Devops, Docker and Security. John
|
|
- Shanna Wilkins
- 5 years ago
- Views:
Transcription
1 Devops, Docker and Security John
2 About Me One of the founding members of Devopsdays Co-author of the Devops Handbook. Author of the Introduction to Devops on Linux Foundation edx. Podcaster at devopscafe.org Devops Enterprise Summit - Cofounder Nine person in at Chef (VP of Customer Enablement) Formally Director of Devops at Dell Found of Socketplane (Acquired by Docker) 10 Startups over 25 years
3
4
5 What If I told you you could be 2000 times faster than your competitors 5
6 What if I told you that you could be 100 times more reliable than your competitors 6
7 What if you could have both 7
8 Faster, Effective, Reliable Devops (Faster) Immutable Docker (Effective) Supply Chain (Reliable) Service Delivery 8
9 Devops faster
10 DTO Solutions
11 Devops Taxonomies CAMS The Three Ways Culture Automation Measurement Sharing The First Way The Second Way The Third Way
12 Devops Practices and Patterns Continuous Delivery Everything in version control Small batch principle Trunk based deployments Manage flow (WIP) Automate everything Culture Everyone is responsible Done means released Stop the line when it breaks 12 Remove silos itrevolution.com/devops-handbook
13 Recent IT Performance Data is Compelling High performers compared to their peers 30x more frequent deployments 200x faster lead times 60x the change success rate 168x faster mean time to recover (MTTR) 2x 50% more likely to exceed profitability, market share & higher market capitalization growth over 3 years* productivity goals Data from 2014/2015 State of DevOps Report -
14 Recent IT Performance Data is Compelling High performers compared to their peers 30x more frequent deployments 2555x 200x faster lead times Faster 60x the change success rate 168x faster mean time to recover (MTTR) Higher Quality 2x 50% more likely to exceed profitability, market share & productivity goals higher market capitalization growth over 3 years* More Effective Data from 2014/2015 State of DevOps Report -
15 Conventional Wisdom Fast Pick Two! Good Cheap
16 Devops Automated Deployment Pipeline 16 Source: Wikipedia - Continuous Delivery
17
18 Devops Results Google Over 15,000 engineers in over 40 offices 4,000+ projects under active development code submissions per day (20+ p/m) Over 75M test cases run daily 50% of code changes monthly Single source tree 18
19 Devops Results Amazon 11.6 second mean time between deploys max deploys in a single hour. 10,000 mean number of hosts simultaneously receiving a deploy. 30,000 max number of hosts simultaneously receiving a deploy 19
20 Unicorns and Horses (Enterprises) Enterprise Unicorns 20 Shamelessly stolen and repurposed from: Pete Cheslock
21 Devops Results Enterprise Organizations Ticketmaster - 98% reduction in MTTR Nordstrom - 20% shorter Lead Time Target - Full Stack Deploy 3 months to minutes USAA - Release from 28 days to 7 days ING applications teams doing devops CSG - From 200 incidents per release to 18 21
22 Docker effective
23 IBM 360/370 (1960/1970) CHROOT - Version 7 Unix 1979 (Bell Labs) BSD in 1982 (Berkley) VMware (1998) FreeBSD Jails 2000 XEN 2003 History of Solaris Zones 2004 OpenVZ 2005 Amazon Web Services 2006 Namespaces 2007 Cgroups (Google) 2007 Virtualization KVM 2007 AIX LPARS (IBM) 2007 Drawbridge (2008) Hyper-V (2008) Linux Containers - LXC (Parelles, IBM, Google) 2008 Docker (Dotcloud Inc) 2013 Microsoft Docker on Windows Server 2016
24 Virtualization Type 1 Virtualization VMware ESX, XEN, Hyper-V Type 2 Virtualization KVM, Virtualbox, QEMU, VMware Workstation OS Level Virtualization OpenVZ, LXC, Docker
25 BodenRussell/realizinglinux-containerslxc
26 Why OS Level Virtualization Provision in milliseconds Near bare metal runtime performance VM-like agility it s still virtualization Lightweight Just enough Operating System (JeOS) Supported with modern Linux kernel Growing in popularity
27
28 Why Docker Isolation Lightweight Simplicity Workflow Security Community
