The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
A load balancer lives in a critical position between your applications and your end-users. This placement can deliver incredible value in terms of analytics, performance, and cost savings—but only if your load balancer is architected realize this potential. This live workshop will explore the technology and value behind the Smart Load Balancer. As an attendee, you will:
• Learn differences between Smart Load Balancers and Legacy Load Balancers.
• Understand the value of Smart Load Balancers in traditional and modern use cases.
• See a live demonstration of Avi Networks’ Smart Load Balancer in action.
Microservices are all the hype and engineering efforts have shifted to refactoring monoliths into smaller, independent and composable services. Of course, this allows individual components of the application/system architecture to be independently scaled, owned and operated. But, what about your data?
Building highly available, consistent and complex transactional/analytical applications at scale, that continue to perform as demand increases is challenging. Additionally, resigning a once, strongly consistent, ACID-compliant application backed by a DBMS into an eventually consistent architecture is unacceptable for many of the legacy systems still in use today. However, you cannot afford to keep relying on the same monolithic data architectures constituting a single point of failure and continue to supply your demand.
Learn how existing applications can be modernized for the cloud by employing cloud-ready data management technologies, such as Apache Geode, which was built from the ground up on distributed, horizontally scalable (scale-out), shared-nothing architectural principles. When combined with the power of Spring running on Cloud Foundry, you have a recipe for protecting your existing investment while enabling you to leverage cloud-native design patterns that will move you towards the future.
The average enterprise uses 10 or more monitoring products to assess enterprise performance and service availability.
But, it’s 2018 - and it’s essential to take a strategic application and business-centric approach to performance monitoring. Although it’s tempting to put performance monitoring as an afterthought or in response to a new project, it needs to be part of a holistic approach to ITSM processes.
In this webinar, attendees will learn:
- The state of play in regards to monitoring in the enterprise
- How Application Performance Monitoring (APM) tools improve ITSM processes
- Key APM capabilities and how they apply to Service Transition and Operation
With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.
This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.
Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
Quay is CoreOS's enterprise-ready container and application registry. Quay makes it easy for developers to store, manage and deploy container images, and simplifies your development to production workflow for your software containers.
Even the most security focused businesses are susceptible to vulnerabilities such as DNS cache poisoning, DNS outages, or DDoS attacks. These can lead to a website or application becoming slow, completely unavailable, or even worse - hijacked. In this 30-minute live webinar, Jonathan Lewis, VP Product Marketing will cover the several, practical ways enterprises can protect themselves from losing control over their domain, and ensuring an excellent user experience for their customers.
In the fourth part of our Domain-Driven Design (DDD) webinar series we address Domain Events, a major driver for the evolution of DDD over the last couple of years.
Domain Events help us to decouple Bounded Contexts by interaction through preferably asynchronous business events. Domain Events can also be used as a persistence model (Event Sourcing). In order to identify suitable Domain Events, Alberto Brandolini invented a new workshop format called, Event Storming.
This webinar introduces you to the concept of Domain Events and explains how you can leverage the advantages of this approach in your software architectures. We will also address common pitfalls and trade-offs when working with Domain Events and will take a close look at Event Storming and its benefits.
DDS Technical Overview Series - Part IV: The OMG Data Distribution Service provides a diverse set of Quality of Service policies. Strategic use of these QoS policies enables intelligent behavior in middleware and allows the application developer to focus on the domain. In this webinar, we examine one application in detail and explore how it uses DDS QoS policies to address several non-functional requirements. We'll also cover the trade-offs involved in different design choices involving DDS QoS and other DDS features. This webinar builds on the Part I and Part II webinars by examining certain QoS policies in more depth and taking a deep dive into a single application as it evolves from simple data transfer to taking full advantage of the Data-Centric Publish/Subscribe model of DDS.
Join us—the Verizon Threat Research Advisory Center —for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape. Threats like MeltDown, Spectre and other hot topics will be shared by experts across Verizon and our partners.
Each month, we will have a specific theme to help promote awareness and best practices.
Every organization undergoes different pain points during their agile transformation.
