy architecture can be used to deliver the app publicly and privately
The operational benefits of a distributed proxy architecture for delivering new services
Dave Meurer currently serves as the Senior Technical Alliances Manager at Synopsys' Software Integrity Group’s Business Development team, where he leads technical planning, solution development, enablement, and evangelism with existing and potential strategic alliances and partners of Synopsys. Dave joined Synopsys through the acquisition of Black Duck, where he served in a similar role as the director of sales engineering for North America. Before coming to Black Duck Software, Dave worked for Skyway Software, HSN.com, and Accenture in various management and development roles. When he’s not thinking about joint partner solutions, he plays Uber driver for his five kids’ sports activities. Follow him on Twitter at @davemeurer.
Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to mobile to cloud.
We are one of the largest pure-play software companies in the world, focused from the ground up on building, selling, and supporting software. This focus allows us to deliver on our mission to put customers at the center of innovation and deliver high-quality, enterprise-grade scalable software that our teams can be proud of. We help customers bridge the old and the new by maximizing the ROI on existing software investments and enabling innovation in the new hybrid model for enterprise IT.
We believe that organizations don't need to eliminate the past to make way for the future. Everything we do is based on a simple idea: The quickest, safest way to get results is to build on what you have. Our software does just that. It bridges the gap between existing and emerging technologies—so you can innovate faster, with less risk, in the race to digital transformation.
Troubleshooting the Most Common Citrix Complaints for Remote WorkerseG Innovations
When remote workers complain that Citrix is slow, where do you initially focus your investigations? What do you analyze and how do you triage now that there are remote working factors to consider?
Join us as George Spiers, Citrix CTP, and Barry Schiffer, Citrix CTP, share their real-world experience to provide you with tips on troubleshooting in the new normal.
In this webinar you'll learn how to:
• Understand the most common issues and how to troubleshoot them like slow logons, slow app/desktop sessions, connectivity issues, and more
• Methodically go about finding the scope, magnitude of impact, and source of the problem
• Investigate issues in the supporting infrastructure (network, AD, virtualization, etc.)
• Troubleshoot with automated and built-for-Citrix monitoring tools
DevOps in the Real World: Know What it Takes to Make it WorkVMware Tanzu
DevOps Loop at VMworld
Session Title: DevOps in the Real World: Know What it Takes to Make it Work
Speaker: Bola Rotibi, Research Director, Software Development, CCS Insight
DevOps for Highly Regulated EnvironmentsDevOps.com
Financial institutions, medical groups, governmental organizations, automotive companies… these types of entities all have unique and sometimes difficult-to-meet regulations. You may be required to have fine-grained auditability of your SDLC or maintain specific third-party integrations. Security models may be heightened, or certain types of compliance processes maintained. So how are we supposed to “do the DevOps” when we have so many things to worry about? In this webinar, we’ll explore some ways that you can adopt DevOps best practices and even (gasp!) thrive when building your DevOps and DevSecOps pipelines in highly-regulated industries.
Easily Create Scalable Automation using SeleniumMicro Focus
We were delighted to be at STAREAST again, one of the longest-running and most respected conferences on software testing and quality assurance. Archie Roboostoff ran a session on how to easily create Scalable Test Automation using Selenium and here are his charts. To find out more about how we can help go to https://www.microfocus.com/products/silk-portfolio/silk-webdriver/
Using Collaboration to Make Application Vulnerability Management a Team SportDenim Group
Vulnerability management - especially application vulnerability management - is a challenging business function because it crosses disciplinary boundaries. Security teams find and adjudicate vulnerabilities, DevOps and server ops teams have to fix them, and GRC teams need to be kept apprised of status and progress. As has always been the case - but especially in a necessarily remote work environment - collaboration is key to making these business functions operate efficiently and effectively. This webinar looks at common bottlenecks that snarl vulnerability remediation workflows and discusses strategies to address these issues via collaboration. Examples are given of implementing these via the ThreadFix platform, but the strategies are universally-applicable for vulnerability management professionals looking to streamline their vulnerability remediation workflows.
