The document discusses securing Docker environments with Vulnerability Advisor in IBM Bluemix Container Service. It provides an overview of security concerns with Docker containers, introduces IBM Bluemix Container Service and its DevSecOps and Vulnerability Advisor features. Vulnerability Advisor scans Docker images and containers for vulnerabilities and policy violations and provides recommendations to remediate issues.
Microservice Builder: A Microservice DevOps Pipeline for Rapid Delivery and P...David Currie
Presentation from IBM InterConnect 2017.
Abstract: Acceleratate your microservice delivery and promotion with an out-of-box DevOps pipeline! In this session, you'll learn how to use the Project Liber8 DevOps pipeline. We will explore its anatomy, operation, visualization, customization and ecosystem integration. We will further examine its use in deploying to IBM Cloud and on-premise deployments. A live demo will be used to reinforce concepts.
Client Deployment of IBM Cloud Private (Think 2019 Session 5964A)Yong Feng
This document provides guidance on planning and designing IBM Cloud Private deployments. It discusses key architecture decisions around high availability, workloads, security and more. It also covers topics like network topology, storage options, infrastructure providers, configuration of management services, and examples for large scale, multi-tenant and air-gapped environments. The goal is to help customers successfully plan their specific IBM Cloud Private architecture based on their requirements.
#8311: Transform the Enterprise with IBM Cloud PrivateMichael Elder
Does your organization need to improve development agility and operational efficiency? Does it also need to accelerate the delivery of applications to market? Bottom line: do you need to become cloud native with your application development, but face security and compliance challenges that limit your adoption of public cloud? The enterprise needs a platform on which it can create new, cloud native applications, modernize and optimize existing ones, and gain access to capabilities in public cloud for secure integration with applications being developed behind the firewall. The new IBM Cloud Private helps your organization meet these enterprise challenges. Come learn more about IBM Cloud Private and how you can leverage it.
Presented at IBM Think 2018.
How to Adopt Docker Within Your Enterprise Using IBM UrbanCode Deploy (Interc...Michael Elder
In this session, we will discuss how to incorporate Docker into your Continious Delivery pipeline. We will highlight challenges that enterprises can encounter when adopting Docker, including image management, promotion and configuration management. We will discuss how Docker applications or components can compliment existing traditional IT architectures, and will perform a live demonstration of the Docker/IBM UrbanCode capabilities to deploy Docker containers into local Docker Runtimes, or to IBM Container Services on Bluemix.
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds - UrbanCod...Michael Elder
Provides an introduction to different types of workloads, delivery approaches, and delivery scenarios for combining UrbanCode Deploy and IBM DevOps Services.
Improving Software Delivery with DevOps & Software Defined EnvironmentsMichael Elder
Introducing UrbanCode Deploy with Patterns - based on OpenStack technology, UCD with Patterns enables you to quickly leverage software defined environments based on OpenStack and other off premise clouds to improve your software delivery lifecycle.
Provides an overview of DevOps techniques and principles in applying DevOps practices to IBM Commerce. Includes details of applying UrbanCode Deploy to manage IBM Commerce assets
Microservice Builder: A Microservice DevOps Pipeline for Rapid Delivery and P...David Currie
Presentation from IBM InterConnect 2017.
Abstract: Acceleratate your microservice delivery and promotion with an out-of-box DevOps pipeline! In this session, you'll learn how to use the Project Liber8 DevOps pipeline. We will explore its anatomy, operation, visualization, customization and ecosystem integration. We will further examine its use in deploying to IBM Cloud and on-premise deployments. A live demo will be used to reinforce concepts.
Client Deployment of IBM Cloud Private (Think 2019 Session 5964A)Yong Feng
This document provides guidance on planning and designing IBM Cloud Private deployments. It discusses key architecture decisions around high availability, workloads, security and more. It also covers topics like network topology, storage options, infrastructure providers, configuration of management services, and examples for large scale, multi-tenant and air-gapped environments. The goal is to help customers successfully plan their specific IBM Cloud Private architecture based on their requirements.
#8311: Transform the Enterprise with IBM Cloud PrivateMichael Elder
Does your organization need to improve development agility and operational efficiency? Does it also need to accelerate the delivery of applications to market? Bottom line: do you need to become cloud native with your application development, but face security and compliance challenges that limit your adoption of public cloud? The enterprise needs a platform on which it can create new, cloud native applications, modernize and optimize existing ones, and gain access to capabilities in public cloud for secure integration with applications being developed behind the firewall. The new IBM Cloud Private helps your organization meet these enterprise challenges. Come learn more about IBM Cloud Private and how you can leverage it.
Presented at IBM Think 2018.
How to Adopt Docker Within Your Enterprise Using IBM UrbanCode Deploy (Interc...Michael Elder
In this session, we will discuss how to incorporate Docker into your Continious Delivery pipeline. We will highlight challenges that enterprises can encounter when adopting Docker, including image management, promotion and configuration management. We will discuss how Docker applications or components can compliment existing traditional IT architectures, and will perform a live demonstration of the Docker/IBM UrbanCode capabilities to deploy Docker containers into local Docker Runtimes, or to IBM Container Services on Bluemix.
