The Future of APM and Why It Requires Analytics Everywhere!New Relic
Learn about New Relic's perspective on the state of IT and APM monitoring, and why managing software in today's world requires more. Patrick will discuss the value of dimensionality and context to your data, and the challenge of storing and querying that data at scale. Finally, hear directly from two of New Relic's customers, Vungle and CafePress, about their own experience and insights gained when they embraced the idea that Software Analytics is a big data problem that requires new solutions.
11 Ways Microservices & Dynamic Clouds Break Your MonitoringAbner Germanow
Every software team has its moments of truth. How does this impact the way agile developers, site reliability engineers, and IT operations teams work together? We'll break down the intricacies of modern monitoring and show you what to look for, particularly when monitoring microservices and dynamic clouds. With examples from New Relic customers, you'll learn what to look out for when preparing to conquer your digital moments of truth, master microservices, using cloud services for autoscaling, and getting your teams to work together. I also added a quick bit on quickly evaluating the security of a cloud service provider before you engage your infosec team.
The Internet of Things (IoT) is no longer hype. It?s here, delivering benefits to society and businesses in the form of higher productivity, more efficient use of existing resources, and new revenues. Realizing these benefits, however, requires recognizing and addressing the fundamental technical challenges of deploying and implementing IoT systems. Join Wind River Senior Technical Marketing Engineer Kamal Desai as he discusses and demonstrates new approaches for cloud-based development and management that provide far greater flexibility for how organizations can build and run IoT infrastructure. In this session, you will learn about:
Building applications independent of device operating system and hardware complexity
Designing, developing, and testing advanced IoT networks before deployment
Streamlining management of hundreds or thousands of IoT devices for provisioning, configuring, and monitoring
Improving business intelligence by aggregating and analyzing IoT data in Salesforce
How to See and Resolve Office 365 Performance Challenges ThousandEyes
Take control of your Office 365 deployments with ThousandEyes and learn how to monitor, detect and resolve performance issues. Find out:
- What the common misconceptions about Office 365 and how they affect performance
- Monitoring best practices for readiness, deployment and operational phases of your Office 365 rollout
- Real-world case studies explained through a demo
Outage analysis: BGP Routing Errors Ripple Across the InternetThousandEyes
How did Cloudflare, AWS, Discord and a metals manufacturer all end up in the same Internet pile-up? For nearly two hours on June 24, 2019, a BGP routing error from an ISP in Pennsylvania rippled outward across the global Internet, creating havoc and causing Cloudflare, AWS and related services like Discord and Nintendo Life to become unavailable to many users. The worst part is that it was entirely preventable.
Delivering Predictable Financial Services Applications over the Internet with...ThousandEyes
Adam Litman presents at ThousandEyes Connect in London on how Refinitiv is using ThousandEyes to help deliver exceptional digital experiences to its customers.
ThousandEyes Webinar: How to see and resolve office 365 performance challengesThousandEyes
ThousandEyes EMEA webinar from July 2nd 2019 @ 1000 UK time covering troubleshooting Office 365 applications using ThousandEyes. Presented by Ian Waters, Director of Solutions Marketing and Tim Hale, Senior Solutions Engineer.
The Future of APM and Why It Requires Analytics Everywhere!New Relic
Learn about New Relic's perspective on the state of IT and APM monitoring, and why managing software in today's world requires more. Patrick will discuss the value of dimensionality and context to your data, and the challenge of storing and querying that data at scale. Finally, hear directly from two of New Relic's customers, Vungle and CafePress, about their own experience and insights gained when they embraced the idea that Software Analytics is a big data problem that requires new solutions.
11 Ways Microservices & Dynamic Clouds Break Your MonitoringAbner Germanow
Every software team has its moments of truth. How does this impact the way agile developers, site reliability engineers, and IT operations teams work together? We'll break down the intricacies of modern monitoring and show you what to look for, particularly when monitoring microservices and dynamic clouds. With examples from New Relic customers, you'll learn what to look out for when preparing to conquer your digital moments of truth, master microservices, using cloud services for autoscaling, and getting your teams to work together. I also added a quick bit on quickly evaluating the security of a cloud service provider before you engage your infosec team.