This annual review will highlight the most significant legal developments related to open source software in 2019, including:
•Evolution of open source: control, sustainability, and politics
•Litigation update: Cambium and Artifex cases
•Patents and the open source community
•Impacts of government sanctions
•The shift left for compliance and rise of bug bounty programs
•And much, much more
For more information, please visit https://www.synopsys.com/software-integrity/managed-services/open-source-software-audit.html
DevOps For Everyone: Bringing DevOps Success to Every App and Every Role in y...Siva Rama Krishna Chunduru
Understand DevOps and it's fitment to various types of applications.
Understand various Organization Roles after Org-restructure.
Understand the way to measure the success.
Integrating SAP into DevOps Pipelines: Why and HowDevOps.com
Teams practicing DevOps don’t usually have to spend much time thinking about applications like SAP, and SAP often remains a DevOps-free zone that is resolutely difficult to change. But SAP systems enable critical operational processes and in an increasingly interconnected technology stack, need to adapt at high speed if a business is going to be truly agile.
DevOps expertise from outside SAP teams is helping to accelerate change in SAP so that digital transformation of products, processes and business models isn’t held back by dependence on slow, unresponsive ‘systems of record’. In this webinar we’ll look at why it’s important to include SAP in cross-application CI/CD pipelines, and how to do so. Join us to learn:
Why DevOps teams should care about SAP
Key SAP differences that DevOps teams need to understand
How to get started with DevOps for SAP and successfully integrate SAP into wider DevOps pipelines
Real-world examples of SAP DevOps adoption
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & InfostretchInfostretch
How can enterprises leverage cloud to deliver the most value to their customers?
In this webinar, the travel and lifestyle reward company, InterMiles, discusses its continuous modernization approach using AWS services. By leveraging its AWS expertise, Infostretch helped InterMiles cut costs, improve performance and optimize operations. With a robust application in place, users were able to leverage their core and trending loyalty features such as hyper-personalization, gamification and micro-redemption. InterMiles, AWS and Infostretch covered the strategic, technical and practical aspects of managing a successful app modernization in AWS cloud, including:
• Modernization in Cloud: Kickstarting your modernization journey, the importance of continuous modernization and how to adopt a microservices model with reusable components between the native mobile and web platform.
• Cost Optimization and Operational Efficiency: The cost and operational benefits of optimizing your operations and infrastructure by consolidating web and mobile platforms on AWS.
• AWS Well-Architected Review (WAR): Building a resilient cloud architecture and infrastructure using AWS Well-Architected Review (WAR) and identifying and addressing critical challenges with custom solutions.
Speakers:
Ketan Phanse, VP & Head of Information and Digital Technology, InterMiles
Shabir Rupani, Sr. Partner Solutions Architect, AWS
Deven Samant, Head of Enterprise Data and Cloud Practice, Infostretch
The Developer is the New CIO: How Vendors Adapt to the Changing LandscapeLauren Cooney
CloudConnect presentation on the shifting developer ecosystem & changes in the market allowing for more rapid development, ease of product acquisition and demand for DX (developer UX). Details how vendors need to shift to address users, developers & customer needs that are changing and steps to consider while doing this.
Dependency Health: Removing the Barriers to Keeping Projects in ShapeDevOps.com
Enterprises and Developers already know the importance of managing vulnerabilities and dependencies, so why do so many still fall behind?
Like maintaining good physical health, software projects require more than just good intentions - there needs to be sensible and achievable process that developers want to follow, and the rewards must outweigh the demands.
In this webinar, David Habusha and Rhys Arkins from WhiteSource will discuss some of today's challenges that hold enterprises back from having great Open Source dependency management, and identify what the missing pieces are for a future in which updates and vulnerability patches can be applied intelligently, safely, and in many cases even automatically.
Title:
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Abstract:
With all the focus on DevSecOps and integrating security into Continuous Integration/Continuous Delivery (CI/CD) pipelines, some teams may be lured into thinking that the entirety of a Software Security Assurance (SSA) program can be baked into these pipelines. While integrating security into CI/CD offers many benefits, it is critical to understand that a full SSA program encompasses a variety of activities – many of which are incompatible with run time restrictions and other constraints imposed by these pipelines. This webinar looks at the breadth of activities involved in a mature SSA program and steps through the aspects of a program that can be realistically included in a pipeline, as well as those that cannot. It also reviews how these activities and related tooling have evolved over time as the application security discipline has matured and as development teams started to focus on cloud-native development techniques and technologies.