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds - UrbanCod...Michael Elder
Provides an introduction to different types of workloads, delivery approaches, and delivery scenarios for combining UrbanCode Deploy and IBM DevOps Services.
Improving Software Delivery with DevOps & Software Defined EnvironmentsMichael Elder
Introducing UrbanCode Deploy with Patterns - based on OpenStack technology, UCD with Patterns enables you to quickly leverage software defined environments based on OpenStack and other off premise clouds to improve your software delivery lifecycle.
Provides an overview of DevOps techniques and principles in applying DevOps practices to IBM Commerce. Includes details of applying UrbanCode Deploy to manage IBM Commerce assets
The Bluemix Triple Threat: Cloud Foundry, Containers and Virtual Machines IBM Bluemix is pushing the envelope on what is possible with cloud computing. From its Platform-as-a-Service Cloud Foundry implementation to its Infrastructure-as-a-Service OpenStack implementation to its Docker-based container solution to its 100+ services, Bluemix is revolutionizing application development and deployment on the cloud. Come and see how easy it is to build a hybrid, composite application that takes advantage of Instant runtimes, containers and virtual machines....and now, OpenWhisk!
IBM Softlayer Bluemix Marketplace
API Economy
Infrastructure as a Service
Platform as a Service
Software as a Service
IaaS PaaS SaaS
Register for Bluemix at http://ibm.biz/BluemixSBSS
See Softlayer at http://ibm.biz/SBSlideShareSL
Join the Marketplace at http://ibm.biz/SBSlideShareMP
1. Bluemix is IBM's cloud platform that provides an open innovation platform to build, deploy, and manage applications anywhere through public, private, and on-premises options.
2. It delivers flexible compute options including containers and virtual machines and a catalog of over 100 services to extend applications.
3. Bluemix offers deployment options like public, dedicated, and local environments to meet enterprise security, compliance, and infrastructure needs while fostering innovation.
Deployment Automation for Hybrid Cloud and Multi-Platform EnvironmentsIBM UrbanCode Products
This document discusses how IBM's UrbanCode Deploy product can be used to automate application deployments across hybrid cloud and multi-platform environments. It provides examples of how UrbanCode Deploy supports deploying applications to systems like IBM z/OS, distributed systems, private clouds, public clouds and PaaS platforms in an automated and unified manner using patterns and templates. The document also discusses reference architectures and case studies for implementing continuous delivery pipelines spanning both on-premise and cloud infrastructures.
Developing for Hybrid Cloud with BluemixRoberto Pozzi
This document discusses two ways to integrate an IBM i program with a Bluemix application using REST services. The first way uses WebSphere Application Server Liberty Profile to expose a REST service that calls the IBM i program. The second way uses Cast Iron Live to expose an API that calls a REST service behind the firewall, which is then consumed by a Cloud Integration Service in Bluemix. Both options allow developers to integrate existing IBM i assets with new applications in Bluemix.
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointHyTrust
Virtualizing more of an organization's workloads presents both opportunities and risks. As more mission-critical workloads are virtualized, security and compliance become greater priorities. Purpose-built solutions that provide security, visibility, and control over virtual infrastructure and assets are needed. Intel, HyTrust, and McAfee are partnering to provide comprehensive solutions through technologies like Intel TXT, the HyTrust Appliance, and McAfee security products to help organizations securely virtualize more workloads while improving their security posture and compliance.
Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise AppsMichael Elder
Brad Topol & Michael Elder, IBM
“12 Factor” is a software methodology for building scalable microservice applications that provides best practices designed to enable applications to be built with portability, resilience, and scalability when deployed to the web. In this talk we provide an overview of the 12 Factor methodology and describe how the core constructs provided by Kubernetes can be leveraged to support the 12 factors for scalable web apps. In this talk we will provide live demonstrations of how Kubernetes can support 12 Factor for not only newer cloud native applications, but also for legacy enterprise middleware applications that include stateful and transactional workloads.
An architect’s guide to leveraging your incumbencyMichael Elder
O'Reilly Software Architecture Conference 2018 (London)
Continuous delivery for 12-factor Microservices works because it’s by design. When you can architect a solution for continuous delivery, you control all the angles but what do you do when you don’t have that luxury? This session will highlight how modernizing existing IT infrastructure with containers enables you to manage change through continuous delivery and reduce ongoing operational costs.
Abstract
While the industry has promoted a dramatic trend to build new, improved styles of architecture; there remains a gap in how to address the ongoing and continuous improvement and operation of existing enterprise IT systems alongside these new 12-factor apps.
In this session, we will review why 12-factor apps are a natural fit for Kubernetes by design. We will demonstrate how Kubernetes addresses virtually all of the 12 factors for scalable web apps. Then we will take a step back and consider the important question: how well will stateful and transactional workloads that were not designed for 12-factor be able to run within Kubernetes?
Even with purist gaps from 12-factor for traditional enterprise workloads, there are real benefits to velocity and cost management to move stateful and transactional workloads to containers. With a container based orchestrator like Kubernetes, all workload types can take advantage of automated DevOps release pipelines, provide rich feedback loops with canary testing, leverage better automated failure recovery in production, and provide easier visibility into the operational health of services running within Kubernetes. Leveraging a standard platform for a blend of architectural types enables an enterprise to standardize operational practices for across the board. The end result might be the right path for your enterprise to drive your digital transformation.
