[slides] High Availability in the Cloud | @CloudExpo @NewRelic #IoT #Cloud #BigData #DevOps

When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application.
“Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes.
In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, will discuss how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.

read more

[slides] High Availability in the Cloud | @CloudExpo @NewRelic #IoT #Cloud #BigData #DevOps

When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application.
“Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes.
In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, will discuss how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.

read more

Encore @SoftLayer Presentation | @CloudExpo @IBMCloud #SDS #DataCenter

What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together.
In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.

read more

Cloud Orchestration | @CloudExpo @Pythian #DevOps #IoT #Microservices

Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle.
In his session at 18th Cloud Expo, Alex Lovell-Troy, Director of Solutions Engineering at Pythian, presented a roadmap that can be leveraged by any organization to plan, analyze, evaluate, and execute on moving from configuration management tools to cloud orchestration tools. He also addressed the three major cloud vendors as well as some tools that will work with any cloud.

read more

Venafi to Exhibit at @DevOpsSummit | @Venafi #DevOps #IoT #CD #InfoSec

SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks. In today’s connected world, cybercriminals want to gain trusted status and remain undetected, which makes keys and certificates a prime target. Unfortunately, most security systems blindly trust keys and certificates, allowing bad guys to use them to hide in encrypted traffic, spoof websites, deploy malware, and steal data. As the Immune System for the Internet, Venafi patrols across the network, on devices, behind the firewall, and throughout the internet to determine which SSL/TLS, SSH, WiFi, VPN and mobile keys and certificates are trusted, protects those that should be trusted, and fixes or blocks those that are not.

read more

WebRTC Capabilities | @ThingsExpo #IoT #M2M #Java #RTC #WebRTC

For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.

read more

What Will You Do with IoT? | @ThingsExpo #BigData #IoT #IIoT #M2M #API

When the Internet of Things (IoT) started to emerge as a popular topic, I had to stop and ask myself if I was once again going to provide commentary on this emerging field. I enjoy exploring new technology shifts and illustrating how they can benefit various industries and businesses. It’s what I’ve done for the past 20 years through Java, XML, Web Services, SOA, Cloud and DevOps. However, every time I started writing on IoT I seemed to run into the same conundrum; am I commenting on this to jump on the hype bandwagon or because I see a need to represent the pragmatics of implementing and adopting this technology.

read more

Redis Data Structures | @CloudExpo @DaveNielsen #Redis #IoT #Containers

Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems.
In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis’ popularity.

read more

M2M Certificate Standard | @ThingsExpo #IoT #IIoT #M2M #InternetOfThings

The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.

read more

Orchestrating Microservices | @DevOpsSummit #DevOps #Microservices

Before becoming a developer, I was in the high school band. I played several brass instruments – including French horn and cornet – as well as keyboards in the jazz stage band. A musician and a nerd, what can I say?

I even dabbled in writing music for the band. Okay, mostly I wrote arrangements of pop music, so the band could keep the crowd entertained during Friday night football games. What struck me then was that, to write parts for all the instruments – brass, woodwind, percussion, even keyboards – I had to have an overall score to work from. Or at least a sketch of one. Otherwise, I’d end up with a bunch of parts that might sound great on their own, but would never fit together to make someone want to listen or dance to it.

read more