Installing and Configuring NGINX Open SourceNGINX, Inc.
This pre-recorded 101-level lab and demo takes you from a “blank” LINUX system to a full-featured NGINX application delivery configuration for serving web content and load balancing.
Best Practices for Getting Started with NGINX Open SourceNGINX, Inc.
Best Practices for Getting Started with NGINX Open Source
You already use NGINX, but can you take its performance "over 9000"? Alessandro Fael Garcia, Senior Solution Engineer for NGINX, describes best practices for configuring NGINX as a reverse proxy, load balancer, and cache, and how small adjustments with NGINX directives can improve performance.
Speakers:
Alessandro Fael Garcia
How to Avoid the Top 5 NGINX Configuration MistakesNGINX, Inc.
When helping NGINX users, we see the same configuration mistakes over and over again. Occasionally, these configurations are even written by fellow NGINX engineers!
Some misconfigurations are worse than others. Minor mistakes might just hurt NGINX performance a bit, but others can introduce serious security vulnerabilities. Not only can those mistakes result in data loss, they have the potential to snowball into countless other negative side effects: data breaches, loss of reputation, and ex‑customers.
In this webinar, we explore five of the most prevalent NGINX misconfigurations. Learn how to detect them and – most importantly – how to avoid and correct them.
It's been said that open source software is eating the world. In the observability space, the project making this possible is OpenTelemetry. It's quickly becoming the standard for instrumentation and data collection of observability data. Understanding what data to collect and how to collect it properly is fundamental to ensuring users can quickly address availability and performance issues. Steve Flanders, Director of Engineering at Splunk, discusses the components of the project, its current status, and how you can get started integrating it into your modern app infrastructure.
Speakers:
Steve Flanders
Learn from HashiCorp Vault engineer Nick Cabatoff how you can ensure that you actually use Vault effectively to allow no potential leaks of secret credentials, apis, or certs.
A beginner's guide to Open Liberty (https://openliberty.io/) covering history, getting started, configuration, capabilities, java ee, microprofile, docker, microservices and cloud.
Bryan Owen of OSIsoft at S4x15 OTDay.
Bryan shows how to harden a Windows Services generically and then specifically to a service used by OSIsoft's PI Server
Installing and Configuring NGINX Open SourceNGINX, Inc.
This pre-recorded 101-level lab and demo takes you from a “blank” LINUX system to a full-featured NGINX application delivery configuration for serving web content and load balancing.
Best Practices for Getting Started with NGINX Open SourceNGINX, Inc.
Best Practices for Getting Started with NGINX Open Source
You already use NGINX, but can you take its performance "over 9000"? Alessandro Fael Garcia, Senior Solution Engineer for NGINX, describes best practices for configuring NGINX as a reverse proxy, load balancer, and cache, and how small adjustments with NGINX directives can improve performance.
Speakers:
Alessandro Fael Garcia
How to Avoid the Top 5 NGINX Configuration MistakesNGINX, Inc.
When helping NGINX users, we see the same configuration mistakes over and over again. Occasionally, these configurations are even written by fellow NGINX engineers!
Some misconfigurations are worse than others. Minor mistakes might just hurt NGINX performance a bit, but others can introduce serious security vulnerabilities. Not only can those mistakes result in data loss, they have the potential to snowball into countless other negative side effects: data breaches, loss of reputation, and ex‑customers.
In this webinar, we explore five of the most prevalent NGINX misconfigurations. Learn how to detect them and – most importantly – how to avoid and correct them.
It's been said that open source software is eating the world. In the observability space, the project making this possible is OpenTelemetry. It's quickly becoming the standard for instrumentation and data collection of observability data. Understanding what data to collect and how to collect it properly is fundamental to ensuring users can quickly address availability and performance issues. Steve Flanders, Director of Engineering at Splunk, discusses the components of the project, its current status, and how you can get started integrating it into your modern app infrastructure.
Speakers:
Steve Flanders
Learn from HashiCorp Vault engineer Nick Cabatoff how you can ensure that you actually use Vault effectively to allow no potential leaks of secret credentials, apis, or certs.
A beginner's guide to Open Liberty (https://openliberty.io/) covering history, getting started, configuration, capabilities, java ee, microprofile, docker, microservices and cloud.
Bryan Owen of OSIsoft at S4x15 OTDay.
