As our applications transform to cloud-native-first architectures, policy replaces configuration files to define infrastructure at all layers; networking, compute, storage, and of course application. Developers now have almost unlimited choices in how to solve their architecture, agility and scale challenges using the software defined infrastructure that powers our cloud-native world. Prescriptive topologies for networks are too rigid to support the needed agile iterations of today’s application. The software development lifecycle (SDLC) evolved to support multiple iterations for innovation and has some lessons for all of us. This session describes SDLC evolutions to help network and infrastructure experts as they strive to connect business value to applications to infrastructure while constructing the networks of the future.
Ken Owens, the CTO of Cisco Intercloud Services, presented on Cisco's migration from MapReduce jobs to Spark jobs for processing customer interaction data. The document discussed Cisco's need to embrace both traditional and hyperscale application deployment across data centers, clouds, and edges. It also covered Cisco's analysis platform requirements, AWS and Cisco Intercloud sizing comparisons, and performance results from testing the migration of MapReduce jobs to Spark on the Cisco Intercloud.
The future of you application development platforms, the ability to create applications that are cloud native with elastic services and network aware application policies, and microservices is strategic to your company. When the decision to build you next product is made, Openstack and Microservices became central to your application architectures and becomes strategic to your vision.
This document discusses how Citrix Application Delivery Management (ADM) can be used to manage Citrix ADC instances at scale in cloud-native environments. Key points include:
- Citrix ADM allows controlling and gaining insights from one to thousands of Citrix ADC instances (VPX, MPX, CPX), across container platforms like Mesos/Marathon and Kubernetes.
- Metadata from Citrix ADCs provides valuable information to Citrix ADM for an "App Health Score", including user experience metrics, security threats, and device health.
- Citrix ADM provides capabilities for app-centric lifecycles, configuration at scale, visibility, and security across Citrix ADC instances.
Reduce the complexities of managing Kubernetes clusters anywhereAshnikbiz
Learn how Kubernetes has become a critical component for deploying applications on multi-platform / multi-cloud environments and how to manage and monitor clusters running Mirantis Kubernetes Engine (formerly Docker Enterprise) using Mirantis Container Cloud, AWS, VMware and other providers.
Tsvi Korren,
VP of Product Strategy at Aqua Security CISSP, has been an IT security professional for over 25 years. In previous positions at DEC and CA Inc., he consulted with various industry verticals on the process and organizational aspects of security. As the VP of Product Strategy at Aqua, he is tasked with delivering commercial and open source solutions that make Cloud Native workloads the most secure, compliant and resilient application delivery platform.
Orchestrating stateful applications with PKS and PortworxVMware Tanzu
This document provides an overview of Portworx, including:
1. Portworx is a leader in providing stateful container orchestration that works across any cloud or scheduler.
2. It has an experienced team and investors, with headquarters in Los Altos, CA and 70 employees globally.
3. Portworx allows applications to run across different infrastructure types and clouds with a portable cloud stack that provides high availability, replication, security and data mobility features.
Kata and arm, a secure alternative in the 5 g spaceLibbySchulze
This document discusses using Kata containers to securely deploy RAN Intelligent Controllers (RICs) in 5G networks. It first provides background on 5G technology and initiatives like O-RAN, then describes the performance requirements for near-real-time RICs. It notes security concerns around third-party applications accessing RAN infrastructure. The document then introduces Kata containers as a way to provide security isolation for RIC workloads through lightweight virtual machines. It explains how Kata containers can help address security concerns when deploying RICs in 5G networks.
Protect Kubernetes Environments with Cisco Stealthwatch CloudRobb Boyd
Jeff Moncrief discusses how Stealthwatch Cloud provides visibility, threat identification, and network compliance for Kubernetes environments. Stealthwatch is deployed as a POD application on each node to create network telemetry of all POD to POD traffic and report it to Stealthwatch Cloud, giving complete visibility into traffic in the Kubernetes cluster. The solution deploys as a Pod and integrates with the node-level network layer to provide visibility, baselining, and anomaly detection into container and pod communications.
Ken Owens, the CTO of Cisco Intercloud Services, presented on Cisco's migration from MapReduce jobs to Spark jobs for processing customer interaction data. The document discussed Cisco's need to embrace both traditional and hyperscale application deployment across data centers, clouds, and edges. It also covered Cisco's analysis platform requirements, AWS and Cisco Intercloud sizing comparisons, and performance results from testing the migration of MapReduce jobs to Spark on the Cisco Intercloud.
The future of you application development platforms, the ability to create applications that are cloud native with elastic services and network aware application policies, and microservices is strategic to your company. When the decision to build you next product is made, Openstack and Microservices became central to your application architectures and becomes strategic to your vision.
This document discusses how Citrix Application Delivery Management (ADM) can be used to manage Citrix ADC instances at scale in cloud-native environments. Key points include:
- Citrix ADM allows controlling and gaining insights from one to thousands of Citrix ADC instances (VPX, MPX, CPX), across container platforms like Mesos/Marathon and Kubernetes.
- Metadata from Citrix ADCs provides valuable information to Citrix ADM for an "App Health Score", including user experience metrics, security threats, and device health.
- Citrix ADM provides capabilities for app-centric lifecycles, configuration at scale, visibility, and security across Citrix ADC instances.
Reduce the complexities of managing Kubernetes clusters anywhereAshnikbiz
Learn how Kubernetes has become a critical component for deploying applications on multi-platform / multi-cloud environments and how to manage and monitor clusters running Mirantis Kubernetes Engine (formerly Docker Enterprise) using Mirantis Container Cloud, AWS, VMware and other providers.
Tsvi Korren,
VP of Product Strategy at Aqua Security CISSP, has been an IT security professional for over 25 years. In previous positions at DEC and CA Inc., he consulted with various industry verticals on the process and organizational aspects of security. As the VP of Product Strategy at Aqua, he is tasked with delivering commercial and open source solutions that make Cloud Native workloads the most secure, compliant and resilient application delivery platform.
