Featured Sessions at Container World 2018

In this edition of container world, you will get sessions from various categories like orchestration, storage, security, devops. Here is the list of most of the featured sessions at Container World 2018

So You Think You Can Scale…Containers? Why a Service Mesh is the answer to the question

Time: 11:20am – 12:00pm

Location: Mission City Ballroom, B2

Attendees will leave with an understanding of:

  • The core components of scaling containers: Circuit breakers, Retry, Discovery and Distribution
  • Proxy models used for scaling containers: Reverse, Forward, Sidecar
  • Basic service mesh architecture: Control plane and Data plane
  • Where service mesh is going: programmable service platforms

All Access, Conference, Startup Conference or Enterprise Conference pass required to attend this session.

Participants: Lori MacVittie – Principal Technical Evangelist, F5 Networks

Containers: Polyglot Ninjas for Build and Delivery Toolchains

Time:11:20am – 12:00pm

Location: Mission City Ballroom, M1

Moving away from monolithic applications towards distributed applications and micro- services gives development teams the freedom to select the best platform, languages, and tools for each task. But although a modern approach allows developers to quickly get resilient, scalable code out the door, CI/CD pipelines also get complicated. Have no fear, containers are here to help. By containerizing your build platform and agents, as well as your team’s toolsets, you can keep developers happy and moving fast while delivering the quality your business demands.

All Access, Conference, Startup Conference or Enterprise Conference pass required to attend this session.

Participants: Mandy Hubbard – Software Engineer/QA Architect, CS Disco

From the Beginning: Hypervisors, VMs, and Containers

Time:1:00pm – 1:40pm

Location: Mission City Ballroom, B3

Containers are nothing new to the industry, but it’s surge in popularity have many engineers questioning the best use cases for virtual machines and containers. It’s hard to figure out what is best for your application without understanding what the strengths of these technologies are. It’s time to break down the barriers and understand containers, the difference between rkt and Docker, and all the acronyms buzzing through the community right now. Let’s learn about the why’s and whens to use virtual machines, containers, or both!”

All Access, Conference, Startup Conference or Enterprise Conference pass required to attend this session.

Participants: Sarah Christoff – Technical Support Analyst, WP Engine

How to Re-architect Your Legacy Apps for a Microservices Architecture

Time: 1:00pm – 1:40pm

Location: Mission City Ballroom, B2

How to Re-architect Your Legacy Apps for a Microservices Architecture. The architecture of legacy applications doesn’t often align with the idealized containerized microservices architecture many organizations are putting in place. Containers are expected to be stateless, selfconfiguring, but traditional applications are often stateful, with additional configuration required. This talk will cover:

  • Overview of microservices architectures
  • How to architect legacy apps to work in a containerized microservices
  • Examples of applications/Demos of challenges legacy apps may have.

 

Why Should I Adopt DevOps and Agile/Lean Principles? Where should I start?

Time: 1:50pm – 2:30pm

Location: Mission City Ballroom, M1

  • Case Studies: What successes have DevOps practices helped others achieve?
  • It’s all about the people! Culture is key!
  • Tools to aid DevOps adoption
  • What ROI can I expect?

 

Behavior Intelligence at the Edge Cloud

Time: 3:00pm – 3:40pm

Behavioral intelligence, the method and application of cloud native computing and artificial intelligence, provides unprecedented insight into customer behavior based on how the software they use behaves and interacts along the hybrid edge cloud. However, to gain this insight, we need to evolve traditional infrastructure towards a modern edge cloud, meaning:

  • Any software architecture, language or vintage
  • Any content or capability implemented in software
  • Any hybrid infrastructure and technology

In this session, Doug will discuss the modern edge cloud, which requires new software architectures and deployment models. These new approaches unleash the use of microservices, containers, and functions at scale. However, how does one gain insight into how software functions interact with each other in this new architecture and their environment during runtime? Doug will also discuss the visibility and control requirements needed to build behavioral intelligence in this new modern edge cloud.

Location: Mission City Ballroom, B3

Participants: Doug Nassaur – General Manager, Lead Principal Technical Architect, Technology Design & Architect, AT&T

Hybrid Networking: Managing Containers and Virtual Machines

Time: 3:00pm – 3:40pm

Location: Mission City Ballroom, B2

All Access, Conference, Startup Conference or Enterprise Conference pass required to attend this session.

Participants: Prem Sankar Gopannan – System Manager/Principal Architect, Ericsson

Embracing White-Box Monitoring: Prometheus

Time: 3:00pm – 3:40pm

Location: Mission City Ballroom, M1

Can your monitoring setup tell you about the radiation coming from atomic particle explosions on the Sun? The trick we have at Google is to monitor the errorcorrection rate of the memory hardware and many other metrics, throughout all of Google’s datacenters in real time. Now let’s bring the same capabilities to your clusters using open source software.