The Internet of Things (IoT) is no longer hype. It?s here, delivering benefits to society and businesses in the form of higher productivity, more efficient use of existing resources, and new revenues. Realizing these benefits, however, requires recognizing and addressing the fundamental technical challenges of deploying and implementing IoT systems. Join Wind River Senior Technical Marketing Engineer Kamal Desai as he discusses and demonstrates new approaches for cloud-based development and management that provide far greater flexibility for how organizations can build and run IoT infrastructure. In this session, you will learn about:
Building applications independent of device operating system and hardware complexity
Designing, developing, and testing advanced IoT networks before deployment
Streamlining management of hundreds or thousands of IoT devices for provisioning, configuring, and monitoring
Improving business intelligence by aggregating and analyzing IoT data in Salesforce
How to See and Resolve Office 365 Performance Challenges ThousandEyes
Take control of your Office 365 deployments with ThousandEyes and learn how to monitor, detect and resolve performance issues. Find out:
- What the common misconceptions about Office 365 and how they affect performance
- Monitoring best practices for readiness, deployment and operational phases of your Office 365 rollout
- Real-world case studies explained through a demo
Outage analysis: BGP Routing Errors Ripple Across the InternetThousandEyes
How did Cloudflare, AWS, Discord and a metals manufacturer all end up in the same Internet pile-up? For nearly two hours on June 24, 2019, a BGP routing error from an ISP in Pennsylvania rippled outward across the global Internet, creating havoc and causing Cloudflare, AWS and related services like Discord and Nintendo Life to become unavailable to many users. The worst part is that it was entirely preventable.
Delivering Predictable Financial Services Applications over the Internet with...ThousandEyes
Adam Litman presents at ThousandEyes Connect in London on how Refinitiv is using ThousandEyes to help deliver exceptional digital experiences to its customers.
ThousandEyes Webinar: How to see and resolve office 365 performance challengesThousandEyes
ThousandEyes EMEA webinar from July 2nd 2019 @ 1000 UK time covering troubleshooting Office 365 applications using ThousandEyes. Presented by Ian Waters, Director of Solutions Marketing and Tim Hale, Senior Solutions Engineer.
SIGRed - Monitoring and Detecting with SplunkAnthony Reinke
Drew Church and Bryan Pluta of Splunk presented to the Nebraska Splunk User Group on August 13th, 2020 about SIGRed. The idea of this talk came from a blog post on July 17th on the Splunk site with a title of "Checking for SIGRed (CVE-2020-1350) and CISA ED 20-03 with Splunk (https://www.splunk.com/en_us/blog/security/checking-for-sigred-cve-2020-1350-and-cisa-eod-20-03-with-splunk.html?_lrsc=84746313-f6fe-401e-b552-47ba27adff3c). For those who haven’t heard about CVE-2020-1350, it is an unauthenticated, remote code execution (RCE) vulnerability in Microsoft Windows Domain Name System (DNS) servers. Successful exploitation allows attackers to run any code they want with local SYSTEM access. RCEs are bad vulnerabilities, unauthenticated ones are even worse. Pair this with one of the most common authentication platforms (Microsoft Active Directory), and you’re in for a world of hurt.
1. What does Predix bring to the table?
2. How is it different to Cloud Foundry and IBM Bluemix?
3. Predix service catalog. Which services can set Predix apart?
4. Top use cases and apps
5. Likely scenarios of Predix evolution
Examine common application performance problems hiding in plain sight. See how you can quickly remove the noise, pinpoint root cause and fix these problems once and for all. Watch the webinar replay: http://rvbd.ly/1QGxMBs
Why and How to Monitor App Performance in AzureIan Downard
This presentation provides a brief overview of APM solutions for the Azure cloud computing platform. We discuss three challenges unique to cloud computing which APM can address, and we summarize which APM techniques can be applied in IaaS, PaaS, and SaaS application architectures. To illustrate APM techniques for IaaS and PaaS we look at a variety APM offers in the Azure marketplace, including Riverbed AppInternals, Microsoft Application Insights, and New Relic. To illustrate APM techniques for SaaS, we look at how SharePoint Online can be instrumented using JavaScript injection. This presentation was prepared and delivered by Ian Downard to the Portland Azure User Group on March 28th, 2016, in Portland Oregon.
ThousandEyes Webinar - Clash of the CloudsThousandEyes
ThousandEyes EMEA webinar on Tuesday January 14th, 2020 at 1000 GMT presented by Ian Waters, Senior Director, EMEA Marketing and Jack Riach, Solutions Engineer on the Public Cloud Benchmark report comparing performance globally of AWS, Azure, GCP, AliCloud and IBM Cloud
Ensuring the compliance, resiliency, and availability of business-critical ne...Riverbed Technology
This presentations highlights how the SteelCentral Network Performance and Configuration Management (NPCM) product family reduces the time and effort spent manually collecting and reconciling data from multiple sources to document the status, dependencies and configuration of the enterprise network by helping separate teams share information.