Speaker:
Dan Cornell
Bio:
A globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As Chief Technology Officer and Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process.
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel AvivAmazon Web Services
Session 1:"Git, Bitbucket, Jira, Chef an ALM DevOps demo by ManageWare"
In this session we will explore the method and tools for an end-to-end workflow, from Story to code Deployment.
Session 2: ""DevOps with Red Hat OpenShift and our offering on AWS""
Integrating the workflow between Development & Operations in an agile way through automation
PaaS Anywhere - Deploying an OpenShift PaaS into your Cloud Provider of ChoiceIsaac Christoffersen
Choice matters. And OpenShift Enterprise by Red Hat is the only Platform-as-a-Service (PaaS) product that runs in the hosting environment of your choice.
While true PaaS products provide a level of infrastructure abstraction so developers can be more productive, choosing the right environment to host your PaaS product is critical. You must take many factors into consideration, like cost, availability, scalability, and manageability. Having a PaaS product that’s truly environment-agnostic can maximize your options and help you make the choice that best fits your needs.
This talk has a demo of deploying OpenShift Enterprise to multiple public cloud providers and within local virtual machines. By using common provisioning tools and the various cloud vendor APIs, you’ll see the realization of open, hybrid PaaS. You’ll also learn about considerations when running OpenShift Enterprise in these different environments, and monitoring strategies for proactively maintaining the health of an OpenShift Enterprise environment.
IBM Think 2020 Openshift on IBM Z and LinuxONEFilipe Miranda
IBM Think 2020 - Openshift on IBM Z and LinuxONE
#mainframe #openshift #kubernetes #modernization #ibm #devops #openshift4 #redhatopenshift #redhat #ibmz #linuxone #ibmer
Building Cloud Native Applications with Oracle Autonomous Database.Oracle Developers
In this session, Manish Kapur from the Oracle Application Development Cloud Platform team will provide an overview of Oracle's Cloud-Native Application Development platform. He will talk about developing and deploying cloud-native applications like Microservices and Serverless functions using Continuous Integration and Delivery Pipelines. This will include a demonstration of how to use the CI/CD approach to build and deploy a simple Node.js based microservices application that uses Oracle Autonomous Transaction Processing (ATP) database for persistence.
Docker & aPaaS: Enterprise Innovation and Trends for 2015WaveMaker, Inc.
WaveMaker Webinar: Cloud-based App Development and Docker: Trends to watch out for in 2015 - http://www.wavemaker.com/news/webinar-cloud-app-development-and-docker-trends/
CIOs, IT planners and developers at a growing number of organizations are taking advantage of the simplicity and productivity benefits of cloud application development. With Docker technology, cloud-based app development or aPaaS (Application Platform as a Service) is only becoming more disruptive − forcing organizations to rethink how they handle innovation, time-to-market pressures, and IT workloads.
Putting Private Clouds to Work with PaaS Interop 2013 Vegas Diane MuellerOpenShift Origin
Presentation from Interop/Vegas 2013 Private Cloud track
Getting the most out of your Private Cloud means going beyond simply deploying IaaS, maximize your investment and meet your line of business managers & developer's expectations of self-service, on demand cloud resource in today's agile life cycles
Putting Private Clouds to Work with PaaS Interop Vegas 2013 presentation by D...Diane Mueller
Presentation from Interop/Vegas 2013 Private Cloud track
Getting the most out of your Private Cloud means going beyond simply deploying IaaS, maximize your investment and meet your line of business managers & developer's expectations of self-service, on demand cloud resource in today's agile life cycles
Similar to Securing Red Hat OpenShift Containerized Applications At Enterprise Scale (20)
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
With the growing adoption of Kubernetes, organizations want to take advantage of containerized Microsoft SQL Server 2019 to optimize transactional performance and accelerate time-to-insights from their business-critical data. However, as enterprises embrace hybrid cloud strategy, they need to consider several aspects based on the performance, cost and data protection requirements for running enterprise-grade SQL Server databases.
In this webinar, we will compare and contrast various cloud-native platforms for SQL Server that would help CIOs, DevOps engineers, database administrators and applications architects to determine the most suitable platform that fits their business needs.