29 Docker Security Enhancements Docker Security Scanning Docker Content Trust Docker Trusted Registry TLS by Default for Swarm/Docker Data Center Read Only Containers User Namespaces Secomp and LSMS support Enhanced System Capabilities support 29 Secrets Management Immutable Operating System (Coming Soon)
30 30 Immutable Delivery
31 31 Immutable Delivery
32 Supply Chain Reliable
33 33
34
35 Supply&chain&advantage& Toyota& Advantage& Toyota& Prius& Chevy& Volt& Unit%Retail%Price% 61%& $24,200% $39,900% Units%Sold/Month% 13x& 23,294% 1,788% In?House%ProducBon% 50%& 27%% 54%% 35 Plant%Suppliers% 16%&& 125% 800% 4%# 224( 5,500( Source:(Toyota(Supply(Chain( Management:(A(Strategic( Approach(to(Toyota s( Renowned(System,(by(Ananth( Iyer(and(Sridhar(Seshadri(
36 Use fewer, better suppliers Use their highest quality parts Track which parts you use & where
37 Toyota Production Systems - 4VL Variety Determine your variety of offerings based on operational efficiency and market demand Velocity Maintain a steady flow through all processes of the supply chain Variability Manage inconsistencies carefully to reduce cost and improve quality Visibility 37 Ensure the transparency of all processes to enable continuous learning and improvement
38 Docker and the Three Ways of Devops 38
39 Immutable Service Delivery (4VL) Variety Learn faster, Limited frameworks, Limited operating systems, Limit vendors. Velocity Small Batch, Small Teams, Microservices and Containers Variability Docker and Immutable Delivery Use fewer, better suppliers Use their highest quality parts Track which parts you use & where Visibility Automated Testing, Docker Trust, 39 Docker Security Scanning, Bounded Context, Bill of Materials
40 Software Supply Chain - 4VL Visibility - Docker - Bill of Material 40 Where and when was it built and why What was its ancestor images How do I start, validate, monitor and update it What git repo is being built, what hash of that git repo was built What are all the tags this specific container is known as at time of build What s the project name this belongs to Have the ability to have arbitrary user supplied rich metadata
41 Devops Automated Deployment Pipeline 41 Source: Wikipedia - Continuous Delivery
42 DevSecOps Preventative Detective Requirements & Design Development CI Interval Trigger Assessment Production Application Risk Classification Security Requirement Definition Static Analysis/IDE Secure Libraries SCM Static Analysis (CI) Open Source Governance(CI) Dynamic Assessments Threat-Based Pen Test Perimeter Assessment Web Application Firewalls Automated Attack/ Bot Defense Threat modeling Secure Coding Standards Container Security Compliance (CI) Container Security Management Security Mavens (Security-Trained Developers and Operations) Lightweight threat modeling approach Role Based Software Security Training Continuous Monitoring, Analytics and KPI Gathering Detailed manual assessments triggered automatically at appropriate interval; detached from release cycle
43 Immutable Service Delivery Fortune 500 Insurance Company Tracks critical and high security defect rate per 10k lines of code Started out with (10/10k) After applying Devops practices and principles (4/10k) After applying Toyota Supply Chain 4VL (1/10k ) After Docker with Immutable Delivery (0.1/10k) 43
44 With Docker Fortune 500 Insurance Company One Service One Container One Read Only File System One Port 44
45 Immutable Service Delivery Devops (Faster) Docker (Effective) 2000x Faster and 100x Reliable Supply Chain (Reliable) 45
ISLET: Jon Schipp, AIDE jonschipp.com. An Attempt to Improve Linux-based Software Training
ISLET: An Attempt to Improve Linux-based Software Training Jon Schipp, AIDE 2015 jonschipp@gmail.com, @Jonschipp, jonschipp.com About me: Security Engineer for the National Center for Supercomputing Applications
More informationDevOps Anti-Patterns. Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! COPYRIGHT 2019 MANICODE SECURITY
DevOps Anti-Patterns Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! 31 Anti-Pattern: Throw it Over the Wall Development Operations 32 Anti-Pattern: DevOps Team Silo
More informationSAINT LOUIS JAVA USER GROUP MAY 2014
