Building and Delivering Software in a Faster and More Consistent WayDevOps Indonesia
ย
The document discusses how organizations can deliver software faster and more consistently through DevOps practices and cloud native technologies. It outlines initiatives around adopting cloud native technologies and DevOps culture to enable continuous delivery. The key benefits highlighted include faster release cycles, reduced bugs, and improved trust between development and operations teams. Dynatrace is presented as a software intelligence platform that can help achieve an autonomous cloud environment through features like automated deployment, self-healing, and full stack observability powered by artificial intelligence.
Google Cloud Build - Sfeir Lunch Janvier 2019Gaรซlle Acas
ย
Google Cloud Build allows developers to automate the build, test and deployment process for applications. It provides containerized build steps that can be chained together to run tasks like installation, building, testing, deployment, etc. The workspace is mounted as a volume within each container step, allowing each step to access the output of previous steps. Cloud Build offers pricing of $0.003 per minute, with local builds also possible using cloud-build-local. Resources like documentation, Slack community and GitHub repos are available to help users get started with Cloud Build.
DevOps Indonesia is a community that was established in October 2017 to promote DevOps practices in Indonesia. It has over 2,300 members on Meetup.com and 3,400 members on Telegram. The community holds meetups at least monthly where members share their experiences with DevOps culture, automation tools, and practices. It also partners with other communities and organizations to hold larger events like DevOpsDays Jakarta, an annual conference held in April. The document provides details on DevOps Indonesia's activities and events from 2017-2020 and encourages participation and sharing of DevOps knowledge.
This document summarizes a presentation about securing containers within 30 minutes using Aqua Security. The presentation covers 6 top container security concerns like open source supply chain attacks and infrastructure flaws. It demonstrates how Aqua Security addresses these concerns through controls like container immutability, dynamic analysis, and admission control. Key takeaways are getting immediate value from Aqua in 30 minutes through environment discovery and runtime security, while maintaining developer flexibility. Attendees are encouraged to try free Aqua security tools.
Api Lifecycle Operation with Open Source ProductsDevOps Indonesia
ย
This document summarizes Muhammad Edwin's presentation on API lifecycle management with open source products. The presentation covers what an API is and its importance in microservices architecture. It then defines the stages of an API lifecycle as design, mock, publish, manage, and operate. It provides examples of open source tools that can be used at each stage, such as OpenAPI, Microcks, Castle Mock, Ansible, and Jenkins. The presentation emphasizes that managing the entire lifecycle of APIs is important as the number of services, developers, and operations scale.
[Online] How DevOps Tranforming Service Operation and PlatformDevOps Indonesia
ย
This document outlines the agenda for an online DevOps meetup in Indonesia on July 8, 2020. The meetup will include two presentation sessions, each including a presentation and Q&A period, on the topics of "How DevOps Tranforming Service Operation and Platform" and "Service Operations Transformation Journey". Ground rules for the online event are also provided, noting it will be livestreamed, recorded, and published on the DevOps Indonesia YouTube channel. Background on the DevOps Indonesia community is given, including its establishment in 2017, membership numbers, and communication channels.
Integrate Security and Compliance into your CI/CD PipelineDevOps Indonesia
ย
This document discusses integrating security and compliance into continuous integration/continuous delivery (CI/CD) pipelines. It advocates for automating security checks and shifting them left in the development process using a DevSecOps approach. Specifically, it recommends automating security tools and practices at various pipeline stages, including static code analysis, software composition analysis, dynamic application security testing, and web application firewall shielding in production. The document also describes how the F5 Advanced Web Application Firewall can be automated and integrated into CI/CD toolchains to speed up web application firewall policy deployment and provide consistent, repeatable security controls.
DevOps Indonesia is a community that was established in October 2017 to promote DevOps practices in Indonesia. It has over 2300 members on Meetup.com and 3400 members on Telegram. The community holds meetups at least once per month where members share their experiences with DevOps practices like culture, automation, etc. It also collaborates with other communities and organizations on events. Past meetups have covered topics like infrastructure as code, monitoring, security, and containers.
Observe and command your fleets across any kubernetes with weave git opsWeaveworks
ย
Modern day deployments can often resemble the chaos of navigating the high seas with poor visibility and the dangers of unexpected events. Dev and test environments, running test data sets and feature flags in the public cloud, and production being served from a self-managed site that securely hosts client data can all be a challenge without full observability and control.
In this webinar, we show how you can reliably expand your Kubernetes footprint with Weave GitOps. Confidently observe and control your fleets, all from a single pane of glass across any environment.
Join this webinar to learn how to:
Control the health and propagation of customized clusters
Easily assign and secure clusters across multiple teams for multiple purposes
Observe all actions across all environments all from within Git
Understand managing all deployments across your cluster and fleets
The document discusses the service operations transformation journey to DevOps using an inside-out approach. It advocates setting up a safe-to-fail environment and focusing on individuals and small teams first before scaling out agile practices. The Dev and Ops teams combine Scrum and Kanban frameworks, with Ops using Kanban to handle requests and incidents in small daily iterations while Dev uses Scrum for product backlogs and iterations. This dual-band model aims to achieve continuous creation, resilience, and improvement through empathy, design, and measurement to ensure value.
In this webinar we will be discussing how Orange Business Services, a global IT and communications services provider, and its large scale distributed cloud and edge network can achieve sovereignty with the hybrid EKS and Weave GitOps shared services platform.
Topics we are covering:
How EKSD (EKS on premise) and EKS (AWS managed Kubernetes) is used to establish common workflows that minimize operational overhead
How to lower operational costs with the use of ephemeral cloud environments for development and testing
How to achieve operational Sovereignty by enabling the operation of the shared services platform in on premise, air gapped and non-tethered configurations
Yann Rouillard presented principles for a developer-friendly CI/CD pipeline for Kubernetes applications. The principles include having a simple interface like a deployment file template, validating configuration early to fail fast, making the pipeline self-service through automation and templates, providing clear error messages with context, and ensuring the pipeline is troubleshoot-able by developers. Examples were given of implementing these principles using tools like Python scripts, Helm, schemas, and error tracking software. The talk concluded with a Q&A section and thanks to the audience.
Bi-modal IT: Bridge Traditional and Agile IT Services by Michal Svec, SUSEDocker, Inc.
ย
If you are in the shoes of traditional IT admin or developer and are looking to be more agile or run the data center in a more agile manner, containers provide the right vehicle. However, you also want the enterprise foundation for your infrastructure so you are not spending time supporting container environment. Learn about how you can collaborate securely to create Docker apps or integrate container applications with cloud or quickly deploy Docker using a minimized host OS.
DevOps Spain 2019. David Caรฑadillas -CloudbeesatSistemas
ย
This document discusses using Jenkins X to automate CI/CD pipelines on Kubernetes. It begins by introducing Jenkins X and its capabilities for CI/CD automation on Kubernetes using custom resource definitions. It then discusses how Jenkins X embraces a GitOps model using Git as the source of truth for promoting applications through environments. Finally, it invites the reader to a CloudBees event to learn more about building a continuous software delivery system with Jenkins X.
This document discusses DevOps and infrastructure as code. It describes how infrastructure as code allows infrastructure to be provisioned in an automated way using code and templates rather than manual configuration. Specific tools mentioned include Ansible, Nginx, and F5. Benefits of infrastructure as code include reduced errors, faster delivery, standardization, and scalability. The document also discusses API security and how security responsibilities are shared between development and operations teams. It emphasizes that security cannot be built only into application code and must be supported at the infrastructure level as well.
Continuous Everything in a Multi-cloud and Multi-platform EnvironmentVMware Tanzu
ย
This document discusses continuous delivery strategies using Pivotal technologies like Pivotal Build Service, Pivotal Container Service, and Spinnaker. Pivotal Build Service allows building Docker images without Dockerfiles using buildpacks. Spinnaker is an open source multi-cloud delivery platform that provides deployment strategies and rollback capabilities. The document demonstrates continuous deployment of a Spring Boot app to PKS using Concourse CI and Spinnaker for deployment automation and monitoring.