• Reduce network outages with customized, automated audit reports, detecting policy violations before they affect service availability
• Reduce outages caused by misconfiguration for infrastructure that’s too important and too complex to be managed manually, using automated network configuration analysis
• Plan for network resiliency despite network changes and growth without making any risky changes to the production network
Learn more at: http://www.riverbed.com/npm
In a world of business that has increasingly become more and more distributed, and with our relationship with data having changed, we need to begin expanding the way we look at innovation in IT from solely focusing on the data center, to considering the requirements, challenges and costs associated with the edge. This presentation focuses on extending data center investments to all remote sites, and new opportunities to connect IT with today's business requirements through a Software-Defined Edge.
http://Predixtransform.com
This session will provide an in-depth look at Predix availability and reliability from a cloud infrastructure and support perspective. We will also discuss the Predix approach for managing industrial data at scale.
Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...Infostretch
Remember how apps used to be? They connected to the internet and incorporated one device at most. Sure, testers had to factor in performance under different usage conditions, but we had great testing toolsets in place to deal with that. Fast forward to the present. These days sensors enable much more diverse functionality from our connected devices or smartphones and that means mobile app testing is no longer just about testing the app. Smartphones now include many sensors that interface with the ecosystem around them. These software and hardware components can all too easily play havoc with the apps themselves. During his presentation, Sivakumar Anna will share the complexity of peripherals testing. He will demonstrate sensor testing scenarios including location, camera, TouchID and Bluetooth. Drawing on his years of experience in this testing domain, Sivakumar will describe current industry best practices, specific challenges and how to overcome them. He will illustrate these unique issues with a case study involving device peripheral automation for one the leading medical device & solution providers.
Ready, Set, SD-WAN: Best Practices for Assuring Branch ReadinessThousandEyes
ThousandEyes EMEA webinar run on Tuesday October 29th at 1000 GMT. Presented by Ian Waters, Senior Director of EMEA Marketing and Tim Hale, Senior Solutions Engineer. Covering SD-WAN visibility best practices and featuring a live demo of ThousandEyes monitoring a Cisco Viptela SD-WAN.
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...Riverbed Technology
Digital Transformation (DX) is driving organizations to adopt Digital Experience Management (DEM) best practices. Companies hoping to provide the best digital experiences to their end users are often met with challenges arising from disjointed point solutions and a lack of unified insights and management tools across all infrastructure types.
With problematic application lifecycles, ineffective tools, and complex application delivery architectures, enterprises must rethink their existing tools and methodologies to ensure their digital channels, applications, and services are optimized for business and end-user success.
This Riverbed presentation covers the following topics:
- What is Digital Experience Management (DEM)?
- Why DEM is important to organizations?
- What roadblocks and hurdles exist?
- How Riverbed's unified DEM solution is different
- What are some next steps you can take to achieve success with DEM?
Find out more about Digital Experience Management with Riverbed here http://rvbd.ly/2y0MHpt
Riverbed conducted a remote office/branch office IT survey at EMC World on May 3, 2016. The surveys were taken on the show floor and 183 people took part. The number of employees at their locations range from less than 500 to over 10,000. http://rvbd.ly/1YvjwTI
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...Livingstone Advisory
How should we navigate the pitfalls of IT’s newest ‘big opportunity’?
For individuals and small business, Cloud computing via the Internet offers unprecedented access to systems, software and technologies, previously restricted to the corporate world, at little or no cost.
But for mid-sized and large organisations, the reality of adopting Cloud computing presents a whole new set of costs, risks and governance implications, quite different to those in traditional in-house IT systems.
This public lecture provides a concise, plain English overview of Cloud computing and what it means for businesses in Australia. It explores the privacy, security, commercial, regulatory, cost, risk and internal governance challenges that organisations, as well as the wider community, should be aware of.
How to Build Out a Tech Eco-System | Dan Cregg | Lunch & Learn UCICove
About UCI Applied Innovation:
UCI Applied Innovation is a dynamic, innovative central platform for the UCI campus, entrepreneurs, inventors, the business community and investors to collaborate and move UCI research from lab to market.
About the Cove @ UCI:
To accelerate collaboration by better connecting innovation partners in Orange County, UCI Applied Innovation created the Cove, a physical, state-of-the-art hub for entrepreneurs to gather and navigate the resources available both on and off campus. The Cove is headquarters for UCI Applied Innovation, as well as houses several ecosystem partners including incubators, accelerators, angel investors, venture capitalists, mentors and legal experts.
Follow us on social media:
Facebook: @UCICove
Twitter: @UCICove
Instagram: @UCICove
LinkedIn: @UCIAppliedInnovation
For more information:
cove@uci.edu
http://innovation.uci.edu/
SIGRed - Monitoring and Detecting with SplunkAnthony Reinke
Drew Church and Bryan Pluta of Splunk presented to the Nebraska Splunk User Group on August 13th, 2020 about SIGRed. The idea of this talk came from a blog post on July 17th on the Splunk site with a title of "Checking for SIGRed (CVE-2020-1350) and CISA ED 20-03 with Splunk (https://www.splunk.com/en_us/blog/security/checking-for-sigred-cve-2020-1350-and-cisa-eod-20-03-with-splunk.html?_lrsc=84746313-f6fe-401e-b552-47ba27adff3c). For those who haven’t heard about CVE-2020-1350, it is an unauthenticated, remote code execution (RCE) vulnerability in Microsoft Windows Domain Name System (DNS) servers. Successful exploitation allows attackers to run any code they want with local SYSTEM access. RCEs are bad vulnerabilities, unauthenticated ones are even worse. Pair this with one of the most common authentication platforms (Microsoft Active Directory), and you’re in for a world of hurt.
