Theo Schlossnagle offers best practices for service-level objectives including:
- How to design SLOs and how to evaluate their effectiveness
- How histograms can condense massive amounts of information into digestible and actionable insights
- What it means to look at SLOs ‘upside down”
The State of DevOps Report is the longest-standing, most widely referenced and largest body of DevOps research on the planet. The 2018 report analyzes responses from more than 3,000 technical professionals from around the world to reveal the 5 Stages of DevOps Evolution.
When your new application is ready to deploy, do you know the role that containerization will play? From Docker to Kubernetes to Titus, you need to stay on top of the latest container technology. This new ebook can help you figure out where to start. Learn about the most common container technologies and how they play a part in your cloud and on-premises application deployments.
Application build systems have evolved from reliance on manual processes to advanced automation that helps you: Deliver software faster than ever, improve release quality, reduce or eliminate manual processes, let your dev team focus on building great software. Get the ebook to learn how modern app builders can help you modernize and break free of manual pro
With the right foundation and optimizations, your teams can successfully adopt continuous delivery practices — and deliver software faster, with fewer bugs and lower risk. If you’re getting started with continuous delivery or evolving your approach, there are a few strategic considerations that can keep you on the right path.
LIVE Jan. 22, 2019:
Most development teams are practicing some form of DevOps these days. Regardless of the extent of that practice, speed is the ultimate measure for success. Another earmark of a successful DevOps practice is the empowerment of smaller teams. Gone is the idea of consolidating complicated toolsets into the hands of a small Center of Excellence (CoE).
Rancher 2.0 is a complete container management platform built on Kubernetes.
The three core components of the new architecture are: Rancher Kubernetes Engine, Unified Cluster Management, Application Workload Management. This technical architecture paper dives into those components, and looks at all the new features in Rancher 2.0. Download this whitepaper today!
There are many different approaches to implementing microservices. Many of them or specific to the needs of individual development teams. A model can make it easier for those teams to develop and deliver their own microservices-based applications.
This eBook offers a microservices reference architecture that includes a set of models you can use to create your own microservices applications.
The reference architecture has two components:
- A detailed description of each of the three models
- Downloadable code that implements a sample photosharing program, called Ingenious.
Read this eBook today!
You’ve built your first containerized application, and now you want to connect it to another container that, say, has a database. And, you don’t want to have to do the manual work of launching the containers and checking to see if they’re still running.. and if not, relaunching them.
It’s at this point that you realize you’re run into a challenge: Container networking. Now, imagine if you’re running a hundred containers that need to call into each other, despite perhaps being removed from one application and plugged into another.
This book from NGINX and O’Reilly Media is an excellent guide to understanding container networking, and how you can overcome the challenges presented. Download it today!
RECORED EVENT: As containers become commonplace for delivering and deploying applications, we’ve seen more of our customers taking a “lift-and-shift” approach to migrating their existing applications. In this session, Patrick Maddox, Sr. Director, Twistlock Solutions Architecture, will reveal how an environmental science and engineering consulting company moved its 14-year-old app that models storm surge to containers. The move to containers for this company — which has typical data collection, modeling, and other core line-of-business applications — delivered immediate benefits, including consistency, security and compliance.
Attendees will learn:
- How the move to containers simplified and improved the security of this application
- Specifics about how containers lowered expenses, while enabling greater visibility into the vulnerability posture of the app throughout its lifecycle
- Why containers make compliance instantly easier, by enabling organizations to find and correct problems early on, enforce settings and automatically block non-compliant actions
The move to cloud computing has significant repercussions for network management. Cloud computing environments are dynamic, so your tools need to be dynamic as well.
Download this white paper to learn about five best practices for cloud monitoring including:
- Focusing on service monitoring of your own applications instead of network monitoring
- Monitoring within the cloud for service outages and external to the cloud for WAN connectivity problems
- Creating visualizations of how an application is working within the public cloud, your internal network, SaaS environments, and the underlying infrastructure
- Using automation to respond to changes in application load
- Implementing a monitoring platform that is integrated with—yet independent of—the cloud vendor
Download this whitepaper today to learn more!
Next Page »
In today’s modern software factories, organizations are shifting security to the left. No longer just the purview of firewalls, security needs to be built in during development and deployment processes. By doing so, organizations can ensure they are limiting vulnerabilities getting into production while cutting costs of both downtime and code rework. Learn about:
- How to ensure that the use of open source doesn’t introduce vulnerabilities and other security risks
- How to automate delivery of trusted images using a policy-driven approach
- Empowering developers to secure their applications, while maintaining segregation of duties
- Ensuring the consistent flow of images through the pipeline, with no side-doors or introduction of unvetted images
- Enforcing immutability of containers, preventing container-image drift
Watch the webinar now!
Mostafa Siraj is a senior AppSec Engineer (Manager Level) at Capital One Bank based in London, United Kingdom. He has broad experience in preventing vulnerabilities in source code and architecture.
Rani Osnat has more than 20 years of enterprise software industry experience, in project management, product management and marketing, including a decade as VP of marketing for innovative tech startups in the IT security and cloud arenas. Previously Rani was a management consultant in the London office of Booz & Co. He holds an MBA from INSEAD in Fontainebleau, France.