If you have somehow missed the hype, the Internet of Things (IoT) is a fast-growing constellation of internet-connected sensors attached to a wide variety of 'things'. Sensors can take a multitude of possible measurements, Internet connections can be wired or wireless, while 'things' can literally be any object to which you can attach or embed a sensor. If you carry a smartphone, for example, you become a multi-sensor IoT 'thing', and many of your day-to-day activities can be tracked, analysed and acted upon.
Many of the conversations taking place around the IoT are incomplete without a mention of big data. Big data is characterised by “4 V’s”: volume, variety, velocity and veracity. That is, big data comes in large amounts (volume), is a mixture of structured and unstructured information (variety), arrives at (often real-time) speed (velocity) and can be different levels of uncertainty (veracity).
As organizations step into IoT, they must understand the symbiotic relationship between IoT and big data. Just like with any big-data play, merely collecting the data isn't enough. The data must be processed and analyzed to derive meaningful insights, and those insights must drive actionable steps that can improve the business.
What that means is that, without Big Data, the IoT can offer an enterprise little more than noise. But wait…! On the other hand, without IoT, the Big Data is little more than any other software lying idle. Actually you need two to Tango. That’s when you get the perfect marriage!
In IoT StreamConf's keynote, Todd Greene, CEO of PubNub, kicked off the conference with an optimistic keynote address, looking forward to solving the challenges of Internet of Things communication.
If you have somehow missed the hype, the Internet of Things (IoT) is a fast-growing constellation of internet-connected sensors attached to a wide variety of 'things'. Sensors can take a multitude of possible measurements, Internet connections can be wired or wireless, while 'things' can literally be any object to which you can attach or embed a sensor. If you carry a smartphone, for example, you become a multi-sensor IoT 'thing', and many of your day-to-day activities can be tracked, analysed and acted upon.
Many of the conversations taking place around the IoT are incomplete without a mention of big data. Big data is characterised by “4 V’s”: volume, variety, velocity and veracity. That is, big data comes in large amounts (volume), is a mixture of structured and unstructured information (variety), arrives at (often real-time) speed (velocity) and can be different levels of uncertainty (veracity).
As organizations step into IoT, they must understand the symbiotic relationship between IoT and big data. Just like with any big-data play, merely collecting the data isn't enough. The data must be processed and analyzed to derive meaningful insights, and those insights must drive actionable steps that can improve the business.
What that means is that, without Big Data, the IoT can offer an enterprise little more than noise. But wait…! On the other hand, without IoT, the Big Data is little more than any other software lying idle. Actually you need two to Tango. That’s when you get the perfect marriage!
In IoT StreamConf's keynote, Todd Greene, CEO of PubNub, kicked off the conference with an optimistic keynote address, looking forward to solving the challenges of Internet of Things communication.
As the confluence of several mature and emerging technologies, the Internet of Things (IoT) is rapidly developing into a vibrant new marketplace. What are important considerations for technology, media, and telecom (TMT) companies as they compete for opportunities? This presentation covers:
• Questions TMT executives should be asking about impacts of IoT technologies, performance improvement opportunities, and where value can be generated.
• Building an IoT ecosystem where all players benefit – defining different players' roles and relationships, and already-successful tactics.
• Security and privacy challenges, including how data protection responsibility is assigned and monitored, and defining appropriate security and privacy standards.
Explore this quickly developing new opportunity for TMT companies.
Get more IoT insights: http://www.deloitte.com/us/iot_ecosystem
By bringing together the IoT with IBM Watson
™
cognitive computing
technologies, we’re infusing a new kind of thinking into objects,
systems and processes. Watson technology understands, reasons
and learns. It communicates in natural, human terms. It understands
context and nuance, enabling it to not only uncover new insights
but also unearth entirely new pathways to explore and possibilities
to imagine
Verso IoT experience – What have we learned from implementations all over the...Bosnia Agile
IoT projects face many obstacles on their journey from idea to end-to-end solution. Technology is less an issue, with many vendors and solutions emerging every day. This brings optimism, but also concerns about proper future proof choice and interoperability issues. Even bigger concerns are present in business model definition, business cases creation, go-to-market strategy preparation which requires organizational changes that companies need to conduct in order to be long-term successful in the IoT domain. Verso deploys many projects worldwide, focusing mainly on communication part of IoT solution, however being involved in business discussion as well. What are common technological and business obstacles and what are best practices to resolve them will be the main feature of our presentation.