Join us as we explore some exciting results from a recent performance benchmark study conducted by McKnight Consulting Group, an independent consulting firm, to compare the performance of Microsoft SQL Server 2019 on the best possible configurations of the following Kubernetes platforms:
Diamanti Enterprise Kubernetes Platform
Amazon Web Services Elastic Kubernetes Service (AWS EKS)
Azure Kubernetes Service (AKS)
Topics will include:
Platform considerations and requirements for running Microsoft SQL Server 2019
Performance comparison and analysis of running SQL Server on various platform
Best practices for running containerized SQL Server databases in Kubernetes environment
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
With the growing adoption of Kubernetes, organizations want to take advantage of containerized Microsoft SQL Server 2019 to optimize transactional performance and accelerate time-to-insights from their business-critical data. However, as enterprises embrace hybrid cloud strategy, they need to consider several aspects based on the performance, cost and data protection requirements for running enterprise-grade SQL Server databases.
In this webinar, we will compare and contrast various cloud-native platforms for SQL Server that would help CIOs, DevOps engineers, database administrators and applications architects to determine the most suitable platform that fits their business needs.
Join us as we explore some exciting results from a recent performance benchmark study conducted by McKnight Consulting Group, an independent consulting firm, to compare the performance of Microsoft SQL Server 2019 on the best possible configurations of the following Kubernetes platforms:
Diamanti Enterprise Kubernetes Platform
Amazon Web Services Elastic Kubernetes Service (AWS EKS)
Azure Kubernetes Service (AKS)
Topics will include:
Platform considerations and requirements for running Microsoft SQL Server 2019
Performance comparison and analysis of running SQL Server on various platform
Best practices for running containerized SQL Server databases in Kubernetes environment
Next Generation Vulnerability Assessment Using Datadog and SnykDevOps.com
Vulnerability assessment for teams can often be overwhelming. The dependency graph could be thousands of packages depending on the application. Triaging vulnerability data and prioritizing actions has historically been a very manual process, until now. With Datadog and Snyk, learn how to trace security and performance issues by leveraging continuous profiling capabilities for actionable insight that help developers remediate problems.
Join us on Thursday, January 21 for a unique opportunity to learn more about continuous profiling, vulnerability management, and the benefit to customers from using both of these products. In this webinar, you will:
Bust some myths around continuous profiling and learn how Datadog differentiates itself
See decorated traces in action for sample Java applications and understand how Snyk + Datadog reduce time to triage supply chain vulnerabilities
Learn roadmap information for upcoming public announcements from both partners
In the era of cloud generation, the constant activity around workloads and containers create more vulnerabilities than an organization can keep up with. Using legacy security vendors doesn't set you up for success in the cloud. You’re likely spending undue hours chasing, triaging and patching a countless stream of cloud vulnerabilities with little prioritization.
Join us for this live webinar as we detail how to streamline host and container vulnerability workflows for your software teams wanting to build fast in the cloud. We'll be covering how to:
Get visibility into active packages and associated vulnerabilities
Reduce false positives by 98%
Reduce investigation time by 30%
Spot a legacy vendor looking to do some cloud washing
2021 Open Source Governance: Top Ten Trends and PredictionsDevOps.com
If you work in software development, jumpstart your engineering team in 2021—get ahead of the engineering curve and your competitors—by attending this must-watch open source trends and predictions webinar.
Alex Rybak, Director of Product Management at Revenera, and Russ Eling, founder and CEO of OSS Engineering Consultants, share their top 10 open source usage, license compliance and security insights for the new year.
Just a few hints at what you’ll learn more about:
Where the adoption of shift-left is headed and the decisions you’ll face going forward
The impact of a lack of software developer security training relative to pandemic fallout
The broader role of the engineering team in open source management and governance
The expanding role and impact of open source marketplaces such as GitHub
Don’t miss the discussion for valuable insight and learning for software engineering teams
2020 was a brutal year for ransomware. Cybercriminals operated without any human decency, targeting the most vulnerable and at-risk parties, such as hospitals, scientists, and global manufacturers. The approach has become more sophisticated and life-threatening, shifting from individual targets to global enterprises, destroying backups, blackmailing victims with public leakage of exfiltrated data, and paralyzing critical systems and infrastructure.