Talk about the basic principles and concepts of CI/CD as a set of practices in order to reduce integration errors through automated implementations for testing and deployments as well as the tooling behind this philosophy.
This document provides an overview of cloud native monitoring with Prometheus. It discusses Prometheus and how it has become the standard for metrics-based monitoring. It covers monitoring systems and applications with Prometheus, including scraping metrics, querying, and instrumenting applications to expose metrics. It also discusses alerting with Alertmanager and scaling Prometheus through federation and projects like Thanos. The document aims to explain how Prometheus enables observability of systems in cloud native environments and the growing ecosystem around Prometheus.
Google Deployment Manager allows users to define and provision infrastructure resources in Google Cloud Platform through code. The speaker will discuss how GDG chapters can use Google Deployment Manager and infrastructure as code to automate deployments, build communities of experts on Google technologies like Cloud and Golang, and help members get certified. Google Deployment Manager is similar to AWS CloudFormation in that it allows defining and provisioning infrastructure through templates.
The document discusses DevOps principles, goals, advantages, disadvantages and tools. It summarizes that DevOps is a culture that encourages collaboration between development and operations teams to build and maintain software quickly while improving quality and reliability. Traditional processes make modern architectures hard to manage at scale while DevOps aims to remove barriers and bottlenecks through continuous delivery, automation, collaboration and feedback loops.
Building Cloud Native Architectures with SpringKenny Bastani
ย
Cloud-native architectures are an emerging practice of software development and delivery. This deck was presented at the Pivotal Cloud Native roadshow and teaches developers how to build modern cloud-native applications using the popular JVM-based application framework: Spring Boot. You'll be provided with a walk through from the monolith application architecture into the more modern microservices architecture. Two open source reference architectures are introduced for building cloud-native microservices. Learn the basics of cloud native platforms and also the approaches for integrating and strangling legacy systems.
https://pivotal.io/event/pivotal-cloud-native-roadshow
The document discusses continuous integration, continuous deployment, and infrastructure as code for modern applications. It describes how AWS services like CodePipeline, CodeBuild, CodeDeploy, and CloudFormation can be used to automate the build, test, and deployment of serverless and containerized applications. Continuous integration ensures code changes are built and tested regularly. Continuous deployment enables automated deployments to staging and production. Modeling infrastructure as code allows infrastructure changes to be released predictably using the same tools as code changes.
Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021VMware Tanzu
ย
This document discusses achieving DevSecOps outcomes with Tanzu Advanced. It outlines how Tanzu Advanced provides capabilities across the DevSecOps lifecycle, including development environments, continuous integration/delivery, container packaging, a validated catalog of images, Kubernetes deployment and operations, connectivity and observability. It notes how Tanzu Advanced enables securing containers and applications, accelerating developer velocity, and simplifying multi-cloud operations.
StripeCon 2021: A Cloud-Native approach to running Silverstripe on Google Clo...Jon Su
ย
This document is a presentation on running the Silverstripe content management system on Google Cloud Platform (GCP) using cloud-native principles. It discusses the history of web hosting, defines cloud-native approaches, and provides step-by-step instructions for deploying a basic Silverstripe project on GCP. Specifically, it covers using Cloud Storage for assets, Cloud SQL for the database, and App Engine for hosting the application. The presentation emphasizes automation, scalability, and removing the need for manual infrastructure management that cloud-native approaches provide.
Introduction to Spring Cloud KubernetesVMware Tanzu
ย
This document is an introduction to Spring Cloud Kubernetes presented by Alexandre Roman on July 4th, 2019. It discusses how Spring Cloud Kubernetes allows writing portable applications using the same source code for different environments with seamless integration to Kubernetes. Key features covered include native service discovery leveraging Kubernetes DNS and events, pod health indicators, Kubernetes-aware profiles, and support for ConfigMaps and Secrets. The presentation includes a demo and questions.
Spring Cloud Kubernetes: An Easier Path from Idea to ProductionVMware Tanzu
ย
Kubernetes might be a dream for operations teams willing to learn its intricacies, but it can be a nightmare for developers whose primary goal is getting working applications into production.
Spring Cloud Kubernetes addresses developersโ needs by making it simple to deploy Spring Cloud and Spring Boot applications into Kubernetes environments.
This webinar will explore some key Spring Cloud Kubernetes concepts and demonstrate the process of porting an existing application onto a Kubernetes cluster.
This document provides an introduction to cloud native computing, including:
- Cloud native computing enables rapid application development and deployment at scale through distributed systems, automation, and other techniques.
- Traditional monolithic architectures are difficult to scale and maintain, while distributed systems improve availability, performance, and scalability through decomposition and parallelization.
- Cloud native platforms are built for distributed applications and provide automation, continuous deployment, efficient resource utilization, fault tolerance, security and scalability.
This document discusses convergence across the cloud native ecosystem and connections between communities. It highlights how connected communities can foster cross-community collaboration through various means like commons sites, briefings, code contributions, and mailing lists. Examples are given of relationships between individuals, projects, and corporations in the Kubernetes and OpenShift ecosystems. Key players like Red Hat, IBM, Uber, and Amadeus are discussed in terms of their involvement in projects like Kubernetes, OpenShift, Jaeger, OpenStack, and more. The importance of inter-corporate relationships and upstream engagement is also touched on.
The combination of StackPointCloud with NetApp creates NetApp Kubernetes Service, the industryโs first complete Kubernetes platform for multi-cloud deployments and a complete cloud-based stack for Azure, Google Cloud, AWS, and NetApp HCI. Further, Trident is a fully supported open source project maintained by NetApp, designed from the ground up to help meet the sophisticated persistence demands of containerized applications.
Building Cloud-Native Applications with a Container-Native SQL Database in th...NuoDB
ย
Agencies of all sizes are struggling to keep pace with rapidly changing mission needs and regulations. Their success is more dependent than ever on their ability to increase agility and take advantage of cloud and cloud-native architectures.
This webinar will cover how public sector agencies are working with Red Hat and NuoDB to:
Seamlessly deploy and manage applications in a modern architecture; Maintain the benefits of SQL and gain on-demand, horizontal scalability; Deploy a technology stack that facilitates efficiency and a DevOps structure.
Observe and command your fleets across any kubernetes with weave git opsWeaveworks
ย
Modern day deployments can often resemble the chaos of navigating the high seas with poor visibility and the dangers of unexpected events. Dev and test environments, running test data sets and feature flags in the public cloud, and production being served from a self-managed site that securely hosts client data can all be a challenge without full observability and control.
In this webinar, we show how you can reliably expand your Kubernetes footprint with Weave GitOps. Confidently observe and control your fleets, all from a single pane of glass across any environment.
Join this webinar to learn how to:
Control the health and propagation of customized clusters
Easily assign and secure clusters across multiple teams for multiple purposes
Observe all actions across all environments all from within Git
Understand managing all deployments across your cluster and fleets
The document discusses the service operations transformation journey to DevOps using an inside-out approach. It advocates setting up a safe-to-fail environment and focusing on individuals and small teams first before scaling out agile practices. The Dev and Ops teams combine Scrum and Kanban frameworks, with Ops using Kanban to handle requests and incidents in small daily iterations while Dev uses Scrum for product backlogs and iterations. This dual-band model aims to achieve continuous creation, resilience, and improvement through empathy, design, and measurement to ensure value.
In this webinar we will be discussing how Orange Business Services, a global IT and communications services provider, and its large scale distributed cloud and edge network can achieve sovereignty with the hybrid EKS and Weave GitOps shared services platform.