Welcome to the world of white-box monitoring, where you can look inside the black-box for more. White-box monitoring empowers you to monitor your entire infrastructure by collecting and aggregating metrics offered by your applications.

In this talk, we will instrument a real-world application with white-box monitoring using Prometheus, an open source monitoring system. Once we start collecting the metrics, we can finally write queries and alerting on top of metrics that matter. Expect your pager going off during this talk! All Access, Conference, Startup Conference or Enterprise Conference pass required to attend this session.

Participants: Ahmet Balkan – Software Engineer, Google Cloud, Google

 

Best Practices to Secure Application Containers and Microservices

Time: 3:50pm – 4:30pm

Location: Mission City Ballroom, B2

Containers such as Docker and CoreOS Rkt deliver incredible capabilities to developers and operators and are powering the DevOps revolution in application development and deployment. Docker in particular has taken industry by storm, resulting in over 8 billion downloads and 500,000+ containerized applications in this open source platform. With all this new-found power comes significant challenges and concerns. Come learn how application containers and microservices work via the definition published in the NIST publication SP 800-180, understand the security challenges leveraging this new approach, and best practices to address the same as documented in future NIST publications.

Participants: Anil Karmel – Co-Chair | CEO & Co-Founder, NIST Cloud Security Working Group, Cloud Security Alliance | C2 Labs

 

A DevOps State of Mind: Continuous Security for DevOps with Kubernetes

Time: 3:50pm – 4:30pm

Location: Mission City Ballroom, M1

With the rise of DevOps, containers are at the brink of becoming a pervasive technology in Enterprise IT to accelerate application delivery for the business. When it comes to adopting containers in the enterprise, Security is the highest adoption barrier. Is your organization ready to address the security risks with containers for your DevOps environment? In this presentation, you’ll learn about:

  • The underlying technologies for Containers based DevOps including Kubernetes
  • The top security risks with containers and how to manage these risks at scale for Container Images, Builds, Registry, Deployment, Hosts, Network, Storage, API, Monitoring/Logging, Federation.
  • How to make your Container workflow more secure without slowing down DevOps
  • Automating security vulnerability management and compliance checking for container images

Participants: Chris Van Tuin – Chief Technologist, NA West, Red Hat

 

QoS And Burstability: Dynamic Kubernetes at Domo

4:40pm – 5:20pm

Location: Mission City Ballroom, B3

Domo manages 40+ Kubernetes clusters for a range of workloads, clouds, and compute resources. We also replace, delete, scale, and add new clusters on a regular basis and therefore need to be able to able to keep a stable client endpoint even as the underlying infrastructure is evolving. Come see how we have designed our cluster infrastructure to provide:

  • Dynamic QOS for millions of pods per day across 40+ clusters without any client code change required
  • Dynamic handling of diverse node pools for fun and profit (literally)

All Access, Conference, Startup Conference or Enterprise Conference pass required to attend this sessions.

Participants: Carson Anderson – Cloud Ops Engineer, Domo

 

Enabling Cloud Native Web Scale @ Sling TV

Time: 4:40pm – 5:20pm

Location: Mission City Ballroom, B2

A look back at how Sling TV launched our first Cloud Native, web scale application. Attendees will leave with an understanding of:

  • How we got started and the technical, people and process challenges we overcame
  • How we are combining Cloud Native & Big Data to provide a higher quality service to our customers
  • Our high-level architecture to achieve the levels of abstraction, reliability and flexibility we are after
  • Some things we wish we knew before we started.
  • What is on the horizon for us in the coming year We will review our journey from the developer, platform engineering and end user perspectives.

All Access, Conference, Startup Conference or Enterprise Conference pass required to attend this session.

Participants: Brad Linder – Cloud Native and Big Data Evangelist, Sling TV

 

Containers in the Enterprise: A Security Perspective

Time: 8:30am – 8:50am

Location: Mission City Ballroom

Containers are at the brink of becoming mainstream in Enterprise IT, in large part due to the agility and speed they bring to application delivery. However, much like the revolutionary technology that came before (most recently, the cloud), security fears are a significant barrier to adoption.

In this presentation, you’ll learn:

  • About the underlying technologies for Containers
  • The security risks that come with deploying containers in the enterprise
  • The dangers of untrusted content and why you should maintain container images
  • Best practices for making your container workflow more secure
  • About the importance of automating vulnerability management, security management, and compliance checking for container images.

 

Containers and Persistent Memory

Time: 11:20am – 12:00pm

Location: Mission City Ballroom, M1

Containers can make it easier for developers to know that their software will run, no matter where it is deployed. What do customers, storage developers, and the industry want to see to fully unlock the potential of persistent memory in a container environment? This presentation will discuss how persistent memory is a revolutionary technology which will boost the performance of next-generation packaging of applications and libraries into containers.

You’ll learn:

  • What SNIA is doing to advance persistent memory
  • What the ecosystem enablement efforts are around persistent memory solutions
  • How NVDIMMs are paving the way for plug-n-play adoption into container environments

All Access, Conference, Startup Conference or Enterprise Conference pass required to attend this session.