We've been a part of many of those transformations, and our experts can offer insights and best practices for your organization to overcome those pain points. Join CA's Senior Director of Agile Management, Doug Dockery, agile coach and co-author of Modern Business Management: Creating a Built-to-Change Organization and resident agile expert, on Tuesday, January 16, for your opportunity to ask the questions on your mind as your organization starts, expands and scales agile across multiple teams and departments.
With IoT still experiencing growing pains, predicting its future can be guesswork at best. Join us for this January 16 webinar where IoT subject matter experts peer into the crystal ball and expand on some of their IoT visions for the near future.
Moderated by Christina Richards, VP, Global Marketing, Aeris, this webinar will present viewpoints, discuss upcoming IoT directions, innovations, and challenges, and enable audience participation via a Q&A session. All is possible at this future-leaning webinar. Here are a few tidbits.
“SIM providers are going away. It’s just a matter of when.”
—Drew Johnson, VP Engineering & Operations, Aeris
“Automotive transformation via the IoT will become mainstream.”
—Michelle Avary, VP, Automotive Strategy, Aeris
“With more than a billion people in India alone, many below the poverty line, IoT will lead the charge for securing basic needs, such as clean water, healthcare, and education.”
—Dr. Rishi Mohan Bhatnagar, President, Aeris India
“Security will have to up its game as IoT delivers huge volumes of data.”
—Syed “Z” Hosain, Chief Technology Officer, Aeris
My prediction: This will be the only IoT futuristic view you will need to attend this year!
Sign up now for this futuristic view into the future of IoT.
Pressure to deliver faster, better and more economical services is driving IT modernization across state and local government. But a recent survey from the Center for Digital Government indicates that CIOs are approaching modernization with a growing emphasis on value -- respondents said “budget, cost control and fiscal management” dominate their attention, discussions and strategic planning activities. So how do government leaders approach modernization in an environment where value and fiscal responsibility are paramount?
This hour-long, panel-style webinar will:
• Uncover additional CDG survey findings on technology, planning and procurement priorities
• Offer best practices around modernizing legacy systems, consolidating IT environments, strengthening data and analytics capabilities, adopting cloud services, and improving security and risk management
• Discuss how commercially supported open source technologies can drive better performance at lower cost
(ISC)² COO Wesley Simpson, shares the association’s experience as (ISC)² transitions to a 100% cloud-based services model. This interactive discussion explores how (ISC)² decided to go all in with cloud, why the cloud was the best option, how the team ensured its cloud strategy mapped to operational needs, and how security is front and center throughout the entire process. Learn how we are doing it and share your cloud migration experiences. This discussion is for anyone thinking about moving to the cloud, already making the transition or even those who completed a cloud migration but still looking for best practices to apply.
From its early days as a Platform-as-a-Service (PaaS) to the current evolution as the industry's leading enterprise-ready Kubernetes platform, Red Hat OpenShift has quickly evolved to enable containers, cloud-native applications and open hybrid cloud deployments for companies around the world.
In this webcast, learn how OpenShift is helping developers and operators deploy a broad range applications across multiple cloud environments.
How does an established data center-centric organization with high trust and security needs move to the public cloud? How does a waterfall-model-oriented organization make such a move in a timely fashion so as to not be left behind by its competition? What does governance look like for such an organization's use of the public cloud? What can these organizations avoid doing wrong?
These questions are answered by using the fundamentals of Agile methodologies: prioritization by highest value and risk; technical excellence; and continuous delivery of valuable products as seen through the lense of security principles. Those principles include least privilege, separation of duties, data protection, and visibility to examine and provide solutions for the trust, security and governance needs of cloud-new adopting organizations.
With more than 500,000 unfilled cybersecurity jobs, an industry made up of 10 percent women and a trend of 56 percent of women leaving tech inside 10 years, we have a big problem. The stereotype of a hoodie-clad man at a terminal in a dark room -- a myth our schools perpetuate -- is harmful. Those in cybersecurity can change this right now! Come discuss how to sell all the diverse cybersecurity jobs to women, so they will want to join us.