Topics we are covering:
How EKSD (EKS on premise) and EKS (AWS managed Kubernetes) is used to establish common workflows that minimize operational overhead
How to lower operational costs with the use of ephemeral cloud environments for development and testing
How to achieve operational Sovereignty by enabling the operation of the shared services platform in on premise, air gapped and non-tethered configurations
Yann Rouillard presented principles for a developer-friendly CI/CD pipeline for Kubernetes applications. The principles include having a simple interface like a deployment file template, validating configuration early to fail fast, making the pipeline self-service through automation and templates, providing clear error messages with context, and ensuring the pipeline is troubleshoot-able by developers. Examples were given of implementing these principles using tools like Python scripts, Helm, schemas, and error tracking software. The talk concluded with a Q&A section and thanks to the audience.
Bi-modal IT: Bridge Traditional and Agile IT Services by Michal Svec, SUSEDocker, Inc.
ย
If you are in the shoes of traditional IT admin or developer and are looking to be more agile or run the data center in a more agile manner, containers provide the right vehicle. However, you also want the enterprise foundation for your infrastructure so you are not spending time supporting container environment. Learn about how you can collaborate securely to create Docker apps or integrate container applications with cloud or quickly deploy Docker using a minimized host OS.
DevOps Spain 2019. David Caรฑadillas -CloudbeesatSistemas
ย
This document discusses using Jenkins X to automate CI/CD pipelines on Kubernetes. It begins by introducing Jenkins X and its capabilities for CI/CD automation on Kubernetes using custom resource definitions. It then discusses how Jenkins X embraces a GitOps model using Git as the source of truth for promoting applications through environments. Finally, it invites the reader to a CloudBees event to learn more about building a continuous software delivery system with Jenkins X.
This document discusses DevOps and infrastructure as code. It describes how infrastructure as code allows infrastructure to be provisioned in an automated way using code and templates rather than manual configuration. Specific tools mentioned include Ansible, Nginx, and F5. Benefits of infrastructure as code include reduced errors, faster delivery, standardization, and scalability. The document also discusses API security and how security responsibilities are shared between development and operations teams. It emphasizes that security cannot be built only into application code and must be supported at the infrastructure level as well.
Continuous Everything in a Multi-cloud and Multi-platform EnvironmentVMware Tanzu
ย
This document discusses continuous delivery strategies using Pivotal technologies like Pivotal Build Service, Pivotal Container Service, and Spinnaker. Pivotal Build Service allows building Docker images without Dockerfiles using buildpacks. Spinnaker is an open source multi-cloud delivery platform that provides deployment strategies and rollback capabilities. The document demonstrates continuous deployment of a Spring Boot app to PKS using Concourse CI and Spinnaker for deployment automation and monitoring.
Talk about the basic principles and concepts of CI/CD as a set of practices in order to reduce integration errors through automated implementations for testing and deployments as well as the tooling behind this philosophy.
This document provides an overview of cloud native monitoring with Prometheus. It discusses Prometheus and how it has become the standard for metrics-based monitoring. It covers monitoring systems and applications with Prometheus, including scraping metrics, querying, and instrumenting applications to expose metrics. It also discusses alerting with Alertmanager and scaling Prometheus through federation and projects like Thanos. The document aims to explain how Prometheus enables observability of systems in cloud native environments and the growing ecosystem around Prometheus.
Google Deployment Manager allows users to define and provision infrastructure resources in Google Cloud Platform through code. The speaker will discuss how GDG chapters can use Google Deployment Manager and infrastructure as code to automate deployments, build communities of experts on Google technologies like Cloud and Golang, and help members get certified. Google Deployment Manager is similar to AWS CloudFormation in that it allows defining and provisioning infrastructure through templates.
The document discusses DevOps principles, goals, advantages, disadvantages and tools. It summarizes that DevOps is a culture that encourages collaboration between development and operations teams to build and maintain software quickly while improving quality and reliability. Traditional processes make modern architectures hard to manage at scale while DevOps aims to remove barriers and bottlenecks through continuous delivery, automation, collaboration and feedback loops.
Building Cloud Native Architectures with SpringKenny Bastani
ย
Cloud-native architectures are an emerging practice of software development and delivery. This deck was presented at the Pivotal Cloud Native roadshow and teaches developers how to build modern cloud-native applications using the popular JVM-based application framework: Spring Boot. You'll be provided with a walk through from the monolith application architecture into the more modern microservices architecture. Two open source reference architectures are introduced for building cloud-native microservices. Learn the basics of cloud native platforms and also the approaches for integrating and strangling legacy systems.
https://pivotal.io/event/pivotal-cloud-native-roadshow
The document discusses continuous integration, continuous deployment, and infrastructure as code for modern applications. It describes how AWS services like CodePipeline, CodeBuild, CodeDeploy, and CloudFormation can be used to automate the build, test, and deployment of serverless and containerized applications. Continuous integration ensures code changes are built and tested regularly. Continuous deployment enables automated deployments to staging and production. Modeling infrastructure as code allows infrastructure changes to be released predictably using the same tools as code changes.
Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021VMware Tanzu
ย
This document discusses achieving DevSecOps outcomes with Tanzu Advanced. It outlines how Tanzu Advanced provides capabilities across the DevSecOps lifecycle, including development environments, continuous integration/delivery, container packaging, a validated catalog of images, Kubernetes deployment and operations, connectivity and observability. It notes how Tanzu Advanced enables securing containers and applications, accelerating developer velocity, and simplifying multi-cloud operations.
StripeCon 2021: A Cloud-Native approach to running Silverstripe on Google Clo...Jon Su
ย
This document is a presentation on running the Silverstripe content management system on Google Cloud Platform (GCP) using cloud-native principles. It discusses the history of web hosting, defines cloud-native approaches, and provides step-by-step instructions for deploying a basic Silverstripe project on GCP. Specifically, it covers using Cloud Storage for assets, Cloud SQL for the database, and App Engine for hosting the application. The presentation emphasizes automation, scalability, and removing the need for manual infrastructure management that cloud-native approaches provide.
Introduction to Spring Cloud KubernetesVMware Tanzu
ย
This document is an introduction to Spring Cloud Kubernetes presented by Alexandre Roman on July 4th, 2019. It discusses how Spring Cloud Kubernetes allows writing portable applications using the same source code for different environments with seamless integration to Kubernetes. Key features covered include native service discovery leveraging Kubernetes DNS and events, pod health indicators, Kubernetes-aware profiles, and support for ConfigMaps and Secrets. The presentation includes a demo and questions.
Spring Cloud Kubernetes: An Easier Path from Idea to ProductionVMware Tanzu
ย
Kubernetes might be a dream for operations teams willing to learn its intricacies, but it can be a nightmare for developers whose primary goal is getting working applications into production.
Spring Cloud Kubernetes addresses developersโ needs by making it simple to deploy Spring Cloud and Spring Boot applications into Kubernetes environments.
This webinar will explore some key Spring Cloud Kubernetes concepts and demonstrate the process of porting an existing application onto a Kubernetes cluster.
This document provides an introduction to cloud native computing, including:
- Cloud native computing enables rapid application development and deployment at scale through distributed systems, automation, and other techniques.
- Traditional monolithic architectures are difficult to scale and maintain, while distributed systems improve availability, performance, and scalability through decomposition and parallelization.
- Cloud native platforms are built for distributed applications and provide automation, continuous deployment, efficient resource utilization, fault tolerance, security and scalability.
This document discusses convergence across the cloud native ecosystem and connections between communities. It highlights how connected communities can foster cross-community collaboration through various means like commons sites, briefings, code contributions, and mailing lists. Examples are given of relationships between individuals, projects, and corporations in the Kubernetes and OpenShift ecosystems. Key players like Red Hat, IBM, Uber, and Amadeus are discussed in terms of their involvement in projects like Kubernetes, OpenShift, Jaeger, OpenStack, and more. The importance of inter-corporate relationships and upstream engagement is also touched on.
