Spring Cloud Kubernetes: An Easier Path from Idea to ProductionVMware Tanzu
Kubernetes might be a dream for operations teams willing to learn its intricacies, but it can be a nightmare for developers whose primary goal is getting working applications into production.
Spring Cloud Kubernetes addresses developers’ needs by making it simple to deploy Spring Cloud and Spring Boot applications into Kubernetes environments.
This webinar will explore some key Spring Cloud Kubernetes concepts and demonstrate the process of porting an existing application onto a Kubernetes cluster.
Cloud-Native Patterns and the Benefits of MySQL as a Platform Managed ServiceVMware Tanzu
You can’t have cloud-native applications without a modern approach to databases and backing services. Data professionals are looking for ways to transform how databases are provisioned and managed.
In this webinar, we’ll cover practical strategies you can employ to deliver improved business agility at the data layer. We’ll discuss the impact that microservices are having in the enterprise, and what this means for MySQL and other popular databases. Join us and learn the answers to these common questions:
● How can you meet the operational challenge of scaling the number of MySQL database instances and managing the fleet?
● Adding to this scale challenge, how can your MySQL instances maintain availability in a world where the underlying IT infrastructure is ephemeral?
● How can you secure data in motion?
● How can you enable self-service while maintaining control and governance?
We’ll cover these topics and share how enterprises like yours are delivering greater outcomes with our Pivotal Platform managed MySQL.
Now you can scale without fear of failure.
Presenters:
Judy Wang, Product Management
Jagdish Mirani, Product Marketing
Fully Orchestrating Applications, Microservices and Enterprise Services with ...Docker, Inc.
As a multi-national bank, Societe General IT infrastructure has thousands of apps, almost every bit of technology deployed and compliance requirements. Our vision is to broadly transform traditional bank IT to be agile and fast. Speed is critical in a digital economy and at Societe Generale we are building a new execution platform with Docker that provides IT containers, middleware and infrastructure as a service and orchestration. In this session we will share the technical and organizational steps of our journey from how we defined and architected a PaaS for our entity; with service catalog, service topologies, ambassadors with Docker Datacenter, continuous integration and what’s next.
Continuous Everything in a Multi-cloud and Multi-platform EnvironmentVMware Tanzu
This presentation is all about Concourse, Spinnaker, Harbor and Pivotal Build Service, and how combining these tools can help you build an efficient, secure, and trusted container pipeline.
StripeCon 2021: A Cloud-Native approach to running Silverstripe on Google Clo...Jon Su
In this talk, Jon talks about how a SilverStripe application can be deployed onto Google Cloud Platform as a cloud-native application to take advantage of the full power and benefits of the Cloud.
First presented at StripeCon EU 2021 on 01/10/2021
Service Mesh: Two Big Words But Do You Need It?DevOps.com
Today, one of the big concepts buzzing in the app development world is service mesh. A service mesh is a configurable infrastructure layer for microservices application that makes communication flexible, reliable and fast. Let’s take a step back, though, and answer this question: Do you need a service mesh?
Join this webinar to learn:
What a service mesh is; when and why you need it — or when and why you may not
App modernization journey and traffic management approaches for microservices-based apps
How to make an informed decision based on cost and complexity before adopting service mesh
Learn about NGINX Service Mesh in a live demo, and how it provides the best service mesh option for container-based L7 traffic management
Spring Cloud Kubernetes: An Easier Path from Idea to ProductionVMware Tanzu
Kubernetes might be a dream for operations teams willing to learn its intricacies, but it can be a nightmare for developers whose primary goal is getting working applications into production.
Spring Cloud Kubernetes addresses developers’ needs by making it simple to deploy Spring Cloud and Spring Boot applications into Kubernetes environments.
This webinar will explore some key Spring Cloud Kubernetes concepts and demonstrate the process of porting an existing application onto a Kubernetes cluster.
Cloud-Native Patterns and the Benefits of MySQL as a Platform Managed ServiceVMware Tanzu
You can’t have cloud-native applications without a modern approach to databases and backing services. Data professionals are looking for ways to transform how databases are provisioned and managed.
In this webinar, we’ll cover practical strategies you can employ to deliver improved business agility at the data layer. We’ll discuss the impact that microservices are having in the enterprise, and what this means for MySQL and other popular databases. Join us and learn the answers to these common questions:
● How can you meet the operational challenge of scaling the number of MySQL database instances and managing the fleet?