Helping Organizations Realize the Value of DevOps with Continuous Software De...IBM UrbanCode Products
The IBM UrbanCode solution enables continuous release and application deployment allowing organizations to deliver applications rapidly and improve overall time to market.
Turning up the HEAT with IBM MobileFirst for iOS Apps (Interconnect 2016)Michael Elder
The landmark partnership between Apple and IBM announced in 2014 set the Internet abuzz. This partnership aims to spark true, mobile-led business change across the enterprise. In this talk, we’ll show you how IBM is using OpenStack, Heat, and DevOps to deploy the MobileFirst Platform for iOS enterprise solutions. We willl tell the story of how we used full-stack application patterns based on OpenStack Heat to provision environments with speed and reliability.
Hybrid Cloud DevOps with Apprenda and UrbanCode DeployClaudia Ring
In this webinar, Michael Elder, IBM Distinguished Engineer for UrbanCode, Rakesh Malhotra, SVP of Product Strategy at Apprenda, and Chris Dutra, Senior Integrations Engineer at Apprenda, will walk through best practices and a live demo showing how to;
Standardize, simplify and orchestrate deployments across IBM Bluemix and Apprenda with UrbanCode Deploy
Cloud enable existing multi-tier applications with Apprenda PaaS, making them elastically scalable and reliable
Enable modern applications built with Kubernetes to integrate with on premises systems of record
Enable multiple development teams releasing code at different speeds to coordinate deployments
Achieve abstraction over different cloud APIs
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps IBM UrbanCode Products
Delivering software is complex. Systems being developed are made up of multiple components, which in turn interact with other systems, services, application servers, data sources and invocations of 3rd party systems. In an Enterprise this complexity is further enhanced by the cross-platform nature of the infrastructure typical enterprises have. While the customers may be interacting with Systems of Engagement using Mobile and Web Apps, the core capabilities of the enterprise that the customers access are in Systems of Record that are running on large datacenters and more than likely Mainframe systems. Keeping these complex systems up and running and constantly updated with the latest capabilities is a task that requires constant coordination between the lines of business, various cross-platform development, QA and operations teams.
DevOps addresses these development and deployment challenges. The goal of DevOps is to align Dev and Ops by introducing a set of principles and practices such as continuous integration and continuous delivery. Cross-platform enterprise Systems take the need for these practices up a level due to their inherent complexity and distributed nature. Such systems need even more care in applying DevOps principles as there are multiple platforms to be targeted, in a coordinated manner, each with its own requirements, quirks, and nuanced needs. This talk takes a look at the DevOps challenges specific to Cross-platform Enterprise Systems and present Best Practices to address them.
McAfee offers SaaS Web Protection to help organizations protect themselves from web-based threats. The solution works at the network perimeter to filter out malware, viruses, phishing attacks and unauthorized websites. It provides continuous updates and real-time protection. SaaS Web Protection helps improve employee productivity, reduce IT costs, and free up bandwidth and staff time otherwise spent addressing infected devices. The solution offers flexible control and scalability to suit business needs.
Improving Software Delivery with DevOps & Software Defined Environments | The...IBM UrbanCode Products
IBM UrbanCode Deploy with Patterns is a full-stack environment management and deployment solution that enables users to design, deploy and update full-stack environments for multiple clouds.
Join Michael Elder, Senior Technical Staff Member, IBM DevOps, as he shows you how you can improve your customer feedback loop using iterative, full-stack application design for the cloud. In this webinar, he will cover an innovative new way of designing and versioning your cloud applications through a web-based environment development toolkit.
Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)Michael Elder
This document provides an overview of deploying Kubernetes in the enterprise, including descriptions of key Kubernetes concepts like pods, deployments, replica sets, services, and networking. It discusses features for continuous delivery on Kubernetes like small batch changes, source control, developer access to production environments, continuous integration, and automated testing. Examples are given for creating Kubernetes objects like pods, deployments, replica sets, and services using YAML files and kubectl commands.
3298 microservices and how they relate to esb api and messaging - inter con...Kim Clark
Microservices relate to application architecture and involve breaking applications into small, independent components with well-defined interfaces. APIs are not the same as microservices - APIs are an interface while microservices refer to the granularity of application components. When building microservice applications, API management is important to handle concerns such as routing, security and analytics without overburdening individual microservice components. Inter-microservice communication uses lightweight protocols and messaging while external communication involves managed API gateways and protocols. The document discusses challenges of microservices and trends in tools like IBM API Connect and Message Hub that help address these challenges.
Applying DevOps, PaaS and cloud for better citizen service outcomes - IBM Fe...Sanjeev Sharma
1) Applying DevOps practices like continuous integration/delivery can help government agencies deploy IT projects faster and get citizen services into production quicker.
2) Using a Platform as a Service (PaaS) like IBM Bluemix allows agencies to build and manage applications faster while reducing costs and skills requirements.
3) Adopting a DevOps culture and tools that automate testing, deployment, and monitoring can help agencies accelerate delivery of citizen services with better outcomes and less resources.
WebSphere Liberty and IBM Containers: The Perfect Combination for Java Micros...David Currie
Presentation from IBM InterConnect 2017.