The combination of StackPointCloud with NetApp creates NetApp Kubernetes Service, the industryโs first complete Kubernetes platform for multi-cloud deployments and a complete cloud-based stack for Azure, Google Cloud, AWS, and NetApp HCI. Further, Trident is a fully supported open source project maintained by NetApp, designed from the ground up to help meet the sophisticated persistence demands of containerized applications.
Building Cloud-Native Applications with a Container-Native SQL Database in th...NuoDB
ย
Agencies of all sizes are struggling to keep pace with rapidly changing mission needs and regulations. Their success is more dependent than ever on their ability to increase agility and take advantage of cloud and cloud-native architectures.
This webinar will cover how public sector agencies are working with Red Hat and NuoDB to:
Seamlessly deploy and manage applications in a modern architecture; Maintain the benefits of SQL and gain on-demand, horizontal scalability; Deploy a technology stack that facilitates efficiency and a DevOps structure.
Oracle - Continuous Delivery NYC meetup, June 07, 2018Oracle Developers
ย
The document discusses Oracle's approach to containerization and Kubernetes. It provides an overview of container native development and Oracle's vision of an end-to-end container native suite. It also describes Oracle Container Engine (OKE) which provides a fully managed Kubernetes service on Oracle Cloud Infrastructure.
This document provides an overview of cloud-native development and Red Hat OpenShift:
- It discusses moving to cloud-native development through optimizing existing applications, developing new applications faster, and automating infrastructure.
- Red Hat OpenShift is positioned as the enterprise solution for running Kubernetes in production, as it addresses limitations of "raw" Kubernetes through features like developer tools, operations automation, and additional services.
- New features are highlighted for OpenShift 4.6, including improved application topology and monitoring, a new log forwarding API, and enhancements to the developer experience.
The Fastest Way to Redis on Pivotal Cloud FoundryVMware Tanzu
ย
What do developers choose when they need a fast performing datastore with a flexible data model? Hands-down, they choose Redis.
But, waiting for a Redis instance to be set up is not a favorite activity for many developers. This is why on-demand services for Redis have become popular. Developers can start building their applications with Redis right away. There is no fiddling around with installing, configuring, and operating the service.
Redis for Pivotal Cloud Foundry offers dedicated and pre-provisioned service plans for Cloud Foundry developers that work in any cloud. These plans are tailored for typical patterns such as application caching and providing an in-memory datastore. These cover the most common requirements for developers creating net new applications or who are replatforming existing Redis applications.
We'd like to invite you to a webinar discussing different ways to use Redis in cloud-native applications. We'll cover:
- Use cases and requirements for developers
- Alternative ways to access and manage Redis in the cloud
- Features and roadmap of Redis for Pivotal Cloud Foundry
- Quick demo
Presenters: Greg Chase, Director of Products, Pivotal and Craig Olrich, Platform Architect, Pivotal
PSOCLD 1007 Cisco Hybrid Cloud Platform for Google CloudRohit Agarwalla
ย
The document provides an overview of the Cisco Hybrid Cloud Platform for Google Cloud. It discusses how the solution allows customers to develop and deploy applications anywhere across on-premises and Google Cloud environments using consistent tools and policies. Key components of the solution include Cisco Container Platform, HyperFlex, ACI, CloudCenter, Stealthwatch Cloud, and Apigee for hybrid deployments. The demo shows how the Booksinfo sample app can be deployed across on-prem and Google Kubernetes Engine clusters with Istio for service mesh capabilities.
This document discusses NetApp's corporate IT strategy and use of cloud technologies. It notes that NetApp has over 10,500 employees worldwide and uses CloudOne, its internally developed DevOps platform, to build cloud-native applications with microservices architectures. CloudOne provides infrastructure as a service, platform as a service, and other cloud services on AWS, Azure, and GCP. It aims to simplify operations and enable a "SaaS First" strategy through application rationalization and a hybrid multicloud approach.
8 - OpenShift - A look at a container platform: what's in the boxKangaroot
ย
Many already have some familiarity with containers, and maybe even with Kubernetes. But what's the difference between those and a container platform? In this session the goal is to look at OpenShift, Red Hat's container platform based on Kubernetes. We see what it's made out of, what makes it tick, and what the future of OpenShift & Kubernetes holds.
NetApp IT Data Center Strategies to Enable Digital TransformationNetApp
ย
During an Insight Las Vegas 2017 breakout presentation, NetApp IT Customer-1 Director, Stan Cox, and Senior Storage Architect, Eduardo Rivera explained how NetApp IT enables digital transformation with data center strategies that incorporates ONTAP AFF systems in the data center to save power, cooling & space and NetApp Private Storage and ONTAP Cloud to leverage the public cloud while retaining control of their data. Using OnCommand Insight for data center managementโand its integration with their configuration management databaseโthe NetApp IT team knows whatโs in their data centers, in terms of both functionality, usage, and inter-connections. NetApp IT believes knowing whatโs in your data centers is fundamental to maintaining total cost of ownership, adapting to new technologies, leveraging the cloud while owning your data, and enabling digital transformation.
Cloud Native Night, April 2018, Mainz: Workshop led by Jรถrg Schad (@joerg_schad, Technical Community Lead / Developer at Mesosphere)
Join our Meetup: https://www.meetup.com/de-DE/Cloud-Native-Night/
PLEASE NOTE:
During this workshop, Jรถrg showed many demos and the audience could participate on their laptops. Unfortunately, we can't provide these demos. Nevertheless, Jรถrg's slides give a deep dive into the topic.
DETAILS ABOUT THE WORKSHOP:
Kubernetes has been one of the topics in 2017 and will probably remain so in 2018. In this hands-on technical workshop you will learn how best to deploy, operate and scale Kubernetes clusters from one to hundreds of nodes using DC/OS. You will learn how to integrate and run Kubernetes alongside traditional applications and fast data services of your choice (e.g. Apache Cassandra, Apache Kafka, Apache Spark, TensorFlow and more) on any infrastructure.
This workshop best suits operators focussed on keeping their apps and services up and running in production and developers focussed on quickly delivering internal and customer facing apps into production.
You will learn how to:
- Introduction to Kubernetes and DC/OS (including the differences between both)
- Deploy Kubernetes on DC/OS in a secure, highly available, and fault-tolerant manner
- Solve operational challenges of running a large/multiple Kubernetes cluster
- One-click deploy big data stateful and stateless services alongside a Kubernetes cluster
.NET Cloud-Native Bootcamp- Los AngelesVMware Tanzu
ย
This document outlines an agenda for a .NET cloud-native bootcamp. The bootcamp will introduce practices, platforms and tools for building modern .NET applications, including microservices, Cloud Foundry, and cloud-native .NET technologies and patterns. The agenda includes sessions on microservices, Cloud Foundry, hands-on exercises, and a wrap up. Break times are scheduled between sessions.
How do you grapple with a legacy portfolio? What strategies do you employ to get an application to cloud native?
How do you grapple with a legacy portfolio? What strategies do you employ to get an application to cloud native?
This talk will cover tools, process and techniques for decomposing monolithic applications to Cloud Native applications running on Pivotal Cloud Foundry (PCF). The webinar will build on ideas from seminal works in this area: Working Effectively With Legacy Code and The Mikado Method. We will begin with an overview of the technology constraints of porting existing applications to the cloud, sharing approaches to migrate applications to PCF. Architects & Developers will come away from this webinar with prescriptive replatforming and decomposition techniques. These techniques offer a scientific approach for an application migration funnel and how to implement patterns like Anti-Corruption Layer, Strangler, Backends For Frontend, Seams etc., plus recipes and tools to refactor and replatform enterprise apps to the cloud. Go beyond the 12 factors and see WHY Cloud Foundry is the best place to run any app - cloud native or non-cloud native.