Reshaping Business Through IoT: Key Technology Factors to ConsiderEurotech
The IoT is the manifestation that the raw material of the information age is datum. Data are the new source of innovation and the lever to achieve business sustainability. By extracting data from assets and products, companies can become more efficient through a strategic rethinking of their value chains and business processes. In so doing, companies will add the required readiness to shift from products to services, and eventually enter in the outcome economy. To truly embrace the digital transformation, organizations need to collect actionable data from their assets, processes, and products and then connect the OT (Operational Technology) world where data are generated to IT (Information Technology) world where data are consumed. Beside predictive maintenance and asset usage maximization/optimization the benefits are huge: the transformation of any business into a smart business, increasing competitiveness also in mature markets; the creation of new innovative products and services; and the enablement of service prosumerization.
To make this happen there are some key technology factors to consider during the implementation of an IoT architecture.
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
Download our special report, IoT Tech for the Manager: http://bit.ly/report1-slideshare
The IoT Food Chain – Picking the Right Dining Partner is Important as presented at the IoT Inc Business' fourteenth Meetup. See: http://www.iot-inc.com/internet-of-things-value-chain-meetup/
In our fourteenth Meetup we have Dean Freeman, Research VP at Gartner presenting “The IoT Food Chain – Picking the Right Dining Partner is Important”.
Presentation Abstract
The Internet of Things means many different things to different people. What is key about the IoT is there is a distinct food chain that runs from the silicon devices to the services and then back. The level of success you will have in the IoT is heavily dependent upon where you fit in the food chain, and if you have the capability to move up the chain or across the chain into different verticals. In this presentation we will explore the food chain, what is important and what steps need to be taken to succeed in the world of the IoT.
IoT is one of the transformational trends that will shape the future of businesses in 2017 and beyond. Many firms see big opportunity in IoT uses and enterprises start to believe that IoT holds the promise to enhance customer relationships and drive business growth by improving quality, productivity, and reliability on one side, and on the other side reducing costs, risk, and theft.
Oracle Digital Business Transformation and Internet of Things by Ermin PrašovićBosnia Agile
This session discuss solutions and Oracle strategy to support digital transformation for companies interested in their business transformation path as well as how to allign with modern trends brought by digitalization. Second part of this session discuss news Oracle has in its offer for the Internet of Things (IoT) services and including solutions based on IoT.
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATIONRajat Maheshwari
IoT is the new wave of innovation.
IoT has the potential to enable extensions and enhancements to fundamental services in transportation, logistics, security, utilities, education, healthcare and other areas, while providing a new ecosystem for application development.
A concerted effort is required to move the industry beyond the early stages of market development towards maturity, driven by common understanding of the distinct nature of the opportunity.
Smart Industry 4.0: IBM Watson IoT in de praktijkIoT Academy
Tijdens de tweede IoT meetup van 2017 gaf Ronald Teijken inzicht hoe bedrijven slimmer complexe beslissingen kan nemen dankzij het Watson IoT Platform van IBM. Sensoren, Data, Analytics, Cognitive zijn enkele onderwerpen die hierbij aan bod kwamen.
This demo was featured at the Grace Hopper Conference in October 2016. Members of the Cisco IoT Engineering team designed, sourced, and built the demo from concept to finish.
DELL Technologies - The IoT Value Chain - Solutions for the Smart World - Del...Smarter.World
In this presentation we will introduce various aspects of the Internet of Things, Industry 4.0 and the associated challenges in implementing new digital services.
We also refer to IoT / Industry 4.0 terminology, market developments, factors and drivers, IoT platform components, but also to the differentiation and similarities of the Internet of Things and Industry 4.0.
Using various application examples, we will outline the range of DELL Technologies offerings.
Here, however, we remain at an overview level for the first time without paying attention to the details of the deployable DELL-EMC products and solutions.
We would continue this in downstream discussions depending on the identified topic segment.
As the confluence of several mature and emerging technologies, the Internet of Things (IoT) is rapidly developing into a vibrant new marketplace. What are important considerations for technology, media, and telecom (TMT) companies as they compete for opportunities? This presentation covers:
• Questions TMT executives should be asking about impacts of IoT technologies, performance improvement opportunities, and where value can be generated.
• Building an IoT ecosystem where all players benefit – defining different players' roles and relationships, and already-successful tactics.