In application security, the size of the security team is always the most scarce resource. The best way to optimize the security team is automation. This presentation will provide an overview of key application security automation principles and practices creating an Application Security Pipeline augmented with automation.
With the rise of docker and serverless patterns, there is a whole new suite of tools available to the pipeline builder. We show you how to get started automating application security tooling and reporting using these new patterns.
Call it Younger Sibling Syndrome: You study the successes and failures of those who came before. You replicate the wins. You limit the failures. You capitalize on the experience of pioneers and trailblazers.
Digital transformation is no different. Over half of the Fortune 500 is already using Cloud Foundry® as part of their digital transformation strategy. Where have they succeeded? How can you replicate? What will you need?
Wherever you are on your digital transformation journey, learn from your predecessors. In this talk, Dormain Drewitz distills the experiences of Fortune 500 companies using Cloud Foundry. Attend this session to learn more about the patterns around strategies, processes, and team-level tactics.
Are you currently operating a complex distributed system or in the process of transforming to a distributed architecture? Join us for this webinar to learn more about some of the challenges of operating distributed systems and how you can leverage monitoring to ensure your system is always up and running as efficiently as possible.
In this session we'll give an introduction to the Open Source monitoring solution, Prometheus. We'll cover how to get started with Prometheus, basic concepts such as time series data, metrics, querying and alerting. We'll also show a brief demonstration of Prometheus in action.
Securing the enterprise Jenkins credential store is paramount given the fact that it is a potential attack vector. Join us to explore CoreOS' new Vault Open Cloud Service (OCS) and learn how it can be used to secure Jenkins running on CoreOS Tectonic.
CoreOS Vault OCS is effortlessly installed, operated, scaled, and configured to handle failover. Unlike proprietary cloud services, CoreOS Open Cloud Services are first-class, automated Kubernetes resources running on the CoreOS Tectonic platform leveraging the Operator platform we introduced in 2016.
Kubernetes automates deployment, operations, and scaling of applications, but Kubernetes should extend beyond system management and help developers, too. Kubernetes should make it easy to write the distributed applications and services that run in cloud and datacenter environments.
During this webcast, you will learn:
- How to make application deployment and operations at scale simple and reliable
- How to make it easy to create “cloud-native” applications in the first place
- Idiomatic, efficient, clean, and extensible design and concurrency patterns leveraging Containers, Docker and Red Hat OpenShift.
Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.
Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.
During this webinar you’ll learn:
- How should you monitor services built on top of containers?
- What metrics become more relevant in Docker-based environments?
- How do you construct alerts most effectively?
- How do you troubleshoot containers that are rapidly coming and going?
The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
Join us to learn about the Enterpryze Omnichannel Suite, a Mobile and Cloud simplified ERP that integrates SAP Business One and Square for Retail.
Morgan Browne, CEO of Enterpryze, will provide an overview and demo of the Enterpryze Omnichannel Suite. This cloud-based ERP suite provides users with the back office power of SAP Business One fully integrated with the omnichannel elegance of Square for Retail. It can be licensed for $75/month/user and takes only minutes to get started.
Enterprises are transitioning from on-premise, monolithic applications to highly dynamic, polyglot environments using microservices and cloud computing. During this transition, organizations are often left wondering what to do with existing investments in legacy platforms and application development frameworks that are running the business of today but are quickly becoming obsolete in the face of the ongoing digital revolution.
In this webcast, we'll explore how organizations can meet the challenges of modern business using existing applications while at the same time driving new innovation using modern application development technologies like microservices, containers, and hybrid cloud. These techniques can help deliver market innovation faster and with more reliability while minimizing the risk of introducing new technology too quickly.
Two critical European regulations are rolling out in 2017 and 2018. The General Data Protection Regulation (GDPR) is designed to strengthen the safeguards around personal data and create a more uniform standard within the European Union (EU), while eIDAS is the European Regulation aimed at creating a framework for cross-border electronic identification and transactions across EU member countries.