Bryan shows how to harden a Windows Services generically and then specifically to a service used by OSIsoft's PI Server
What does Day 0 with Vault secrets management look like? What about Day 1? 2? N? This talk gives you a detailed look at typical Vault user progressions that provide the most successful deployments for customers
Practical Defensive Security
for Security Engineers.
This session will be an overview on the WAF book the practical defensive guide for security engineer and WAF owner.
One of the most challenging tasks for a Citrix administrator is when a user calls in to the helpdesk complaining of a Citrix problem: logon is slow, session is getting disconnected, application launch is slow, etc. So, how does a Citrix admin go about solving such issues? A Citrix deployment has many infrastructure tiers and dependencies. Where do you initially focus your investigations, what do you analyze, and how do you triage?
George Spiers, Citrix CTP and EUC Architect, shares his real-world experience to help you learn the art of Citrix troubleshooting.
You’re ready to make your applications more responsive, scalable, fast and secure. Then it’s time to get started with NGINX. In this webinar, you will learn how to install NGINX from a package or from source onto a Linux host. We’ll then look at some common operating system tunings you could make to ensure your NGINX install is ready for prime time.
View full webinar on demand at http://nginx.com/resources/webinars/installing-tuning-nginx/
IPFS is a distribution protocol that enables the creation of completely distributed applications through content addressing. A very ambitious open source project in Go, IPFS adopts a peer-to-peer hypermedia protocol to protect against a single point of failure. This presentation aims to highlight the design and ideas of IPFS and also touches upon a real world use case.
The way SoundCloud monitors its services and infrastructure has dramatically changed over the last couple of years. Monitoring, alerting, and being on-call is now deeply ingrained in every engineering team and we have learned a lot on the way.
This talk explains the goals and reasons Prometheus was born, show the early history of the project and how it has helped SoundCloud to fundamentally change its monitoring to support the rapid development of services.
Delivered at the FISL13 conference in Brazil: http://www.youtube.com/watch?v=K9w2cipqfvc
This talk introduces the USE Method: a simple strategy for performing a complete check of system performance health, identifying common bottlenecks and errors. This methodology can be used early in a performance investigation to quickly identify the most severe system performance issues, and is a methodology the speaker has used successfully for years in both enterprise and cloud computing environments. Checklists have been developed to show how the USE Method can be applied to Solaris/illumos-based and Linux-based systems.
Many hardware and software resource types have been commonly overlooked, including memory and I/O busses, CPU interconnects, and kernel locks. Any of these can become a system bottleneck. The USE Method provides a way to find and identify these.
This approach focuses on the questions to ask of the system, before reaching for the tools. Tools that are ultimately used include all the standard performance tools (vmstat, iostat, top), and more advanced tools, including dynamic tracing (DTrace), and hardware performance counters.
Other performance methodologies are included for comparison: the Problem Statement Method, Workload Characterization Method, and Drill-Down Analysis Method.
One of the most important things you can do to improve the performance of your flash/SSDs with Aerospike is to properly prepare them. This Presentation goes through how to select, test, and prepare the drives so that you will get the best performance and lifetime out of them.
Integrating Google Cloud Dataproc with Alluxio for faster performance in the ...Alluxio, Inc.
Alluxio Tech Talk
Dec 10, 2019
Chris Crosbie and Roderick Yao from the Google Dataproc team and Dipti Borkar of Alluxio will demo how to set up Google Cloud Dataproc with Alluxio so jobs can seamlessly read from and write to Cloud Storage. They’ll also show how to run Dataproc Spark against a remote HDFS cluster.
For more Alluxio events: https://www.alluxio.io/events/
Hashicorp's understanding of Digital Transformation, and the different areas that require specific solutions. Provides an overview of each of the tools - Terraform, Consul, Vault and Nomad
Hashicorp Vault: Open Source Secrets Management at #OPEN18Kangaroot
HashiCorp Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. We'll show how this works.
How Cisco Provides World-Class Technology Conference Experiences Using Automa...InfluxData
Cisco Systems’ Cisco Live conference is held annually in the winter in Europe and in the summer in the United States. A typical US event hosts 600+ breakout sessions, dozens of keynotes, Certification Testing and walk-in labs. The conference serves over 26,000 attendees and all their mobile devices. The internal network team is responsible for ensuring that 2,200 wireless access points and 800 switches are providing sufficient network connectivity, availability and bandwidth for all attendees, speakers and organizers across 2 million square feet of conference space. Over 9 days (4 days of setup and 5 conference days), event staff and attendees have pushed over 84 terabytes of data from the conference to the internet! Dual 100 Gigabit/second primary links and backup 10 Gigabit/second links handle anything the users can throw at it.