• Security and privacy challenges, including how data protection responsibility is assigned and monitored, and defining appropriate security and privacy standards.
Explore this quickly developing new opportunity for TMT companies.
Get more IoT insights: http://www.deloitte.com/us/iot_ecosystem
By bringing together the IoT with IBM Watson
™
cognitive computing
technologies, we’re infusing a new kind of thinking into objects,
systems and processes. Watson technology understands, reasons
and learns. It communicates in natural, human terms. It understands
context and nuance, enabling it to not only uncover new insights
but also unearth entirely new pathways to explore and possibilities
to imagine
Verso IoT experience – What have we learned from implementations all over the...Bosnia Agile
IoT projects face many obstacles on their journey from idea to end-to-end solution. Technology is less an issue, with many vendors and solutions emerging every day. This brings optimism, but also concerns about proper future proof choice and interoperability issues. Even bigger concerns are present in business model definition, business cases creation, go-to-market strategy preparation which requires organizational changes that companies need to conduct in order to be long-term successful in the IoT domain. Verso deploys many projects worldwide, focusing mainly on communication part of IoT solution, however being involved in business discussion as well. What are common technological and business obstacles and what are best practices to resolve them will be the main feature of our presentation.
Reshaping Business Through IoT: Key Technology Factors to ConsiderEurotech
The IoT is the manifestation that the raw material of the information age is datum. Data are the new source of innovation and the lever to achieve business sustainability. By extracting data from assets and products, companies can become more efficient through a strategic rethinking of their value chains and business processes. In so doing, companies will add the required readiness to shift from products to services, and eventually enter in the outcome economy. To truly embrace the digital transformation, organizations need to collect actionable data from their assets, processes, and products and then connect the OT (Operational Technology) world where data are generated to IT (Information Technology) world where data are consumed. Beside predictive maintenance and asset usage maximization/optimization the benefits are huge: the transformation of any business into a smart business, increasing competitiveness also in mature markets; the creation of new innovative products and services; and the enablement of service prosumerization.
To make this happen there are some key technology factors to consider during the implementation of an IoT architecture.
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
Download our special report, IoT Tech for the Manager: http://bit.ly/report1-slideshare
The IoT Food Chain – Picking the Right Dining Partner is Important as presented at the IoT Inc Business' fourteenth Meetup. See: http://www.iot-inc.com/internet-of-things-value-chain-meetup/
In our fourteenth Meetup we have Dean Freeman, Research VP at Gartner presenting “The IoT Food Chain – Picking the Right Dining Partner is Important”.
Presentation Abstract
The Internet of Things means many different things to different people. What is key about the IoT is there is a distinct food chain that runs from the silicon devices to the services and then back. The level of success you will have in the IoT is heavily dependent upon where you fit in the food chain, and if you have the capability to move up the chain or across the chain into different verticals. In this presentation we will explore the food chain, what is important and what steps need to be taken to succeed in the world of the IoT.
IoT is one of the transformational trends that will shape the future of businesses in 2017 and beyond. Many firms see big opportunity in IoT uses and enterprises start to believe that IoT holds the promise to enhance customer relationships and drive business growth by improving quality, productivity, and reliability on one side, and on the other side reducing costs, risk, and theft.
Oracle Digital Business Transformation and Internet of Things by Ermin PrašovićBosnia Agile
This session discuss solutions and Oracle strategy to support digital transformation for companies interested in their business transformation path as well as how to allign with modern trends brought by digitalization. Second part of this session discuss news Oracle has in its offer for the Internet of Things (IoT) services and including solutions based on IoT.
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATIONRajat Maheshwari
IoT is the new wave of innovation.
IoT has the potential to enable extensions and enhancements to fundamental services in transportation, logistics, security, utilities, education, healthcare and other areas, while providing a new ecosystem for application development.
A concerted effort is required to move the industry beyond the early stages of market development towards maturity, driven by common understanding of the distinct nature of the opportunity.
Smart Industry 4.0: IBM Watson IoT in de praktijkIoT Academy
Tijdens de tweede IoT meetup van 2017 gaf Ronald Teijken inzicht hoe bedrijven slimmer complexe beslissingen kan nemen dankzij het Watson IoT Platform van IBM. Sensoren, Data, Analytics, Cognitive zijn enkele onderwerpen die hierbij aan bod kwamen.
This demo was featured at the Grace Hopper Conference in October 2016. Members of the Cisco IoT Engineering team designed, sourced, and built the demo from concept to finish.