Abstract: This session will demonstrate how WebSphere Application Server Liberty and Docker containers make the perfect combination for development and deployment of Java-based microservices. We'll show an end-to-end workflow, starting with creating a new service with the Liberty App Accelerator, local development with the free WebSphere Developer Tools, and then deployment to IBM Containers with the Bluemix DevOps Services.
The Bluemix Triple Threat: Cloud Foundry, Containers and Virtual Machines IBM Bluemix is pushing the envelope on what is possible with cloud computing. From its Platform-as-a-Service Cloud Foundry implementation to its Infrastructure-as-a-Service OpenStack implementation to its Docker-based container solution to its 100+ services, Bluemix is revolutionizing application development and deployment on the cloud. Come and see how easy it is to build a hybrid, composite application that takes advantage of Instant runtimes, containers and virtual machines....and now, OpenWhisk!
IBM Softlayer Bluemix Marketplace
API Economy
Infrastructure as a Service
Platform as a Service
Software as a Service
IaaS PaaS SaaS
Register for Bluemix at http://ibm.biz/BluemixSBSS
See Softlayer at http://ibm.biz/SBSlideShareSL
Join the Marketplace at http://ibm.biz/SBSlideShareMP
1. Bluemix is IBM's cloud platform that provides an open innovation platform to build, deploy, and manage applications anywhere through public, private, and on-premises options.
2. It delivers flexible compute options including containers and virtual machines and a catalog of over 100 services to extend applications.
3. Bluemix offers deployment options like public, dedicated, and local environments to meet enterprise security, compliance, and infrastructure needs while fostering innovation.
Deployment Automation for Hybrid Cloud and Multi-Platform EnvironmentsIBM UrbanCode Products
This document discusses how IBM's UrbanCode Deploy product can be used to automate application deployments across hybrid cloud and multi-platform environments. It provides examples of how UrbanCode Deploy supports deploying applications to systems like IBM z/OS, distributed systems, private clouds, public clouds and PaaS platforms in an automated and unified manner using patterns and templates. The document also discusses reference architectures and case studies for implementing continuous delivery pipelines spanning both on-premise and cloud infrastructures.
Developing for Hybrid Cloud with BluemixRoberto Pozzi
This document discusses two ways to integrate an IBM i program with a Bluemix application using REST services. The first way uses WebSphere Application Server Liberty Profile to expose a REST service that calls the IBM i program. The second way uses Cast Iron Live to expose an API that calls a REST service behind the firewall, which is then consumed by a Cloud Integration Service in Bluemix. Both options allow developers to integrate existing IBM i assets with new applications in Bluemix.
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointHyTrust
Virtualizing more of an organization's workloads presents both opportunities and risks. As more mission-critical workloads are virtualized, security and compliance become greater priorities. Purpose-built solutions that provide security, visibility, and control over virtual infrastructure and assets are needed. Intel, HyTrust, and McAfee are partnering to provide comprehensive solutions through technologies like Intel TXT, the HyTrust Appliance, and McAfee security products to help organizations securely virtualize more workloads while improving their security posture and compliance.
Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise AppsMichael Elder
Brad Topol & Michael Elder, IBM
“12 Factor” is a software methodology for building scalable microservice applications that provides best practices designed to enable applications to be built with portability, resilience, and scalability when deployed to the web. In this talk we provide an overview of the 12 Factor methodology and describe how the core constructs provided by Kubernetes can be leveraged to support the 12 factors for scalable web apps. In this talk we will provide live demonstrations of how Kubernetes can support 12 Factor for not only newer cloud native applications, but also for legacy enterprise middleware applications that include stateful and transactional workloads.
An architect’s guide to leveraging your incumbencyMichael Elder
O'Reilly Software Architecture Conference 2018 (London)
Continuous delivery for 12-factor Microservices works because it’s by design. When you can architect a solution for continuous delivery, you control all the angles but what do you do when you don’t have that luxury? This session will highlight how modernizing existing IT infrastructure with containers enables you to manage change through continuous delivery and reduce ongoing operational costs.
Abstract
While the industry has promoted a dramatic trend to build new, improved styles of architecture; there remains a gap in how to address the ongoing and continuous improvement and operation of existing enterprise IT systems alongside these new 12-factor apps.
In this session, we will review why 12-factor apps are a natural fit for Kubernetes by design. We will demonstrate how Kubernetes addresses virtually all of the 12 factors for scalable web apps. Then we will take a step back and consider the important question: how well will stateful and transactional workloads that were not designed for 12-factor be able to run within Kubernetes?
Even with purist gaps from 12-factor for traditional enterprise workloads, there are real benefits to velocity and cost management to move stateful and transactional workloads to containers. With a container based orchestrator like Kubernetes, all workload types can take advantage of automated DevOps release pipelines, provide rich feedback loops with canary testing, leverage better automated failure recovery in production, and provide easier visibility into the operational health of services running within Kubernetes. Leveraging a standard platform for a blend of architectural types enables an enterprise to standardize operational practices for across the board. The end result might be the right path for your enterprise to drive your digital transformation.
Helping Organizations Realize the Value of DevOps with Continuous Software De...IBM UrbanCode Products
The IBM UrbanCode solution enables continuous release and application deployment allowing organizations to deliver applications rapidly and improve overall time to market.