The infrastructure required for this event also includes servers, VMs, and containerized workloads. With the growing need for hybrid events, Cisco’s team also ensures 100% video streaming uptime. Discover how Cisco uses InfluxDB to store key performance metrics across many IT domains alongside their commercial management solutions. The team continues to iterate and improve year-over-year to gain visibility into their network and devices to streamline troubleshooting and quickly respond to events before they become service impacting.
In this webinar, Jason Davis dives into:
Cisco’s approach to using automation, orchestration, Python scripts, SNMP, and streaming telemetry to collect network data
Their methodology to troubleshooting, prioritizing, and scheduling fixes to ensure the best client experience
How a time series platform is crucial to their real-time data analysis
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...eG Innovations
One of the most challenging tasks for a Citrix administrator is when a user calls in complaining of a Citrix problem: logon is slow, session is getting disconnected, application launch is slow, session itself is slow, etc. So, how does a Citrix admin go about solving these issues? A Citrix infrastructure has many tiers and dependencies. Where do you start looking, what do you analyze, and how do you triage?
Watch this webinar by George Spiers, Citrix CTP and EUC Architect, who shares his real-world experience to help you learn the art of Citrix troubleshooting. You will find out how to:
• Methodically go about finding the scope, magnitude of impact, and source of the problem
• Troubleshoot common Citrix problems like slow logons, slow app/desktop launch, disconnecting sessions, frozen sessions, etc.
• Investigate issues in the supporting infrastructure (network, AD, virtualization, etc.)
• Optimize the Citrix environment for maximum performance
At the end, we discuss how automated monitoring can help accelerate performance troubleshooting.
Easily View, Manage, and Scale Your App Security with F5 NGINXNGINX, Inc.
Organizations typically use between 200 and 1,000 applications, many of them public facing and a direct gateway to customers and their data. While these apps enable critical functions, they’re also a common target for bad actors. A web application firewall (WAF) is a critical tool for securing apps by providing protection, detection, and mitigation against vulnerabilities and attacks. However, WAFs can be difficult to maintain and manage at scale. In this webinar, we explore how centralized visibility and configuration management of WAFs can decrease risk and save time.
2022: 6 Cloud-Native App Development Trends to Transform Your BusinessWeCode Inc
The cloud-native approach has made it seamless for developers to release products faster and deploy updates without disrupting the function of the mobile app. As a growing field, cloud-native app trends help visualize a future that eliminates the bottleneck of the current cloud-native stack. So, here are the top 6 cloud-native app trends to not miss out, on for your business! https://bit.ly/3SW6m2T
What does Day 0 with Vault secrets management look like? What about Day 1? 2? N? This talk gives you a detailed look at typical Vault user progressions that provide the most successful deployments for customers
Practical Defensive Security
for Security Engineers.
This session will be an overview on the WAF book the practical defensive guide for security engineer and WAF owner.
One of the most challenging tasks for a Citrix administrator is when a user calls in to the helpdesk complaining of a Citrix problem: logon is slow, session is getting disconnected, application launch is slow, etc. So, how does a Citrix admin go about solving such issues? A Citrix deployment has many infrastructure tiers and dependencies. Where do you initially focus your investigations, what do you analyze, and how do you triage?
George Spiers, Citrix CTP and EUC Architect, shares his real-world experience to help you learn the art of Citrix troubleshooting.
You’re ready to make your applications more responsive, scalable, fast and secure. Then it’s time to get started with NGINX. In this webinar, you will learn how to install NGINX from a package or from source onto a Linux host. We’ll then look at some common operating system tunings you could make to ensure your NGINX install is ready for prime time.
View full webinar on demand at http://nginx.com/resources/webinars/installing-tuning-nginx/
IPFS is a distribution protocol that enables the creation of completely distributed applications through content addressing. A very ambitious open source project in Go, IPFS adopts a peer-to-peer hypermedia protocol to protect against a single point of failure. This presentation aims to highlight the design and ideas of IPFS and also touches upon a real world use case.