Orchestrating stateful applications with PKS and PortworxVMware Tanzu
This document provides an overview of Portworx, including:
1. Portworx is a leader in providing stateful container orchestration that works across any cloud or scheduler.
2. It has an experienced team and investors, with headquarters in Los Altos, CA and 70 employees globally.
3. Portworx allows applications to run across different infrastructure types and clouds with a portable cloud stack that provides high availability, replication, security and data mobility features.
Kata and arm, a secure alternative in the 5 g spaceLibbySchulze
This document discusses using Kata containers to securely deploy RAN Intelligent Controllers (RICs) in 5G networks. It first provides background on 5G technology and initiatives like O-RAN, then describes the performance requirements for near-real-time RICs. It notes security concerns around third-party applications accessing RAN infrastructure. The document then introduces Kata containers as a way to provide security isolation for RIC workloads through lightweight virtual machines. It explains how Kata containers can help address security concerns when deploying RICs in 5G networks.
Protect Kubernetes Environments with Cisco Stealthwatch CloudRobb Boyd
Jeff Moncrief discusses how Stealthwatch Cloud provides visibility, threat identification, and network compliance for Kubernetes environments. Stealthwatch is deployed as a POD application on each node to create network telemetry of all POD to POD traffic and report it to Stealthwatch Cloud, giving complete visibility into traffic in the Kubernetes cluster. The solution deploys as a Pod and integrates with the node-level network layer to provide visibility, baselining, and anomaly detection into container and pod communications.
Empowering developers and operators through Gitlab and HashiCorpMitchell Pronschinske
Companies digitally transforming themselves into modern, software-defined businesses are building their foundation on cloud native solutions like GitLab and Hashicorp. Together, GitLab, Terraform, and Vault are empowering organizations to be more iterative, flexible, and secure. Join us in this session to learn more about how GitLab and Hashicorp are lowering the barrier of entry into industrializing the application development and delivery process across the entire application lifecycle.
Rose Schooler
Vice President, Intel Architecture Group
General Manager, Communications and Storage Infrastructure Group
Intel Corporation
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
A day in the life of an enterprise CIO can be daunting—challenges such as managing complex environments, security and ongoing TCO pressures face us everyday. Addressing these challenges offer opportunities to significantly improve operations, productivity and have an impact on the bottom line if done successfully. To learn more please visit our website here: http://www.cisco.com/web/CA/index.html
This document provides an overview of considerations for choosing container storage for Kubernetes. It discusses the existing storage landscape, including open-source and commercial options. Key factors to consider include supported storage types, data protection and replication capabilities, dynamic provisioning, and whether container-native storage (CNS) or container-attached storage (CAS) is preferable based on workload needs. Performance benchmarks show Piraeus and StorageOS providing the best performance. The document aims to help users determine the right storage solution for their specific Kubernetes applications and workloads.
This document provides an overview of F5's Automation Toolchain and how it can be used to automate the configuration of F5 products like BIG-IP. It introduces key concepts like the AS3 declarative API and shows examples of how to automate tasks like deploying a virtual server configuration via REST, integrating with configuration management tools like Ansible Tower, implementing infrastructure as code practices, and automating testing and deployments through DevOps pipelines. The document demonstrates how the F5 Automation Toolchain allows network configurations to be treated as code for consistent, repeatable deployments.
Empower Your Security Practitioners with Elastic SIEMElasticsearch
Learn how Elastic SIEM’s latest capabilities enable interactive exploration and automated analysis — all at the speed and scale your security practitioners need to defend your organization.
See the video: https://www.elastic.co/elasticon/tour/2019/washington-dc/empower-your-security-practitioners-with-elastic-siem
This document discusses the partnership between Microsoft Azure and GE's Predix platform for industrial IoT. For Microsoft, the partnership will help existing industrial customers build and operate IIoT solutions using Azure's capabilities in artificial intelligence, data analytics, and security. For GE, Predix will benefit from Azure's large global footprint and hybrid cloud capabilities. The combination of Predix and Azure aims to bridge the gap between operational technology and information technology for industrial customers worldwide.
Discover the benefits of Kubernetes to host a SaaS solutionScaleway
What you can take away from this presentation:
- What a SaaS solution is
- Key figures on the SaaS market
- Advantages of Kubernetes Kapsule for SaaS
- How to optimize your costs and loads while maintaining stability
- How to guarantee the security of your infrastructures
- The difference between a multi-instance and a multi-tenant architecture
As businesses strive to innovate while aiming to reduce risk, IT has become more critical to the success of the business than ever before. In this session, Nick Barcet, Senior Director of Product Management for OpenStack at Red Hat, explains the importance of an IT evolution to modernize data center infrastructure through a culture, process, and technology transformation. Learn what’s driving customer success around OpenStack and how Red Hat is collaborating within the community to provide businesses with the modernized infrastructure they need
Monitoring Security Policies for Container and OpenStack CloudsPLUMgrid
Container and OpenStack clouds often co-exist in data centers. Monitoring both environments require views into the underlay and overlay infrastructure, but infrastructure monitoring alone is no longer sufficient and needs to be paired with security policy views as containers and microservices are constantly reshaping data center traffic and flow patterns. A visualization GUI that correlates containers and VMs with security policy views provide a powerful tool for any operations team to detect security flow violations in real-time. Enterprises and cloud providers are adopting visualization and monitoring platforms in addition to OpenStack Horizon to keep their infrastructure running with 100% uptime. New tools that help with proactive remediation of issues are being deployed to quickly bring back the system to healthy conditions.
This document discusses cybersecurity considerations for industrial Internet of Things (IIoT) systems. It describes how IIoT systems are distributed across sensors, actuators and other devices with streaming data, analytics/control, and connectivity to IT systems and clouds. This distributed nature introduces potential vulnerabilities from threats. The document then introduces the Data Distribution Service (DDS) standard as a connectivity platform that can address challenges like security while supporting real-time and reliable data distribution. Key features of DDS like decentralization and publish/subscribe capabilities are described. Finally, the document outlines DDS security capabilities like authentication, access control, encryption and logging to secure IIoT systems from unauthorized access and tampering.