● Adding to this scale challenge, how can your MySQL instances maintain availability in a world where the underlying IT infrastructure is ephemeral?
● How can you secure data in motion?
● How can you enable self-service while maintaining control and governance?
We’ll cover these topics and share how enterprises like yours are delivering greater outcomes with our Pivotal Platform managed MySQL.
Now you can scale without fear of failure.
Presenters:
Judy Wang, Product Management
Jagdish Mirani, Product Marketing
Fully Orchestrating Applications, Microservices and Enterprise Services with ...Docker, Inc.
As a multi-national bank, Societe General IT infrastructure has thousands of apps, almost every bit of technology deployed and compliance requirements. Our vision is to broadly transform traditional bank IT to be agile and fast. Speed is critical in a digital economy and at Societe Generale we are building a new execution platform with Docker that provides IT containers, middleware and infrastructure as a service and orchestration. In this session we will share the technical and organizational steps of our journey from how we defined and architected a PaaS for our entity; with service catalog, service topologies, ambassadors with Docker Datacenter, continuous integration and what’s next.
Continuous Everything in a Multi-cloud and Multi-platform EnvironmentVMware Tanzu
This presentation is all about Concourse, Spinnaker, Harbor and Pivotal Build Service, and how combining these tools can help you build an efficient, secure, and trusted container pipeline.
StripeCon 2021: A Cloud-Native approach to running Silverstripe on Google Clo...Jon Su
In this talk, Jon talks about how a SilverStripe application can be deployed onto Google Cloud Platform as a cloud-native application to take advantage of the full power and benefits of the Cloud.
First presented at StripeCon EU 2021 on 01/10/2021
Service Mesh: Two Big Words But Do You Need It?DevOps.com
Today, one of the big concepts buzzing in the app development world is service mesh. A service mesh is a configurable infrastructure layer for microservices application that makes communication flexible, reliable and fast. Let’s take a step back, though, and answer this question: Do you need a service mesh?
Join this webinar to learn:
What a service mesh is; when and why you need it — or when and why you may not
App modernization journey and traffic management approaches for microservices-based apps
How to make an informed decision based on cost and complexity before adopting service mesh
Learn about NGINX Service Mesh in a live demo, and how it provides the best service mesh option for container-based L7 traffic management
From Pivotal to VMware Tanzu: What you need to knowVMware Tanzu
On December 30, 2019, VMware announced that it had completed its acquisition of Pivotal Software, Inc. We’re excited about the opportunities this creates to deliver more innovation to customers, but we understand you may be asking, “Will the portfolio change and how might that impact my company?”
So we want to use this opportunity to be direct with answers—our product and go-to-market leaders will drive this session and describe how Pivotal and VMware products and services are coming together. We will:
- Affirm our commitment to Spring, Cloud Foundry, Pivotal Application Service, PKS, BOSH and more
- Share how Pivotal products and services will amplify our VMware Tanzu portfolio
- Walk through the VMware Tanzu vision for modern infrastructure and modern applications
- Define the engineering priorities that will inform our product roadmap
“Sh*^%# on Fire, Yo!”: A True Story Inspired by Real EventsVMware Tanzu
SpringOne 2020
“Sh*^%# on Fire, Yo!”: A True Story Inspired by Real Events
James Webb, MTS at T-Mobile
Brendan Aye, Technical Director, Platform Architecture at T-Mobile
Unlock Sustainable Kubernetes Services for TASVMware Tanzu
SpringOne 2020
Unlock Sustainable Kubernetes Services for TAS
Sara Arntz, Manager, Product Management at VMware
Tiffany Jordan, Product Lead at VMware
Mikey Boldt, Software Engineer at VMware
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021VMware Tanzu
Achieving DevSecOps Outcomes with Tanzu Advanced
Speakers:
David Zendzian, Global Field CISCO, VMware Tanzu
James Urquhart, Strategic Executive Advisor, VMware Tanzu
Mike Koleno, Chief Architect, AHEAD
The Path Towards Spring Boot Native ApplicationsVMware Tanzu
SpringOne 2020
The Path Towards Spring Boot Native Applications
Sébastien Deleuze, Spring Framework Committer at VMware
Andy Clement, Director at VMware
Introduction to KubeSphere and its open source ecosystemKubeSphere
Video Record →: https://www.youtube.com/watch?v=TupN6ajF18A
Key takeaways in this slides:
* Pain points for enterprises adopting Kubernetes in production
* Introduction to KubeSphere and its open source ecosystem
* Your first journey to cloud native DevOps
* Demo: Create a CI/CD pipeline using KubeSphere DevOps
Next Generation Vulnerability Assessment Using Datadog and SnykDevOps.com
Vulnerability assessment for teams can often be overwhelming. The dependency graph could be thousands of packages depending on the application. Triaging vulnerability data and prioritizing actions has historically been a very manual process, until now. With Datadog and Snyk, learn how to trace security and performance issues by leveraging continuous profiling capabilities for actionable insight that help developers remediate problems.