The way SoundCloud monitors its services and infrastructure has dramatically changed over the last couple of years. Monitoring, alerting, and being on-call is now deeply ingrained in every engineering team and we have learned a lot on the way.
This talk explains the goals and reasons Prometheus was born, show the early history of the project and how it has helped SoundCloud to fundamentally change its monitoring to support the rapid development of services.
Delivered at the FISL13 conference in Brazil: http://www.youtube.com/watch?v=K9w2cipqfvc
This talk introduces the USE Method: a simple strategy for performing a complete check of system performance health, identifying common bottlenecks and errors. This methodology can be used early in a performance investigation to quickly identify the most severe system performance issues, and is a methodology the speaker has used successfully for years in both enterprise and cloud computing environments. Checklists have been developed to show how the USE Method can be applied to Solaris/illumos-based and Linux-based systems.
Many hardware and software resource types have been commonly overlooked, including memory and I/O busses, CPU interconnects, and kernel locks. Any of these can become a system bottleneck. The USE Method provides a way to find and identify these.
This approach focuses on the questions to ask of the system, before reaching for the tools. Tools that are ultimately used include all the standard performance tools (vmstat, iostat, top), and more advanced tools, including dynamic tracing (DTrace), and hardware performance counters.
Other performance methodologies are included for comparison: the Problem Statement Method, Workload Characterization Method, and Drill-Down Analysis Method.
One of the most important things you can do to improve the performance of your flash/SSDs with Aerospike is to properly prepare them. This Presentation goes through how to select, test, and prepare the drives so that you will get the best performance and lifetime out of them.
Integrating Google Cloud Dataproc with Alluxio for faster performance in the ...Alluxio, Inc.
Alluxio Tech Talk
Dec 10, 2019
Chris Crosbie and Roderick Yao from the Google Dataproc team and Dipti Borkar of Alluxio will demo how to set up Google Cloud Dataproc with Alluxio so jobs can seamlessly read from and write to Cloud Storage. They’ll also show how to run Dataproc Spark against a remote HDFS cluster.
For more Alluxio events: https://www.alluxio.io/events/
Hashicorp's understanding of Digital Transformation, and the different areas that require specific solutions. Provides an overview of each of the tools - Terraform, Consul, Vault and Nomad
Hashicorp Vault: Open Source Secrets Management at #OPEN18Kangaroot
HashiCorp Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. We'll show how this works.
How Cisco Provides World-Class Technology Conference Experiences Using Automa...InfluxData
Cisco Systems’ Cisco Live conference is held annually in the winter in Europe and in the summer in the United States. A typical US event hosts 600+ breakout sessions, dozens of keynotes, Certification Testing and walk-in labs. The conference serves over 26,000 attendees and all their mobile devices. The internal network team is responsible for ensuring that 2,200 wireless access points and 800 switches are providing sufficient network connectivity, availability and bandwidth for all attendees, speakers and organizers across 2 million square feet of conference space. Over 9 days (4 days of setup and 5 conference days), event staff and attendees have pushed over 84 terabytes of data from the conference to the internet! Dual 100 Gigabit/second primary links and backup 10 Gigabit/second links handle anything the users can throw at it.
The infrastructure required for this event also includes servers, VMs, and containerized workloads. With the growing need for hybrid events, Cisco’s team also ensures 100% video streaming uptime. Discover how Cisco uses InfluxDB to store key performance metrics across many IT domains alongside their commercial management solutions. The team continues to iterate and improve year-over-year to gain visibility into their network and devices to streamline troubleshooting and quickly respond to events before they become service impacting.
In this webinar, Jason Davis dives into:
Cisco’s approach to using automation, orchestration, Python scripts, SNMP, and streaming telemetry to collect network data
Their methodology to troubleshooting, prioritizing, and scheduling fixes to ensure the best client experience
How a time series platform is crucial to their real-time data analysis
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...eG Innovations
One of the most challenging tasks for a Citrix administrator is when a user calls in complaining of a Citrix problem: logon is slow, session is getting disconnected, application launch is slow, session itself is slow, etc. So, how does a Citrix admin go about solving these issues? A Citrix infrastructure has many tiers and dependencies. Where do you start looking, what do you analyze, and how do you triage?