The document discusses the changing data center landscape and the rise of application-centric infrastructure (ACI) to address these changes. ACI provides a policy-based approach where application requirements are defined through application network profiles that can be applied across physical, virtual, and cloud infrastructure. This decouples applications from network infrastructure and provides visibility, security, mobility and automation through a centralized controller.
Presented by: Dr.-Ing. Dipl.-Inform. Daniel Ewert, Head of Research Group "Engineering Cybernetics," Assoc. Insitute for Management Cybernetics e.V., RWTH Aachen University
The Ice moon Enceladus of planet Saturn holds vast amounts of liquid water beneath its solid ice shell which possibly contain simple extraterrestrial life. For further examination an intended space mission by Germany's national space program aims to take probes from subsurface water using an autonomous ice probe. In order to navigate to a designated goal position, this probe must be able to localize itself within the ice. This localization is achieved by utilizing a distributed network of autonomous pinger units (APUs) which serve as external reference for the ice probe. The talk focusses on the technical details and communication and control mechanisms for this network.
Bringing Cloud Scale Efficiency to Communication Services Providers through R...Radisys Corporation
In this webinar, experts from Radisys and Intel will present the latest developments in applying Intel® RSD to SDN and NFV applications. Webinar participants will learn how the Radisys DCEngine™ hyperscale platforms, an implementation of Intel® RSD and inspired by Open Compute Project (OCP), can deliver the open software flexibility, DevOps deployment efficiencies, with carrier scalability for robust NFV deployments in emerging communication data center applications. The Webinar will include customer deployment examples, including Radisys DCEngine for open source software architectures, Central Office Re-architected as a Datacenter (CORD) projects, as well as Intel® RSD initiatives in telecom networking applications.
OpenStack is an open source cloud operating system that controls large pools of computing, storage, and networking resources. The document discusses OpenStack Sydney Summit 2017, future OpenStack events including the next OpenStack Design Summit and OpenStack Day, and the OpenStack Travel Support Program which helps fund attendance from developers around the world.
This document summarizes a presentation on developing autonomous vehicle architectures. It discusses using a data-centric middleware approach like the Data Distribution Service (DDS) standard to integrate sensors, fusion software, and control systems. DDS provides a common data model, quality of service controls, security features, and other benefits to help lower development risks. It also advocates consolidating electronic control units using a hypervisor and safety-certified operating system like QNX to isolate functions with different safety requirements. The presentation argues this is a lower-risk path to autonomous vehicle architecture than point-to-point and client-server approaches.
This document discusses the networking complexities that arise in hybrid and multi-cloud environments. It notes that routing traffic securely between disparate cloud platforms is challenging, and that managing multiple providers each with their own management and security methods complicates operations. The document then explores specific complexities around modernization, monitoring, suppliers and connectivity. It proposes several potential methods for simplifying this complexity, such as SD-WAN, cloud on-ramp service providers, carrier-neutral colocation, AWS Direct Connect and Azure ExpressRoute.
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Control and secure your applications on IBM SmartCloud Enterprise with Software Defined Networking from CohesiveFT.
An IBM SmartCloud ready partner, CohesiveFT address issues of security and control to allow customers to take full advantage of cloud computing. Cohesive FT’s VNS3 Software Defined Networking is an overlay network which allows you to extend your data centers into the cloud, join clouds together and have control over end to end 256 bit encryption, IP addressing, topology and multicast protocols.
The joint IBM and Cohesive webinar aired on June 20
This document discusses Pure Storage's self-driving storage and integration capabilities. It begins by explaining how IT organizations have evolved from specialized teams to cloud-focused teams. Pure Storage focuses on integration, simplicity and automation in VMware environments. It provides simple provisioning and analytics dashboards. Pure Storage also supports VVols, virtual machine restores, automation through VMware and PowerShell tools, and SAP copy automation. The document envisions continued integration with VMware and new capabilities for analytics, cloud automation, and joint technology development.
How to use SDN to Innovate, Expand and Deliver for your businessNapier University
SDN is about operationalizing networks to improve time-to-market, reduce risks, and reduce operating expenses by centralizing control and programmatically controlling network elements via open APIs. It requires an ecosystem to operationalize the entire network, including stateless L2-4 and stateful L4-7 services. F5's Synthesis solution operationalizes the stateful L4-7 network with programmability, automation, massive scalability, and partnerships with other SDN vendors to provide a full SDN solution.
How Cisco Provides World-Class Technology Conference Experiences Using Automa...InfluxData
Cisco Systems’ Cisco Live conference is held annually in the winter in Europe and in the summer in the United States. A typical US event hosts 600+ breakout sessions, dozens of keynotes, Certification Testing and walk-in labs. The conference serves over 26,000 attendees and all their mobile devices. The internal network team is responsible for ensuring that 2,200 wireless access points and 800 switches are providing sufficient network connectivity, availability and bandwidth for all attendees, speakers and organizers across 2 million square feet of conference space. Over 9 days (4 days of setup and 5 conference days), event staff and attendees have pushed over 84 terabytes of data from the conference to the internet! Dual 100 Gigabit/second primary links and backup 10 Gigabit/second links handle anything the users can throw at it.
The infrastructure required for this event also includes servers, VMs, and containerized workloads. With the growing need for hybrid events, Cisco’s team also ensures 100% video streaming uptime. Discover how Cisco uses InfluxDB to store key performance metrics across many IT domains alongside their commercial management solutions. The team continues to iterate and improve year-over-year to gain visibility into their network and devices to streamline troubleshooting and quickly respond to events before they become service impacting.
In this webinar, Jason Davis dives into:
Cisco’s approach to using automation, orchestration, Python scripts, SNMP, and streaming telemetry to collect network data
Their methodology to troubleshooting, prioritizing, and scheduling fixes to ensure the best client experience
How a time series platform is crucial to their real-time data analysis
Empowering developers and operators through Gitlab and HashiCorpMitchell Pronschinske
Companies digitally transforming themselves into modern, software-defined businesses are building their foundation on cloud native solutions like GitLab and Hashicorp. Together, GitLab, Terraform, and Vault are empowering organizations to be more iterative, flexible, and secure. Join us in this session to learn more about how GitLab and Hashicorp are lowering the barrier of entry into industrializing the application development and delivery process across the entire application lifecycle.