Turning up the HEAT with IBM MobileFirst for iOS Apps (Interconnect 2016)Michael Elder
The landmark partnership between Apple and IBM announced in 2014 set the Internet abuzz. This partnership aims to spark true, mobile-led business change across the enterprise. In this talk, we’ll show you how IBM is using OpenStack, Heat, and DevOps to deploy the MobileFirst Platform for iOS enterprise solutions. We willl tell the story of how we used full-stack application patterns based on OpenStack Heat to provision environments with speed and reliability.
Hybrid Cloud DevOps with Apprenda and UrbanCode DeployClaudia Ring
In this webinar, Michael Elder, IBM Distinguished Engineer for UrbanCode, Rakesh Malhotra, SVP of Product Strategy at Apprenda, and Chris Dutra, Senior Integrations Engineer at Apprenda, will walk through best practices and a live demo showing how to;
Standardize, simplify and orchestrate deployments across IBM Bluemix and Apprenda with UrbanCode Deploy
Cloud enable existing multi-tier applications with Apprenda PaaS, making them elastically scalable and reliable
Enable modern applications built with Kubernetes to integrate with on premises systems of record
Enable multiple development teams releasing code at different speeds to coordinate deployments
Achieve abstraction over different cloud APIs
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps IBM UrbanCode Products
Delivering software is complex. Systems being developed are made up of multiple components, which in turn interact with other systems, services, application servers, data sources and invocations of 3rd party systems. In an Enterprise this complexity is further enhanced by the cross-platform nature of the infrastructure typical enterprises have. While the customers may be interacting with Systems of Engagement using Mobile and Web Apps, the core capabilities of the enterprise that the customers access are in Systems of Record that are running on large datacenters and more than likely Mainframe systems. Keeping these complex systems up and running and constantly updated with the latest capabilities is a task that requires constant coordination between the lines of business, various cross-platform development, QA and operations teams.
DevOps addresses these development and deployment challenges. The goal of DevOps is to align Dev and Ops by introducing a set of principles and practices such as continuous integration and continuous delivery. Cross-platform enterprise Systems take the need for these practices up a level due to their inherent complexity and distributed nature. Such systems need even more care in applying DevOps principles as there are multiple platforms to be targeted, in a coordinated manner, each with its own requirements, quirks, and nuanced needs. This talk takes a look at the DevOps challenges specific to Cross-platform Enterprise Systems and present Best Practices to address them.
McAfee offers SaaS Web Protection to help organizations protect themselves from web-based threats. The solution works at the network perimeter to filter out malware, viruses, phishing attacks and unauthorized websites. It provides continuous updates and real-time protection. SaaS Web Protection helps improve employee productivity, reduce IT costs, and free up bandwidth and staff time otherwise spent addressing infected devices. The solution offers flexible control and scalability to suit business needs.
Improving Software Delivery with DevOps & Software Defined Environments | The...IBM UrbanCode Products
IBM UrbanCode Deploy with Patterns is a full-stack environment management and deployment solution that enables users to design, deploy and update full-stack environments for multiple clouds.
Join Michael Elder, Senior Technical Staff Member, IBM DevOps, as he shows you how you can improve your customer feedback loop using iterative, full-stack application design for the cloud. In this webinar, he will cover an innovative new way of designing and versioning your cloud applications through a web-based environment development toolkit.
Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)Michael Elder
This document provides an overview of deploying Kubernetes in the enterprise, including descriptions of key Kubernetes concepts like pods, deployments, replica sets, services, and networking. It discusses features for continuous delivery on Kubernetes like small batch changes, source control, developer access to production environments, continuous integration, and automated testing. Examples are given for creating Kubernetes objects like pods, deployments, replica sets, and services using YAML files and kubectl commands.
3298 microservices and how they relate to esb api and messaging - inter con...Kim Clark
Microservices relate to application architecture and involve breaking applications into small, independent components with well-defined interfaces. APIs are not the same as microservices - APIs are an interface while microservices refer to the granularity of application components. When building microservice applications, API management is important to handle concerns such as routing, security and analytics without overburdening individual microservice components. Inter-microservice communication uses lightweight protocols and messaging while external communication involves managed API gateways and protocols. The document discusses challenges of microservices and trends in tools like IBM API Connect and Message Hub that help address these challenges.
Applying DevOps, PaaS and cloud for better citizen service outcomes - IBM Fe...Sanjeev Sharma
1) Applying DevOps practices like continuous integration/delivery can help government agencies deploy IT projects faster and get citizen services into production quicker.
2) Using a Platform as a Service (PaaS) like IBM Bluemix allows agencies to build and manage applications faster while reducing costs and skills requirements.
3) Adopting a DevOps culture and tools that automate testing, deployment, and monitoring can help agencies accelerate delivery of citizen services with better outcomes and less resources.
WebSphere Liberty and IBM Containers: The Perfect Combination for Java Micros...David Currie
Presentation from IBM InterConnect 2017.
Abstract: This session will demonstrate how WebSphere Application Server Liberty and Docker containers make the perfect combination for development and deployment of Java-based microservices. We'll show an end-to-end workflow, starting with creating a new service with the Liberty App Accelerator, local development with the free WebSphere Developer Tools, and then deployment to IBM Containers with the Bluemix DevOps Services.