DELL Technologies - The IoT Value Chain - Solutions for the Smart World - Del...Smarter.World
In this presentation we will introduce various aspects of the Internet of Things, Industry 4.0 and the associated challenges in implementing new digital services.
We also refer to IoT / Industry 4.0 terminology, market developments, factors and drivers, IoT platform components, but also to the differentiation and similarities of the Internet of Things and Industry 4.0.
Using various application examples, we will outline the range of DELL Technologies offerings.
Here, however, we remain at an overview level for the first time without paying attention to the details of the deployable DELL-EMC products and solutions.
We would continue this in downstream discussions depending on the identified topic segment.
Learn how Cisco ACI and HashiCorp Terraform can help you increase productivity while reducing risks for your organization by managing infrastructure as code.
Addressing the systemic shortcomings of cloud analyticsSamanthaBerlant
Learn how existing open source technologies like Apache Kylin, Spark, and Mondrian can be used to increase the value of your analytics investment.
As we enter what some have called The Golden Age of Analytics, there are still some fundamental challenges that plague even the largest and most sophisticated cloud analytics adopters. Chief among these is the challenge of scale, often reflected in limitations of concurrency, multi-tenancy, distributed query performance, and all manner of latencies.
Other less obvious, but equally crucial, challenges of scale and performance have to do with IT and end-user productivity. In other words, there have been few technological advances that enable the quick deployment of big data analytics and the rapid creation of business value from the data being analyzed.
This presentation will consider a few of these systemic challenges and suggest some ways that they can be addressed with available open source technology such as Apache Kylin, Apache Spark, and Apache Mondrian.
Presenter:
Kaige Liu is a Senior Solutions Architect at Kyligence, where he works on building the next-generation big data analytics platform. Previously, he worked on the OpenStack and Bluemix team at IBM, focusing on cloud computing and virtualization technology. Kaige loves the open source community and is an active Apache Kylin committer.
Operating costs decrease and agility increases, allowing you to react quickly to new market opportunities.
http://www.cisco.com/web/offers/sp04/simplifying-operations/index.html?KeyCode=000947566
A New Approach to Continuous Monitoring in the CloudNETSCOUT
In this #CLUS 2019 session, you will learn how NETSCOUT’s smart data platform enables continuous monitoring in hybrid cloud environments to minimize risk and accelerate customer migration to the Cloud. You will review real-life examples of how businesses optimized their Cloud migration gaining visibility and deep insights, in both physical and virtual worlds, to maintain continuity and security of the services throughout the migration process.
By 2021, 98% of organizations plan to adopt multicloud architectures, but only 41% have a multicloud management strategy and just 38% have procedures and tools to operate a multicloud environment. As an IT leader you don't want to stifle forays into multicloud as it is an engine to efficiently support growth, innovation and transformation, however, it can be one of the most challenging changes that organizations face.
Join IBM for the keynote presentation where we’ll discuss:
• Opportunities and inherent challenges for organizations as applications across categories migrate to multicloud
• Stages of multicloud transformation
• Best practices from organizations that are succeeding with a multicloud environments
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...ldangelo0772
IT is in the midst of a dramatic shift to the mobile-cloud era, one in which IT services can be consumed on-demand across the enterprise and in hybrid and public clouds. Tjerk Bijlsma will share the latest Cisco Unified Computing System (Cisco UCS) innovations that can help you shape your Software-Defined Data Center, radically simplifying IT while delivering services at the speed of today's business.
During this session you will learn about:
Cisco's comprehensive architectural approach to enable next wave of IT convergence that includes VMware vSAN and comprehensive vRealize integration as part of the SDDC.
Innovations in Cisco Data Center portfolio including Cisco UCS and Nexus integrations with VMware solutions.
Solutions for virtualized environments for Converged and Hyper Converged systems including FlexPod, VersaStack, Vblock, vSAN, Simplivity, StorMagic and more.
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Cisco Canada
Digital transformation is the key buzz word today. But how do you get there? How do you plan now for the future? Cisco delivers the most complete SDN solutions to meet your data center needs - from programmable networks to programmable fabrics to a fully integrated solution with Application Centric Infrastructure (ACI). Here about our latest innovations for all areas, from Applications to ASICs, that bring unique capabilities and value to the industry. Hear your peers share their SDN journeys and how Cisco's open choice solutions have helped them improve agility and attain astounding results for their business. And learn how to lay the foundation now for your digital transformation in the decade ahead. Get ready!