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)DevOps.com
As containers and Kubernetes are adopted in production, security is a critical concern and DevOps teams need to go beyond image scanning. Use cases such as runtime security, network visibility and segmentation, incident response and compliance become priorities as your Kubernetes security framework matures.
In this talk, we’ll share an overview of runtime security, discuss approaches used by open source and commercial tools, and hear how users are getting started quickly without impacting developer productivity.
In any fast-paced engineering environment, unexpected incidents can arise and escalate without warning. Without strong leadership within teams, you get chaotic, stressful, and tiring situations that waste valuable engineering time, slow down resolution, and most importantly, impact your customers.
Operationally mature organisations use proven incident response systems led by Incident Commanders. Incident Commanders provide the leadership needed to help stabilize major incidents fast.
In this webinar, we’ll take lessons learned from formalized incident response, such as those used by first responders, and show you how to apply those same practices to your organization. By utilising these methods you’ll improve both the speed and effectiveness of your team’s response, reducing the amount of downtime experienced.
In this workshop, attendees will:
Be introduced to the Incident Command System and learn how it can be adapted to their organisation
Walk through the basics of incident response best practices
Discuss examples of formal incident response from multiple organisations
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureDevOps.com
Chaos engineering is becoming a critical part of the DevOps toolchain when adopting Site Reliability Engineering (SRE) practices. Every system is becoming a distributed system and chaos engineering proclaims many advantages for them.
It improves infrastructure automation, increases reliability and transforms incident management. However, an often-overlooked benefit of chaos engineering and SRE involves culture transformation. Culture is often touched upon when talking about chaos engineering and SRE but not as often as skills and process.
In this webinar, we will discuss how you can build out a chaos engineering practice and how you can adopt a true blameless culture and maximize the potential of your team.
You will learn how to:
Hold blameless postmortems
Share post mortems with other teams
Run regular fire drills and game days
Automate chaos experiments for continuous validation
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportDevOps.com
Enterprises are best served by leveraging an RBAC system to manage access to their SSH and Kubernetes resources. With Teleport, an open source software, employers are able to provide granular access controls to developers based on the access they need and when they need it. This makes it possible for employers to maintain secure access without getting in the way of their developers’ daily operations.
Join Steven Martin, solution engineer at Teleport, as he demonstrates how to assign access to developers and SRE’s across environments with Teleport through roles mapped from enterprises’ identity providers or SSOs.
Monitoring Serverless Applications with DatadogDevOps.com
Join Datadog for a webinar on monitoring serverless applications with AWS Lambda. You'll learn how to get the most of Datadog's platform, as well ask the following key takeaways:
Learn how to set up a Twitter bot that makes API calls with Node.js
Deploying Serverless Applications
What does observability look like with less infrastructure?
Securing medical apps in the age of covid finalDevOps.com
The COVID-19 pandemic has drastically altered the connected healthcare landscape, accelerating the usage of telemedicine and other remote healthcare delivery systems by as much as 11,000% for some populations. How has this unprecedented push affected healthcare and medical device application security? The security team at Intertrust recently analyzed 100 Android and iOS medical apps to find out.
In this webinar, we'll discuss:
Medical application and device threat trends
The top mHealth security vulnerabilities uncovered in our analysis
Strategies to keep your mHealth apps safe
Future advances in digital healthcare and how your security can evolve with it
Raise your hand if you enjoy being buried in alerts or woken up at 2 a.m. — yeah … thought so. Ever-rising customer expectations around high availability and performance put massive pressure on the teams who develop and support SaaS products. And teams are literally losing sleep over it. Until outages and other incidents are a thing of the past, organizations need to invest in a way of dealing with them that won’t lead to burn-out.
In this session, you’ll learn how to combine the latest tooling with DevOps practices in the pursuit of a sustainable incident response workflow. It’s all about transparency, actionable alerts, resilience and learning from each incident.
The Evolving Role of the Developer in 2021DevOps.com
The role of the developer continues to change as they sit on the front line of application and even cloud infrastructure security. Today, developers are focused on innovating fast and improving security, but how do high-performing teams accomplish this? They commit code frequently, release often and update dependencies regularly (608x faster than others).
In this webinar, we'll discuss the key traits of high-performing teams and how that impacts the role of the developer.