Watch this webinar by George Spiers, Citrix CTP and EUC Architect, who shares his real-world experience to help you learn the art of Citrix troubleshooting. You will find out how to:
• Methodically go about finding the scope, magnitude of impact, and source of the problem
• Troubleshoot common Citrix problems like slow logons, slow app/desktop launch, disconnecting sessions, frozen sessions, etc.
• Investigate issues in the supporting infrastructure (network, AD, virtualization, etc.)
• Optimize the Citrix environment for maximum performance
At the end, we discuss how automated monitoring can help accelerate performance troubleshooting.
Easily View, Manage, and Scale Your App Security with F5 NGINXNGINX, Inc.
Organizations typically use between 200 and 1,000 applications, many of them public facing and a direct gateway to customers and their data. While these apps enable critical functions, they’re also a common target for bad actors. A web application firewall (WAF) is a critical tool for securing apps by providing protection, detection, and mitigation against vulnerabilities and attacks. However, WAFs can be difficult to maintain and manage at scale. In this webinar, we explore how centralized visibility and configuration management of WAFs can decrease risk and save time.
2022: 6 Cloud-Native App Development Trends to Transform Your BusinessWeCode Inc
The cloud-native approach has made it seamless for developers to release products faster and deploy updates without disrupting the function of the mobile app. As a growing field, cloud-native app trends help visualize a future that eliminates the bottleneck of the current cloud-native stack. So, here are the top 6 cloud-native app trends to not miss out, on for your business! https://bit.ly/3SW6m2T
About the Webinar
In this webinar we demonstrate how to implement effective security controls for your application infrastructure, without impacting release velocity or application performance. Join Chris Witeck and Rajiv Kapoor as they showcase NGINX App Protect and the upcoming security capabilities within NGINX Controller, with specific business use cases in mind.
On-Demand Link: https://www.nginx.com/resources/webinars/application-security-nginx-apcj/
About the Webinar
In this webinar we demonstrate how to implement effective security controls for your application infrastructure, without impacting release velocity or application performance. Join Chris Witeck and Rajiv Kapoor as they showcase NGINX App Protect and the upcoming security capabilities within NGINX Controller, with specific business use cases in mind.
On-Demand Link: https://www.nginx.com/resources/webinars/application-security-nginx/
DevOps has become more important than ever as businesses embark on the path to digital transformation. Here are the DevOps trends for 2022 that are predicted to impact the corporate landscape in the near future.
Read more: https://www.cigniti.com/blog/devops-trends-2022/
Your Resolution for 2018: Five Principles For Securing DevOpsDevOps.com
Organizations in today’s market must strike a balance between competitive differentiation and meeting evolving compliance standards-particularly related to software security. They need to obtain faster release and deployment cycles, improved collaboration between business stakeholders and application development and operations teams, and automation tools. DevOps, an innovative organizational and cultural way of organizing development and IT operations work, is addressing this challenge – driven by mounting evidence of its benefits to the business. However reaping these gains requires rethinking application security to deliver more secure code at DevOps speed.
F5 et NGINX vous présentera son nouveau WAF NGINX App Protect. Venez découvrir comment F5 a réussi à créer un WAF homogène et complémentaire de la solution F5 BIG-IP Advanced WAF.
A lot of focus has been placed on securing the cloud, but the cloud can also be used to help secure applications. Find out how the same principles that apply to building cloud scale applications can also be used to deploy test environments in the cloud that support application security testing. Never again fear that your automated security testing, penetration testing, and customer A/B testing will collide. This talk will cover how applications that abide by the 12 Factors (https://12factor.net/) are easier to test. It will also discuss how the extreme flexibility of cloud resources allows easy separation of different types of application testing, ensuring that security tests can be run without interfering with business objectives.
Web Application Security for Continuous Delivery PipelinesAvi Networks
Watch on-demand webinar: https://info.avinetworks.com/webinars/web-application-security-continuous-delivery-pipelines
Applications today have evolved into containers and microservices deployed in fully automated and distributed environments across data centers and clouds. Application services such as load balancing, security, and analytics become critical for continuous delivery.
To secure modern web applications, security policies including SSL/TLS, ACLs, IP Reputation, and WAF need to be applied quickly. We will share a reference implementation from Avi Networks.