Rose Schooler
Vice President, Intel Architecture Group
General Manager, Communications and Storage Infrastructure Group
Intel Corporation
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
A day in the life of an enterprise CIO can be daunting—challenges such as managing complex environments, security and ongoing TCO pressures face us everyday. Addressing these challenges offer opportunities to significantly improve operations, productivity and have an impact on the bottom line if done successfully. To learn more please visit our website here: http://www.cisco.com/web/CA/index.html
This document provides an overview of considerations for choosing container storage for Kubernetes. It discusses the existing storage landscape, including open-source and commercial options. Key factors to consider include supported storage types, data protection and replication capabilities, dynamic provisioning, and whether container-native storage (CNS) or container-attached storage (CAS) is preferable based on workload needs. Performance benchmarks show Piraeus and StorageOS providing the best performance. The document aims to help users determine the right storage solution for their specific Kubernetes applications and workloads.
This document provides an overview of F5's Automation Toolchain and how it can be used to automate the configuration of F5 products like BIG-IP. It introduces key concepts like the AS3 declarative API and shows examples of how to automate tasks like deploying a virtual server configuration via REST, integrating with configuration management tools like Ansible Tower, implementing infrastructure as code practices, and automating testing and deployments through DevOps pipelines. The document demonstrates how the F5 Automation Toolchain allows network configurations to be treated as code for consistent, repeatable deployments.
Empower Your Security Practitioners with Elastic SIEMElasticsearch
Learn how Elastic SIEM’s latest capabilities enable interactive exploration and automated analysis — all at the speed and scale your security practitioners need to defend your organization.
See the video: https://www.elastic.co/elasticon/tour/2019/washington-dc/empower-your-security-practitioners-with-elastic-siem
This document discusses the partnership between Microsoft Azure and GE's Predix platform for industrial IoT. For Microsoft, the partnership will help existing industrial customers build and operate IIoT solutions using Azure's capabilities in artificial intelligence, data analytics, and security. For GE, Predix will benefit from Azure's large global footprint and hybrid cloud capabilities. The combination of Predix and Azure aims to bridge the gap between operational technology and information technology for industrial customers worldwide.
Discover the benefits of Kubernetes to host a SaaS solutionScaleway
What you can take away from this presentation:
- What a SaaS solution is
- Key figures on the SaaS market
- Advantages of Kubernetes Kapsule for SaaS
- How to optimize your costs and loads while maintaining stability
- How to guarantee the security of your infrastructures
- The difference between a multi-instance and a multi-tenant architecture
As businesses strive to innovate while aiming to reduce risk, IT has become more critical to the success of the business than ever before. In this session, Nick Barcet, Senior Director of Product Management for OpenStack at Red Hat, explains the importance of an IT evolution to modernize data center infrastructure through a culture, process, and technology transformation. Learn what’s driving customer success around OpenStack and how Red Hat is collaborating within the community to provide businesses with the modernized infrastructure they need
Monitoring Security Policies for Container and OpenStack CloudsPLUMgrid
Container and OpenStack clouds often co-exist in data centers. Monitoring both environments require views into the underlay and overlay infrastructure, but infrastructure monitoring alone is no longer sufficient and needs to be paired with security policy views as containers and microservices are constantly reshaping data center traffic and flow patterns. A visualization GUI that correlates containers and VMs with security policy views provide a powerful tool for any operations team to detect security flow violations in real-time. Enterprises and cloud providers are adopting visualization and monitoring platforms in addition to OpenStack Horizon to keep their infrastructure running with 100% uptime. New tools that help with proactive remediation of issues are being deployed to quickly bring back the system to healthy conditions.
This document discusses cybersecurity considerations for industrial Internet of Things (IIoT) systems. It describes how IIoT systems are distributed across sensors, actuators and other devices with streaming data, analytics/control, and connectivity to IT systems and clouds. This distributed nature introduces potential vulnerabilities from threats. The document then introduces the Data Distribution Service (DDS) standard as a connectivity platform that can address challenges like security while supporting real-time and reliable data distribution. Key features of DDS like decentralization and publish/subscribe capabilities are described. Finally, the document outlines DDS security capabilities like authentication, access control, encryption and logging to secure IIoT systems from unauthorized access and tampering.
The document discusses the changing data center landscape and the rise of application-centric infrastructure (ACI) to address these changes. ACI provides a policy-based approach where application requirements are defined through application network profiles that can be applied across physical, virtual, and cloud infrastructure. This decouples applications from network infrastructure and provides visibility, security, mobility and automation through a centralized controller.
Presented by: Dr.-Ing. Dipl.-Inform. Daniel Ewert, Head of Research Group "Engineering Cybernetics," Assoc. Insitute for Management Cybernetics e.V., RWTH Aachen University
The Ice moon Enceladus of planet Saturn holds vast amounts of liquid water beneath its solid ice shell which possibly contain simple extraterrestrial life. For further examination an intended space mission by Germany's national space program aims to take probes from subsurface water using an autonomous ice probe. In order to navigate to a designated goal position, this probe must be able to localize itself within the ice. This localization is achieved by utilizing a distributed network of autonomous pinger units (APUs) which serve as external reference for the ice probe. The talk focusses on the technical details and communication and control mechanisms for this network.
Bringing Cloud Scale Efficiency to Communication Services Providers through R...Radisys Corporation
In this webinar, experts from Radisys and Intel will present the latest developments in applying Intel® RSD to SDN and NFV applications. Webinar participants will learn how the Radisys DCEngine™ hyperscale platforms, an implementation of Intel® RSD and inspired by Open Compute Project (OCP), can deliver the open software flexibility, DevOps deployment efficiencies, with carrier scalability for robust NFV deployments in emerging communication data center applications. The Webinar will include customer deployment examples, including Radisys DCEngine for open source software architectures, Central Office Re-architected as a Datacenter (CORD) projects, as well as Intel® RSD initiatives in telecom networking applications.