Ibm business partner connect 2015 long fong yee v1 (read-only)Fong Yee Long
The document provides an overview of IBM's Bluemix platform and services for developers. It discusses how Bluemix allows developers to build and deploy applications quickly using pre-built services and APIs. Bluemix offers a variety of programming languages and tools, as well as services for areas like mobile development, web services, databases, security, and integration with on-premise systems. The document also notes Bluemix's flexible pricing models to suit different needs, such as free trials and pay-as-you-go options.
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...Daniel Berg
This document discusses hybrid cloud and IBM's approach. It defines hybrid cloud as the secure consumption of services from both private and public clouds as well as traditional IT. It outlines IBM's focus on services integration, portability, and flexible deployment models to enable hybrid cloud. It also discusses IBM's DevOps services and tools like UrbanCode Deploy that help deliver applications to hybrid environments through continuous delivery pipelines.
Skip the anxiety attack when building secure containerized appsHaidee McMahon
This document discusses building secure containerized applications using IBM Cloud Container Service. It defines key terms like containers, microservices, and orchestration. It then discusses how IBM Cloud Container Service can help developers build applications securely in the cloud using features like integrated vulnerability scanning, access control, network isolation, Kubernetes orchestration, and open source tools. Customer quotes praise its easy setup, managed Kubernetes clusters, and integration with other IBM Cloud services.
IBM Codename: Bluemix - Cloudfoundry, PaaS development and deployment trainin...Romeo Kienzler
This document provides an agenda and materials for a 200 BlueMix Days technical training course. The agenda includes lessons on BlueMix overview, architecture, DevOps services, registering services, and Cloud Foundry. Labs are included to build and deploy simple applications using BlueMix and DevOps services. Prerequisites for the course are listed. Overall objectives are to describe BlueMix information, understand Cloud Foundry architecture, and complete labs to develop and deploy applications on BlueMix.
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...Vidyasagar Machupalli
IBM Cloud provides a unique capabilities of Watson exposed as Cognitive services that can perform the next-generation computing for your Mobile app Building such innovative mobile app needs access to enormous data sets which is typically stored within an enterprise This talk covers on the end-to-end scenario on how to build cognitive Mobile app in the Hybrid Cloud environment by connecting to the on-premises SOR data sources You will learn about the Mobile Foundation service that helps to build update and manage mobile apps and using it to integrate with the enterprise using the integration services like Secure GatewayThe talk covers the various use-cases on using the Cognitive services on Bluemix for building intelligent Mobile apps
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...Michael Elder
How do you get the value of the last 3 decades of investment in your backend into the hands of your end users faster? And through new mediums like mobile?
IBM Bluemix offers you the opportunity to craft new applications in a fully hosted and managed Platform as a Service. Wouldn’t it be great if you could tie these two worlds together? Well, in fact you can!
In this talk, we’ll show you how to incorporate backend services into your IBM Bluemix applications through Cast Iron Live, an API gateway that let’s you expose your on-prem backend services safely to off-prem applications on IBM Bluemix. We’ll even show you how to manage the entire chain using a consistent DevOps-centric toolchain using IBM UrbanCode Deploy!
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Amazon Web Services
The move to AWS enables new application and architectural patterns that are in a continual state of change. The only way that your infrastructure, security, and operations can keep pace with these changes is with automation. In this session, we discuss the various automation tools you can use to first deploy the AWS infrastructure (as code), add the VM-Series to protect against threats (security as code), and then automatically update the policy based on Amazon GuardDuty or AWS Security Hub finding (operations as code). A brief demonstration concludes the session. This presentation is brought to you by AWS partner, Palo Alto Networks.
Become an IBM Cloud Architect in 40 MinutesAndrew Ferrier
This document provides an overview of the IBM Cloud platform in under 3 sentences. It discusses IBM Cloud as an IBM-managed cloud platform for developing, deploying, and running applications. Key features highlighted include using various compute models like Cloud Foundry and containers, accessing a wide range of cloud services, and architectural considerations for non-functional requirements like security, performance, and integration.
This session will describe how CICS TS v5.1 can quickly and simply support the creation of modern Mobile Ready interfaces to existing applications. The session will introduce the key technologies including the use of Liberty technology in CICS TS. We will work through a simple scenario to demonstrate the key points. The session will cover the core supporting technologies include in CICS TS v5.1 as well as the Dynamic Scripting Feature Pack and content included in the CICS TS v5.2 Open Beta.
This document discusses DevOps and containers. It provides an overview of DevOps, what Docker is, and IBM Bluemix and its Container Service.
The agenda includes DevOps concepts like continuous delivery and feedback. Docker simplifies application portability and deployment. IBM Bluemix is a digital innovation platform that supports containers. Its Container Service automates building, distributing, hosting, and managing Docker images at scale.
IBM's Bluemix Local provides customers the ability to deploy Bluemix applications and services behind their own firewall. The presentation discusses:
1) Bluemix Local uses an SSL tunnel originating from an inception VM at the customer site to securely connect the customer environment to IBM's infrastructure for platform deployment and maintenance.