Join us on Thursday, January 21 for a unique opportunity to learn more about continuous profiling, vulnerability management, and the benefit to customers from using both of these products. In this webinar, you will:
Bust some myths around continuous profiling and learn how Datadog differentiates itself
See decorated traces in action for sample Java applications and understand how Snyk + Datadog reduce time to triage supply chain vulnerabilities
Learn roadmap information for upcoming public announcements from both partners
Cloud native technologies, like containers and Kubernetes, enable enterprise agility at scale and without compromises. Learn how enterprises can warp speed their DevOps initiatives by embracing cloud native technologies, measuring DevOps success, and utilizing modern enterprise Kubernetes platforms like Nirmata!
Introducing Tanzu Editions
VMware Tanzu editions package capabilities of the Tanzu portfolio into clearly defined solutions targeted at the most common enterprise challenges. There are four Tanzu editions, each a superset of the one before it along a spectrum, giving customers a clear path to add capabilities over time as needed.
Containers: Give Me The Facts, Not The Hype - AppD Summit EuropeAppDynamics
Docker, Kubernetes, Rancher… just a few of the container technologies out there. The buzz around containers is still growing, as they can make a seismic impact on release velocity. But what’s the best way to add containers to your technology stack? Get the low down from a container expert who will separate the facts from fiction. What’s the best path to scale your adoption and usage? How do you guard against user privilege escalation? How do containers fit into a DevOps approach?
In this talk, Liz Rice will:
-Explain what’s involved in the lifecycle stages: Develop, Registry, and Deploy
-Build a container live on stage, by writing one in a few lines of Go code
-Flag container security risks and give tips on how to achieve peace of mind
For more information, visit: www.appdynamics.com
Yesterday was 2commit the AZUG.BE place to BE. Together with AZUG.BE we hosted the session: developing a next-gen web App with ASP.NET Boilerplate framework. A session in which. NET consultant Wim van den Broeck illustrated a powerful case study. A app that optimizes the planning and reservation of operation quarters and surgeons by avoiding duplicate bookings and automatically synchronizing changes to the doctors ' workflows. Wim went deeper into the use of the ASP.NET Boilerplate framework, which offers a strong contemporary technological base and allows to develop the Web application according to the SOLID principles.
Learning About GenAI Engineering with AWS PartyRock [AWS User Group Basel - F...Chris Bingham
For this year's re:Invent re:Cap I presented a overview of prompt engineering techniques for large language models (LLMs) along with demos of them implemented in AWS PartyRock.
From Pivotal to VMware Tanzu: What you need to knowVMware Tanzu
On December 30, 2019, VMware announced that it had completed its acquisition of Pivotal Software, Inc. We’re excited about the opportunities this creates to deliver more innovation to customers, but we understand you may be asking, “Will the portfolio change and how might that impact my company?”