Key Takeaways:
Choose the best third party dependencies
Determine the lowest effort upgrades between open source versions
Solve for issues in both direct and transitive dependencies with a single-click
Block and quarantine suspicious open source components
Service Mesh: Two Big Words But Do You Need It?DevOps.com
Today, one of the big concepts buzzing in the app development world is service mesh. A service mesh is a configurable infrastructure layer for microservices application that makes communication flexible, reliable and fast. Let’s take a step back, though, and answer this question: Do you need a service mesh?
Join this webinar to learn:
What a service mesh is; when and why you need it — or when and why you may not
App modernization journey and traffic management approaches for microservices-based apps
How to make an informed decision based on cost and complexity before adopting service mesh
Learn about NGINX Service Mesh in a live demo, and how it provides the best service mesh option for container-based L7 traffic management
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
Red Hat OpenShift is enabling quicker adoption of DevOps practices. Containers are an essential component of DevOps and the OpenShift Kubernetes Container Platform is integral for orchestration within these environments. Data security is now challenged to keep pace with the size and scope of container usage. The migration from legacy in-house deployments to hybrid-cloud installations has created new attack surfaces as data is shared more freely in Kubernetes deployments.
Protecting data at rest and in motions is a necessity. Learn how you can keep data protected and securely share data in OpenShift environments with real-time data protection solutions.
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...DevOps.com
Managing access permissions in the public cloud can be a very complex process. In fact, by 2023, 75% of cloud security failures will result from the inadequate management of identities, access and privileges, according to Gartner.
Join us as Guy Flechter, CISO of AppsFlyer, presents a real-world case of how his company works to enforce least-privilege and to govern identities in their cloud. This webinar will also provide an overview of how to govern access and achieve least privilege by analyzing the access permissions and activity in your public cloud environment. With thousands of human and machine identities, roles, policies and entitlements, this webinar will give you the tools to examine the access open to people and services in your public cloud, and determine whether that access is necessary.
In this workshop, you will learn about:
The risks of IAM misconfiguration and excessive entitlements in cloud environments
The challenges in identifying and mitigating Identity and access risks for both human and machine identities
How to automate cloud identity governance and entitlement management with Ermetic
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...DevOps.com
Open-source machine learning can be transformative, but without the proper tools in place, enterprises struggle to balance the IT security and governance requirements with the need to deliver these powerpoint tools into the hands of their developers and modelers.
How can organizations get the latest technology from the open-source brain trust, while ensuring enterprise-grade management and security? In this webinar, we will discuss how Anaconda Team Edition, available on RedHat Marketplace, enables IT departments to mirror a curated set of packages into their organization in a safe and governed way.
Join Michael Grant, VP of services at Anaconda, to discuss:
How IT organizations are using Anaconda Team Edition to curate, govern and secure Python and R packages
Tips for how development and data science teams can get the most out of Team Edition, from uploading your own packages to building custom channels for groups or projects
How to distribute conda environments to desktops, servers and clusters:
GUI-based installers for desktop users
“Conda packs” for automated delivery to remote servers and distributed computing clusters
Conda-enabled Docker containers for application deployment
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...DevOps.com
This year has been full of surprises — and cloud security data breaches have been no exception. From hotel chains to dating apps and video conferencing, misconfigurations and mistakes have left many organizations with exposed data. Knowing how data breaches happen and how to prevent them from happening is key when it comes to defending your identities and data access.
In this webinar, Eric Kedrosky, CISO and director of cloud research at Sonrai Security, dissects the top 10 notorious cloud data breaches from 2020, breaking down how each was caused and how they could have been prevented. This webinar will detail the anatomy of each type of data breach, what we can learn, what allowed the data breach to happen and the preventative measures.
Join this webinar as we dissect the year’s top cloud data breaches and what caused them, including:
Identity and authentication for data storage
Public cloud misconfiguration
Key and secret management
Overprivileged identities
Malicious Bad Actors
How IBM's Massive POWER9 UNIX Servers Benefit from InfluxDB and Grafana Techn...DevOps.com
IBM has been innovating to create new products for its clients and the world for over a century. Customers look to IBM Power Systems to address their hybrid multicloud infrastructure needs. Larger POWER9 servers can have up to 192 CPU cores, 64 TB of memory, dozens of PB of SAN storage and typically run a mixture of AIX (UNIX) and Enterprise Linux (RHEL or SLES) workloads. As part of its sales process, IBM is always benchmarking its new hardware and software which clients use to monitor their systems.