SAINT LOUIS JAVA USER GROUP MAY 2014 STEVEN BORRELLI steve@borrelli.org @stevendborrelli ABOUT ME FIRST COMPUTER: SYSTEMS ENGINEERING MANAGEMENT FOUNDER, ASTERIS (JAN 2014) @ ORGANIZER OF STL MACHINE LEARNING
More informationTravis Cardwell Technical Meeting
.. Introduction to Docker Travis Cardwell Tokyo Linux Users Group 2014-01-18 Technical Meeting Presentation Motivation OS-level virtualization is becoming accessible Docker makes it very easy to experiment
More informationThe four forces of Cloud Native
1 Aplicaciones Nativas En La Nube The four forces of Cloud Native Iñaki Borrero- Advisory vspecialist MEDI, Dell EMC @DellEMCForum 2 Containers Devops Confluence of 4 forces Agile 3 3 Microservices 4 4
More informationThe Divine and Felonious Nature of Cyber Security
The Divine and Felonious Nature of Cyber Security ( Introduction to DevSecOps ) John Willis @botchagalupe https://github.com/botchagalupe/my-presentations The Felonious Nature of Cyber Security Infecting
More informationDocker and Oracle Everything You Wanted To Know
Docker and Oracle Everything You Wanted To Know June, 2017 Umesh Tanna Principal Technology Sales Consultant Oracle Sales Consulting Centers(SCC) Bangalore Safe Harbor Statement The following is intended
More information, Inc
Monthly Research SELinux in Virtualization and Containers, Inc http://www.ffri.jp Ver 1.00.02 1 SELinux in Virtualization and Containers Virtualization security with SELinux Threat model of operating system
More information[Docker] Containerization
[Docker] Containerization ABCD-LMA Working Group Will Kinard October 12, 2017 WILL Kinard Infrastructure Architect Software Developer Startup Venture IC Husband Father Clemson University That s me. 2 The
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationDeployment Patterns using Docker and Chef
Deployment Patterns using Docker and Chef Sandeep Chellingi Sandeep.chellingi@prolifics.com Agenda + + Rapid Provisioning + Automated and Managed Deployment IT Challenges - Use-cases What is Docker? What
More informationLecture 09: VMs and VCS head in the clouds
Lecture 09: VMs and VCS head in the Hands-on Unix system administration DeCal 2012-10-29 1 / 20 Projects groups of four people submit one form per group with OCF usernames, proposed project ideas, and
More informationFlip the Switch to Container-based Clouds
Flip the Switch to Container-based Clouds B I L L B O R S A R I D I R E C T O R, S Y S T E M S E N G I N E E R I N G 1 November 2017 1 2017 Datera Datera at a Glance Founded 2013 Smart storage for clouds
More informationMicroservices a security nightmare? GOTO Nights Zürich - March 3, 2016 Maximilian Container Solutions Switzerland
Microservices a security nightmare? GOTO Nights Zürich - March 3, 2016 Maximilian Schöfmann @schoefmann Container Solutions Switzerland Microservices (2016) small, hence many services talking over
More informationSpring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand
Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,
More informationAzure DevOps. Randy Pagels Intelligent Cloud Technical Specialist Great Lakes Region
Azure DevOps Randy Pagels Intelligent Cloud Technical Specialist Great Lakes Region What is DevOps? People. Process. Products. Build & Test Deploy DevOps is the union of people, process, and products to
More informationCisco ONE Enterprise Cloud Suite
Cisco ONE Enterprise Cloud Suite Pragmatic Progression to Cloud Automation Geoff Soon Today s Businesses Require Greater Agility Focus on increasing speed of business Customers expect on-demand service
More informationVirtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC
Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /
More information개발자와운영자를위한 DevOps 플랫폼 OpenShift Container Platform. Hyunsoo Senior Solution Architect 07.Feb.2017
개발자와운영자를위한 DevOps 플랫폼 OpenShift Container Platform Hyunsoo Kim(hykim@redhat.com) Senior Solution Architect 07.Feb.2017 1 Agenda 1. What is DevOps? 2. Platform as a Service(PaaS) 3. Build & Deploy on PaaS
More informationDevSecOps Why Aren t You Doing It? Brian Liceaga, CISSP 1