So we want to use this opportunity to be direct with answers—our product and go-to-market leaders will drive this session and describe how Pivotal and VMware products and services are coming together. We will:
- Affirm our commitment to Spring, Cloud Foundry, Pivotal Application Service, PKS, BOSH and more
- Share how Pivotal products and services will amplify our VMware Tanzu portfolio
- Walk through the VMware Tanzu vision for modern infrastructure and modern applications
- Define the engineering priorities that will inform our product roadmap
“Sh*^%# on Fire, Yo!”: A True Story Inspired by Real EventsVMware Tanzu
SpringOne 2020
“Sh*^%# on Fire, Yo!”: A True Story Inspired by Real Events
James Webb, MTS at T-Mobile
Brendan Aye, Technical Director, Platform Architecture at T-Mobile
Unlock Sustainable Kubernetes Services for TASVMware Tanzu
SpringOne 2020
Unlock Sustainable Kubernetes Services for TAS
Sara Arntz, Manager, Product Management at VMware
Tiffany Jordan, Product Lead at VMware
Mikey Boldt, Software Engineer at VMware
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021VMware Tanzu
Achieving DevSecOps Outcomes with Tanzu Advanced
Speakers:
David Zendzian, Global Field CISCO, VMware Tanzu
James Urquhart, Strategic Executive Advisor, VMware Tanzu
Mike Koleno, Chief Architect, AHEAD
The Path Towards Spring Boot Native ApplicationsVMware Tanzu
SpringOne 2020
The Path Towards Spring Boot Native Applications
Sébastien Deleuze, Spring Framework Committer at VMware
Andy Clement, Director at VMware
Introduction to KubeSphere and its open source ecosystemKubeSphere
Video Record →: https://www.youtube.com/watch?v=TupN6ajF18A
Key takeaways in this slides:
* Pain points for enterprises adopting Kubernetes in production
* Introduction to KubeSphere and its open source ecosystem
* Your first journey to cloud native DevOps
* Demo: Create a CI/CD pipeline using KubeSphere DevOps
Next Generation Vulnerability Assessment Using Datadog and SnykDevOps.com
Vulnerability assessment for teams can often be overwhelming. The dependency graph could be thousands of packages depending on the application. Triaging vulnerability data and prioritizing actions has historically been a very manual process, until now. With Datadog and Snyk, learn how to trace security and performance issues by leveraging continuous profiling capabilities for actionable insight that help developers remediate problems.
Join us on Thursday, January 21 for a unique opportunity to learn more about continuous profiling, vulnerability management, and the benefit to customers from using both of these products. In this webinar, you will:
Bust some myths around continuous profiling and learn how Datadog differentiates itself
See decorated traces in action for sample Java applications and understand how Snyk + Datadog reduce time to triage supply chain vulnerabilities
Learn roadmap information for upcoming public announcements from both partners
Cloud native technologies, like containers and Kubernetes, enable enterprise agility at scale and without compromises. Learn how enterprises can warp speed their DevOps initiatives by embracing cloud native technologies, measuring DevOps success, and utilizing modern enterprise Kubernetes platforms like Nirmata!
Introducing Tanzu Editions
VMware Tanzu editions package capabilities of the Tanzu portfolio into clearly defined solutions targeted at the most common enterprise challenges. There are four Tanzu editions, each a superset of the one before it along a spectrum, giving customers a clear path to add capabilities over time as needed.
Containers: Give Me The Facts, Not The Hype - AppD Summit EuropeAppDynamics
Docker, Kubernetes, Rancher… just a few of the container technologies out there. The buzz around containers is still growing, as they can make a seismic impact on release velocity. But what’s the best way to add containers to your technology stack? Get the low down from a container expert who will separate the facts from fiction. What’s the best path to scale your adoption and usage? How do you guard against user privilege escalation? How do containers fit into a DevOps approach?
In this talk, Liz Rice will:
-Explain what’s involved in the lifecycle stages: Develop, Registry, and Deploy
-Build a container live on stage, by writing one in a few lines of Go code
-Flag container security risks and give tips on how to achieve peace of mind
For more information, visit: www.appdynamics.com
Yesterday was 2commit the AZUG.BE place to BE. Together with AZUG.BE we hosted the session: developing a next-gen web App with ASP.NET Boilerplate framework. A session in which. NET consultant Wim van den Broeck illustrated a powerful case study. A app that optimizes the planning and reservation of operation quarters and surgeons by avoiding duplicate bookings and automatically synchronizing changes to the doctors ' workflows. Wim went deeper into the use of the ASP.NET Boilerplate framework, which offers a strong contemporary technological base and allows to develop the Web application according to the SOLID principles.
Learning About GenAI Engineering with AWS PartyRock [AWS User Group Basel - F...Chris Bingham
For this year's re:Invent re:Cap I presented a overview of prompt engineering techniques for large language models (LLMs) along with demos of them implemented in AWS PartyRock.