1. What does Predix bring to the table?
2. How is it different to Cloud Foundry and IBM Bluemix?
3. Predix service catalog. Which services can set Predix apart?
4. Top use cases and apps
5. Likely scenarios of Predix evolution
Examine common application performance problems hiding in plain sight. See how you can quickly remove the noise, pinpoint root cause and fix these problems once and for all. Watch the webinar replay: http://rvbd.ly/1QGxMBs
Why and How to Monitor App Performance in AzureIan Downard
This presentation provides a brief overview of APM solutions for the Azure cloud computing platform. We discuss three challenges unique to cloud computing which APM can address, and we summarize which APM techniques can be applied in IaaS, PaaS, and SaaS application architectures. To illustrate APM techniques for IaaS and PaaS we look at a variety APM offers in the Azure marketplace, including Riverbed AppInternals, Microsoft Application Insights, and New Relic. To illustrate APM techniques for SaaS, we look at how SharePoint Online can be instrumented using JavaScript injection. This presentation was prepared and delivered by Ian Downard to the Portland Azure User Group on March 28th, 2016, in Portland Oregon.
ThousandEyes Webinar - Clash of the CloudsThousandEyes
ThousandEyes EMEA webinar on Tuesday January 14th, 2020 at 1000 GMT presented by Ian Waters, Senior Director, EMEA Marketing and Jack Riach, Solutions Engineer on the Public Cloud Benchmark report comparing performance globally of AWS, Azure, GCP, AliCloud and IBM Cloud
Ensuring the compliance, resiliency, and availability of business-critical ne...Riverbed Technology
This presentations highlights how the SteelCentral Network Performance and Configuration Management (NPCM) product family reduces the time and effort spent manually collecting and reconciling data from multiple sources to document the status, dependencies and configuration of the enterprise network by helping separate teams share information.
• Reduce network outages with customized, automated audit reports, detecting policy violations before they affect service availability
• Reduce outages caused by misconfiguration for infrastructure that’s too important and too complex to be managed manually, using automated network configuration analysis
• Plan for network resiliency despite network changes and growth without making any risky changes to the production network
Learn more at: http://www.riverbed.com/npm
In a world of business that has increasingly become more and more distributed, and with our relationship with data having changed, we need to begin expanding the way we look at innovation in IT from solely focusing on the data center, to considering the requirements, challenges and costs associated with the edge. This presentation focuses on extending data center investments to all remote sites, and new opportunities to connect IT with today's business requirements through a Software-Defined Edge.
http://Predixtransform.com
This session will provide an in-depth look at Predix availability and reliability from a cloud infrastructure and support perspective. We will also discuss the Predix approach for managing industrial data at scale.
Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...Infostretch
Remember how apps used to be? They connected to the internet and incorporated one device at most. Sure, testers had to factor in performance under different usage conditions, but we had great testing toolsets in place to deal with that. Fast forward to the present. These days sensors enable much more diverse functionality from our connected devices or smartphones and that means mobile app testing is no longer just about testing the app. Smartphones now include many sensors that interface with the ecosystem around them. These software and hardware components can all too easily play havoc with the apps themselves. During his presentation, Sivakumar Anna will share the complexity of peripherals testing. He will demonstrate sensor testing scenarios including location, camera, TouchID and Bluetooth. Drawing on his years of experience in this testing domain, Sivakumar will describe current industry best practices, specific challenges and how to overcome them. He will illustrate these unique issues with a case study involving device peripheral automation for one the leading medical device & solution providers.
Ready, Set, SD-WAN: Best Practices for Assuring Branch ReadinessThousandEyes
ThousandEyes EMEA webinar run on Tuesday October 29th at 1000 GMT. Presented by Ian Waters, Senior Director of EMEA Marketing and Tim Hale, Senior Solutions Engineer. Covering SD-WAN visibility best practices and featuring a live demo of ThousandEyes monitoring a Cisco Viptela SD-WAN.
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...Riverbed Technology
Digital Transformation (DX) is driving organizations to adopt Digital Experience Management (DEM) best practices. Companies hoping to provide the best digital experiences to their end users are often met with challenges arising from disjointed point solutions and a lack of unified insights and management tools across all infrastructure types.