DevSecOps Why Aren t You Doing It? Brian Liceaga, CISSP 1 Agenda State of DevOps Value of DevOps Benefitting from DevOps DevSecOps What you can do as InfoSec 2 The State of DevOps - 2017 Automation is
More informationCLOUD WORKLOAD SECURITY
SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly
More informationEE 660: Computer Architecture Cloud Architecture: Virtualization
EE 660: Computer Architecture Cloud Architecture: Virtualization Yao Zheng Department of Electrical Engineering University of Hawaiʻi at Mānoa Based on the slides of Prof. Roy Campbell & Prof Reza Farivar
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationNo Limits Cloud Introducing the HPE Helion Cloud Suite July 28, Copyright 2016 Vivit Worldwide
No Limits Cloud Introducing the HPE Helion Cloud Suite July 28, 2016 Copyright 2016 Vivit Worldwide Brought to you by Copyright 2016 Vivit Worldwide Hosted By Jeff Jamieson VP Sales & Marketing Whitlock
More informationCS 470 Spring Virtualization and Cloud Computing. Mike Lam, Professor. Content taken from the following:
CS 470 Spring 2018 Mike Lam, Professor Virtualization and Cloud Computing Content taken from the following: A. Silberschatz, P. B. Galvin, and G. Gagne. Operating System Concepts, 9 th Edition (Chapter
More informationContainerizing GPU Applications with Docker for Scaling to the Cloud
Containerizing GPU Applications with Docker for Scaling to the Cloud SUBBU RAMA FUTURE OF PACKAGING APPLICATIONS Turns Discrete Computing Resources into a Virtual Supercomputer GPU Mem Mem GPU GPU Mem
More informationWill your application be secure enough when Robots produce code for you?
SESSION ID: ASD-W02 Will your application be secure enough when Robots produce code for you? Hasan Yasar Technical Manager, Faculty Member SEI CMU @securelifecycle With the speed of DevOps It is me! I
More informationDevOps in the Cloud A pipeline to heaven?! Robert Cowham BCS CMSG Vice Chair
DevOps in the Cloud A pipeline to heaven?! Robert Cowham BCS CMSG Vice Chair Agenda Definitions, History & Background Cloud intro DevOps Pipelines Docker containers Examples 2 Definitions DevOps Agile
More informationDC: Le Converged Infrastructure per Software Defined e Cloud Cisco NetApp - Softway. Luigi MARCOCCHIA SOFTWAY
DC: Le Converged Infrastructure per Software Defined e Cloud Cisco NetApp - Softway Luigi MARCOCCHIA SOFTWAY Today s Businesses Require Greater Agility Focus on increasing speed of business Customers expect
More informationCLOUD COMPUTING. Rajesh Kumar. DevOps Architect.
CLOUD COMPUTING Rajesh Kumar DevOps Architect @RajeshKumarIN www.rajeshkumar.xyz www.scmgalaxy.com 1 Session Objectives This session will help you to: Introduction to Cloud Computing Cloud Computing Architecture
More informationLogging, Monitoring, and Alerting
Logging, Monitoring, and Alerting Logs are a part of daily life in the DevOps world In security, we focus on particular logs to detect security anomalies and for forensic capabilities A basic logging pipeline
More informationCIS : Computational Reproducibility
CIS 602-01: Computational Reproducibility Containers Dr. David Koop Virtual Machines Software Abstraction - Behaves like hardware - Encapsulates all OS and application state Virtualization Layer - Extra
More informationDevOps Course Content
DevOps Course Content 1. Introduction: Understanding Development Development SDLC using WaterFall & Agile Understanding Operations DevOps to the rescue What is DevOps DevOps SDLC Continuous Delivery model
More informationWeaving Security into Every Application
Weaving Security into Every Application Paul Fox AVP Technology AT&T 2018 TM Forum 1 Cyber Security Accelerating Threat Telecom Breaches 300,000 Number of complaints filed with the FBI Internet Crime Complaint
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationLINUX Virtualization. Running other code under LINUX
LINUX Virtualization Running other code under LINUX Environment Virtualization Citrix/MetaFrame Virtual desktop under Windows NT. aka Windows Remote Desktop Protocol VNC, Dameware virtual console. XWindows
More informationSunil Shah SECURE, FLEXIBLE CONTINUOUS DELIVERY PIPELINES WITH GITLAB AND DC/OS Mesosphere, Inc. All Rights Reserved.