2) Customers benefit from 24/7 monitoring of the local Bluemix environment by IBM as well as security management services like patching and threat assessment.
3) A customer example from Spain is discussed where the customer chose Bluemix Local to keep their Cloud Foundry environment up-to-date while also leveraging additional IBM services behind their firewall.
4) Common challenges like monitoring the SSL tunnel
IBM Bluemix OpenWhisk: IBM InterConnect 2017, Las Vegas, USA: Technical StrategyOpenWhisk
The document discusses serverless computing and OpenWhisk. It begins with an agenda that covers the evolution of serverless, definitions of serverless computing, advantages over traditional approaches, an overview of OpenWhisk, and use cases for serverless. OpenWhisk is introduced as an open source serverless platform that allows code to execute in response to events. It provides benefits like automatic scaling, pay-per-use billing, and support for multiple languages.
My presentation for our Benelux IBM Rational Innovate event. This presentation explains how the IBM Bluemix and devops as a service solution can be used for modern cloud based development.
IBM takes a holistic, risk-based approach to cloud security based on its IBM Security Framework. It has over 6,000 security engineers and 3,000 security patents. IBM addresses cloud security through governance, identity and access management, data protection, secure infrastructure development and maintenance, and physical security of data centers. The key is choosing the right cloud model and deployment with appropriate security controls to establish trust.
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM CloudMichael Elder
This document discusses deploying VMware workloads to the IBM Cloud platform using VMware on IBM Cloud. Key points include:
- IBM Cloud allows customers to easily move existing VMware workloads from on-premises data centers to IBM Cloud on a common platform.
- IBM Validated Design simplifies deployment of VMware Cloud Foundation on IBM Cloud infrastructure consisting of bare metal servers, VMware software, and automated lifecycle management.
- The partnership between IBM and VMware enables customers to achieve a consistent management and security model across their hybrid cloud with familiar VMware tools.
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...Amazon Web Services
The move to AWS enables new application and architectural patterns that are in a continual state of change. The only way that your infrastructure, security, and operations can keep pace with these changes is with automation. In this session, we discuss the various automation tools you can use to first deploy the AWS infrastructure (as code), add the VM-Series to protect against threats (security as code), and then automatically update the policy based on Amazon GuardDuty or AWS Security Hub findings (operations as code). We conclude with a brief demonstration.
Implementing zero trust in IBM Cloud Pak for IntegrationKim Clark
Implementing zero trust principles in IBM Cloud Pak for Integration involves several key aspects:
1. Treating all identities (users, applications, components, administrators) as untrusted and establishing an identity perimeter.
2. Minimizing privileges by restricting what actions containers and service accounts can perform and limiting their access to secrets, the Kubernetes API, and the underlying operating system.
3. Implementing defense in depth across the network, with microsegmentation between environments, applications, and tiers to control inter-pod and inter-tier communication.
Bluemix is IBM's cloud platform that allows developers to build, deploy, and manage applications across public, private, and hybrid cloud environments. It provides tools for continuous delivery, application services, and infrastructure services to help developers focus on differentiating their applications. A new capability called Bluemix Local will deliver the Bluemix platform as a managed service within customers' own data centers, providing cloud agility while maintaining security and control over sensitive workloads.
This document discusses integrating IBM's Vulnerability Advisor tool into the development pipeline to enable DevSecOps. It describes how Vulnerability Advisor analyzes container images at different stages of the pipeline to check for vulnerabilities and non-compliance. This includes analyzing images built from code in the pipeline service and presenting results within the pipeline stage for developers to address before deployment. It also covers integrating Vulnerability Advisor into IBM's DevOps toolchains and pipeline to automate security checks within the development workflow.
This document provides an abstract and biography for a talk on cloud operational visibility and analytics. The abstract discusses how cloud platforms and services are growing rapidly in complexity, which creates challenges for operational visibility and security. Traditional monitoring solutions are becoming ineffective. The talk will present an approach for deep, seamless visibility into cloud instances using agentless system crawlers. It will also discuss how this visibility can be used to develop operational and security analytics for the cloud. Specific projects for IBM containers called Agentless System Crawler and Vulnerability Advisor will be overviewed. The biography introduces the speaker, Dr. Canturk Isci, as a research manager working on cloud monitoring and security analytics at IBM Research.
This document discusses security and compliance challenges in cloud computing. It summarizes IBM's work developing tools like Agentless System Crawlers and Vulnerability Advisors to provide deep visibility and operational analytics for cloud environments. These tools help users meet security policies, audit compliance, and prevent malware. The presentation describes how the tools have evolved from initial visibility capabilities to addressing real problems through risk analysis, policy management, and remediation guidance.
Operational Visibiliy and Analytics - BU SeminarCanturk Isci
The document discusses building operational visibility and analytics directly into cloud platforms. It describes an agentless system crawler that can provide deep visibility into cloud instances without requiring any action from end users. The crawler collects various system data which is then analyzed to provide operational insights and solve real-world problems. Specific applications discussed include vulnerability advising, configuration analysis, and license discovery. The goal is to design monitoring and analytics that are seamlessly integrated and optimized for cloud environments.