Paperless vs. Privacy is a real issue facing business in the EU, and around the world. Both eIDAS and GDPR have global ramifications and affect a broad group of industries. Complying with both of these regulations can be a real hardship for some small to mid-size companies.
Please join us for our BrighTalk webinar where our resident Public Key Infrastructure expert, Eric Avigdor, will help you tread the waters of eIDAS vs. GDPR. Which one is most important for your business? What are the consequences of non-compliance? We will also discuss how to comply with multi-factor authentication, physical access, and encryption requirements.
No two Agile adoptions are ever the same, but there are a number of common areas that can cause problems. Join industry expert and Projectmanagement.com contributor Andy Jordan as he highlights 7 challenges organizations often face.
In his usual upbeat style Andy will:
-Help you plan to prevent the challenges from affecting you
-Identify the early warning signs that things may be going wrong
-Give you tools to prevent thing getting worse and help you learn from the experience
As Agile becomes ever more critical to business success you can’t afford to fall into expensive traps on your Agile journey. Sign up for this webinar today and learn how to give your organization a path to success.
During this 20-minute webinar, learn how developers can stay ahead of vulnerabilities that can disrupt the software development lifecycle (SDLC). See how Veracode Greenlight finds security defects and provides contextual remediation advice to help you fix issues in seconds, right within your IDE. Coupled with the use of Veracode’s developer sandbox, teams can scan code without alerting security or affecting an application’s overall compliance with policy.
As a result you will be able to:
•Reduce overall costs by 3x when compared to testing during the QA phase
•Increase the fix rate of flaws using sandbox scans
•Get your organization on track to move towards a DevOps and continuous release cycle
In today’s world of ever-increasing cybersecurity threats, identity theft, and online crime, leaving DNS unsecured is potentially like having armed guards patrolling your front door, while leaving your back door hanging open. DNS is a critical, but often overlooked, piece of infrastructure on which virtually every online entity relies. We will explore the top five things you need to know about securing your DNS configuration against the very real threats that plague the Internet.
- The history of DNSSEC
- How DNSSEC works under the hood
- Why EDNS(0) is so critical in a DNSSEC world
- The threats against which DNSSEC can protect you
- When you need DNSSEC, and when you don’t
Balancing DevOps Speed with Quality: Environment Automation to the Rescue
A Prescriptive Approach to Innovation for the Modern Enterprise
Organizations in every industry face opportunities and threats caused by digitally empowered customers. Acquiring new customers — or losing existing ones — has never been easier. Companies can't afford to move fast only in some areas; the whole organization must race together toward customer obsession. Application development and delivery (AD&D) professionals must master development and operations (DevOps) and modern application delivery processes across their entire software portfolio to win in the digital marketplace. As software environments become increasingly distributed and complicated, modeling such environments authentically in the Dev/Test stage becomes critical to speed and quality. Giving timely access to such environments early on in the Dev/Test cycle, with self-service can help break silos and increase productivity allowing organizations to scale their software development and shift into higher gear – all with better governance and business insights.
How do you move fast with increased agility without increasing risk?
This webinar will share state-of-the-art research from Forrester including trends and best practices, and information from Quali on how to drive this with cloud sandboxes as part of the release cycle with on-demand, self-service environments.
Enterprise DevOps architects, Release Management professionals, Cloud architects and professionals from ITOps are encouraged to attend.
In today’s fast paced modern business management environment the need for the right project portfolio management or PPM software solution has never been more important. However, many companies are still not viewing these platforms as part of the strategic infrastructure that drives success, and that’s a big problem. Join industry expert Andy Jordan and CA’s own Jim Tisch as they discuss the issues including:
•Why decisions must be driven from the top down
•Why cost alone is an irrelevant and misleading factor in choosing a solution
•The role IT does – and doesn’t, have in the decision-making process
•The importance of a partner over a vendor
•Measuring and managing the return on your PPM investment
An organization won’t succeed simply because they choose the right tool, but they may well fail if they commit to the wrong one. Don’t miss this thought provoking webinar and give yourself a significant advantage in the battle to deliver consistent success.