OpenStack is an open source cloud operating system that controls large pools of computing, storage, and networking resources. The document discusses OpenStack Sydney Summit 2017, future OpenStack events including the next OpenStack Design Summit and OpenStack Day, and the OpenStack Travel Support Program which helps fund attendance from developers around the world.
This document summarizes a presentation on developing autonomous vehicle architectures. It discusses using a data-centric middleware approach like the Data Distribution Service (DDS) standard to integrate sensors, fusion software, and control systems. DDS provides a common data model, quality of service controls, security features, and other benefits to help lower development risks. It also advocates consolidating electronic control units using a hypervisor and safety-certified operating system like QNX to isolate functions with different safety requirements. The presentation argues this is a lower-risk path to autonomous vehicle architecture than point-to-point and client-server approaches.
This document discusses the networking complexities that arise in hybrid and multi-cloud environments. It notes that routing traffic securely between disparate cloud platforms is challenging, and that managing multiple providers each with their own management and security methods complicates operations. The document then explores specific complexities around modernization, monitoring, suppliers and connectivity. It proposes several potential methods for simplifying this complexity, such as SD-WAN, cloud on-ramp service providers, carrier-neutral colocation, AWS Direct Connect and Azure ExpressRoute.
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Control and secure your applications on IBM SmartCloud Enterprise with Software Defined Networking from CohesiveFT.
An IBM SmartCloud ready partner, CohesiveFT address issues of security and control to allow customers to take full advantage of cloud computing. Cohesive FT’s VNS3 Software Defined Networking is an overlay network which allows you to extend your data centers into the cloud, join clouds together and have control over end to end 256 bit encryption, IP addressing, topology and multicast protocols.
The joint IBM and Cohesive webinar aired on June 20
This document discusses Pure Storage's self-driving storage and integration capabilities. It begins by explaining how IT organizations have evolved from specialized teams to cloud-focused teams. Pure Storage focuses on integration, simplicity and automation in VMware environments. It provides simple provisioning and analytics dashboards. Pure Storage also supports VVols, virtual machine restores, automation through VMware and PowerShell tools, and SAP copy automation. The document envisions continued integration with VMware and new capabilities for analytics, cloud automation, and joint technology development.
How to use SDN to Innovate, Expand and Deliver for your businessNapier University
SDN is about operationalizing networks to improve time-to-market, reduce risks, and reduce operating expenses by centralizing control and programmatically controlling network elements via open APIs. It requires an ecosystem to operationalize the entire network, including stateless L2-4 and stateful L4-7 services. F5's Synthesis solution operationalizes the stateful L4-7 network with programmability, automation, massive scalability, and partnerships with other SDN vendors to provide a full SDN solution.
How Cisco Provides World-Class Technology Conference Experiences Using Automa...InfluxData
Cisco Systems’ Cisco Live conference is held annually in the winter in Europe and in the summer in the United States. A typical US event hosts 600+ breakout sessions, dozens of keynotes, Certification Testing and walk-in labs. The conference serves over 26,000 attendees and all their mobile devices. The internal network team is responsible for ensuring that 2,200 wireless access points and 800 switches are providing sufficient network connectivity, availability and bandwidth for all attendees, speakers and organizers across 2 million square feet of conference space. Over 9 days (4 days of setup and 5 conference days), event staff and attendees have pushed over 84 terabytes of data from the conference to the internet! Dual 100 Gigabit/second primary links and backup 10 Gigabit/second links handle anything the users can throw at it.
The infrastructure required for this event also includes servers, VMs, and containerized workloads. With the growing need for hybrid events, Cisco’s team also ensures 100% video streaming uptime. Discover how Cisco uses InfluxDB to store key performance metrics across many IT domains alongside their commercial management solutions. The team continues to iterate and improve year-over-year to gain visibility into their network and devices to streamline troubleshooting and quickly respond to events before they become service impacting.
In this webinar, Jason Davis dives into:
Cisco’s approach to using automation, orchestration, Python scripts, SNMP, and streaming telemetry to collect network data
Their methodology to troubleshooting, prioritizing, and scheduling fixes to ensure the best client experience
How a time series platform is crucial to their real-time data analysis
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
Speaker: Jason Davis, Cisco Systems
Abstract: Since 1987 CiscoLive has been the premiere event for networking education, collaboration and fun. Las Vegas 2023 brought 19,600 attendees to the Mandalay Bay Conference Center and adjacent properties. To support that we have a few days to install and provision 2300 wireless access points, over 650 switches and a mobile data center. This session is a behind the scenes look at the automation and network monitoring done to support such a large event in such a short time-period. You'll hear about open source solutions like InfluxDB and Grafana. You'll also hear about the importance of standardized management interfaces like gRPC and NETCONF/YANG.
Cisco Live: Containers on Enterprise Compute and NetworksMichael Duarte
Containers are the next evolutionary step in how applications are managed and consumed. Allowing application teams to control and optimize their application deployment process. Along with the advantages provided to application teams, it's also a dynamic shift for data center design. Allowing for better resource utilization, and management resulting in both cost savings and faster IT. This session will explain how Cisco IT has delivered this new paradigm in Cloud Technology by using Cisco ACI, Cisco UCS and open-source solutions like Kubernetes.
1) The document discusses how to build a hybrid cloud-ready IT department, including defining the hybrid cloud, building a private cloud, consuming public clouds, and using Cisco's multicloud portfolio.
2) Building a private cloud involves utilizing existing resources, implementing IT as a service, automating provisioning, and using software-defined networking and orchestration tools.
3) Consuming public clouds requires meeting user expectations for simplified portals, delivery times, costs, security and access models or enabling users directly. Factors like costs, security, connectivity and compliance must be considered for workloads.