Cisco’s Cloud Strategy, including our acquisition of CliQr Cisco Canada
At Partner Summit we made a series of exciting announcements in our Cloud portfolio, including our acquisition of CliQr. Join us to learn about these new announcements and an understanding of Cisco’s Cloud Strategy.
- How does CliQr fit into our existing Cloud portfolio (Metapod, APIC, Enterprise Cloud Suite, Cloud Consumption-as-a-Service)?
- How does our Cloud portfolio today meet the needs of our customers? What problems are we solving?
- How does our portfolio today position us for the world of Containers and Microservices?
Join us for a presentation of how these announcements fit into our current environment and what they mean to your longer-term strategy.
Enterprises that are embracing cloud computing are interested in driving fundamental changes in their business so they can compete in the future. IT transformation, enabled by cloud adoption, is a key component of this future success—from tighter alignment with business unit stakeholders to increased agility and pace of innovation. In this session, we explore the potential for transformation that comes with cloud adoption, and we discuss how some of the world’s leading enterprises were able to transform. We also explore organizational and technology best practices that you can implement to support transformation in your organization.
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
Datacomm Cloud Business Overview
Making Indonesia 4.0
Digital Transformation in Banking Industry
Introduction to Cloud Computing
Big Data Analytics Introduction
Big Data Analytics Application in Banking
Similar to The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast IT (20)
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast IT
1. Cisco Confidential 1
The Power of Orchestration
Inside Cisco IT – DC Cloud from IaaS to Fast IT
In partnership with:
2. Cisco Confidential 2
Cisco Stakeholder & IT Landscape
4,469 Cloud Partner Services71K+ EmployeesStakeholders: 70K Partners17K+ Sales500K+ Customers
135K LaptopsData and Things: 31 Data Centers18PB Data66K Mobile Devices
SecurityProductivityBusiness Capabilities: InnovationEnablementGrowth
3. Cisco Confidential 3
Pace of change2
Today’s Landscape: Challenges or Opportunities?
Video adoption will
increase IP traffic to a
CAGR of 18%, growing a
factor of 2 by 2018
By 2018, over 55% of all
Internet traffic will cross
content delivery networks
By 2017, Cloud to grow to
69% of total DC Traffic
Over 50% of all IP traffic
will originate with non-PC
devices (e.g. smartphones,
tablets) by 2018
Today, malicious traffic
is visible on 100% of
corporate networks
CIOs report that at least
25% of IT spending will
happen outside the IT
budget in 2014
Source: Visual Networking Index 2013 - 2018
5. Cisco Confidential 5
Services Everything: Technology, Process, and People
Architectural Transitions
Services-
Oriented
Everything
Talent Strategy
Accountability Checkpoint
Architectural
Reviews
Strategic
Investment
Planning
Organizational
Health
Services
Review
Organizing Principles
6. Cisco Confidential 6
Cisco Information Technology
Power the #1 IT Company
Future proof our business through adaptive services
Adaptive Experience: Pervasive Experience UpgradeAdaptive Technology: Internet of Everything
Unified Architecture Advantage
Adaptive Process: Commercial Transformation Adaptive People: Workforce Development
S
V
Cisco Performance Measurements
Architecture/Services Operating Framework
Growth Speed Productivity
Software and
Cloud Capabilities
Field Enablement Next-Generation
Collaboration Platform
IoE Foundation
E
M
Continuous Delivery Process and Mindset
Stakeholder
Experience
Security Resiliency
7. Cisco Confidential 7
Lessons Learned
§ The high level outcomes must be made obvious.
§ You have to architect for change, at an accelerating pace.
• If you don’t change your fundamental processes, you won’t
change.
• People make change if they identify with the intended
outcomes.
• Everything you do = communication.