With problematic application lifecycles, ineffective tools, and complex application delivery architectures, enterprises must rethink their existing tools and methodologies to ensure their digital channels, applications, and services are optimized for business and end-user success.
This Riverbed presentation covers the following topics:
- What is Digital Experience Management (DEM)?
- Why DEM is important to organizations?
- What roadblocks and hurdles exist?
- How Riverbed's unified DEM solution is different
- What are some next steps you can take to achieve success with DEM?
Find out more about Digital Experience Management with Riverbed here http://rvbd.ly/2y0MHpt
Riverbed conducted a remote office/branch office IT survey at EMC World on May 3, 2016. The surveys were taken on the show floor and 183 people took part. The number of employees at their locations range from less than 500 to over 10,000. http://rvbd.ly/1YvjwTI
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...Livingstone Advisory
How should we navigate the pitfalls of IT’s newest ‘big opportunity’?
For individuals and small business, Cloud computing via the Internet offers unprecedented access to systems, software and technologies, previously restricted to the corporate world, at little or no cost.
But for mid-sized and large organisations, the reality of adopting Cloud computing presents a whole new set of costs, risks and governance implications, quite different to those in traditional in-house IT systems.
This public lecture provides a concise, plain English overview of Cloud computing and what it means for businesses in Australia. It explores the privacy, security, commercial, regulatory, cost, risk and internal governance challenges that organisations, as well as the wider community, should be aware of.
How to Build Out a Tech Eco-System | Dan Cregg | Lunch & Learn UCICove
About UCI Applied Innovation:
UCI Applied Innovation is a dynamic, innovative central platform for the UCI campus, entrepreneurs, inventors, the business community and investors to collaborate and move UCI research from lab to market.
About the Cove @ UCI:
To accelerate collaboration by better connecting innovation partners in Orange County, UCI Applied Innovation created the Cove, a physical, state-of-the-art hub for entrepreneurs to gather and navigate the resources available both on and off campus. The Cove is headquarters for UCI Applied Innovation, as well as houses several ecosystem partners including incubators, accelerators, angel investors, venture capitalists, mentors and legal experts.
Follow us on social media:
Facebook: @UCICove
Twitter: @UCICove
Instagram: @UCICove
LinkedIn: @UCIAppliedInnovation
For more information:
cove@uci.edu
http://innovation.uci.edu/
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential_e
Can we spend less on IT, work less, but accomplish more?
Join us at The Ritz to discover how Exponential-e’s innovative hybrid services combine the best of traditional IT competencies, with world leading connectivity, Cloud and communication services - and make the impossible, possible.
Our CEO, Lee Wade, will be amongst a selection of key speakers, who will share their views on how innovations in Cloud services can be combined with advanced networking technology and service provider experience to deliver the real benefits businesses have been seeking.
We'll seek to explain how you can spend less on IT, work less and still accomplish more. We'll demonstrate why your Cloud is only as good as your network, and how you can transition to the Cloud efficiently and securely.
Seems too good to be true? Come and see for yourself.
View our Cloud video and more on YouTube: https://www.youtube.com/user/Exponentialltd
Robert Mercier, Senior Network Services Lead at Next Dimension, Reviews IIoT and its impact on the Manufacturing sector. He specifically addresses the value of IT/OT convergence; something that is highly valuable for the Automotive Manufacturing space.
Reshaping Business Through IoT: Key Technology Factors to ConsiderEurotech
The IoT is the manifestation that the raw material of the information age is datum. Data are the new source of innovation and the lever to achieve business sustainability. By extracting data from assets and products, companies can become more efficient through a strategic rethinking of their value chains and business processes. In so doing, companies will add the required readiness to shift from products to services, and eventually enter in the outcome economy. To truly embrace the digital transformation, organizations need to collect actionable data from their assets, processes, and products and then connect the OT (Operational Technology) world where data are generated to IT (Information Technology) world where data are consumed. Beside predictive maintenance and asset usage maximization/optimization the benefits are huge: the transformation of any business into a smart business, increasing competitiveness also in mature markets; the creation of new innovative products and services; and the enablement of service prosumerization.
To make this happen there are some key technology factors to consider during the implementation of an IoT architecture.
meet2016: Reshaping Business Through IoT: Key Technology Factors to ConsiderRoberto Siagri
The IoT is the manifestation that the raw material of the information age is datum. Data are the new source of innovation and the lever to achieve business sustainability. By extracting data from assets and products, companies can become more efficient through a strategic rethinking of their value chains and business processes. In so doing, companies will add the required readiness to shift from products to services, and eventually enter in the outcome economy. To truly embrace the digital transformation, organizations need to collect actionable data from their assets, processes, and products and then connect the OT (Operational Technology) world where data are generated to IT (Information Technology) world where data are consumed. Beside predictive maintenance and asset usage maximization/optimization the benefits are huge: the transformation of any business into a smart business, increasing competitiveness also in mature markets; the creation of new innovative products and services; and the enablement of service prosumerization.
