This workshop will provide a hands-on experience with a turnkey implementation of a scalable Jenkins as a Service solution, based on CloudBees Jenkins Enterprise. The workshop will utilize the same microservice example used in the DevOps 2.1 Toolkit Workshop, walking you through the software development lifecycle using the tools and features provided within CloudBees Jenkins Enterprise. The audience will perform exercises which illustrate the distributed and scalable architecture provided by the CloudBees Jenkins Enterprise cluster.
From quickly provisioning your very own CloudBees Jenkins Enterprise master, to setting up a custom template for built-in, ephemeral and elastic Docker-based Jenkins agents, to dynamically creating Jenkins Pipeline jobs, you will have a true hands-on experience with the features that CloudBees Jenkins Enterprise provides. All of this functionality is derived from the highly-scalable Distributed Pipeline Architecture that serves as the foundation of CloudBees Jenkins Enterprise.
The speaker will cover best practices in Agile Transformation through effective software products and tools. It will also include demo of a couple of tools, and the business case of moving IT productivity tools to the Cloud.
This talk gives practical approaches to help organizations achieve best practices for Enterprise DevOps by deploying an Enterprise CD pipeline solution.
This will cover:
• What are the common mistakes that happen when companies try to start their DevOps programs
• How to leverage CloudBees Jenkins Enterprise to help scale DevOps practices
• Best practices for integrating CloudBees Jenkins Enterprise with leading enterprise DevOps tools (e.g. Atlassian, GitHub, JFrog and more)
We will dive into the CD Wave and see how CA Automic Release Automation can protect you while riding the wave and give you a 10 for your score. We will show how to easily provision and promote through the Pipeline and make auditing your process like spending a day at the beach.
The Austin Chapters of PMI and SIM are presenting an exclusive InnoTech Special Event. “Planning the Roadmap” is designed to bring Austin CIOs and their PMO Directors for a hands-on collaborative Strategic Project Execution session to discuss the Digital Transformation challenges common to all companies and help chart a course forward.
One of the key activities of microservices efforts is to decompose monolithic application architectures into microservices with bounded business contexts. On the surface, this may seem like a relatively common mapping exercise. However, unwinding any tightly-bound architecture yields multiple paths each with consequences with regard to the transformation activity as well as the final architecture. During this session we will look at some common crossroads that occur during these activities and possible solutions.
Check out how easy it is to get started on the CloudBees Jenkins Enterprise platform delivering software at the speed of ideas!
The state of malware has continued to evolve, but the two constants of web and email infiltration remain the same. Despite the infrastructure investments being made to secure organizations, relying on detection of good versus bad results in significant numbers of infections that continue to impact users. In this discussion, Danny Le talks about the challenges of a legacy detection approach and how a technology that has been leveraged in various previous ways is now providing a whole new level of protection with a new twist. Prevention Through Isolation.
- For our business to compete, we as a company need to be agile and nimble
- All core business processes run on IT systems. Hence, business transformation starts with IT becoming agile and nimble
- Some of our core issues before we embarked on transformation journey and how we solved them
- Core pillars of this transformation journey
A) Move from data center thinking to private cloud and infra as a code thinking
B) DevOps transformation – People, process and technical solve
C) Leverage mobility to drive business transformation within the company
How can you run an automated test when your application test workflow depends on an API from an external app or project that is unavailable? This presentation will demonstrate how to implement a CI/CD pipeline that has an external dependency using Service Virtualization to remove that constraint to enable automated unit testing as part of a CI/CD pipeline.
Check Point SmartEvent is a single pane of glass log correlation engine that is part of Security Management that existed for many years with proven performance. Continuous software adaptations and optimization deliver dozens of new capabilities and enhancements. SmartView auto correlates all the logs from Endpoint agents, Cloud security gateways, on premise security gateways and remote security gateways.
USAA’s purpose drive approach to Innovation rose to the challenge during recent Hurricane Harvey. Members in Rockport, Port Aransas, and Corpus Christi asked the question: “Can USAA use the pictures from their drone technology, put them on a public site for all of our members to search their address and see the impact the storm had to their homes?” USAA was able to create a differentiated experience for our impacted members and better still the general public in just 12 hours.
Windows 10, Office 365, cloud, mobile...your company spends a lot on IT transformation projects, but do they truly know if these projects are improving end user experience?
End user experience monitoring gives you the visibility you need to overcome pain points and validate the impact of IT change to successfully improve end user experience.
Attend this session and discover how to:
Jamboard makes enterprise collaboration more intuitive, and free of interruptions through a human-centric design and touch screen technology. Jamboard offers a versatile range of features to facilitate effortless creation of new ideas and “solutioneering”. Plus, Jamboard’s handy video conferencing feature helps bring the whole team together and unlock their collaborative creativity.
Join us for an engaging discussion on the hot topic of Bitcoin, Blockchain, and Initial Coin Offerings (ICO) and how they are disrupting business, government, and society.
Learn about core blockchain technologies and applications which are enabling new business models, changing value streams, and disrupting entire industries through innovation and alternative financing models.
We will discuss the market trends, threats, and opportunities for blockchain applications from Bitcoin and cryptocurrencies, to smart contracts, securities, compliance, and ICO’s. You will walk away with the foundation to prepare your organization for Blockchain Readiness™.
Topics include blockchain, cryptocurrency, bitcoin, smart contracts, distributed networks, decentralized networks, permissioned applications, Initial Coin Offering (ICO), compliance, and an enterprise use case demonstrating Blockchain Readiness™ and the ICO Blueprints™ process
Building microservices offers great benefits to corporations; however, this comes at a cost of increased operational complexity. Discover how to build resilience into your microservices through the automation of scaling, load balancing, throttling and failure handling using the following technologies and patterns:
PaaS - Pivotal Cloud Foundry Platform
API Gateway, Edge Service, Backends for Frontends (BFF) - Netflix Zuul, Feign
Service Registy - Netflix Eureka, Ribbon
Circuit Breaker - Netflix Hystrix and Turbine
Behind your people, nothing is more important to a business than that which makes your company unique. Your company IP; your customer list; your production data, etc… But, protecting these important assets with tired backup technologies has long been a source of frustration for many companies. That no longer has to be true with Disaster Recovery as a Service (DRaaS). In fact, Gartner says the DRaaS market is growing so fast that it will nearly double in size from $2 Billion to nearly $4 Billion in the next four years! DRaaS improves Recovery Time Objectives (RTOs) against ransomware & malware attacks, local hardware failure, natural disasters, human error, and every kind of interruption to business continuity. DRaaS is highly secure and, best of all, DRaaS can now be provided with zero capital expense! Come learn how and why!
Why do collaboration efforts around platforms such as SharePoint, Office 365, Jive, Chatter, and Slack fail to live up to expectations? Why do we continue to collaborate primarily in email? Join Phillip Seawright from Future Point of View where he explains the primary obstacles to enterprise wide buy-in for collaboration, and how to overcome these obstacles by building simple business cases that resonate with executive stakeholders.
Jenkins Pipeline is a game-changing way to write automation jobs with Jenkins. Now Jenkins can support everything from simple, one-step, Hello World-type jobs to the most complex, parallel pipelines. Best of all, pipelines can include manual/automated interventions (for example, a manual approval step) and also pipeline processes that survive Jenkins master restarts. The declarative syntax recently added to Jenkins Pipeline and the Blue Ocean UX enable an easy process for creating pipelines and beautiful, graphical pipeline visualizations. Combining Jenkins Pipeline with Docker can seriously reduce friction in your DevOps efforts. Come learn how to use Jenkins to tie all these things together!