Modern performance tools and techniques can dramatically improve the user experience, reduce developer and ops frustration, lead to better utilization of infrastructure and allow you to smartly ship products to market faster.
Working with many companies across all industries, we recognize the pitfalls and barriers to adopting DevOps. The Rackspace DevOps Automation team works with various tools every day to counteract these pitfalls. Join Product Manager @EricBrinkman as he shows you the technologies our DevOps Automation team uses, provide insight as to why they were chosen, and walk through a customer experience demo.
This webinar will include:
•Deploying Magento through UI and pushing code
•A look into the control panel
•Demo of New Relic and Chef
•Simulation of Rackspace customer experience
Deploying Solid-State for Virtualized Environments: Use Cases for All Flash, Hybrid and Alternative Storage Implementations
This session dives into common use cases for all-flash and hybrid storage systems for virtualized environments in mid and large enterprises. Russ will focus on actual deployments, allowing listeners an opportunity to learn how to build a solid business case for solid-state, based upon findings from enterprise firms, as well as hands on performance testing with multiple systems in head to head comparisons, providing practical information.
Review the options and architectures that are best suited for server and desktop virtualization
Understanding of when and where to deploy solid-state storage or hybrid to maximize your IT budget and ROI.
Webinar Series on Fronthaul Testing
The path towards complete FTTA/RRH site turn-up - in just one field trip
This webinar series covers everything you need to know to efficiently qualify fiber-to-the-antenna (FTTA) networks and confirm that remote radio heads (RRH) and CPRI links are fully functional before leaving the cell site – in just one field trip.
This three-part webinar series to learn more about connector inspection and cleaning techniques, fiber-link validation and troubleshooting, CPRI transport link validation, and more. This series aims to help you:
- Get your tower crews up-to-speed with fiber testing
- Ensure SFPs and RRH equipment are fully functional before activating services
- Speed up your deployment while preventing costly repeated tower climbs
Part 2: Deploying Fiber at 200 Feet - How to keep your foot on the ground
Understanding the challenges in deploying optical fibers within the FTTA/RRH environment. What are the different methods to test and characterize fiber?
1. Recap of previous session
2. Overview of a FTTA fiber network and the components to test
3. Challenges in deploying optical fibers within the FTTA/RRH environment
4. Fiber characterization test methods
› OTDR vs PM/LS – the pros and cons
› Impact of different fiber types (G652 vs G567)
› Bidirectional requirement, gainer vs excess loss, etc.
› Loopback measurement technique: results and benefits
› Test results documentation
Join our panel of product experts who work directly with Virtual SAN customers, and get some practical tips and tricks on deploying Virtual SAN. Whether it’s your first time working with Virtual SAN, or you are looking to expand your existing environment, we’ll share some of the best advice from those who have gone before you.
You’ll come away with ideas you can apply from the pre-deployment to the post-deployment phase, including:
•What to look for when evaluating storage and infrastructure options
•Benefits of Virtual SAN that admins often don’t realize up-front, but discover after deployment
•Key tools to have in place post-deployment and how they help
The business is demanding revenue-producing business services and IT is expected to deliver those services despite growing complexity. You turn to the cloud to help create the speed and agility you need, but onboarding applications is slow and impacting your ability to deliver these services quickly. Sound familiar? You aren’t alone.
Whether you are migrating existing applications or deploying new services, this webinar will show how you can quickly onboard applications to cloud. You’ll see firsthand the technology available to help you:
•Create, provision and deploy new applications in minutes
•Quickly migrate entire business services from one data center to another
•Support multiple hypervisor types (XEN, VMware) in the same grid
Learn how IT organizations, like yours, are deploying cloud services fast and keeping the business happy by making true service agility possible.
Join Managed Solution and Microsoft for best practices, resources and great business stories that all transpired from companies simply deploying and driving adoption on the cutting edge productivity tools they already own.
See how companies your size deployed unused business applications and successfully drove employee wide adoption, resulting in cross-departmental innovation, huge cultural gains and serious KPI achievements.
Join us for a look at how deploying Skype for Business and SharePoint specifically can meld with the tools staffers have already adopted to boost productivity, output and morale!
Citrix XenApp and XenDesktop 7.6 are fast becoming the standard platforms for deploying application and desktop virtualization. Based on the new Flexcast Management Architecture (FMA), XenApp and XenDesktop 7.6 provides a unified platform that makes application and desktop delivery fast and easy.
Join us for the Top Eight Best Practices for Deploying Citrix XenApp and XenDesktop 7.6 live webinar to learn how to take advantage of all the new Citrix features and enhancements to improve the security, manageability and remote access of your virtual applications and desktops.
The SAP HANA Cloud Platform Tools for Java integrate the standard capabilities of Eclipse IDE with extended features that allow you to develop applications based on the Java EE Web application model, and deploy them on the SAP HANA Cloud Platform. This enables you to use programming logic that is well-known to you, benefiting from the advantages of Java EE, while also utilizing the robust services of the SAP HANA Cloud Platform.
•What’s new in SP09
•Key Features - Developing, Deploying, Managing, Monitoring
•Developer Resources - Trial Access, SDKs, Training, Communities, etc.
1.Recap of previous session
2.Overview of a FTTA fiber network and the components to test
3.Challenges in deploying optical fibers within the FTTA/RRH environment
4.Fiber characterization test methods
›OTDR vs PM/LS – the pros and cons
›Impact of different fiber types (G652 vs G567)
›Bidirectional requirement, gainer vs excess loss, etc.
›Loopback measurement technique: results and benefits
›Test results documentation
Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.
In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.
Join this session to learn:
•Some of the different methods of deploying Flowspec
•How Flowspec compares with alternative filtering methods
•Best practices for secure traffic routing
Evolving consumer trends and rising costs dictate the technological necessities that quick serve and fast casual restaurant franchises must adopt to remain competitive. While innovation is creating revenue opportunities, it is also leaving franchises more vulnerable than ever to cybercrime. In an age where consumers are all connected and information travels in the blink of an eye, a breach doesn’t just hurt the single hacked location, it damages the entire brand.
Don’t miss this webinar with Dr. Jonpaul Leskie, a global IT security consultant and franchise owner, who will be joined by ControlScan security and compliance experts. Together, they will examine three new popular technologies that franchise owners are deploying in their organizations to increase profits, and how those same technologies can create risky gaps in their security leaving them vulnerable to breach.