To make this happen there are some key technology factors to consider during the implementation of an IoT architecture.
You are already the Duke of DevOps: you have a master in CI/CD, some feature teams including ops skills, your TTM rocks ! But you have some difficulties to scale it. You have some quality issues, Qos at risk. You are quick to adopt practices that: increase flexibility of development and velocity of deployment. An urgent question follows on the heels of these benefits: how much confidence we can have in the complex systems that we put into production? Let’s talk about the next hype of DevOps: SRE, error budget, continuous quality, observability, Chaos Engineering.
AWS re:Invent 2016: From Dial-Up to DevOps - AOL’s Migration to the Cloud (DE...Amazon Web Services
AOL originally provided dial-up service to millions of people. Today, AOL powers advertising and media experiences for the web’s top destinations. How do you maintain observability and reliability to both business and technical teams for high-traffic services in a dynamic infrastructure? Join us as we discuss AOL’s DevOps journey. We will dive into its engineering culture, automation, and monitoring best practices that have allowed AOL to successfully reinvent their infrastructure, as they moved from globally distributed data centers to the AWS Cloud. Session sponsored by Datadog.
AWS Competency Partner
Onboarding a Historical Company on the Cloud Journey (IT Camp 2018)Marius Zaharia
This session, oriented on governance and strategy, will unveil you the challenges we have encountered and the solutions we've applied to succeed in onboarding one of the most important public companies in France to the Azure cloud. Real life customer feedback and insights here.
7 Tips & Tricks to Having Happy Customers at ScaleNew Relic
Customer expectations are at an all-time high, making it more and more difficult for companies to please them. Companies who understand their customers well are the ones who rise to the top over their competitors. New Relic, provider of real-time insights for software-driven businesses has this formula figured out. Roger Scott, New Relic's EVP and Chief Customer Officer shares his 7 tips and tricks for keeping your customers happy— and how to do so at a large scale.
7 Tips & Tricks to Having Happy Customers at ScaleNew Relic
Customer expectations are at an all-time high, making it more and more difficult for companies to please them. Companies who understand their customers well are the ones who rise to the top over their competitors. New Relic, provider of real-time insights for software-driven businesses has this formula figured out. Roger Scott, New Relic's EVP and Chief Customer Officer shares his 7 tips and tricks for keeping your customers happy— and how to do so at a large scale.
FutureStack Tokyo 19 -[New Relic テクニカル講演]モニタリングと可視化がデジタルトランスフォーメーションを救う! - サ...New Relic
New Relicの目指していることの一つが、DevOpsを推進することを手助けし、デジタルトランスフォーメーションを成功させることです。DevOpsにとってなぜモニタリングと可視化が重要なのか、またどのようなデータを管理する必要があるのかを考察した上で、New Relicで実現できる例をデモを交え、技術からビジネスまで幅広い観点でご紹介します。
New Relic 株式会社
ソリューション コンサルタント
佐々木 千枝
FutureStack Tokyo 19_インサイトとデータを組織の力にする_株式会社ドワンゴ 池田 明啓 氏New Relic
サービス、プロダクトを”いつまでも”継続する為には、インサイトとデータを組織の力とする必要があります。
私達が開発、運用するドワンゴジェイピーは、間もなく二十周年を迎えます。決して順風満帆ではなかったシステムの遍歴と New Relic の導入方法を交え、継続できた理由の一つ、インサイトとデータを組織の力へ変換する方法をご紹介します。
Three Monitoring Mistakes and How to Avoid ThemNew Relic
The days of parsing log files and building out homebrewed monitoring tools are (thankfully) coming to an end. Yet as those outdated techniques begin to fade, a whole new set of challenges have arisen around employing and running modern monitoring solutions.
Discover how New Relic can help turn monitoring blunders into intelligent problem solving, including how to avoid making common mistakes like:
- Not monitoring the whole system
- Monitoring arbitrary things in your system
- Making your monitoring part of the problem
Intro to Multidimensional Kubernetes MonitoringNew Relic
As a Kubernetes environment grows and becomes more complex, it gets harder to answer some very basic—but very important—questions. Questions like: What is the health of my cluster? What is the hierarchy and the health of the elements (nodes, pods, containers, and applications) within my cluster? In order to effectively manage the health and performance of your Kubernetes environments—at any scale and any level of complexity—it’s essential you have immediate, useful answers to these questions.
Our Kubernetes cluster explorer was designed to give you a multi-dimensional representation of your clusters—giving you the ability to drill down into Kubernetes data and metadata in a high-fidelity, curated UI.