4) Cisco's multicloud portfolio aims to provide connectivity between clouds with tools for protection, advisory services,
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasBruno Teixeira
Jason Davis, Distinguished Services Engineer , Cisco Software-Defined Networking (SDN) is an exciting new approach to network IT Service Management. If you are trying to understand what SDN is and want to understand more about Controllers, APIs, Overlays, OpenFlow and ACI, then this introductory session is for you! We will cover the genesis of SDN, what it is, what it is not, and Cisco's involvement in this space. You may also be wondering what products and services are SDN-enabled and how you can solve your unique business challenges by enhancing and differentiating your services by leveraging network programmability. Cisco's SDN-enabled Products and Services will be explained enabling you to consider your own implementations. Since SDN extends network flexibility and functionality which impacts Network Engineering and Operations teams, we'll also cover the IT Service Management impact. Finally, we'll explore what skills and capabilities are needed to take advantage of SDN and Network Programmability. Network engineers, network operation staff, IT Service Managers, IT personnel managers, and application/compute SMEs will benefit from this session.
Security and Virtualization in the Data CenterCisco Canada
The evolving complexity of the data center is placing increased demand on the network and security teams to come up with inventive methods for enforcing security policies in these ever-changing environments. The goal of this session is to provide participants with an understanding of features and design recommendations for integrating security into the data center environment. This session will focus on recommendations for securing next-generation data center architectures. Areas of focus include security services integration, leveraging device virtualization, and considerations and recommendations for server virtualization. The target audience are security and data center administrators.
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUICisco Canada
This document provides an overview and agenda for a session on Cisco's Digital Network Architecture. The session will cover industry trends driving digital transformation, Cisco DNA and the importance of flexible hardware, the evolution of application specific integrated circuits (ASICs), DNA/Software-Defined Access, DNA Center, Encrypted Traffic Analytics, and the Catalyst 9000 series of switches. Attendees will learn how Cisco is innovating in silicon and software development and how these innovations are powering new platforms and solutions from the "gates to the GUI." The session aims to provide deeper insight into Cisco's latest switching silicon and how ASICs are designed and built to deliver advanced network capabilities.
Cisco Digital Network Architecture Deeper Dive From The Gates To The GuiCisco Canada
This document provides an overview of a Cisco session on the Cisco Digital Network Architecture. The session will cover Cisco's evolution from silicon gates to graphical user interfaces, including topics like Cisco DNA, Software-Defined Access, DNA Center, Encrypted Traffic Analytics, and the Catalyst 9000 family of switches. The session aims to provide insight into how Cisco is driving innovation through advances in programmable and flexible application specific integrated circuits (ASICs) and how this foundational technology enables new solutions.
Cumbre PR/AR sobre el mercado Telco en America LatinaFelipe Lamus
The document discusses technology transitions in the market and how they are impacting service providers and IT. It covers topics like public clouds, software-defined architectures, white box switches, and the industry shake up. It presents Cisco's strategies and platforms for leading through this transition, including the Application Centric Infrastructure (ACI), Cisco ONE platform, and evolving software and cloud offerings. Cisco aims to lead the next technology transition to the application economy through its platforms, architectures, software, and ability to disrupt markets as it has done previously through innovation.
Within the next five years, advances in display technology will make science fiction reality with screens that are unobtrusive, frameless, ambient and ultra - high definition. There no longer needs to be a 'black - hole' in the corner of the room, but screens will instead seamlessly blend into the home environment. Organic LED technology needs no edges at all, and it will be possible to create tiled surfaces of almost any shape using low -cost standard parts.
The concept of 'immersion', readily expressed in a simple control, really does give viewers the opportunity to enjoy programs according to their wishes at that moment, with content whose size, position, and level of interactivity adaptively matches the current needs of each audience. Key to the principle is a simple architecture which is readily extensible throughout the home and an engine which reacts to user input and metadata within a multiplicity of content items and streams. Our work has received enthusiastic press and industry attention as they share our excitement about TV’s potential future.
The document discusses building IT teams for the future through automation, programmability, DevNet certifications, and community. It outlines challenges faced by modern IT infrastructure including edge computing, IoT, and multi-cloud. New job roles focused on automation, DevOps, and security are needed. Cisco's certification suite including DevNet certifications help develop skills for roles like Network Automation Developer and DevSecOps Engineer. Example automation projects and use cases are provided to demonstrate how teams can start automating network operations. Community engagement through communities of practice and study groups is also recommended for continuous learning.
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabCisco Canada
This document provides an overview and agenda for a hands-on lab on the Network Service Orchestrator (NSO). It includes details on connecting to the lab environment, an introduction to NSO, installing NSO, using packages in NSO, and using the NETSIM network simulator. The lab will cover device and service management in NSO, YANG modeling, and service design. Attendees are provided credentials to access their assigned POD containing simulated network devices to complete the guided exercises over a 4 hour period.
Cisco HyperFlex is a hyperconverged infrastructure solution that combines compute, storage, networking and virtualization into an integrated system. It uses a distributed file system architecture that stripes data across all nodes simultaneously for high performance. HyperFlex offers flexible node configurations and continuous data optimization through inline deduplication and compression. It provides local and cloud-based management for easy deployment and monitoring of hyperconverged infrastructure from edge to core.
The presentation discusses critical network defenses and strategies for airgapping networks in emergency situations. It notes that most networks are not designed to disconnect from the internet quickly when needed. A scenario is presented where data exfiltration is actively occurring and must be stopped immediately. However, finding the right person to disconnect all networks could take over an hour, allowing significant damage. This highlights the need to design networks so that internet disconnection can occur in just a few minutes through automated and centralized controls.
Cisco® Application Centric Infrastructure (ACI) is an innovative architecture that radically simplifies, optimizes, and accelerates the entire application deployment lifecycle. Cloud, mobility, and big data applications are causing a shift in the data center model. Cisco ACI redefines the power of IT, enabling IT to be more responsive to changing business and application needs, enhancing agility, and adding business value. Cisco ACI delivers a transformational operating model for next-generation data center and cloud applications. This Cisco ACI hands lab will step you through from the ACI Fabric concepts to deployment. • Cisco ACI Overview • ACI Fabric Discovery • ACI Building Basic Network Constructs • ACI Building Policy Filters and Contracts • : Deploying a 3-Tier Application Network Profile • ACI Integrating with VMware • Deploying a Service Graph with Application Network Profile • Exploring Monitoring and Troubleshooting
The document discusses implementing virtual private networks (VPNs) using IPsec. It describes VPNs and their benefits, compares site-to-site and remote-access VPNs, and explains the components of IPsec VPNs including IPsec, IKE, encryption, authentication, and tunnel modes. The document also provides instructions for configuring a site-to-site IPsec VPN using the command line interface, including ISAKMP and IPsec policies, crypto maps, and verification steps.