Sunil Shah SECURE, FLEXIBLE CONTINUOUS DELIVERY PIPELINES WITH GITLAB AND DC/OS 1 Introduction MOBILE, SOCIAL & CLOUD ARE RAISING CUSTOMER EXPECTATIONS We need a way to deliver software so fast that our
More informationDevOps Tooling from AWS
DevOps Tooling from AWS What is DevOps? Improved Collaboration - the dropping of silos between teams allows greater collaboration and understanding of how the application is built and deployed. This allows
More informationMulti-Arch Layered Image Build System
Multi-Arch Layered Image Build System PRESENTED BY: Adam Miller Fedora Engineering, Red Hat CC BY-SA 2.0 Today's Topics Define containers in the context of Linux systems Brief History/Background Container
More informationDevOps and Continuous Delivery USE CASE
DevOps and Continuous Delivery USE CASE CliQr DevOps and Continuous Delivery Page 2 DevOps and Continuous Delivery In the digital economy, increasing application velocity is key to success. In order to
More informationStrengthen and Scale security using DevSecOps
OWASP Indonesia Meetup Strengthen and Scale security using DevSecOps $ www.teachera.io!"# @secfigo % secfigo@gmail.com # whoami Author, Speaker and Community Leader. Speaker/Trainer at Blackhat, AppSec EU,
More informationWHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction
WHITE PAPER RedHat OpenShift Container Platform Abstract Benefits: Applications are designed around smaller independent components called microservices. Elastic resources: Scale up or down quickly and
More informationFIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS
WHITE PAPER FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS Over the past 15 years, server virtualization has become the preferred method of application deployment in the enterprise datacenter.
More informationContainer Deployment and Security Best Practices
Container Deployment and Security Best Practices How organizations are leveraging OpenShift, Quay, and Twistlock to deploy, manage, and secure a cloud native environment. John Morello CTO Twistlock Dirk
More informationMicroservice Deployment. Software Engineering II Sharif University of Technology MohammadAmin Fazli
Microservice Software Engineering II Sharif University of Technology MohammadAmin Fazli Topics Continuous Integration & Microservices Continuous Delivery Artifacts Custom Images Environments Service Configuration
More informationI keep hearing about DevOps What is it?
DevOps & OpenShift I keep hearing about DevOps What is it? FOR MANY ORGANIZATIONS, WHAT IS I.T. LIKE TODAY? WATERFALL AND SILOS Application Version X DEVELOPMENT OPERATIONS IT OPS IS UNDER PRESSURE ENVIRONMENT
More informationSecurity as Code: The Time is Now. Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS
Security as Code: The Time is Now Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS Introduction Business is moving faster to the cloud, and DevOps is accelerating scale and pushing automation
More informationDevelopment and Operations: Continuous Delivery in Practice
Development and Operations: Continuous Delivery in Practice Dr. Julie Wagner Senior UX Researcher at Fujitsu EST Copyright 2016 FUJITSU LIMITED Enchantée Studied computer science in Aachen, Germany Majored
More informationOS Virtualization. Linux Containers (LXC)
OS Virtualization Emulate OS-level interface with native interface Lightweight virtual machines No hypervisor, OS provides necessary support Referred to as containers Solaris containers, BSD jails, Linux
More informationHow Can Testing Teams Play a Key Role in DevOps Adoption?