Understanding Microservice Latency for DevOps Teams: An Introduction to New R...New Relic
Distributed tracing is designed to give DevOps teams an easy way to capture, visualize, and analyze traces through complex architectures—including architectures that use both monoliths and microservices. And, by leveraging New Relic Applied Intelligence capabilities, you can easily highlight anomalies within a trace for more faster resolution.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Essentials of Automations: Optimizing FME Workflows with Parameters
The Transformation of Healthcare.gov: Two years of innovation in how our government serves its citizens
1. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 1
Transformation of Healthcare.gov
1
Sean O’Neil, Optum Technology
2. The Transformation of Healthcare.gov
Two years of innovation in how our government serves its citizens
Sean O’Neil
Optum Technology
3. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 3
Optum joins the .war room
• When the launch of Healthcare.gov ran into troubles, CMS looked for
help from the tech sector and from Optum.
• QSSI, an Optum owned company, was named Master System
Integrator.
• We held the MSI role for the next 24 months.
This story is how those
events have transformed our
Public Sector technology in
amazing ways.
4. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 4
October 2013 - What went wrong?
5. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 5
October 2013 - What went wrong?
• Nothing special. It was just like most IT projects today.
• There’s no need to cover all the details because you’ve all experienced
them yourself.
• The following list will be déjà vu for anyone that has worked in complex
organizations:
6. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 6
Problems we’ve seen over and over…
Processes missing: change, incident, problem, config, release, job control..
Automation and Monitoring missing.
Load Testing inadequate.
Unclear lines of responsibility.
A high profile customer with high expectations.
Technology change approval process complex and bureaucratic.
Functional requirements changed at the last minute.
Hundreds of serious defects known at launch.
“Reference Architecture” overly and unnecessarily complex”.
COTS software used inappropriately.
7. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 7
Partial list of key technology fixes:
• Turn off transparent huge pages.
• Turn down excessive logging (Layer 7, Log4j x 4, firewall).
• Fix memory leaks.
• Strategically replace small VMs with large VMs.
• Fix data cache priming procedure.
• Basic Apache worker tuning.
• Change helpdesk interface to prevent locking on the whole portal.
• Mark Logic xquery tuning (id generator).
• Load balancing problems everywhere (introduce F5s and tuned distribution algorithms).
• Physical tuning:
– Placement of the Mark Logic forests within the NAS.
– Spread hot spots around the compute pools.
– Breaking out Mark Logic data and query nodes.
– Moving VMs to consolidate subnets.
8. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 8
Partial list of process and culture changes:
1) Verbal communication is OK.
2) SOPs and pre-approved changes.
3) Perfection is an illusion.
4) Problem Management on a 12 hour cycle.
5) Diversity in thought is strength.
6) The passive voice (and passive thinking!) is too slow.
9. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 9
The Rules of the .war room
10. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 10
The Rules of the .war room
1) The .war room is for solving problems, not shifting blame.
2) The ones who should be doing the talking are the people who know
the most about an issue, not the ones with the highest rank.
3) We need to stay focused on the most urgent issues - things that will
hurt us in the next 24 – 48 hours.
11. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 11
• The problems that plagued healthcare.gov weren’t anything
special.
• But the rescue of the site was the spark of a new revolution
in IT that is transforming our public sector.
• It’s not just “stopping another healthcare.gov”, it’s about
embracing cutting edge technology and methods!
12. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 12
Our government joins the 21st Century
The Past The Future is Now
Proprietary private clouds Public and hybrid clouds
Expensive proprietary hardware (Oracle Exadata) Amazon EC2
Expensive RDBMS (Oracle) MySQL – MariaDB
Expensive on premise monitoring (Tivoli) New Relic APM
Expensive decision support systems (CA Capacity
Manager)
New Relic Insights
Java Application Servers Node.js and Nginx
No automation Jenkins, Puppet
“Cold stand-by” datacenter for Disaster Recovery Multiple EC2 availability zones, geo-dispersed datacenters,
Akamai GTM
Off-the-shelf, shrink-wrapped “bloatware” Roll your own. Use Open Source.
Static content hosted in datacenters, backed by application
servers.
Dynamic, interactive JavaScript content hosted in Akamai.
Limited visibility into customer behavior End user analytics, A/B Testing
13. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 13
New Relic Custom Plugins drive technology advances
• Roll your own and community sponsored plugins allowed us freedom in our
technology choices because we knew we could monitor it.
• Quickly roll out new monitoring to respond to surprises in production.
Community versions Developed by HC.gov team
• Nginx • Terracotta
• F5 LTM • CA Layer 7 XML Gateway
• Apache HTTP Server • NFS
• EC2 • Chartbeat
• Ehcache • Gluster
• MS SQL • RedHat Kernel
• Node.js • LDAP
• Oracle Identity Manager
• MarkLogic
14. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 14
The Public sector using Public Clouds
• The cloud is a wonderful place, right?