While there have been many improvements around securing containers, there is still a large gap in monitoring the behavior of containers in production and taking action on any abnormal behavior. That’s why we created Sysdig Falco, the open source behavioral activity monitor for containerized environments.
Sysdig Falco can detect and alert on anomalous behavior at the application, file, system, and network level. In this webinar attendees get a deep dive into Falco and learn:
-How does behavioral security differ from existing security solutions like image scanning?
-How does Falco work?
-What can it detect?
-How to build and customize rules.
-How to extend with alerting options.
Who should attend?
If you're managing containers in production, or just beginning our container exploration, you'll want to attend to understand the security paradigms of containers and how to secure them.
How Kubernetes is deployed and managed has changed since the first release of the project. From configuration management systems and unit files to deploying Kubernetes using Kubernetes, a lot has changed.
Self-hosted Kubernetes has many benefits as a deployment option, and this webinar will highlight those benefits, as well as explain the history and nuances of making self-hosted Kubernetes possible.This webinar will describe what self-hosted Kubernetes means, why it exists, how it came into existence, and what you need to know if you're running a self-hosted cluster. Many tools now deploy self-hosted clusters including bootkube and kubeadm, so knowledge of how this works can be very important for anybody running a Kubernetes cluster.
What are the benefits of self-hosting? How does it work? What do I need to know if I'm administering a self-hosted cluster?
All those questions and more will be discussed in detail in this webinar. In addition, I will discuss how various projects and products take advantage of the many benefits of self-hosting, such as Tectonic.
Today, IT organizations have many options for development technology tools, and the number of choices can be daunting. As modern application requirements become more complex, it’s apparent that one runtime, one framework, or one architectural style is no longer a feasible strategy. Organizations must figure out how to manage the complexity of distributed app development with diverse technologies, a lack of skilled resources, and siloed processes.
Red Hat OpenShift Application Runtimes
Join Red Hat to learn about Red Hat’s solution for optimized cloud-native development: Red Hat® OpenShift Application Runtimes. A suite of containerized runtimes that simplifies cloud-native development, Red Hat OpenShift Application Runtimes provides a highly productive and prescriptive developer experience and delivers strategic flexibility without limiting development, testing, deployment, and modernization preferences. The discussion will cover:
Cloud, containers, DevOps, and the open source Cambrian explosion.
Migrating existing apps: rehost, replatform, or refactor.
One size does not fit all: polyglot and developer choice.
Cloud-native deployment techniques.
Future development: Istio service mesh, Kubernetes, and serverless architectures.
There are quite a few Docker security tools in the ecosystem; how do they compare?
Everyone starts with image vulnerability scanning, but that's just the beginning and usually stops where your CI/CD pipeline ends. That’s why we created this extensive list of 20 container and Docker specific security tools that can help keep containers secure in production. https://sysdig.com/blog/20-docker-security-tools/
We got lots of feedback and questions from many of you, so we decided to pick some of the most popular open source tools and commercial products, look at them in detail, and show them to you live in a webinar.
Join Knox and Jorge from the Sysdig Team, for a 1 hour session to run through:
-How to secure Docker containers and what are the best practices
-Why you need to both static and dynamic (run-time) scanning for your images
-What other container security measures and policies are necessary in production
Demo: Comparing and implementing docker security basics with the most popular container security tools
While the CIO's dilemma of optimizing the existing environment while growing new capabilities hasn't
changed, the playing field has—dramatically. New, speedy ways to develop applications and deliver them, such as with microservices, are now creating chasms where once there were gaps in your digital
effort. Enter APIs—the answer to how and where to start.
Modernizing with APIs provides a smooth modernization path for government agencies—from establishing API use, to extending legacy systems with them, to ultimately transitioning to modern
architectures with them.
Join this webinar to learn about:
• The practice of APIs in government agencies.
• How APIs extend the benefit and ROI of legacy systems.
• Reference architectural approaches to bridging old and new architectures.
• Some technologies to help you implement this approach.