Making Meetings Simple: "It's Just A Meeting" Cisco Canada
The document provides housekeeping notes for a Cisco Connect Toronto 2015 session. It reminds attendees to silence phones and laptops, ask questions during the learning session, and complete a post-session survey for a chance to win a headset. It also describes Cisco dCloud, a self-service platform for demonstrations and labs. Finally, it encourages continuing the conversation on Cisco Spark, Cisco's mobile collaboration app.
Cisco connect toronto 2015 mark zienkiewicz 2Cisco Canada
The document provides housekeeping notes for a Cisco Connect Toronto 2015 session. It reminds attendees to silence electronic devices, ask questions during the learning session, and complete a post-session survey for a chance to win a headset. It also describes Cisco dCloud, a self-service platform for demonstrations and labs, and promotes continuing conversation on Cisco Spark, a mobile collaboration app.
The document discusses demystifying security in Application Centric Infrastructure (ACI). It provides an overview of ACI and how it helps tackle data center security challenges by integrating security into applications, accelerating security deployment, and automating security insertion. ACI leverages Cisco security technologies to better protect the data center by providing leading security capabilities and integrating smoothly with the ACI architecture.
Similar to What network architects need to know about the evolving software lifecycle (SDLC) (20)
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
There is a paradigm shift occurring
Understand the develement concepts going on today.
Look at service mesh & routing rules.
PSOGEN-1013 What Network Architects Need to Know About the Evolving Software Lifecycle (SDLC)
As our applications transform to cloud-native-first architectures, policy replaces configuration files to define infrastructure at all layers; networking, compute, storage, and of course application. Developers now have almost unlimited choices in how to solve their architecture, agility and scale challenges using the software defined infrastructure that powers our cloud-native world. Prescriptive topologies for networks are too rigid to support the needed agile iterations of today’s application. The software development lifecycle (SDLC) evolved to support multiple iterations for innovation and has some lessons for all of us. This session describes SDLC evolutions to help network and infrastructure experts as they strive to connect business value to applications to infrastructure while constructing the networks of the future.
Software defined paradigm shift
The SDLC in a nutshell – a lot of this is shifting left.
AppDev software defined networking
Reliability is everyone’s responsibility
Becoming dangerous in the new world
Hi, I am marco, and I have worked for one of the top 50 international banks, managed data centers for hospitals as part of CSC (now DXC) and managed teams in 13 different countries. Before joining AppDynamics, I spent 5 years as an industry analyst and running the data science team at 451 Research. These are a few of the places where you can read my writing or interviews.
I have seen technology from every side: as a vendor, operations, development , analyst and buyer.
So enough about me.
Marc Andreessen's Famous Quote
Since we are in San Diego, here are some taco’s since I have the 1pm session.
Software has been feeding the world!
Let’s go through an evolution of application infrastructure.
In this example the taco is actually a request.
This is how fulfilling requests used to look.
You would have a load balancer feeding the request into a choice of active VM’s.
And in case of problems, you would have a pair of standby VMs.
This is pretty easy to plan for and connect.
And remember, I am taking a developer viewpoint here rather than an operations one.
But what is happening today?
Today is more dynamic.
We would use a container orchestrator like K8S. Now, the state can change on a regular basis.
We have caught up to here.
So when our request comes in, K8S might say ’umm state B looks best for that, that state B’.
Cluster size is more predictable. But where we are heading is even more dynamic.
This may be the future, or you may already be there.
This is the serverless revolution.
Who is using microservices today?
With any request, the infrastructure is spun up and down per request.
Wow!
Totally dynamic to the point of being ephemeral.
This is the modern paradigm.
An important part of it is that the serverless function being called does not know the trigger that is calling it. That trigger could be 3 or 4 levels upstream in the code. The function is simply called and it produces an output. I will come back to this a little later.
The ability to re-create and re-constitute infrastructure at every step of the lifecycle is the big difference.
Sicne we have to recreate infrastructure along with the software.
So here we have a container orchestrator definition. I describe what I want and the orchestrator will go and get it.
This format is yaml.
Since we are at Cisco live, this defines my Cisco live Taco!
In the middle here is an application-centric concept that usually the network team would have.
What are the ports that I need?
What are the virtual IP’s?
And also setting up some of the ingress needs.
This is what we call shifting left for the development team.
They are defining eventual production infrastructure needs while developing code.
And with JenkinsX, they can create testing frameworks for their code to ensure compatibility.
This is the execution of software defined infrastructure from the developer viewpoint.
This is the pipeline paradigm.
Anytime there is a request, we have to recreate!
And this paradigm led to the bloom of SDI.
THIS IS IT. Just using what you need when you need it.
Hello SDLC. Software Development Lifecycle.
So what can infrastructure and operations folks learn from the trends in development?
SDLC allows a lot of innovation to occur because when doing something you do not have to be perfect.
In the past, with waterfall, you would spend months before a customer got to see it and let the developer know whether the work paid off.
By moving left, and becoming agile, there is a lot more experimentation possible.
It all becomes about iteration.
A lot of trial and error to get things to work.
And they are allowed to fail.
A lot of time now, you are making small changes.
Building a little piece of the application environment at a time.
Requirements come along iteratively. You are building a little piece of the environment at a time and you want to build it iteratively.
Incremental value is crucial in the agile world.
You want to create not a fixed set of definitions, but a definition of the requirement that can be passed to an orchestrator.
And it is ok that you will not get it completely right on the first attempt.
It takes iteration to make something perfect. These tacos are FAR from perfect, but with iteration …
We can definitely get there.