June 3, 2016 How Can Testing Teams Play a Key Role in DevOps Adoption? Sujay Honnamane QA Director @sujayh Rameshkumar Bar Sr. Automation Architect @rameshbar 2016 Cognizant Session take away DevOps Overview
More informationIntroduction to Container Technology. Patrick Ladd Technical Account Manager April 13, 2016
Introduction to Container Technology Patrick Ladd Technical Account Manager April 13, 2016 Container Technology Containers 3 "Linux Containers" is a Linux kernel feature to contain a group of processes
More informationThe Intent based Data Center. Kim In-Sook Manager, ASEAN Data Center Architect Team Jan 11, 2018
The Intent based Data Center Kim In-Sook Manager, ASEAN Data Center Architect Team Jan 11, 2018 30,000+ Application developers. 7200+ Apps. 32 data centers. More software developers than Google, and more
More informationAutomating for Agility in the Data Center. Purnima Padmanabhan Jeff Evans BMC Software
Automating for Agility in the Data Center Purnima Padmanabhan Jeff Evans BMC Software 9/5/2006 Agenda The Situation Challenges Objectives BMC Solution for Data Center Closed-Loop Change Data Center Optimization
More informationRed Hat Roadmap for Containers and DevOps
Red Hat Roadmap for Containers and DevOps Brian Gracely, Director of Strategy Diogenes Rettori, Principal Product Manager Red Hat September, 2016 Digital Transformation Requires an evolution in... 2 APPLICATIONS
More informationWindocks Technical Backgrounder
Windocks Technical Backgrounder Windocks is a port of Docker s open source to Windows used to modernize SQL Server workflows. Windocks is also an open, modern, data delivery solution that sources data
More informationHPE GO4SAP Getting Orchestrated for SAP Automate SAP Basis Management Enterprise-scale end-to-end
HPE GO4SAP Getting Orchestrated for SAP Automate SAP Basis Management Enterprise-scale end-to-end Automate enterprise-scale SAP Basis Management end-to-end SAP helps companies of all sizes and industries
More informationMurray Goldschmidt. Chief Operating Officer Sense of Security Pty Ltd. Micro Services, Containers and Serverless PaaS Web Apps? How safe are you?
Murray Goldschmidt Chief Operating Officer Sense of Security Pty Ltd Micro Services, Containers and Serverless PaaS Web Apps? How safe are you? A G E N D A 1 2 3 Serverless, Microservices and Container
More informationDocker & Chef. Containers. Containers and Docker 8/4/14. Linux containers (LXC) Single operating system Multiple isolated, working configurations
Docker & Chef Containers Linux containers (LXC) Single operating system Multiple isolated, working configurations Containers and Docker Open-source engine for container management Docker registry for sharing
More informationOpenStack hypervisor, container and Baremetal servers performance comparison
OpenStack hypervisor, container and Baremetal servers performance comparison Yoji Yamato a) Software Innovation Center, NTT Corporation, 3 9 11 Midori-cho, Musashino-shi, Tokyo 180 8585, Japan a) yamato.yoji@lab.ntt.co.jp
More informationOracle Solaris 11: No-Compromise Virtualization
Oracle Solaris 11: No-Compromise Virtualization Oracle Solaris 11 is a complete, integrated, and open platform engineered for large-scale enterprise environments. Its built-in virtualization provides a
More informationGlauber Costa, Lead Engineer
Glauber Costa, Lead Engineer glommer@cloudius-systems.com Who are we Small startup founded by Avi Kivity (Creator of KVM) Around 15 people, including some Linux veterans 10 countries Headquarters in Israel
More informationOvercoming the Challenges of Automating Security in a DevOps Environment
SESSION ID: LAB-W02 Overcoming the Challenges of Automating Security in a DevOps Environment Murray Goldschmidt Chief Operating Officer Sense of Security @ITsecurityAU Michael McKinnon Director, Commercial
More informationDocker and HPE Accelerate Digital Transformation to Enable Hybrid IT. Steven Follis Solutions Engineer Docker Inc.
Docker and HPE Accelerate Digital Transformation to Enable Hybrid IT Steven Follis Solutions Engineer Docker Inc. Containers are the Fastest Growing Cloud Enabling Technology Title source: 451 Research
More informationOperating system hardening
Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications
More informationLINUX CONTAINERS. Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER
Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Flexible and connected platforms are core components in leading computing fields, including
More informationHow Container Runtimes matter in Kubernetes?