Join this webinar to learn:
- CI/CD in the web application security context
- Challenges and solutions integrating a modern web application firewall (WAF) into the application development pipeline
- How to create processes that support both security and development requirements
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPOlivia LaMar
This presentation covers:
* The NGINX Ingress Controller for Kubernetes
* NGINX Plus to up-level your KIC Architecture
* NGINX App Protect for securing your Kubernetes services
* Demo of both working in tandem to set:
* Kubernetes routing policy with NGINX KIC
* Granular, Per-App and Per-Service Security Policy with NGINX App Protect
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksDevOps.com
Today’s enterprises have more compute options than ever before across the cloud native continuum. This continuum, spanning VMs, containers, managed Kubernetes, PaaS and serverless, provides users trade-offs and advantages when it comes to building and running their modern workloads and applications.
Recently, Enterprise Strategy Group conducted a survey titled “Leveraging DevSecOps to Secure Cloud Native Applications.” This research, covers the latest adoption numbers, trends and security concerns across all of the categories in the cloud native continuum—with insights into how organizations are successfully building and securing these technologies.
Join ESG, Senior Analyst and Group Practice Director Doug Cahill and Palo Alto Networks VP of Product John Morello to unpack the latest survey findings and discuss how security plays a vital role in securing cloud native applications.
Resolving the Security Bottleneck Why DevSecOps is Better compared to DevOps.pdfMobibizIndia1
DevSecOps is a development methodology that combines security measures at every stage of the software development lifecycle in order to provide reliable and secure systems. DevSecOps, in general, increases the benefits of a DevOps service.
Understanding DevOps Security - Full GuideLency Korien
DevSecOps is a process of integrating security practices into the stages of the SDLC lifecycle. The DevSecOps(https://opstree.com/) process ensures that secure software is delivered to the production environment, without delaying security until the last stages of the Software Development Life Cycle (SDLC). This is where does DevSecOps fits into the SDLC phase.
You can check more info about:
DevOps Company In UAE ( https://opstree.com/ )
DevSecOps is a process of integrating security practices into the stages of the SDLC lifecycle. The DevSecOps(https://opstree.com/) process ensures that secure software is delivered to the production environment, without delaying security until the last stages of the Software Development Life Cycle (SDLC). This is where does DevSecOps fits into the SDLC phase.
You can check more info about:
devops solutions ( https://opstree.com/usa/ )
DevSecOps Trends in 2022 How to Stay Secured, Innovative, and Productive in D...Urolime Technologies
It is important to know some key trends of DevSecOps to have a better understanding which can be beneficial for a company. As companies prefer digital transformation of their business shortly DevSecOps has a key role in the success of the company.
Why is The IT industry moving towards a DevSecOps approach?Enov8
The rise of cybercrime and other cybersecurity concerns in recent years prompted the software industry to coin the phrase “DevSecOps.” DevSecOps adoption is crucial for developers and businesses to meet the demands of modern application and software development.
Infrastructure as Code in Large Scale OrganizationsXebiaLabs
The adoption of tools for the provisioning and automatic configuration of "Infrastructure as Code" (eg Terraform, Cloudformation or Ansible) reduces cost, time, errors, violations and risks when provisioning and configuring the necessary infrastructure so that our software can run .
However, those who have begun to make intensive use of this technology at the business level agree to identify the emergence of a very critical problem regarding the orchestration and governance needs of supply requests such as security, compliance, scalability, integrity and more.
Learn how The Digital.ai DevOps Platform (formerly XebiaLabs DevOps Platform) responds to all these problems and many more, allowing you to continue working with your favorite tools.
Similar to Shift Left for More Secure Apps with F5 NGINX (20)
Managing Kubernetes Cost and Performance with NGINX & KubecostNGINX, Inc.
Kubecost and NGINX have recently partnered together to provide a more comprehensive solution for managing cost and performance when deploying Kubernetes. The Kubecost platform helps organizations optimize and monitor their Kubernetes costs, while NGINX is a leading open source software web server, reverse proxy and ingress controller. Together, they offer a powerful combination of cost optimization and application delivery capabilities, enabling you to gain greater visibility into your Kubernetes environments and achieve better performance and efficiency.
On-Demand Link https://www.nginx.com/resources/webinars/managing-kubernetes-cost-performance-with-nginx-kubecost/
Manage Microservices Chaos and Complexity with ObservabilityNGINX, Inc.
Learn about the three principal classes of observability data, the importance of infrastructure and app alignment, and ways to start analyzing deep data.
Accelerate Microservices Deployments with AutomationNGINX, Inc.