Speakers: Pieter Humphrey, Principal Product Manager; Pivotal
Rohit Kelapure, PCF Advisory Solutions Architect; Pivotal
Hungry for more? Check out this blog from Kenny Bastani:
http://www.kennybastani.com/2016/08/strangling-legacy-microservices-spring-cloud.html
This document provides an overview and agenda for a developer 2 developer webcast series on microservice architecture and container technologies. It includes details on upcoming webcasts in March and April 2017 focused on microservice architecture, Azure container service, Pivotal cloud foundry, and RedHat OpenShift. The document also advertises a webcast on RedHat OpenShift presented by John Archer on containerization with OpenShift and how it enables modern application development.
Application Modernization with PKS / KubernetesPaul Czarkowski
ย
This document discusses strategies for modernizing applications and replatforming them using Project Kubernetes Service (PKS). It outlines how companies have different options for packaging and running workloads, such as using containers, microservices, serverless functions, and monolithic applications. PKS aims to provide the right runtime for each workload type. The document compares container orchestrators, application platforms, and serverless functions, noting that PKS aims to push workloads higher in the platform hierarchy for more flexibility and less enforcement of standards while lowering development complexity and improving operational efficiency. It provides recommendations for getting started with migrating workloads to PKS, such as lifting and shifting applications with minimal modernization, leveraging platform capabilities, and fully modernizing
Raleigh NC Docker Meetup presentation from October 21, 2015.
Doing development and test for an application on your laptop or a single server is an effective and quick way to ensure functionality, but can be limiting for larger applications. When the application is ready to deploy into production using containers, youโre going to want to use more than one server to increase resources and provide distributed availability. There are a large number of orchestration platforms for Docker which allow you to define an application consisting of one or more containers, and then coordinate deploying the application across small and large farms of servers. In this session we will concentrate on the three most popular orchestration platforms: Mesos, Kubernetes, and Docker Swarm. We will learn how each of them defines an application, some of their strengths, some weaknesses, and why you might choose one over another.
Pivotal Container Service (PKS) at SF Cloud Foundry Meetupcornelia davis
ย
Overview of Pivotal Container Service (PKS), built on the open source Cloud Foundry Container Runtime (CFCR). Covers what Kubernetes is, how PKS presents a complete platform that includes Kubernetes and much more, and key cloud principles.
Presented at the San Francisco-Bay Area Cloud Foundry meetup.
Infrastructure as Code in Large Scale OrganizationsXebiaLabs
ย
The adoption of tools for the provisioning and automatic configuration of "Infrastructure as Code" (eg Terraform, Cloudformation or Ansible) reduces cost, time, errors, violations and risks when provisioning and configuring the necessary infrastructure so that our software can run .
However, those who have begun to make intensive use of this technology at the business level agree to identify the emergence of a very critical problem regarding the orchestration and governance needs of supply requests such as security, compliance, scalability, integrity and more.
Learn how The Digital.ai DevOps Platform (formerly XebiaLabs DevOps Platform) responds to all these problems and many more, allowing you to continue working with your favorite tools.
Red Hat OpenShift Container Platform offers enterprises a fully supported enterprise-grade Kubernetes platform that provides capabilities beyond just Kubernetes. It includes developer tools, CI/CD pipelines, service meshes, and more. OpenShift can be deployed on-premises, on any public cloud, or in a managed service offering. It provides portability, security, automation, and a full-stack developer experience. Compared to building out Kubernetes capabilities individually, OpenShift reduces costs and complexity while accelerating application development.
Yohanes Syailendra discusses DevSecOps implementation at DKATALIS, an Indonesian company. Some key points:
1. DevSecOps shifts security left to earlier stages of development to find and fix vulnerabilities sooner. This allows for faster development times and more secure applications.
2. At DKATALIS, DevSecOps includes threat modeling, static application security testing (SAST), dynamic application security testing (DAST), infrastructure as code scanning, and container security throughout the development pipeline.
3. A successful DevSecOps implementation requires changing culture, processes, and architecture to establish security as a shared responsibility across development and security teams. Automation is also important to scale practices
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022DevOps Indonesia
ย
The document outlines an event hosted by DevOps Indonesia on March 8, 2022. The event featured two presentations - one in Bahasa on "DevSecOps Implementation Journey" and one in English on "A secure NGINX deployment on K8s". It provided an agenda, rules for participation, background on DevOps Indonesia community and past events. The goal was to promote DevOpsDays Jakarta 2022 through these presentations and discussions on DevOps topics.
This document summarizes steps for securing an NGINX deployment on Kubernetes. It begins by outlining the challenge of securing a website hosted on NGINX without vulnerabilities. The plan is then described in three steps: 1) Use NGINX and get example code, 2) Wrap the code in a Kubernetes Deployment, and 3) Check for security issues using Checkov. Key aspects of securing the deployment discussed are applying the principle of least privilege through profiles, capabilities, and users, ensuring immutability with read-only filesystems and unmounting service account tokens, and increasing resilience with liveness/readiness probes and resource limits. The importance of using secure defaults, open source scanning tools, and an overall Dev
DevOps Indonesia is hosting a roadshow event with Shopee Indonesia to promote DevOpsDays Jakarta 2022. The event will include an opening, introduction, a 55-minute presentation by Akbar on "Observability on highly distributed systems" in Bahasa, followed by a photo session and closing. The presentation will discuss observability techniques for monitoring highly distributed systems. DevOps Indonesia is a community established in 2017 with over 3,400 members on meetup.com and 4,500 members on Telegram that organizes regular events on DevOps topics. This event will be livestreamed and recorded for their YouTube channel.
Dev ops meetup 51 : Securing DevOps Lifecycle - AnnouncementDevOps Indonesia
ย
This document is the agenda for an online DevOps Indonesia Meetup on securing the DevOps lifecycle. The meetup will include an opening and introduction, a 55-minute presentation on "Securing DevOps Lifecycle" by Mudito Adi Pranowo and Jevon Hura, and a photo session, feedback, and closing. The meetup rules state it will be live streamed and recorded for publishing on the DevOps Indonesia YouTube channel. DevOps Indonesia is a community established in 2017 with over 3,400 members on meetup.com and 4,500 members on Telegram that holds regular meetups on DevOps topics.
This document discusses securing the DevOps lifecycle with continuous trust. It provides an overview of DevOps and how security remains a challenge that impacts code and data integrity. It discusses how security and quality assurance teams must integrate with DevOps. The benefits of DevOps like speed, reliability, scalability and collaboration are described. It also discusses potential vulnerabilities in DevOps and how establishing a chain of trust across tools is needed. Hardware security modules and key management systems can help support security in DevOps tools that manage the CI/CD pipeline and infrastructure.
DevOps Meetup 50 : Securing your Application - AnnouncementDevOps Indonesia
ย
This document outlines the agenda for DevOps Indonesia Meetup #50 on securing applications. The meetup includes two presentations: "Secure your Application with Google Cloud armor" by Didiet A. Pambudiono, delivered in Bahasa, and "Securing APIs: When WAF is not Enough" by Itsik Mantin, delivered in English. There will also be a question and answer session and closing remarks. DevOps Indonesia is a community of over 3,300 members on meetup.com and 4,500 members on Telegram that shares knowledge about DevOps practices through regular meetups and online events.
The document discusses using Google Cloud Armor to secure applications. It provides an introduction to why web application firewalls (WAFs) are important for protecting business and sensitive data. It then gives an overview of common network security threats like denial of service (DDoS) attacks and application vulnerabilities. The presentation focuses on how Cloud Armor can help detect and mitigate DDoS and layer 7 attacks at Google scale while also providing WAF capabilities to block common exploits. Specific use cases are discussed where Cloud Armor can allow/block IP addresses and protect against attacks like SQL injection and cross-site scripting.