Given at Agile Camp 2013, San Jose, CA. Sept. 21
How do you take a gigantic organization like PayPal that was entrenched in a culture of a “”long shelf life”” and transform it to a culture of rapid experimentation? Bill will give 3 principles applied to PayPal engineering to make it a full partner with Lean UX. This will be illustrated by showing how they re-factored the tech stack and changed the way engineers work in Lean streams with design & product partners and how it plays with agile.
As a backdrop Bill will discuss several historical factors in the field of software engineering that are antithetical to the Lean Startup mindset but still find their way into most large enterprises. By understanding this historical context and applying lean principles he will demonstrate how a lean transformation can take place in any enterprise.
Immutable Infrastructure: the new App DeploymentAxel Fontaine
Immutable Infrastructure: the new App Deployment
App deployment and server setup are complex, error-prone and time-consuming. They require OS installers, package managers, configuration recipes, install and deployment scripts, server tuning, hardening and more. But... Is this really necessary? Are we trapped in a mindset of doing things this way just because that's how they've always done?
What if we could start over and radically simplify all this? What if, within seconds, and with a single command, we could wrap our application into the bare minimal machine required to run it? What if this machine could then be transported and run unchanged on our laptop and in the cloud? How do the various platforms and tools like AWS, Docker, Heroku and Boxfuse fit into this picture? What are their strengths and weaknesses? When should you use them?
This talk is for developers and architects wishing to radically improve and simplify how they deploy their applications. It takes Continuous Delivery to a level far beyond what you've seen today. Welcome to Immutable Infrastructure generation. This is the new black.
6 Principles for Enabling Build/Measure/Learn: Lean Engineering in ActionBill Scott
Presented at Lean Day West - Portland, OR. Sept. 17, 2013
How do you take a gigantic organization like PayPal and begin to transform the experiences? Engineering is often the key blocker in being able to achieve a high rate of innovation. In this talk, Bill Scott will give specific examples on implemented Lean UX in a 13,000 person company, re-factored the technology stack and changed the way engineers work with design & product partners. In addition, Bill will provide additional examples that go back to his early days writing one of the first Macintosh games to his more recent work at Netflix and the power of treating the user interface layer as the experimentation layer.
Presented at All Things Open RTP Meetup
Presented by Jarred Overson, CTO at Candle
Title: WebAssembly & Zero Trust for Code
Abstract: Zero Trust eliminated the notion that users, devices, or service could be inherently trusted within your company's network. Yet for some reason we default to trusting the dozens to even thousands of dependencies we import into our applications. These dependencies adopt the same privileges and access as the parent application and are prime targets for attackers. Malicious actors repeatedly seek and take over popular dependencies to gain a foothold into companies. This is not fear mongering, this is happening today. Millions of people – including our speaker – have unknowingly downloaded and run malicious code as part of their normal developer activities.
This is a difficult problem without obvious solutions. WebAssembly gives us a new way of thinking about it. In this talk, Jarrod Overson illustrates how WebAssembly changes the game and can make our applications more secure while improving performance, reusability, and maintainability both on and off the browser.
Measure and Increase Developer Productivity with Help of Serverless at JCON 2...Vadym Kazulkin
The goal of Serverless is to focus on writing the code that delivers business value and offload everything else to your trusted partners (like Cloud providers or SaaS vendors). You want to iterate quickly and today’s code quickly becomes tomorrow’s technical debt. In this talk we will show why Serverless adoption increases the developer productivity and how to measure it. We will also go through AWS Serverless architectures where you only glue together different Serverless managed services relying solely on configuration, minimizing the amount of the code written.
Building frameworks: from concept to completionRuben Goncalves
What are considerations when building a framework/library? How does that apply to OutSystems components? In this session, we’ll do a deep dive into the importance of addressing certain concepts like code granularity, and architecture, in order to create useful, future-proof and coherent frameworks that deliver the best possible developer experience.
Mastering Chaos - A Netflix Guide to MicroservicesJosh Evans
QConSF 2016 Abstract:
By embracing the tension between order and chaos and applying a healthy mix of discipline and surrender Netflix reliably operates microservices in the cloud at scale. But every lesson learned and solution developed over the last seven years was born out of pain for us and our customers. Even today we remain vigilant as we evolve our service architecture. For those just starting the microservices journey these lessons and solutions provide a blueprint for success.