Managing a microservice application means managing numerous moving parts, where changes to one container can have a negative impact on another and potentially bring down the entire application. With automation you can streamline the validation of containers and standardize deployment, and ensure your apps are updated correctly and securely. Join this session to learn:
• How to use GitHub Actions to streamline your processes
• About managing security
• Why automation simplifies quick recovery from failure
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXNGINX, Inc.
With advancing technology and the ever-evolving landscape of cybercrime, it is more important today than ever to reduce file-borne attacks, secure encrypted traffic, and protect your networks.
In this webinar, we discuss the latest developments in the threat landscape, why shared responsibility matters for critical infrastructure, and how you can mitigate future threat vectors with the F5 NGINX Plus Certified Module from OPSWAT.
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...NGINX, Inc.
In this hands-on demo and lab, we take you step-by-step through installing NGINX Unit on a Linux system, then configuring it as an app server, web server, and reverse proxy. Following a short review of production features and demo of the lab environment, we let you loose in a disposable lab environment to try NGINX Unit for yourself. During the lab, we’re available online to answer questions or demo anything you might be stuck on.
Protecting Apps from Hacks in Kubernetes with NGINXNGINX, Inc.
Kubernetes has become the platform of choice for deploying modern applications. A Web Application Firewall (WAF) is the most common solution to providing run-time protection for applications (well, second most common, after blind -faith and protective amulets). The question is, how do you put a WAF in place for applications running on Kubernetes?
As for most IT questions, the obvious answer is, of course, “it depends.” But on what?
In this webinar, we look at how a WAF works, where to insert a WAF in your infrastructure, and the best way for a platform engineering team to create self-service WAF configuration on Kubernetes. We explore some sample configurations, and provide a demo of NGINX App Protect WAF in action.
Successfully Implement Your API Strategy with NGINXNGINX, Inc.
On-Demand Recording:
https://www.nginx.com/resources/webinars/successfully-implement-your-api-strategy-with-nginx/
About the Webinar
Cloud-native applications are distributed and decentralized by design, composed of dozens, hundreds, or even thousands of APIs connecting services deployed across cloud, on-premises, and edge environments. Without an effective API strategy in place, API sprawl quickly gets out-of-control and becomes unmanageable as the number of APIs in production outpaces your ability to govern and secure them.
In this webinar we explore trends that are accelerating API sprawl and look at some well-established best practices for managing, governing, and securing APIs in distributed environments. Our presenters also demo how to use API Connectivity Manager, part of F5 NGINX Management Suite, to streamline and accelerate your API operations.
Software Delivery and the Rube Goldberg Machine: What Is the Problem We Are T...NGINX, Inc.
The software delivery life cycle (SDLC) can be complicated. Depending on your architecture and your particular deployment environment, your team may find themselves cobbling together numerous different tools and frameworks, each with its own history and a particular set of challenges it's designed to solve. Sometimes teams find creative ways to use tools outside of their original purpose. It’s a cycle of continuous improvement (secure, deliver, monitor, reflect, make changes, and repeat) with the end goal of easing the process. In this session Melissa McKay, Developer Advocate at JFrog, discusses some of the common problems that teams face during the development and delivery process, and how organizations come together to address them. You will leave empowered and with a call to action to become part of the solution.
Speakers:
Melissa McKay
Open Sourcing NGINX Agent and Demo
The NGINX Agent is a lightweight piece of software that can be installed next to NGINX OSS and/or NGINX Plus that provides local interaction with NGINX instances to allow administrative actions to be carried out. The NGINX Agent provides a secure entry point for managing NGINX instance configurations, collecting metrics, and gather a set of events on a NGINX instance.
Speakers:
Oliver O'Mahony
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
Worried about document security while sharing them in Salesforce? Fret no more! Here are the top-notch security standards XfilesPro upholds to ensure strong security for your Salesforce documents while sharing with internal or external people.
To learn more, read the blog: https://www.xfilespro.com/how-does-xfilespro-make-document-sharing-secure-and-seamless-in-salesforce/
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
Tim Combridge from Sensible Giraffe and Salesforce Ben presents some important tips that all developers should know when dealing with Flows in Salesforce.
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
Modern design is crucial in today's digital environment, and this is especially true for SharePoint intranets. The design of these digital hubs is critical to user engagement and productivity enhancement. They are the cornerstone of internal collaboration and interaction within enterprises.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.