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps IndonesiaDevOps Indonesia
ย
This document outlines the agenda for the DevOps Indonesia (ONLINE) Meetup #49 on November 11, 2021. The meetup featured two presentations: "Operate Containers with AWS Copilot" by Donnie Prakoso from 7:11-8:00 PM, and "Working with DevOps and GitOps" by Rizal M. Nur from 8:00-8:50 PM, followed by a quiz, photo session, feedback, and closing from 8:51-9:00 PM. DevOps Indonesia is a DevOps community in Indonesia established in October 2017 with over 3,300 members on Meetup.com and 4,500 members on Telegram.
This document discusses operating containers with AWS Copilot. It begins with introductions to containers and Docker. It then discusses the AWS container landscape including Amazon ECS, ECR, and Fargate. AWS Copilot is introduced as a toolkit for containerized applications on AWS that helps with building, releasing, and operating containers. Copilot addresses common challenges like deployment, testing, releasing, and cleanup. It provides features like deployment with App Runner, scheduled jobs, release pipelines, environment variables and more. The document encourages focusing on building products rather than infrastructure and using AWS services like ECS, Fargate and Copilot to streamline container deployment.
Continuously Deploy Your CDK Application by Petra novandi barusDevOps Indonesia
ย
This document discusses CDK Pipelines, which allow continuous deployment of AWS CDK applications. It introduces AWS CDK and its components. CDK Pipelines automate the process of building, testing, and deploying CDK applications across multiple AWS environments and accounts. The demo shows how to deploy a CDK app to different AWS regions and accounts. References provide links to the CDK GitHub repo, demo code, documentation, and blog posts about CDK Pipelines.
DevOps Indonesia (online) meetup 45 - AnnouncementDevOps Indonesia
ย
This document provides an agenda for the DevOps Indonesia (ONLINE) Meetup #45 on July 15, 2021. The agenda includes an introduction and announcement from 7:06-7:10 PM, a presentation from Made Mulia Indrajaya on "The Death and Rise of Enterprise DevOps" from 7:11-7:45 PM followed by a Kahoot game, a Q&A session from 7:46-7:55 PM, and closing from 7:56-8:00 PM. The document also lists rules for the online sharing session and provides information about DevOps Indonesia, including its establishment in October 2017, membership numbers, social media accounts, and past meeting topics.
The document discusses the implementation of DevOps in small, medium, and large enterprises. In small and medium enterprises, DevOps allows for more agile delivery but often faces challenges of manual deployments and lack of engineering practices. As enterprises grow larger, they struggle to implement DevOps effectively when viewing it simply as tools or separate from Agile. The document argues that DevOps succeeds in large enterprises by adopting a holistic delivery model, dual operating systems, and viewing IT as engineering with a focus on flow and scale. It is a journey that requires experimenting with frameworks and improving processes continuously.
API Security Webinar - Security Guidelines for Providing and Consuming APIs by Alexander Marcel
Simak penjelasan dari pakar industri tentang trend dan tantangan API dalam tahun 2021. Pelajari bagaimana organisasi dapat membebaskan potensi API, untuk secara efektif menangkis serangan dan melindungi aset API. Masalah-masalah yang muncul di event API Security Challenge juga akan dibahas di sini, dan akan ada hadiah-hadiah menarik bagi semua peserta.
Agenda :
- Penelusuran trend keamanan API, tantangan dan masalah-masalah keamanan yang sering dihadapi.
- Temuan dan Statistik yang dipelajari lewat API Security Challenge
- Penelusuran solusi untuk tantangan nyata yang ditemui dalam API Security Challenges
- Pengumuman pemenang API Security Challenge
API Security Webinar - Security Guidelines for Providing and Consuming APIsDevOps Indonesia
ย
API Security Webinar - Security Guidelines for Providing and Consuming APIs by Faisal Yahya
Simak penjelasan dari pakar industri tentang trend dan tantangan API dalam tahun 2021. Pelajari bagaimana organisasi dapat membebaskan potensi API, untuk secara efektif menangkis serangan dan melindungi aset API. Masalah-masalah yang muncul di event API Security Challenge juga akan dibahas di sini, dan akan ada hadiah-hadiah menarik bagi semua peserta.
Agenda :
- Penelusuran trend keamanan API, tantangan dan masalah-masalah keamanan yang sering dihadapi.
- Temuan dan Statistik yang dipelajari lewat API Security Challenge
- Penelusuran solusi untuk tantangan nyata yang ditemui dalam API Security Challenges
- Pengumuman pemenang API Security Challenge
API Security Webinar by Hendra Tanto
Simak penjelasan dari pakar industri tentang trend dan tantangan API dalam tahun 2021. Pelajari bagaimana organisasi dapat membebaskan potensi API, untuk secara efektif menangkis serangan dan melindungi aset API. Masalah-masalah yang muncul di event API Security Challenge juga akan dibahas di sini, dan akan ada hadiah-hadiah menarik bagi semua peserta.
Agenda :
- Penelusuran trend keamanan API, tantangan dan masalah-masalah keamanan yang sering dihadapi.
- Temuan dan Statistik yang dipelajari lewat API Security Challenge
- Penelusuran solusi untuk tantangan nyata yang ditemui dalam API Security Challenges
- Pengumuman pemenang API Security Challenge
Credential stuffing involves using breached username and password pairs from one site to attempt to log in to other sites where users may have reused passwords. It occurs in four main steps: 1) obtaining credentials from data breaches, 2) automating the login process without human interaction, 3) defeating any login defenses, and 4) distributing the process globally through botnets and cloud hosting. While two-factor authentication prevents account takeovers, credential stuffing can still reveal valid user accounts. Users and organizations are encouraged to take steps like using unique passwords, password managers, and two-factor authentication to help mitigate credential stuffing risks.
API Security Webinar : Security Guidelines for Providing and Consuming APIsDevOps Indonesia
ย
1) The document provides guidelines for securing APIs when providing and consuming services. It outlines evaluating API risks, securing ingress API connectivity, and mapping the OWASP API security risks to the ingress API development lifecycle.
2) The guidelines include five phases for ingress API connectivity: design, development, testing, implementation, and logging/monitoring. Each OWASP API security risk is mapped to elements within these phases.
3) APIs have become critical to modern applications, but many organizations' security measures have not kept up with requirements. Robust API security policies that span the entire development lifecycle are needed to securely provide and consume services.
Dev Dives: Automate and orchestrate your processes with UiPath MaestroUiPathCommunity
ย
This session is designed to equip developers with the skills needed to build mission-critical, end-to-end processes that seamlessly orchestrate agents, people, and robots.
๐ Here's what you can expect:
- Modeling: Build end-to-end processes using BPMN.
- Implementing: Integrate agentic tasks, RPA, APIs, and advanced decisioning into processes.
- Operating: Control process instances with rewind, replay, pause, and stop functions.
- Monitoring: Use dashboards and embedded analytics for real-time insights into process instances.
This webinar is a must-attend for developers looking to enhance their agentic automation skills and orchestrate robust, mission-critical processes.
๐จโ๐ซ Speaker:
Andrei Vintila, Principal Product Manager @UiPath
This session streamed live on April 29, 2025, 16:00 CET.
Check out all our upcoming Dev Dives sessions at https://community.uipath.com/dev-dives-automation-developer-2025/.
AI Changes Everything โ Talk at Cardiff Metropolitan University, 29th April 2...Alan Dix
ย
Talk at the final event of Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence funded by the British Council UK-Saudi Challenge Fund 2024, Cardiff Metropolitan University, 29th April 2025
https://alandix.com/academic/talks/CMet2025-AI-Changes-Everything/
Is AI just another technology, or does it fundamentally change the way we live and think?