In this talk we’ll explore the chaotic and vibrant world of microservices at Netflix. We’ll start with the basics - the anatomy of a microservice, the challenges around distributed systems, and the benefits realized when integrated operational practices and technical solutions are properly leveraged. Then we’ll build on that foundation exploring the cultural, architectural, and operational methods that lead to microservice mastery.
An unknown Mobile “country”. A wandering developer from Web “city”. No idea about how to deal with the “droids”. The only available means of transport: the express “JavaScript” train, the most up-to-date Html Underground and the confortable and safe CSS Tram. Tension, drama, action and finally, love. This is my story getting started with Android OS.
In this talk we’ll speak about the existent cross platforms for mobile development, talking openly about weaknesses, strengths and myths present in cross platforms, from the point of view of a newbie mobile developer.
Talk given at Droidcon Torino 2015
Lean engineering for lean/balanced teams: lessons learned (and still learning...Balanced Team
Bill Scott, PayPal
How do you take a gigantic organization and begin to transform the products? One key is to change the way teams work together to build experiences by following a Lean UX methodology. However, essential to this is to have engineering fully onboard as an integrated partner in the process. In this talk, Bill Scott will share 6 principles gleaned from the last two years to transforming engineering and the technology stack to support this working model.
Similar to Stability anti patterns in cloud-native applications (20)
Monitoring Java Application Security with JDK Tools and JFR Events.pdfAna-Maria Mihalceanu
Learn how JDK Flight Recorder, JDK Mission Control and JFR Security Events can help monitoring security of your Java application so that you can detect potential safety risks.
Is it tuning the garbage collector? Writing clean(er) code?
No, the first step is understanding what’s going on in your application!
Performance tuning starts with analysis, and JDK tools can help you gain insights on classes and threads and can perform live GC analysis or heap dump postprocessing: jcmd, jconsole, jstat, jmap and jfr.
We’ll examine the functional visibility areas essential to Java and how these tools provide that information. Moreover, will discuss options on how to integrate information gathered from these tools with widespread monitoring systems like Prometheus.
After this talk, you will be ready to understand what your application spends time on and why so you can start improving its perform
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
2. I am Ana
Solutions Architect @ IBM
Co-founder of Bucharest Software Craftsmanship
Community
HELLO!
#devfestRO @ammbra1508
3. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
What are anti-patterns?
An anti-pattern is a common response to a
recurring problem that is usually ineffective
and risks being highly counterproductive.
Wikipedia
4. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
STABILITY Continue to work with a
SYSTEM
DISRUPTIONS OCCUR
TEMPORARY SHOCKS
CONTINUOUS LOAD STRESS
COMPONENT FAILURES
Users can Even when
System Stability
7. #devfestRO
@ammbra1508
#devfestRO @ammbra1508
A specific order to the start and stop processes when bringing up applications.
A deployment depends on previous successful deployment of another application.
A service waits for another component to be available.
kubectl wait --for=condition=ready pod -l app=backend
Examples and symptoms
8. #devfestRO
@ammbra1508
#devfestRO @ammbra1508
Why is it bad?
Wait time between deployments
equals application not fully functional
When the condition is never met, the next deployment
cannot proceed and the process breaks.
10. #devfestRO
@ammbra1508
#devfestRO @ammbra1508
Choose a deployment strategy
Blue/green deployments for instant rollout/rollback
LB
Pod
v2
Pod
v2
1.
Pod
v3
Pod
v3
LB
Pod
v2
Pod
v2
2.
Pod
v3
Pod
v3
LB
Pod
v3
Pod
v3
3.
Pod
v2
Pod
v2
LB
Pod
v3
Pod
v3
4.
Pod
v2
Pod
v2
11. #devfestRO
@ammbra1508
#devfestRO @ammbra1508
Choose a deployment strategy
Canary deployments when the user does the testing
LB
Pod
v3
Pod
v3
1.
Pod
v4
LB
Pod
v3
Pod
v3
2.
Pod
v4
LB
Pod
v3
Pod
v3
Pod
v4
3.
LB
Pod
v4
Pod
v4
Pod
v4
4.
14. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
Requests may be sent but
not receive a reply.