Agentless System Crawler - InterConnect 2016Canturk Isci
IBM speaker guidelines mandate including forward-looking and legal disclaimer slides in presentations. All presentations must include mandatory notices and disclaimers slides before the conclusion. Speakers should refer to additional legal guidance documents and have materials reviewed by legal if concerned. Final presentations are due by February 5th, 2016 and must follow a specific file naming convention. Disclosures for forward-looking statements are available at a specified link. Instructions should be removed before finalizing presentations.
The document provides information about IBM's Vulnerability Advisor tool for analyzing container images and instances for security vulnerabilities and policy violations. It discusses how the tool provides deep visibility into images and instances by collecting various data types and using annotators to analyze the data and provide operational insights. It also describes how the tool can help users identify vulnerable or non-compliant images, detect systems with weak passwords or password access configurations, and provide a vulnerability report with details on discovered issues and policy violations.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
1. InterConnect
2017
Securing Your Docker
Environment with
Vulnerability Advisor in IBM
Bluemix Container Service
Chris Rosen
Senior Technical Offering Manager
crosen@us.ibm.com
Canturk Isci
Research Manager,
canturk@us.ibm.com
1 5/16/2018
2. 2 5/16/2018
Please note
IBM’s statements regarding its plans, directions, and intent
are subject to change or withdrawal without notice at IBM’s
sole discretion.
Information regarding potential future products is intended to
outline our general product direction and it should not be relied
on in making a purchasing decision.
The information mentioned regarding potential future products
is not a commitment, promise, or legal obligation to deliver
any material, code or functionality. Information about potential
future products may not be incorporated into any contract.
The development, release, and timing of any future features
or functionality described for our products remains at our sole
discretion.
Performance is based on measurements and projections
using standard IBM benchmarks in a controlled environment.
The actual throughput or performance that any user will
experience will vary depending upon many factors, including
considerations such as the amount of multiprogramming in
the user’s job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no
assurance can be given that an individual user will achieve
results similar to those stated here.
3. AGENDA
• Getting started with Docker
• Scared straight – security concerns everywhere
• IBM Bluemix Container Service
• DevSecOps
• Vulnerability Advisor details
9. Beta available March 20th.
Combining Docker and Kubernetes to deliver powerful tools,
an intuitive user experience, and built-in security and
isolation to enable rapid delivery of applications - all while
leveraging IBM Cloud Services including cognitive
capabilities from Watson.
www.ibm.com/cloud-computing/bluemix/containers
IBM Bluemix Container Service
10. Intelligent Scheduling Automated rollouts and rollbacks Container Security & PrivacyDesign Your Own Cluster
Self-healing Horizontal scaling Leverages IBM Cloud & Watson Integrated Operational Tools
Service discovery & load balancing Secret & configuration management Simplified Cluster Management Native Kubernetes Experience
IBM Bluemix Container Service
42. 42 5/16/2018
Notices and disclaimers
continued
Information concerning non-IBM products was obtained from the
suppliers of those products, their published announcements or other
publicly available sources. IBM has not tested those products in
connection with this publication and cannot confirm the accuracy of
performance, compatibility or any other claims related to non-IBM
products. Questions on the capabilities of non-IBM products should be
addressed to the suppliers of those products. IBM does not warrant the
quality of any third-party products, or the ability of any such third-party
products to interoperate with IBM’s products. IBM expressly disclaims
all warranties, expressed or implied, including but not limited to, the
implied warranties of merchantability and fitness for a particular,
purpose.
The provision of the information contained herein is not intended to, and
does not, grant any right or license under any IBM patents, copyrights,
trademarks or other intellectual property right.
IBM, the IBM logo, ibm.com, Aspera®, Bluemix, Blueworks Live, CICS,
Clearcase, Cognos®, DOORS®, Emptoris®, Enterprise Document
Management System™, FASP®, FileNet®, Global Business Services®,
Global Technology Services®, IBM ExperienceOne™, IBM SmartCloud®,
IBM Social Business®, Information on Demand, ILOG, Maximo®,
MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower,
PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®,
PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®,
PureSystems®, QRadar®, Rational®, Rhapsody®, Smarter Commerce®,
SoDA, SPSS, Sterling Commerce®, StoredIQ, Tealeaf®, Tivoli® Trusteer®,
Unica®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and
System z® Z/OS, are trademarks of International Business Machines
Corporation, registered in many jurisdictions worldwide. Other product
and service names might be trademarks of IBM or other companies. A
current list of IBM trademarks is available on the Web at "Copyright and
trademark information" at: www.ibm.com/legal/copytrade.shtml.
Managed infrastructure:
Customer does not have to maintain physical hardware, operating systems, patches, etc
IBM performs the scaling, operability, performance testing on new versions of open projects saving the customer time and frustration
IBM provides the monitoring of the platform and the infrastructure
We provide monitoring and logging tools to the users for the containerized workloads
Security has two main branches:
First is the infrastructure side that is required to maintain a multi-tenant public cloud
Second is the user consumption of security and we’ve made it as easy as possible with Vulnerability Advisor
Using existing open source projects from the community
IBM has not forked anything
To reconcile those two competing factors and to avoid data overload we have to optimize for the client experience
This might sound obvious but often experience has been optimized for the business process and not for the individual client experiences
Entire industries are being reformed based on this simple idea of using technology to put the client experience first.