Every technology has a direct impact with micro-ethical consequences, some good, some bad. However more profound are the ways in which some technologies reshape the very fabric of society with macro-ethical impacts. The invention of the stirrup revolutionised mounted combat, but as a side effect gave rise to the feudal system, which still shapes politics today. The internal combustion engine offers personal freedom and creates pollution, but has also transformed the nature of urban planning and international trade. When we look at AI the micro-ethical issues, such as bias, are most obvious, but the macro-ethical challenges may be greater.
At a micro-ethical level AI has the potential to deepen social, ethnic and gender bias, issues I have warned about since the early 1990s! It is also being used increasingly on the battlefield. However, it also offers amazing opportunities in health and educations, as the recent Nobel prizes for the developers of AlphaFold illustrate. More radically, the need to encode ethics acts as a mirror to surface essential ethical problems and conflicts.
At the macro-ethical level, by the early 2000s digital technology had already begun to undermine sovereignty (e.g. gambling), market economics (through network effects and emergent monopolies), and the very meaning of money. Modern AI is the child of big data, big computation and ultimately big business, intensifying the inherent tendency of digital technology to concentrate power. AI is already unravelling the fundamentals of the social, political and economic world around us, but this is a world that needs radical reimagining to overcome the global environmental and human challenges that confront us. Our challenge is whether to let the threads fall as they may, or to use them to weave a better future.
Procurement Insights Cost To Value Guide.pptxJon Hansen
ย
Procurement Insights integrated Historic Procurement Industry Archives, serves as a powerful complement โ not a competitor โ to other procurement industry firms. It fills critical gaps in depth, agility, and contextual insight that most traditional analyst and association models overlook.
Learn more about this value- driven proprietary service offering here.
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. ๐
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! ๐
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul
ย
Artificial intelligence is changing how businesses operate. Companies are using AI agents to automate tasks, reduce time spent on repetitive work, and focus more on high-value activities. Noah Loul, an AI strategist and entrepreneur, has helped dozens of companies streamline their operations using smart automation. He believes AI agents aren't just toolsโthey're workers that take on repeatable tasks so your human team can focus on what matters. If you want to reduce time waste and increase output, AI agents are the next move.
AI and Data Privacy in 2025: Global TrendsInData Labs
ย
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the todayโs world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
How Can I use the AI Hype in my Business Context?Daniel Lehner
ย
๐๐จ ๐ผ๐ ๐๐ช๐จ๐ฉ ๐๐ฎ๐ฅ๐? ๐๐ง ๐๐จ ๐๐ฉ ๐ฉ๐๐ ๐๐๐ข๐ ๐๐๐๐ฃ๐๐๐ง ๐ฎ๐ค๐ช๐ง ๐๐ช๐จ๐๐ฃ๐๐จ๐จ ๐ฃ๐๐๐๐จ?
Everyoneโs talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know ๐ต๐ผ๐.
โ What exactly should you ask to find real AI opportunities?
โ Which AI techniques actually fit your business?
โ Is your data even ready for AI?
If youโre not sure, youโre not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
ย
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
Artificial Intelligence is providing benefits in many areas of work within the heritage sector, from image analysis, to ideas generation, and new research tools. However, it is more critical than ever for people, with analogue intelligence, to ensure the integrity and ethical use of AI. Including real people can improve the use of AI by identifying potential biases, cross-checking results, refining workflows, and providing contextual relevance to AI-driven results.
News about the impact of AI often paints a rosy picture. In practice, there are many potential pitfalls. This presentation discusses these issues and looks at the role of analogue intelligence and analogue interfaces in providing the best results to our audiences. How do we deal with factually incorrect results? How do we get content generated that better reflects the diversity of our communities? What roles are there for physical, in-person experiences in the digital world?
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025BookNet Canada
ย
Book industry standards are evolving rapidly. In the first part of this session, weโll share an overview of key developments from 2024 and the early months of 2025. Then, BookNetโs resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about whatโs next.
Link to recording, transcript, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfSoftware Company
ย
Explore the benefits and features of advanced logistics management software for businesses in Riyadh. This guide delves into the latest technologies, from real-time tracking and route optimization to warehouse management and inventory control, helping businesses streamline their logistics operations and reduce costs. Learn how implementing the right software solution can enhance efficiency, improve customer satisfaction, and provide a competitive edge in the growing logistics sector of Riyadh.
TrsLabs - Fintech Product & Business ConsultingTrs Labs
ย
Hybrid Growth Mandate Model with TrsLabs
Strategic Investments, Inorganic Growth, Business Model Pivoting are critical activities that business don't do/change everyday. In cases like this, it may benefit your business to choose a temporary external consultant.
An unbiased plan driven by clearcut deliverables, market dynamics and without the influence of your internal office equations empower business leaders to make right choices.
Getting things done within a budget within a timeframe is key to Growing Business - No matter whether you are a start-up or a big company
Talk to us & Unlock the competitive advantage
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
ย
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
Generative Artificial Intelligence (GenAI) in BusinessDr. Tathagat Varma
ย
My talk for the Indian School of Business (ISB) Emerging Leaders Program Cohort 9. In this talk, I discussed key issues around adoption of GenAI in business - benefits, opportunities and limitations. I also discussed how my research on Theory of Cognitive Chasms helps address some of these issues
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
ย
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnellโs ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
3. Agenda
1) Transitioning from Data Center to Cloud
2) Data Management Challenge for DevOps
3) DevOps Anywhere + Automation
4) Storage
โช Persistent storage for containerized apps
โช Trident
5) Demo
6) Key TakeAways
2 ยฉ 2020 NetApp, Inc. All rights reserved.
4. Starting with โ?โ
What are you developing
and automating?
Where are you developing
and automating?
What are your development
and automation priorities?
How are you developing and
automating. Who is doing the work?
3 ยฉ 2020 NetApp, Inc. All rights reserved.
5. Public cloud offers
advantages that users
have come to expect
โข Empowers developers to work fast, without IT overhead
โข Offers great services for modern application development
โข Makes it easy to get started with minimal upfront cost and
preparation
โข Enables applications to be scaled according to demand
ยฉ 2020 NetApp, Inc. All rights reserved.
6. โข Regulatory compliance
โข Privacy and confidentiality
โข Protect core intellectual property
โข No vendor lock-in
โข Long-term economic advantages
โข Low-latency integration with legacy systems
โข Cloud repatriation
โข Proper availability for typical off-the-shelf applications
โข Many legacy architectures cannot be statelessly
load-balanced
โข Need infrastructure-level availability
โข Better long-term economics
On-premises advantages
For new application development... For traditional enterprise applications
ยฉ 2020 NetApp, Inc. All rights reserved
7. Ensure access,
security, and
reliability,
as well as data
sovereignty, of critical
data.
Control costs
and optimize application
performance.
Transitioning
large-scale and
virtualized
workloads from
the data center
to the cloud has
its challenges.
ยฉ 2020 NetApp, Inc. All rights reserved.6
of applications that are
already in production
and during migration.
Avoid disruption
8. Data Management Challenges for DevOps
7 ยฉ 2020 NetApp, Inc. All rights reserved.
Scale Out Agility
Quality of Service
Hybrid Cloud
Data management
Automation
Copies management
& Data protection
Develop
Collaboratively
9. DevOps and Automation: Core Capabilities
Services
Containers
Configuration
Management
Code and Binary
Management
Continuous Integration
and Continuous Delivery
Cloud and PaaS Analytics
8 ยฉ 2020 NetApp, Inc. All rights reserved.
10. DevOps Anywhere โ Integrating Automation & Orchestration
9
ยฉ 2020 NetApp, Inc. All rights reserved.