The provider claims to
send a different response
format.
Synchronous calls are
vicious amplifiers that
facilitate blockages.
Tightly coupled
middleware amplifies
shocks to the system.
Why is it bad?
15. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
Application Level Solutions (1)
Circuit Breaker pattern
✚ Consider delayed retries.
✚ Report, record and correlate state changes.
16. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
Application Level Solutions (2)
Failure rate
threshold
Configuration example for SpringBoot with Resillience4j
Allowed number
of calls in half-
open state
Sliding window
Wait duration
17. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
Is this enough?
Yes, if your end-user is happy that
<<real>> data is not present in the response.
Yes, if your fallback method retrieves a
unified satisfying response.
18. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
Transition Solutions (1)
DETERMINE THE
OUTAGE PATTERN
BASED ON MAINTENANCE
WINDOW
CACHE SOLUTION
Stress
testing
+
Load
Testing
19. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
Transition Solutions (2)
Cache Hit:
Check if TTL of first layer cache expired
NO: Return the response from Redis.
YES: Go at 2nd layer cache and find entry:
Try to call the real method
On Success: Store the new result with a proper TTL
On Failure: Extend the existing TTL to put it back into the
first layer and return the result.
Cache miss:
Try to call the real method
On Success: Store the new result with a proper TTL
On Failure: Return a result covering the miss. Record the failure.
helm3 install my-redis stable/redis
20. Source: “Inside out” animation by Pixar
https://www.psychologies.co.uk/inside-out-interview-creators
21. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
Circuit
breaker
Traefik
Solutions at Kubernetes level(1)
22. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
Circuit
breaker
Istio Traefik
Solutions at Kubernetes level(2)
25. Not setting memory or CPU can result into scheduling an unlimited number of pods
on any node.
The container could use all of the available memory on its node, possibly invoking
the OOM (out of memory) Killer.
The default memory limit of the namespace (in which the container is running) is
assigned to the container.
#devfestRO#devfestRO @ammbra1508
Why is it bad?
26. #devfestRO
@ammbra1508
#devfestRO @ammbra1508
Solutions at Kubernetes level
Set memory and CPU requests
below their limits
Control resource limits via
ResourceQuotas and LimitRange in
the namespace settings.
Keep the CPU request at 1 core
or below and
use ReplicaSets to scale it out.
28. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
2 hosts, 2 instances, 300
threads
3000
threads
70
instances
20 hosts
Anytime you have a “many-to-one” or “many-to-few”
relationship.
Amplify the scaling effects through “shared resource” or
”commons project”.
Dangerously combining horizontal and vertical
autoscaling.
Counterproductive usage of predictable demands and
elastic scale patterns.
Examples and symptoms
29. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
One service can flood another with
requests beyond its capacity.
Shared resources are a
capacity constraint.
Why is it bad?
30. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
Solutions at design level
Approximate a shared-nothing
architecture through reducing the number
of callers of the shared resource.
Design for pairs of applications that
each act as a failover for the other.
31. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
Provision cluster nodes to have the same resource
footprint.
Ensure that the cluster autoscaler pod has enough
resources.
To avoid delays in provisioning, over-provision your
cluster.
https://github.com/kubernetes/autoscaler/blob/master/cluster-
autoscaler/FAQ.md#how-can-i-configure-overprovisioning-with-
cluster-autoscaler
Solutions at Kubernetes level(1)
32. #devfestRO
@ammbra1508
• I am Ana
• Solutions Architect @ IBM
• Co-founder of Bucharest Software
Craftsmanship Community
HELLO!
#devfestRO @ammbra1508
Ensure that every pod has resource requests defined.
Validate that resource requests are close to actual usage.
Install metrics-server and configure custom/external metrics.
Specify PodDisruptionBudget for application pods.
Solutions at Kubernetes level(2)
33. #devfestRO @ammbra1508
Takeaways
Avoid deploying things in a specific order: applications should not wait
because a dependency is not ready.
Consider setting memory and CPU limits to reduce the risk of resource
contention and that resource requests are close to actual usage.
Utilize Kubernetes’s self-healing mechanism, implement retries and
circuit breakers both at application and Kubernetes level.
Avoid using both HPA and VPA; consider installing metrics-server and
adding custom metrics for horizontal scaling.