9. Cisco Confidential 9
Growth
Enablement
Global Data Center Strategy
Policy Based is Key
§ New markets and
business models
§ Global expansion
§ User experience
§ Enable customer
success
§ Increase data
center tiers
§ Multi-site architecture
§ Move out of high
risk geographies
§ Improve availability
and recoverability
Resiliency
Capacity
§ Build and occupy
data center
§ Optimize demand
§ Consolidate where
appropriate
§ Run IT as a business
§ Internal service
provider model
§ Service-oriented
architecture
§ Product & technology
transformation
§ Focus on operational
excellence
Transformation
10. Cisco Confidential 10
Building DC Capacity Worldwide
Company-Wide Bundled Investment Approach
RTP
Mountain View
Texas
APAC
AmsterdamTBD
Bundle 1
(Jan-08)
Critical resiliency,
critical capacity
Bundle 2
(July-09)
SaaS
European growth,
bridging immediate
capacity
Bundle 3
(TBD)
Continental hub,
SaaS growth
Bundle 0
(Pre-07)
IT Foundation,
critical capacity,
early adopter
TIME
11. Cisco Confidential 11
Cisco IT’s infrastructure organization
With Global Infrastructure Services Group
OPERATIONSIMPLEMENTATIONARCHITECTURE DESIGN
Network
UC/Video
Infrastructure as a Service
Private Cloud
VirtualTeams
NETWORKCOMPUTE
&
VIRTUALIZ
ATION
SECURITY STORAGE CLOUD PaaS
Infrastructure Groups
12. Cisco Confidential 12
Large Programs Services
Infrastructure Organization Today
Virtual Acceleration Teams
ACI and
IoE
Head of
Infrastructure
Cross-Service Functions
Business
Strategy and
Security
Automation
Software
Development
Architecture
and Design
Implementation
and Operations
IT Delivery
Transformation
Unified
Communications
and Video Service
Data Centre
Service
Network
Service
14. Cisco Confidential 14
Application and
Service Migration
Total Cost of
Ownership
End-User
Experience
Operational
Excellence
Configuration
and Policy
Implementation
Security
Infrastructure Challenges
15. Cisco Confidential 15
Cloud Services Stack – Taxonomy
Cloud
Delivery
Models
SaaS
Software as a Service
SalesForce CRM, WebEx, Ironport
PaaS
Platform as a Service
JVM, Database, Apache
IaaS
Infrastructure as a Service
Compute, storage, networking
Data Center as a Service
Data center facilities, power, cooling DCaaS
CITEIS
16. Cisco Confidential 16
VMWare ESX/ESXi
Network Virtualization
PaaS
• Web Server
• Application Server
• Database Server
• Integration Services
Logical Segmentation
Control, Security
and Fault
Isolation
CITEIS – Journey to the Infrastructure Services Cloud
Cisco
Nexus
Cisco
UCS x86
Virtualization Automation Self-service Multi-tenancy Elasticity
Unified
Infrastructure
Cisco IT Elastic Infrastructure Service (CITEIS)
Cisco Intelligent
Automation for Cloud
Image Repository
Service Catalog
Show/chargeback
Change Management
17. Cisco Confidential 17
Continuous
Real-Time
Response
OpenStack OpenShift
OPFLEX
E2E Infra
Programmability
CIAC
APIC
Nexus 9000
Integrated
Security
Agility, Lower TCO
Business Benefits
Technologies * Cloud operations include elasticity, mobility & security
Cisco Intercloud,
Identity and Data
Awareness,
Service
Awareness
Fabric Integrated Compute
Traditional Cloud
(PaaS, IaaS)
Fabric Integrated Storage
We Are
HERE
Intercloud
Application-Driven
Cloud
Operations*
Big Data,
Analytics
Fast IT Seamless
Workload Mobility,
Catalog Driven
Policy-Based
Learning Network
Evolution to the Intercloud Fabric
Policy-Based
Fabric Control
Next-Gen Fabric
Integrated
Security
18. Cisco Confidential 18
ACI Relevance to Cisco IT
Application Centric Infrastructure
Adaptive Security:
Data Center
• Policy Model
• Fine Grain Network Security
Enablement
• Simplified Network Security
Management
• Unified Policy Model for Hybrid
Clouds
Application Centric Infrastructure
Speed and Agility:
Adaptive Infrastructure
• Revolutionize End to End
Infrastructure significantly
reducing provisioning time
• Deliver “Just-in-Time” and
“Elastic” Infrastructure
• Self Service provisioning
• Policy Model
Adaptive User
Experience:
• Reduced Downtimes for
Planned changes
• Operational Simplicity
• Visibility on Infra
dependencies
• Health Metrics by
Application
• Robust and Resilient
Infrastructure
21. Cisco Confidential 21
Proposed Tenancy Model for IT Services
Organizing Principle
Service Category
Service
Service Offering
(SO)
Service
Asset
Service
Asset
Service Offering
(SO)
Service
Asset
Service
Asset
Organizing Principle
Tenant
Application
Profile
Mapping
Mapping
Application
Profile
1:1
Application Profile
Mapping
OR
22. Cisco Confidential 22
Speed of Delivery
Platform as
a Service
Platform as
a Service
Compute
Networking
StorageStorage
Compute
Networking
Orchestration
Without ACI With ACI
End-to-End
Automated
Provisioning
Security
Partial
Automated
Provisioning
23. Cisco Confidential 23
Application Centric Infrastructure (ACI) – Summary Value Case
Network Operations & ManagementNetwork Provisioning
Type of Saving %
CAPEX Savings 25%
Power Savings 45%
Space Savings 19%
Compute Optimization Storage (NAS) Optimization
12 %
Optimization
20 %
Optimization
Automation Savings
Provisioning SLA Improvement
Data Center Access 38 %
Access Control List
(ACL)
43 %
Local/Global Server
Load Balancing
41 %
Incident Management
Problem Management
Event Management
4x Increase in Bandwidth (10Gbs > 40Gbs)
Data Center Network Compute Storage
* Single Fabric * Single Fabric
58% Cost Savings
Data Center Access
Access Control List
(ACL)
Local/Global Server
Load Balancing
21%
Cost Savings
Service Management
24. Cisco Confidential 24
CITEIS Solution Components
Network Management
APIC, PNSC, N1Kv
Cisco UCS
DC Resources
Storage Management
Cloud Management
vCenter, OpenStack
Resource
Managers
Automation
Packs
Cisco Process
Orchestrator
Prime Service
Catalog
Cisco Intelligent
Automation for Cloud
Provisioning
Automation
Self-Service—
Service Catalog
PaaS Management
OpenShift, Puppet
CITEIS API Server
MessageBus
APIC
Customer Support
Incident Mgmt, Change Mgmt
Enterprise Management
Address Mgmt, Host Mgmt
25. Cisco Confidential 25
$0
$2,000
$4,000
Legacy (rackmount); all
physical
Legacy; medium virtualization
(54%)
46/54% Legacy/UCS; 75%
Virtualized
100% UCS/Cloud; 80%
virtualization
Delivery
Time
12+ weeks 2-3 weeks 15 minutes VM 8 minutes
(self-service)
TCO Physical
Compute TCO
($/Qtr/OS
instance)
Virtualization Unified Computing Cloud
Average TCO
-37%
-27%
-27%
CITEIS Brings Agility and Cost Benefits
27. Cisco Confidential 27
IT Delivery Transformation Framework
Vertical, Disparate, and Unconnected stacks à transformed into Horizontal Integrated Services
P
L
A
N
B
U
I
L
D
O
P
E
R
A
T
E
Order
Mgmt
myCiscoPricing
Dev.
Stack
Testing
Software
Dev’ment
IDE
Software
Release
Source
Cntl Mgt.
Quality
StorageCompute Network
Database
ReplicationEntitlement Integration
App / Web
InfrastructureInfrastructure
Service
Assurance
OperationsSecurity
XaaS
PaaS
IaaS
SDaaS
28. Cisco Confidential 28
Plan
Innovation Circles
Architectural
Framework
Active Stakeholder
Involvement
Changing the Way We Work: Continuous Delivery
Develop and Build
Continuous
Integration, On-
demand
Small Teams
Cloud, ERP,
Mobile Apps
Automated Testing
Built by Developers-
No Separate Q/A
Appropriate Risk Taking
Deploy and Release
Configurable Control
Gates, Regularity
Compliance
Working Prototypes
Client Updates
Adapt and Scale
Policy Enforced Network,
Adaptive Infrastructure,
Workload Mobility
Fast Results
29. Cisco Confidential 29
Continuous Delivery
End to End Workflow for Cloud Applications
TBD
Prioritized Sprint
Product Mgr.