Hybrid CloudPrivate
SCM
Data Management
(Develop & Deploy Anywhere โ Movement,Management,Governance)
Continuous Integration/Continuous Delivery (CI/CD)
Tools
Define Code Build Test Deploy Release
Code
&
Repoโs
Code
&
Repoโs
Code
&
Repoโs
Code &
Repoโs
Development
Teams
Work Flow
& Tools
PaaS/IaaSSoftware
Defined
OpenStack
Integration
Containers
Efficiency Security
Automation Persistent Data
Store
Data
Protection HA/DR
Data
Portability
APIโs, Automation and Orchestration
QA UAT
Workloads
Products &
Technology
11. Putting it All Together in the NetApp DevOps Eco-system
On Premises Public CloudsHybrid Clouds
Store Manage ProtectMove
Enterprise Data Management Software
Converged / Hyperconverged
Hybrid Arrays All Flash Arrays
Software-Defined Storage
Unified Storage
Object Storage
White box, third-party
or NetApp hardware
Cloud Integrated Storage
Strategy Design OperationsDeploy and Transition
ยฉ 2020 NetApp, Inc. All rights reserved. --- NETAPP CONFIDENTIAL ---
12. DevOps Integrations & Solutions
11 ยฉ 2020 NetApp, Inc. All rights reserved.
Development Tools
PaaS
(Platform as a Service)
Containers/
IaaS/Cloud
(Infrastructure as a Service) Automation
13. โข Ansible
โข Puppet
โข Chef
โข Terraform
Automation
and
Orchestration
Automation and Consumption Models
NetApp consumable in all forms
ยฉ 2020 NetApp, Inc. All rights reserved.12
Tools
Software Data Management
(OnPrem / Cloud)
Appliance
(Hy brid/Flash/SAN, Object)
White Box Cloud
Configuration
Management
Application / Workload
Orchestration
PaaS / IaaS
โข Kubernetes
โข OpenShift
โข CloudFoundry
โข Trident
APIโs
โข REST & REST APIโs
โข Tools/Libraries
14. Challenges of Enterprise Workloads in Containers
13 ยฉ 2020 NetApp, Inc. All rights reserved. โ NETAPP CONFIDENTIAL โ
Persistence
โช
โช
โช
Hybrid + Multi-Cloud
โช
โช
โช
Application-Consistency
โช
โช
โช
15. Jhon the Developer
Worries about whatโs
inside the container
His code
His Libraries
His Package Manager
His Apps
His Data
All Linux servers look
the same
Rud the Ops Guy
Worries about whatโs
outside the container
Logging
Remote access
Monitoring
Network config
All containers start, stop,
copy, attach, migrate, etc.
the same way
Separation of concerns
14 ยฉ 2020 NetApp, Inc. All rights reserved. โ NETAPP CONFIDENTIAL โ
16. Simplify Storage for Apps
โข
โข
โข
โข
โข
15 ยฉ 2020 NetApp, Inc. All rights reserved. โ NETAPP CONFIDENTIAL โ
17. โช Connects to backends to
determine capabilities of storage
array
โช Receives requests for storage
from frontends, e.g. Kubernetes,
REST
โช Evaluates configured backends
against desired attributes in the
storage class
โช Creates a list of eligible backends
โช Selects one eligible backend,
requests provisioning
โช Retries on failure until all eligible
backends are exhausted
Trident Architecture
16 ยฉ 2019 NetApp, Inc. All rights reserved. โ NETAPP CONFIDENTIAL โ
Storage Platform
Clients/AppsKubernetes
Orchestration Engine
CSI
Kubernetes
Plugin
Create/Delete Commands
AdministrationDocker
Docker
Plugin
etcd
REST
Container
Storage
Interface
18. Trident Support Matrix
17 ยฉ 2020 NetApp, Inc. All rights reserved. โ NETAPP CONFIDENTIAL โ
1.11-1.18
3.11, 4.2 and 4.3
2.1, 3.0
1.1, 1.2 ANF
CVO
Operating System Container Platform Storage Backend
19. Kubernetes Persistent Storage Paradigm
Persistent volumes and persistent volume claims
18 ยฉ 2019 NetApp, Inc. All rights reserved. โ NETAPP CONFIDENTIAL โ
claim
Pod
claim
Pools of Persistent Volumes
NFS
PV
iSCSI
PV
NFS
PV
Developer
Administrator
20. Kubernetes Persistent Storage Paradigm
Dynamic storage provisioning
19 ยฉ 2019 NetApp, Inc. All rights reserved. โ NETAPP CONFIDENTIAL โ
claim
Pod
claim
Developer
Administrator
Storage Classes
SSD
Gold
Bronze
PV
21. Trident Storage Provisioning
20 ยฉ 2020 NetApp, Inc. All rights reserved. โ NETAPP CONFIDENTIAL โ
01 Configures storage backends
02 Installs Trident in K8s
03 Adds one or more backend
04 Defines StorageClass based on
preferred volume type
05 Creates PVC
TridentC
06 Detects creation of PVC
07 Finds storage pools that satisfy the Gold class
08 Creates volume in an appropriate storage pool
09 Creates PV and binds PVC with PV
10 Mounts the volume onto the container
Storage
Classes
22. Trident Storage Deprovisioning
21 ยฉ 2020 NetApp, Inc. All rights reserved. โ NETAPP CONFIDENTIAL โ
01 Developer deletes PVC
TridentC
Storage
Classes
02 Detects deleted PVC
03 Finds and validates the matching PV
04 Determines PV reclaim policy
05 Deletes volume & PV if reclaim policy is โdeleteโ
23. NFS Example: Create the PVC
22 ยฉ 2020 NetApp, Inc. All rights reserved. โ NETAPP CONFIDENTIAL โ
โ kind: PersistentVolumeClaim
apiVersion: v1
metadata:
name: pvcclaim-nas-gold
Spec:
parameters:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 10Gi
storageClassName: storage-class-nas-gold
24. Broad Support for Top Container Platforms
23 ยฉ 2020 NetApp, Inc. All rights reserved. --- PARTNER CONFIDENTIAL ---
HCI
Google GKE
Azure AKS
Docker EE
Block Storage
C O N T A I N E R O R C H E S T R A T O R S S T O R A G E P L A T F O R M S
Unified Storage
Cloud Volumes
25. Container Adoption
24 ยฉ 2020 NetApp, Inc. All rights reserved. โ NETAPP CONFIDENTIAL โ
Modernize
Apps
Cloud-native
Apps
Pipelines
Platform
Meet Business
Requirements
Lifecycle
Orchestrate common
app operations
Portability
Migrate between clouds
without change
Security
Isolate and introspectwith
integrity guarantees
Freedom
Build apps the way you
want without constraints
Innovate
Fully flexible and
scalable micro services
Standardize
Well-definedsharable
app definitions
Accelerate
Seamlesslymove
along the SDLC
Integrate
APIs and openinterfaces
tie everything together
Automate
Rapid repetitionimproves
quality and time to value
CostSavings
Increase density and
reduce VM licensing
Efficiency
Enable self-service
and reduce maintenance
Optimize
Maximize resource
utilization and availability
26. 25 ยฉ 2020 NetApp, Inc. All rights reserved.
Demo
Moving Kubernetes Application Workloads Between Hybrid-Cloud Endpoints
27. โช Success is knowing your data and how to manage it, One stack, one experience,
anywhere
โช Deliver a consistent experience across OnPrem & Public/Private Cloud - to streamline
software development
โช IT and operational efficiency by delivering automation and flexibility
โช Business and operational benefits โ Provide faster delivery and time to value
โช Using Ansible [automation] to manage NetApp systems can bring deployment time down
from days to minutes
26 ยฉ 2020 NetApp, Inc. All rights reserved.
Key Takeaways
28. thePub: NetAppโs Developer and Open Source Community
Sharing is Caring!
27 ยฉ 2020 NetApp, Inc. All rights reserved. โ NETAPP CONFIDENTIAL โ
GitHub
https://github.com/NetApp
thePub
netapp.io
Twitter
@NetAppPub
Slack
netapp.io/slack
NetApp website
netapp.com/devops