How Container Runtimes matter in Kubernetes? Kunal Kushwaha NTT OSS Center About me Works @ NTT Open Source Software Center Contributes to containerd and other related projects. Docker community leader,
More information64-bit ARM Unikernels on ukvm
64-bit ARM Unikernels on ukvm Wei Chen Senior Software Engineer Tokyo / Open Source Summit Japan 2017 2017-05-31 Thanks to Dan Williams, Martin Lucina, Anil Madhavapeddy and other Solo5
More informationTHE IMPACT OF HYBRID AND MULTI CLOUDS TO CYBERSECURITY PRIORITIES
SESSION ID: STR-R14 THE IMPACT OF HYBRID AND MULTI CLOUDS TO CYBERSECURITY PRIORITIES Doug Cahill Group Director and Senior Analyst Enterprise Strategy Group @dougcahill WHO IS THIS GUY? Topics The Composition
More informationOpen Containers of Champagne
Open Containers of Champagne OpenStack Magnum Boyd Hemphill Director of Evangelism @behemphi @stackengine Background Background Oracle Developer, MySQL DBA, PHP Developer, System Architect, DevOps Director
More informationCloud solution consultant
Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Level 18 Job family Professional services Date November 2017 Reports to Cloud services group
More informationDevOps Course Content
Introduction to DevOps: Background Ingredients of DevOps DevOps principles Who has adopted? Mirage or Reality? Challenges, Domain specific Technology specific DevOps Toolchain (Practices and Tools) SDLC
More informationInnovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant
1 Innovate or die!? Modern IT Workplace Security Alex Verboon Cyber Security Consultant Alex.verboon@basevision.ch Daniel Buehlmann Principal Workplace Consultant daniel.buehlmann@basevision.ch About Alex
More informationCloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention
More informationRED HAT OPENSHIFT A FOUNDATION FOR SUCCESSFUL DIGITAL TRANSFORMATION
RED HAT OPENSHIFT A FOUNDATION FOR SUCCESSFUL DIGITAL TRANSFORMATION Stephanos D Bacon Product Portfolio Strategy, Application Platforms Stockholm, 13 September 2017 1 THE PATH TO DIGITAL LEADERSHIP IT
More informationTEN LAYERS OF CONTAINER SECURITY
TEN LAYERS OF CONTAINER SECURITY Tim Hunt Kirsten Newcomer May 2017 ABOUT YOU Are you using containers? What s your role? Security professionals Developers / Architects Infrastructure / Ops Who considers
More informationIntroduction to Containers
Introduction to Containers Shawfeng Dong Principal Cyberinfrastructure Engineer University of California, Santa Cruz What are Containers? Containerization, aka operating-system-level virtualization, refers
More informationApplication Deployment
Application Deployment Software Engineering II WS 2018/19 Christoph Matthies (christoph.matthies@hpi.de) Enterprise Platform and Integration Concepts Datacenter Work by Leonardo Rizzi (CC BY-SA 2.0) Agenda
More informationResearch Faculty Summit Systems Fueling future disruptions
Research Faculty Summit 2018 Systems Fueling future disruptions Continuous Delivery for Bing UX Chap Alex Engineering Manager, Microsoft Core Bing-wide Principles Live-site quality is paramount Constant
More informationTable of Contents 1.1. Introduction. Overview of vsphere Integrated Containers 1.2
Table of Contents Introduction Overview of vsphere Integrated Containers 1.1 1.2 2 Overview of vsphere Integrated Containers This document provides an overview of VMware vsphere Integrated Containers.
More informationPowerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations
Powerful Insights with Every Click FixStream Agentless Infrastructure Auto-Discovery for Modern IT Operations The Challenge AIOps is a big shift from traditional ITOA platforms. ITOA was focused on data
More informationSUSE An introduction...