–Leverage the cloud for cheap capacity
• We’re all paying for it… you want the Government to use your money
wisely, right?
–Scale up for “Black Friday” scenarios
• The last day of Healthcare.gov enrollment is 10x volume burst from day
one.
–Scale down after the surge to save your money.
15. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 15
Are public clouds secure?
• Securing applications in of public clouds is top priority!
–Remediated with secure network access using dedicated hardware
–Hardened server images
–Multiple layers of threat detection / prevention, data loss prevention,
strong encryption everywhere. (…and lots of other stuff I won’t talk
about!!)
16. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 16
Hybrid Clouds – The Best of Both Worlds
• Because moving everything to the cloud is hard and
expensive.
–Some technology doesn’t work well in the cloud (yet)
• Mark Logic still needs big iron.
• Move assets to the cloud as they are ready.
17. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 17
A Case Study: The Scalable Login System
• Oracle Identity Management Suite was the source of many problems.
An expensive and complex COTS product.
• Replaced with the Scalable Login System
Node.js and Maria DB
Amazon EC2, S3, ELB
End of
Year One
End of
Year Two
SLS
currently
Logins per
sec
53 154 346
Accounts
per hour
60,000 120,000 132,000
18. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 18
A Case Study: App 2.0
• We found 70% of applications submitted the first year were “simple”.
• Simple apps could be completed in less than 16 steps.
• For year two, we created App 2.0
Year One
“Classic”
Year Two
App 2.0
Application
submittal
time
40 minutes
average for
all apps.
10 minutes
Steps per
application
70+ 16 steps
NGNIX, Node.js and Maria DB
Calls into the restful layer of the
“classic” Healthcare.gov system.
No changes required to existing
system.
19. Confidential property of Optum. Do not distribute or reproduce without express permission from Optum. 19
The United States Digital Service
• A few of the original members of the Healthcare.gov rescue team have formed
a new team within the government to transform it from the inside out.
• Change Agents: USDS members are embedded within select agencies.
• Change the culture.
• Change the technology.
• Oversight of agency technology budgets.
• You can help!
https://www.whitehouse.gov/digital/united-states-digital-service
Hi, I’m Sean O’Neil, from Optum Technology – the services business line within UnitedHealth Group. I’m here to tell you a little known story of how the Healthcare.gov debacle has transformed the technology landscape of our government.
Back in October, 2013, during the problematic initial launch of Healthcare.gov, CMS (the Center for Medicare and Medicaid Services) looked for help from the tech sector and from Optum. QSSI, one of the subcontractors on the Federal Exchange project, had been more successful than some of the other subcontractors, and so was named Master System Integrator.
This is the point in my speech where I usually disappoint people. They want to hear all the stupid things that everyone thinks must have happened. But that was not the case. (quick slide)
The problems we had were just like any of the problems you’ve experienced yourself. (quick slide)
Take a look at this list. These are things you’ve all experienced before. To go over this list, line by line would be to miss the point: that the problems weren’t anything special. Maybe the volume of problems was! It seemed that anything that could be broken, was broken. But I often disappoint people by telling them that there wasn’t any single mistake.
And so it is true for the fixes. Also, very straightforward. Things we’ve all done before. Maybe special in the respect that we had so many things we had to fix in such a short period of time!
However, I will pause to go over these changes as I see them as even more important than the technology fixes. Only by radically shaking up the culture of the .war room, were we able to make the progress necessary – and then sustain that progress over the next 24 months. This is also key to the transformation currently underway in how the Federal government approaches IT.
Made famous by Mikey Dickerson in his article in Time. You may have heard these before. These were revolutionary ideas when we came to the .war room and needed to make rapid progress in a very chaotic situation.
“ in the words of Mikey Dickerson: There are plenty of other venues where people devote their creative energies to shifting blame.”
No badges. No titles.
This is just a small list. Also using an enterprise implementation of Jira and Github. Pagerduty, Optimizely, Chartbeat, Geckoboard and Mixpanel
We were able to tune the COTS product to 3x original capability. But that was as far as we could go. Using the new architecture approach, we created a system of nearly limitless throughput capabilities. I can’t show the architecture picture. I would love to – but it’s confidential. However, imagine any of the AWS, hybrid cloud apps you’re working on now and you’re on the right track!
We were able to tune the COTS product to 3x original capability. But that was as far as we could go. Using the new architecture approach, we created a system of nearly limitless throughput capabilities. I can’t show the architecture picture. I would love to – but it’s confidential. However, imagine any of the AWS, hybrid cloud apps you’re working on now and you’re on the right track!