White Papers

There are many different approaches to implementing microservices. Many of them or specific to the needs of individual development teams. A model can make it easier for those teams to develop and deliver their own microservices-based applications.
This eBook offers a microservices reference architecture that includes a set of models you can use to create your own microservices applications.
The reference architecture has two components:
  • A detailed description of each of the three models
  • Downloadable code that implements a sample photosharing program, called Ingenious.
Read this eBook today!

White Papers

You’ve built your first containerized application, and now you want to connect it to another container that, say, has a database. And, you don’t want to have to do the manual work of launching the containers and checking to see if they’re still running.. and if not, relaunching them.
It’s at this point that you realize you’re run into a challenge: Container networking. Now, imagine if you’re running a hundred containers that need to call into each other, despite perhaps being removed from one application and plugged into another.
This book from NGINX and O’Reilly Media is an excellent guide to understanding container networking, and how you can overcome the challenges presented. Download it today!

Webinars

RECORED EVENT: As containers become commonplace for delivering and deploying applications, we’ve seen more of our customers taking a “lift-and-shift” approach to migrating their existing applications. In this session, Patrick Maddox, Sr. Director, Twistlock Solutions Architecture, will reveal how an environmental science and engineering consulting company moved its 14-year-old app that models storm surge to containers. The move to containers for this company — which has typical data collection, modeling, and other core line-of-business applications — delivered immediate benefits, including consistency, security and compliance.

Attendees will learn:

  • How the move to containers simplified and improved the security of this application
  • Specifics about how containers lowered expenses, while enabling greater visibility into the vulnerability posture of the app throughout its lifecycle
  • Why containers make compliance instantly easier, by enabling organizations to find and correct problems early on, enforce settings and automatically block non-compliant actions

White Papers

The move to cloud computing has significant repercussions for network management. Cloud computing environments are dynamic, so your tools need to be dynamic as well.

Download this white paper to learn about five best practices for cloud monitoring including:

  • Focusing on service monitoring of your own applications instead of network monitoring
  • Monitoring within the cloud for service outages and external to the cloud for WAN connectivity problems
  • Creating visualizations of how an application is working within the public cloud, your internal network, SaaS environments, and the underlying infrastructure
  • Using automation to respond to changes in application load
  • Implementing a monitoring platform that is integrated with—yet independent of—the cloud vendor

Download this whitepaper today to learn more!

Webinars

In today’s modern software factories, organizations are shifting security to the left. No longer just the purview of firewalls, security needs to be built in during development and deployment processes. By doing so, organizations can ensure they are limiting vulnerabilities getting into production while cutting costs of both downtime and code rework. Learn about:

  • How to ensure that the use of open source doesn’t introduce vulnerabilities and other security risks
  • How to automate delivery of trusted images using a policy-driven approach
  • Empowering developers to secure their applications, while maintaining segregation of duties
  • Ensuring the consistent flow of images through the pipeline, with no side-doors or introduction of unvetted images
  • Enforcing immutability of containers, preventing container-image drift

Watch the webinar now!

FEATURED SPEAKERS:

MSiraj

Mostafa Siraj is a senior AppSec Engineer (Manager Level) at Capital One Bank based in London, United Kingdom. He has broad experience in preventing vulnerabilities in source code and architecture.

RaniOsnat-Aqua

Rani Osnat has more than 20 years of enterprise software industry experience, in project management, product management and marketing, including a decade as VP of marketing for innovative tech startups in the IT security and cloud arenas. Previously Rani was a management consultant in the London office of Booz & Co. He holds an MBA from INSEAD in Fontainebleau, France.

Webinars

Containers are becoming the basic unit of deployment. Kubernetes is becoming the industry standard for managing containerized applications.

In this webinar, we will talk about basic Kubernetes constructs and will show how you can run three pod clustered Redis Enterprise on Kubernetes.

You will learn:

  •  Kubernetes primitives
  •  How to deploy Redis Enterprise service on Kubernetes
  •  How to deploy your app and connect to Redis Kubernetes service

Register for the webinar now.

FEATURED SPEAKER:

vkelkar.jpg

Vick Kelkar, Product, Redis Labs

Webinars

Organizations in a wide range of industries are rapidly adopting microservices because of the promise of greater agility and scalability. However, managing the performance of microservices-based applications introduces new challenges. Gartner stated in a recent report that traditional APM tools which were purpose-built for monoliths aren’t well suited to the dynamism, modularity, and scale of microservices-based applications.

During this webinar Tyler Wells, Director of Engineering at Twilio and Dennis Chu, Director of Product Marketing at LightStep share their insights about how to effectively manage the performance of microservices-based applications. You’ll learn how Twilio was able to:

  • Reduce the mean time to resolution (MTTR) by 92%
  • Analyze all of the company’s performance data generated by more than 40 core services without adding overhead
  • Launch segmented and detailed performance monitoring for each top customer including customer-specific root cause analysis

Watch the webinar today!

FEATURED SPEAKERS:

TylerWells

Tyler Wells

Director of Software Engineering, Twilio

Dennis Chu

Dennis Chu

Director of Product Marketing, LightStep

Webinars

Improved efficiency, reduced cost, and new revenue streams are the promised benefits of IoT deployments. To attain these results, connectivity management comes to the forefront, providing the ability to effectively connect, monitor, and manage multiple devices spread out over diverse areas.

Connectivity management, regardless of the number of devices or the amount of data transmitted, must be simplified for cost and efficiencies. The solution comes via a single platform, one that simplifies the connectivity management process, includes heightened security, and enables performance optimizations and cost controls.

In this webinar we look into the issues, the challenges, and the benefits of an evolving IoT landscape. We then then provide insights to solutions and growth in this sector.

Watch the webinar today!

White Papers

Multi-cloud strategies offer undeniable benefits of speed and scalability. But it also comes with some downsides, including architectural complexity and a lack of consistent application services across platforms.

This ebook looks at the good, the bad and the downright ugly of adopting a multi-cloud strategy. Read it today!

White Papers

Many organizations understand the benefits of cloud computing, but their journey has been done in an ad hoc manner. There is, however, much to consider before moving to the cloud, such as choosing one cloud or multiple clouds to run on, or adopting a hybrid on-premises/cloud strategy.

Some numbers:
56% of F5 survey respondents say their cloud decisions are made on a per-application, case-by-case basis
42% say applying consistent security across all company applications was a challenge.
Read this white paper to learn the 4 key steps to take when starting your journey to the cloud!

White Papers

By understanding the distinct phases of incident management in technology environments, teams can build a comprehensive plan to prepare for, react to, and analyze the impact of an incident. Download the Five Stages of Incident Management white paper and gain clear insight into:

Understanding each stage of incident management
Helpful tips on driving improvements across each stage
Key insights into the practices of top incident management teams
OpsGenie bridges the flow of data across DevOps monitoring tools for unmatched visibility into system and application health. This helps teams work smarter and react faster across the development lifecycle.

Regardless of how established your incident management practices are, this white paper has been designed to take you to the next level.

White Papers

APIs power today’s connected digital world, extending the functionality of web applications and driving automation. While they improve extensibility and innovation, API’s can also hurt your end-user’s experience if integrations are not available or functioning properly, so API monitoring has become critical to protecting performance.

This API monitoring primer covers:
  • Description of modern APIs and web services
  • Illustration of data transfer methods (SOAP, REST) and common data structures (XML, JSON)
  • Using Catchpoint to monitor APIs (alerts, SLA monitoring, root cause analysis)
  • Using webhooks to integrate performance data with your existing tools

Download the ebook now.

Next Page »

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!