So in networking, what does this actually look like.
So SDLC has the concept of multiple environments – we are separating the places where we make change.
So if we want to make a particular change in development, we can blow away the dev environment and make the changes without impacting other environments.
And the key aspect here is – in the same way that the developer code is transferred from dev, to test, to QA, to production making sure it is not changed along the way. That what we tested is what ends up in production. We need to ensure the ephemeral controls, the yaml descriptors also travel and live with the code and go through the same processes.
The automated builds and testing from the DevOps discipline is not just for developers, it is for network as well.
These silly AppDev teams keep asking for more networking resources.
JUST ONE MORE TACO!
Or in the networking case, just one more endpoint. Why do developers keep asking for more endpoints?
This is an oversimplification, but with a trifecta like this we can start applying networking goals.
I was part of a panel interview in Atlanta last week and one of the audience questions was around how a network person could know what ports a monitored application used.
This has been a continual conflict of balancing the security and performance needs against the appdev lack of clarity of what specifically is being used.
Lets go back to our Taco request to understand how the changes in SDLC changed the network.
This is easy.
There are 4 boxes.
It is pretty easy, and we have a lot of control.
As we come forward in time … we are more dynamic.
The state can change on a regular basis.
To represent this, we have to introduce more concepts.
One static endpoint = ciscolivetaco.com
Depending on some choices K8S makes, we might have 4 separate addresses AND 4 separate routes to those addresses.
And while it is still maybe MOSTLY yours, we also have concepts of third party cloud providers and infrastructure providers.
Finally with the future state:
This is a lot harder.
You will have 3 static endpoints, but you will have an indeterminate number of routes and addresses
AND this is NOT your infrastructure!
So you are dealing with a paradigm where software is defining and making decisions around the network in a dynamic way.
Survival for network admins means taking a policy approach that can scale and deploy automatically AND can improve with iteration.
Software engineers don’t know that CIDR means.
They do not understand what a different world /8 and /16 create.
A good friend of mine had his biggest outage as a result of not understanding this.
He was part of the first team in his enterprise to move to AWS.
And in those early days his networking team too the attitude that they were not going to get involved in architecting networking that was not on-premise.
As part of that they had to learn how to setup a VPC or virtual private cloud.
By getting this setting wrong, he basically cut off half the internet.
The questions raised here was “He was an app developer, why is he working on CIDR? A purely network function’
---======-----
Classless Inter-Domain Routing (CIDR)
Classless Inter-Domain Routing is a method for allocating IP addresses and IP routing. The Internet Engineering Task Force introduced CIDR in 1993 to replace the previous addressing architecture of classful network design in the Internet. Its goal was to slow the growth of routing tables on routers across the Internet, and to help slow the rapid exhaustion of IPv4 addresses.
/8 255.0.0.0 1 A 16,777,214
/16 255.255.0.0 1 B 65,024
The reality is that developers ARE and WILL be defining network needs within their solutions.
My friends comment in the aftermath was ‘he wished he had learned sooner’.
They need the network engineering or netops team to help them out!
There is a middle ground happening now.
Many enterprises are now building a platform engineering team that builds the places where the applications will go.
Networking now can be seen as part of the platform.
Networking now can be seen as part of the platform.
Understand the SDLC and how their process works, then help understand how networking works.
Find a developer peer and jointly hold a brownbag for the dev team on how to configure networks in K8S, or Jenkins, or whatever is used.
Explain how ACI policy works.
Rescue them!
Now, let’s get dangerous and talk about the developer pipeline.
This is what the devops teams are working with in the last few years.
This is a webserver installation defined for chef.
We are describing an end state. We need to have a particular internet server with this certificate.
This is what modern infrastructure is: we describe what we need and having it execute on a particular platform.
https://docs.chef.io/resource_rpm_package.html
And some thing else you should be aware of is service mesh.
Service Mesh, side car
Is pushing a lot of network concepts.
Servicemesh is a place where serverless services can be made discoverable and it defines how they interoperate with each other.
So looking at an example from Istio.
Maxconnections was a sort of thing that was dealt with load-balancer team. Now, this is core within the code being built.
This is difficult for Developers, to build application-centric networking logic.
https://istio.io/docs/concepts/traffic-management/
Coming back to the pipeline idea again, you could be using spinnaker, but this example is using harness.
So as we are moving something to production, it gets pushed through a pipeline.
This even gets to the extent that if you are in an AppDev team you may have heard of GitOps.
Lots of developers are using git as a source management solution. From git you can kickoff a chain of events that moves things into production automatically.
And one final point about how to survive this SDLC-driven infrastructure.
As you will know AppDynamics is part of Cisco. And that combines our existing strengths around applications with cisco’s strengths around networking and infrastructure.
This combination is really about helping you troubleshooting issues whether in the development, QA and testing environments, and of course in production should something get through to that point.
You may wonder how it works that we make things more efficient and end up using more resources.
There is a name for that.
He was talking about coal consumption and the improvements of the Watt’s steam engine that delivered more efficient steam for less coal. Economists predicted less coal usage, but instead coal usage went up.
Jevon identified that when there is elastic demand, increased efficiency can lead to paradoxical increased consumption.
With the efficiency and agility that cloud provides, people end up using more of it!
Good news is – you can use our product to fight the paradox.
Software building and deployment pipeline is going through a massive paradigm shift.
The outcome is that AppDev teams are engaging on an intimate level with networking concepts.
Routing rules are moving into the development team.
The key takeaway here is that as networks and infrastructure become software defined, network
experts need to be more closely aligned to the platform and SDLC teams.
Find a peer in the SDLC team to help you understand the software deployment process from coding to production – not just the last step.
Pay them back by helping them understand networking policy and ACI.
Get to the point where you are working jointly on Chef and K8S yaml.
You will deliver network as a platform.
In a software defined world, we are all engineers.
The important messages we want to highlight are 1) appd is in the showcase in the “Business Insights” area 2) you can schedule 1:1 meetings with product specialists during the event and 3) ask about AppDynamics visibility packs to get started.