Discover how IBM and its clients are using InfluxDB and Grafana to collect, store and visualize performance data, which is used to monitor and tune for peak performance in ever-changing workload environments. Join this webinar featuring Nigel Griffiths from IBM to learn how you can use InfluxDB and Grafana to improve large production workloads.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
1. Red Hat/CyberArk webinar
Jody Hunt
Director, DevOps Security
CyberArk
Vijay Arungurikai
Senior Solutions Architect
Embedded & ISV Partners, Red Hat
2. F16625-200131
The world’s leading provider
of open source enterprise IT solutions
2
*Red Hat client data and Fortune 500 list, October 2019.
Note: Currency in U.S. dollars.
MORE THAN
90%of the
FORTUNE
500
RED HAT
use
PRODUCTS &
SOLUTIONS*
~13,815
EMPLOYEES
105+
OFFICES
40+
COUNTRIES
THE FIRST
$3
OPEN
SOURCE
COMPANY
IN THE WORLD
BILLION
4. 44
Red Hat
Enterprise Linux
Red Hat
Virtualization
Red Hat
OpenStack Platform
Red Hat
Ceph Storage
Infrastructure Software
Container Platform
Red Hat
OpenShift Container Platform
Developer Tools
Automation &
Management
Red Hat
Ansible Automation
Platform
Red Hat
Satellite
Red Hat
Insights
Red Hat
CloudForms
Middleware & Integration
Red Hat
Fuse
Red Hat
Decision Manager
Red Hat
Process Automation Manager
Application & Business processes
Red Hat
JBoss EAP
Red Hat
AMQ
Red Hat
3Scale API Mgmt
Red Hat
OpenShift Application
Runtimes
Red Hat
CodeReady
Workspace
Services
Red Hat
Learning Subscription
Red Hat
Certification
Red Hat
Consulting
Red Hat
OPEN Innovation Labs
Product Portfolio
5. NEW INSTALLER
PLATFORMS
STORAGE
AUTOMATION
CLOUD-NATIVE
DEV TOOLS
RHV IPI
Azure & OpenStack UPI
DNS forwarding
Kubernetes 1.17
OpenShift Serverless is GA
Helm 3 support is GA
OpenShift Pipelines is TP
Developer Console gains
monitoring & Helm features
CSI topology support
CSI Volume snapshot,
restore, clone (Tech Preview)
iSCSI PVs for internal registry
Auto image pruning in registry
OpenShift 4.4
5
7. Automated
operations
A consistent container application platform
Multi-tenant
Network
traffic control
Over-the-air
updates
Bare metal, VMware vSphere, Red Hat Virtualization, Red Hat OpenStack Platform, Amazon
Web Services, Microsoft Azure, Google, IBM Cloud
Pluggable
architecture
Monitoring
& chargeback
Secure by default
FROM YOUR DATACENTER TO THE CLOUD
7
8. OpenShift enables developer productivity
SPRING & JAVA™ EE MICROSERVICES FUNCTIONS
LANGUAGES DATABASES APPLICATION SERVICES
LINUX WINDOWS*
* coming soon
CODE
BUILD TEST DEPLOY
MONITORREVIEW
Self-service
provisioning
Automated
build & deploy
CI/CD
pipelines
Consistent
environments
Configuration
management
App logs &
metrics
8
9. Full Stack Automation (IPI) Pre-existing Infrastructure (UPI)
Bare Metal
4.4 Supported Providers
IBM Power Systems
*
* Note: Planned for an upcoming 4.3.z release on April 30th
*
Denotes new addition in OCP 4.4
9
10. OpenShift offers the broadest set of hybrid cloud
services
Red Hat
OpenShift
Dedicated
Managed By Red Hat
or
Customer
Managed
or
Customer
Managed
Red Hat
OpenShift
Dedicated
Managed By Red Hat
or
Customer
Managed
Red Hat
OpenShift on
IBM Cloud
or
Customer
Managed (UPI)
Customer
Managed
On-premises
Azure Red Hat
OpenShift
Jointly Managed &
Supported Jointly Engineered
10
11. 11
Red Hat OpenShift has seen 70%+ market expansion
Red Hat OpenShift customers
● Supported on every major cloud: AWS, Azure, GCP, IBM,
AliCloud
● Broadest hybrid cloud market adoption
● 100s of ISVs supporting operators