Scrum
Master
Developers
Plan Develop Continuous
Build
Automated
Testing
Deploy &
Release
Adapt & Scale
Source Code Management Application
Snapshot
Release Control
Gates
Development
Staging
Production
30. Cisco Confidential 30
IT Delivery Transformation
30% adoption in Q1FY15
releaseSDaaS & Vir. DB POC
LAE GA, Just In Time DB
OpenShift on Openstack POCLAE Express
CITEIS on Openstack
Express
Q1FY14
Q2FY14
Q3FY14
Q4FY14 Q1FY15
SDaaS Phase 1 (Cont. Integ + SRA)
Adoption use case prototypes
OpenShift on Openstack POC
Openstack VDC
SDaaS Phase 2 (Automated Tests)
Integrated App Development
Multi-DC LAE (High Availability)
Traditional
Network
LAE
Fabric
Plan
Build
Operate
Agile Application Development
Lightweight Application Environment
API Enabled Standard IaaS
Application Centric Infra. (ACI)
Existing
Platforms
Policy Control
Unified
Infrastructure
Scalability
APIs
Intercloud
Autonomic
Feature Rich
Continuous
Delivery
PaaS
IaaS
SDaaS
31. Cisco Confidential 31
Continuous Delivery
Develop
Branch, Merge,
Code Review
Build
Continuous Integration,
On-demand, Nightly, …
Deploy & Release
Configurable control gates
Regulatory compliance
Runtime Stacks
Programmable Network (Access)
Disposable Infrastructure
Adaptive Platforms
Test
Developer Built Unit Tests.
Virtual
Databases
PROD
STG
DEV
Cloud, ERP, and
Mobile Apps
Static Unit, Compliance, Performance, Security, Regression, tests ..
32. Cisco Confidential 32
Develop in CITEIS Cloud
Development as a Service
Platform as a Service
Source Control
Build & Review
Deploy
1. Download (Pre-configured) IDE
2. Request Application Development Stack
3. Develop, version control, test, code review, deploy without leaving the IDE
1
2
3
33. Cisco Confidential 33
Integrated Services - IT Delivery Transformation
Transform IT Delivery Services into a Strategic Competitive Advantage
(accelerate time-to-capability, pervasive quality and optimized cost of delivery)
Traditional
Network
LAE
Fabric
Plan
Build
Operate
Agile Application Development
Lightweight Application Environment
API Enabled Standard IaaS
Application Centric Infra. (ACI)
Existing
Platforms
Policy Control
Unified
Infrastructure
Scalability
APIs
Intercloud
Autonomic
Feature Rich
Continuous
Delivery
PaaS
IaaS
SDaaS
36. Cisco Confidential 36
Fully Self Contained Apps:
Portable, and Lightweight
Private Interface
App
Private Interface
App
Private Interface
App
Private Interface
App
App App
Routing + Access Policy (EPG)
(EPG) Routing +
Access Policy
(EPG) Routing +
Access Policy
(EPG) Routing +
Access Policy
(EPG) Routing +
Access Policy
OpenShift (Current) OpenShift + ACI + Apcera (Policy Mgmt)
Only the node (VM) is addressable
Individual apps are not directly accessible.
Each app has a directly addressable IP
Routing service a separate “app” by itself.
Linked
containers
Public Interface
Addressable IP Addressable IP
App
Addressable IP
App
Addressable IP
37. Cisco Confidential 37
Self Service
Elastic
Rapid
Is it ready?
Architect it
Design it
Procure it
Install it
Configure it
Secure it
QA it
Design it
Is configured
IT IS READY!
Is procured
Architect it
Is installed
Is secured
Is QA’d
Service Transformation Through PaaS
Manual
Scripted
Automated
Bundled
Integrated
Today
38. Cisco Confidential 38
Data Center Transformation
Sustained YoY TCO reduction – provisioning from days to minutes
$98,930
$66,009
$41,349
$30,729
$0
$25000
$50000
$75000
$100000
Q2 CY12 Q2 CY14 Q2/Q3 CY16Circa 2009
Virt.
Rate (%)
25%
50%
75%
100%
E2E Prov.
(Days)
15
30
45
60
E2E I+P(1) = 45 days
E2E I+P(1) = 17 days
E2E I+P(1) = 7 days
VM = 15 mins.
E2E I+P(1)
Automated
Provisioning
5%
70%
92%
Virtualization
95%
-33%
-37%
-26%
Legacy Bare Metal
based Data Center
• CITEIS Gen 2
• PaaS enablement
• Storage optimization
TCO
($ Per Qtr)
• UCS adoption
• Compute Virtualization
• ACI Network architecture
• Process automation
• Open Stack/ Open Shift
• SAN/NAS/CEPH
TCO ($ per Qtr) Virtualization Rate E2E Provisioning (Days)
39. Cisco Confidential 39Cisco Confidential 39
In partnership with:
Thank you. Visit us in the World of Solutions