Accelerating your digital transformation will often add new challenges to an already complex IT environment. Cloud, microservices, containers and IoT are just the start, and require flexible, modern approaches that put customer experience first and are built to be future-proof. CA Application Performance Management (CA APM) is engineered to address the challenge of improving performance across these dynamic application environments.
In this webcast, we will discuss the top five reasons why you should consider CA Application Performance Management to help optimize your customer experience and performance across digital ecosystems.
There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.
SDRs provide wireless communication components whose trans¬mit and receive characteristics are realized through specialized software running on programmable platforms. The benefit of allowing a single communications platform to be rapidly reconfigured for multiple, highly-diverse communication is to multiplex receive and transmission signals of different encodings on many frequencies (each combination is called a “waveform”). SDRs handle waveforms programmatically are used in fundamentally new ways for multiple domains (e.g. C4ISR, Internet of Things, Robotics, Space, etc.). Sup¬porting several waveforms inside the same device eases bug fixing, enables field re-configurability, allows mul¬tiple data transmission standards to be supported simultaneously, and helps improve the security and integrity of communications. Any communication task can be realized instanta¬neously by uploading/downloading appropriate software that defines the necessary waveforms allowing rapid reconfiguration and upgrades of Over-The-Air Reprogrammable deployed equipment and use of Smart Antennas.
This webinar’s purpose is to provide background and solicit interest for a revised version of the OMG Software-Based Communications Domain Task Force (SBC/DTF), called the Secure Network Communications (SNC) for Software Defined Radios (SDR) Working Group (WG).
For information on OMG SBC visit http://www.omg.org/intro/SCAV.pdf.
The more you understand the numerous cloud migration considerations, the more likely your enterprise will take advantage of its scalability, agility, and cost reduction benefits.
Register for this 30-minute webinar to learn how to minimize the risks and set yourself up for success.
You’ll also learn:
- Which applications to migrate first
- How to monitor and minimize the impact on users before, during, and after
- What training your IT staff needs to effectively build and operate cloud environments
Just when you thought you had container security covered, a vulnerability appeared in the Docker container runtime—an insecure opening of the file-descriptor allowing privileged escalation—Now what?
Yes, container hardening and image scanning are essential for container security, but automating anomaly detection and threat defenses in the container runtime is now essential. Join us on January 30th, for a technical webinar, to learn more about threat to the evolution of the container runtime layer as well as a simplified approach to container runtime protection.
In this technical webinar you will learn:
* How container runtime protection complements image, instance, and orchestration security
* What elements of container security may be monitored
* How runtime container protection enables true DevSecOps
* How to deploy container runtime security across multiple public clouds and even on-premise
* Advantages of combining container security alerts with AWS CloudTrail monitoring
This webinar is a chance to learn how the circuit breaker pattern is used in microservices applications. Fundamentally, the circuit breaker pattern in a microservice application is all about managing traffic to the different instances of your services. We utilize active health checks to monitor these instances, to help avoid catastrophic failure.
Join this webinar to learn:
- How the circuit breaker pattern works
- Why the circuit breaker pattern has become popular, especially for microservices apps
- How the circuit breaker pattern is implemented in Microservices Reference Architecture
- Why NGINX is particularly well-suited for supporting microservices apps
Chris Stetson, Chief Architect & Sr. Director, Microservices Engineering
Charles Pretzer, Technical Architect
Floyd Smith, Director, Content Marketing
Whether you are new to Anypoint Platform or interested in MuleSoft’s latest innovations, watch this webinar to learn how to get started with Anypoint Platform, taking an API-led approach to integration.
You’ll learn how to:
- Design APIs quickly and consistently leveraging API fragments
- Implement APIs, and transform data graphically
- Auto-generate unit and integrated tests for APIs and integrations
- Engage internal and external users throughout the lifecycle
- Deploy, manage and analyze APIs and integrations in a unified management center
Kubernetes has yet to close the developer gap from source code to app running in a production Kubernetes cluster. Many build bespoke tools. How can the Kubernetes community come together to build decomposable solutions that help people define their app, deploy it, and manage its lifecycle over time? Learn about the progress we are making together to elevate the conversation from container orchestration to application lifecycles management.