● Expanded AI/ML focus
● 1st to market with service mesh
● 1st to market with serverless
● New CodeReady developer experience
● New security, encryption enhancements
● Integrated IBM Portfolio via CloudPaks
● ...and much more
1700+
FY 2015 FY 2016 FY 2017 FY 2018 FY 2019 FY 2020
500
0
1000
1500
2000
12. 12
A broad ecosystem of workloads
Operator-backed services allow for a
SaaS experience on your own infrastructure
Relational DBs
NoSQL DBs
Storage
Messaging
Security
Monitoring
AI/ML
Big Data
DevOps
13. Operator SDK
13
Enabling everybody to write Operators
Support for Helm 3
Build Operators from Helm
v2 and v3 charts
Ansible collections
Ansible Operator supports
k8s module collection
Custom metrics
Every Operator supports
custom metric endpoints
Generate Packaging
Operator Metadata (CSV) for
OLM gets generated
Kubernetes Compatibility
Keep in sync with new
Kubernetes releases
Scorecard v2
Enable testing your
Operator in a pipeline
14. Do your applications use
privileged credentials?
Secrets management for Red Hat OCP
Jody Hunt, DevOps SME
14
16. SHIFTING SECURITY LEFT INTO DEVELOPMENT WORKFLOWS
16
Developers
DevOps
Security
Empower Security Team
• Highlight the app & tool risk
• Leverage single platform –
human/non-human solution serves all
• Security focus
• Manage security budget
Enable Developer/DevOps
• Easy to use (consume secrets)
• Prebuilt integrations
• Open source and Secretless
Free developers from security burden
• Compliance, audit requests, human creds
• Security budget
Plan Code Create Test Release Deploy Operate
17. THE PROBLEM WE’RE SOLVING
There are lots of places to store secrets.
But:
• Platform solutions only work for
those platforms
• Tool solutions lack security
• Most not enterprise ready
• Hard to share best-practices
• SoD not enforced
• GRC reporting is impossible
Islands of Security
Hiera DatabagsVault
IAM / KMS IAM / KMS
Home Grown
Solutions
SecretsSecrets
IAM / KMS
18. THE VISION WE’RE DELIVERING ON
Enterprise-Spanning Service delivered by IT Security
IaaSOn-Prem Infrastructure and Apps
(*NIX, Windows, zOS)
DevOps ToolsPaaS
Security
Solutions
IT Mgt
Software
App Servers and
Custom Apps
RPA
PAS
Consistently enforce privilege security policies for both human users and non-human identities
20. Dynamic Access Provider (Conjur Open Source)
OCP4 Lab Architecture
Linux Host
(Azure)
Windows Hosts
(my Mac)
CyberArk Enterprise
Password Vault
Synchronizer
OCP4 Cluster
(AWS)
User
Namespaces
Lab
App
Authen
-ticator
cybrlab
Namespace
ServiceService
21. SECRETS ACCESS WORKFLOW
Authenticate
Access Token
Requestor
Application Access Manager
Dynamic Access Provider
Targe
t
Access per Policy
Retrieve secrets
Use secrets
Access Token
expires after 8 mins
Audited
activity
22. • Lab 1:
• Authenticator runs as a Sidecar
• App pulls DB creds with REST API
• App connects to DB
• Lab 2: Secrets Injection
• Leverages Summon component
• Authenticator runs as an Init container
• Summon pulls DB creds & calls app w/ creds in env vars
• App connects to DB
• Lab 3: K8s Secrets
• Authenticator runs as an Init Container
• K8s secret manifest names DB cred names
• Authenticator retrieves DB creds & dynamically patches
K8s secret w/ DB cred values
• App connects to DB
• Lab 4: Secretless Broker
• Authenticator runs as a Sidecar Container listening on
DB port
• App attempts to connect to DB on local port
• Authenticator retrieves DB creds, connects to DB,
proxies connection for app
• App connects to DB
CYBERARK OCP4 LABS