Virtualization @ SUSE An introduction... Mike Latimer Sr. Engineering Manager SUSE mlatimer@suse.com Agenda Who is SUSE? Introduction to Virtualization Types of Hypervisors Xen KVM libvirt Virtualization
More informationAbout Codefrux While the current trends around the world are based on the internet, mobile and its applications, we try to make the most out of it. As for us, we are a well established IT professionals
More informationMODERNIZING TRADITIONAL SECURITY:
GUIDE TO MODERNIZING TRADITIONAL SECURITY: The Advantages of Moving a Legacy Application to Containers The Leading Cloud Native Cybersecurity Platform Understanding Lift and Shift As containers become
More informationDevOps Using VSTS and Azure
DevOps Using VSTS and Azure ALMDO; 5 Days, Instructor-led Course Description The combination of Visual Studio Team Services (VSTS) and Microsoft Azure provides a powerful and fully featured solution to
More information@amirmc UNIKERNELS WHERE ARE THEY NOW? AMIR CHAUDHRY. Open Source Summit NA 13 Sep 2017
@amirmc UNIKERNELS WHERE ARE THEY NOW? AMIR CHAUDHRY Open Source Summit NA 13 Sep 2017 OVERVIEW Unikernel refresher Status updates: MirageOS, IncludeOS, HaLVM, Solo5 Summary Questions? REFRESHER UNIKERNEL
More information1/10/2011. Topics. What is the Cloud? Cloud Computing
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More informationUsing MySQL in a Virtualized Environment. Scott Seighman Systems Engineer Sun Microsystems
Using MySQL in a Virtualized Environment Scott Seighman Systems Engineer Sun Microsystems 1 Agenda Virtualization Overview > Why Use Virtualization > Options > Considerations MySQL & Virtualization Best
More informationAGILE RELIABILITY WITH RED HAT IN THE CLOUDS YOUR SOFTWARE LIFECYCLE SPEEDUP RECIPE. Lutz Lange - Senior Solution Architect Red Hat
AGILE RELIABILITY WITH RED HAT IN THE CLOUDS YOUR SOFTWARE LIFECYCLE SPEEDUP RECIPE Lutz Lange - Senior Solution Architect Red Hat Digital Transformation It requires an evolution in. Applications Infrastructure
More informationData Center Automation: Automated Provisioning, Patching, and Compliance
ebook Data Center Automation: Automated Provisioning, Patching, and Compliance Explore the Benefits of Micro Focus Automation Software in Customer Case Studies Get Started ebook Table of Contents 3 The
More informationTECHNICAL BRIEF. Scheduling and Orchestration of Heterogeneous Docker-Based IT Landscapes. January 2017 Version 2.0 For Public Use
TECHNICAL BRIEF Scheduling and Orchestration of Heterogeneous Docker-Based IT Landscapes January 2017 Version 2.0 For Public Use Table of Contents 1 Summary... 2 2 Introduction... 2 3 Stonebranch DevOps
More informationRethinking Security CLOUDSEC2016. Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team
Rethinking Security CLOUDSEC2016 Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team Breaches Are The New Normal Only The Scale Surprises Us OPM will send notifications
More informationQualys Cloud Platform
18 QUALYS SECURITY CONFERENCE 2018 Qualys Cloud Platform Looking Under the Hood: What Makes Our Cloud Platform so Scalable and Powerful Dilip Bachwani Vice President, Engineering, Qualys, Inc. Cloud Platform
More informationCloud and Datacenter Networking
Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica
More informationwhat is the problem to be solved
what is the problem to be solved CEO view: How can the highest levels of CPU, Memory and Storage capacity be consumed to provide efficient usage of compute resources? A goal is to manage electric power
More informationVMware vsphere 4.0 The best platform for building cloud infrastructures
VMware vsphere 4.0 The best platform for building cloud infrastructures VMware Intelligence Community Team Rob Amos - Intelligence Programs Manager ramos@vmware.com (703) 209-6480 Harold Hinson - Intelligence
More informationVMware vsphere Clusters in Security Zones
SOLUTION OVERVIEW VMware vsan VMware vsphere Clusters in Security Zones A security zone, also referred to as a DMZ," is a sub-network that is designed to provide tightly controlled connectivity to an organization
More informationThe Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36
The Challenges of X86 Hardware Virtualization GCC- Virtualization: Rajeev Wankar 36 The Challenges of X86 Hardware Virtualization X86 operating systems are designed to run directly on the bare-metal hardware,
More informationEverything visible. Everything secure.
Everything visible. Everything secure. Unparalleled visibility, end-to-end security and compliance for all your global IT assets Qualys Cloud Platform 2-second visibility across all your assets Continuous
More informationHow Verizon boosted product delivery with Dynatrace Software Intelligence
How Verizon boosted product delivery with Dynatrace Software Intelligence 3x faster build and test cycles 2x faster deployments 33 percent faster revenue realization 50 percent reduction in issues 2019
More informationTeaching Elephants to Dance (and Fly!)
Teaching Elephants to Dance (and Fly!) IT s Journey to Digital Transformation Red Hat GEMs Jason Peng, Senior Solution Architect 6 Blind Men (and an elephant) IT s Reality What most of us are up against.
More information