Participants: Arthur Sainio – Co-Chair, SNIA Persistent Memory Special Interest Group | SMART Modular Technologies

 

From Unsure to Secure: Basics for getting Kubernetes Running Securely in Production

Time: 1:00pm – 1:40pm

Location: Mission City Ballroom, B2

As you scale your use of containers, Kubernetes provides a simple centralized way to manage and orchestrate your containerized applications. But it also brings with it a new set of security challenges specific to the orchestration layer. In this talk, we’ll outline the key steps necessary to get Kubernetes up and running securely – so you can deploy applications at scale with confidence

Participants: Kevin Lewis – Solutions Architect, Twistlock

 

The Container Monitoring Problem: Managing risk and ensuring performance in a containerized environment

Time: 1:00pm – 1:40pm

Location: Mission City Ballroom, B3

Containers have skyrocketed in popularity, but with the benefits, come the risks. One being that containers come and go so frequently, and change so rapidly, that they can be much more difficult to monitor and understand than physical or virtual hosts.

  • Why you need monitoring—blind spot/gap in monitoring of containers
  • Massive Operational Complexity. Container Ops are not the same as Host Ops
  • Metrics / Data Explosion
  • Host vs. Container lifetimes. Monitoring uptimes of minutes as opposed to days.

Avoiding Infrastructure At Rest – the Power of Immutable Containers

Time: 1:50pm – 2:30pm

Location: Mission City Ballroom, B3

Keeping up with patches has never been more critical. For hardware, that’s… hard. What if servers were deployed 100% ready to run without any need for remote configuration or access? What if we were able to roll a complete rebuild of an entire application stack from the BIOS up in minutes? Those are key concepts behind a cloud and container deployment pattern called “immutable infrastructure.” It’s called immutable because the servers are deployed from container images produced by CI/CD process and destroyed after use instead of being reconfigured. It’s a container and cloud pattern that has finally made it to physical. In this talk, we’ll cover the specific process and its advantages over traditional server configuration. Then we’ll dive deeply into open tools and processes that make it possible to drive immutable containers into your own infrastructure. The talk will include live demos and will discuss process and field challenges that attendees will likely face when they start implementation at home. We’ll also cover the significant security, time and cost benefits of this approach to make pitching the idea effective.

Participants:

Rob Hirschfeld – Founder and CEO, RackN

Shane Gibson – Sr. Architect & Community Evangelism, RackN

 

Singularity Containers for Enterprise Performance Computing (EPC)

Time: 1:50pm – 2:30pm

Location: Mission City Ballroom, M1

Singularity is the most widely used container solution in high-performance computing (HPC). Enterprise users interested in AI, Deep Learning, compute drive analytics, and IOT are increasingly demanding HPClike resources. Singularity has many features that make it the preferred container solution for this new type of “Enterprise Performance Computing” (EPC) workload. Instead of a layered filesystem, a Singularity container is stored in a single file. This simplifies the container management lifecycle and facilitates features such as image signing and encryption to produce trusted containers. At runtime, Singularity blurs the lines between the container and the host system allowing users to read and write persistent data and leverage hardware like GPUs and Infiniband with ease. The Singularity security model is also unique among container solutions. Users build containers on resources they control or using a service like Singularity Hub. Then they move their containers to a production environment where they may or may not have administrative access and the Linux kernel enforces privileges as it does with any other application. These features make Singularity a simple, secure container solution perfect for HPC and EPC workloads.

Participants: David Godlove – Software Engineer, Sylabs

 

Istio: The Extensible Service Mesh

Time: 3:00pm – 3:40pm

Location: Mission City Ballroom, B3

With microservices and containers mainstreaming, container orchestrators provide much of what the cluster (nodes and containers) need. With container orchestrators’ core focus on scheduling, discovery and health at an infrastructure level, microservices are left with unmet, service-level needs, such as:

  • Traffic management, routing, resilient and secure communication between services
  • Policy enforcement, rate-limiting, circuit breaking
  • Visibility and monitoring with metrics, logs and traces
  • Load-balancing and rollout / canary deployment support

Service meshes provide for these needs. In this session, we will dive into Istio — its components, capabilities and extensibility. Istio envelopes and integrates with other open source projects to deliver a full-service mesh. We’ll explore these integrations and its extensibility in terms of choice of proxies and adapters.

All Access, Conference, Startup Conference or Enterprise Conference pass required to attend this session.

Participants: Lee Calcote – Head of Technology Strategy, SolarWinds

Skip the Anxiety Attack When Building Secure Containerized Apps

Time: 3:00pm – 3:40pm

Location: Mission City Ballroom, B2

As a developer security is something you know you have to handle, but that doesn’t mean you have to figure it all out yourself. Application security complexity can be reduced if planned into development from the start. In this talk, experts from the IBM Container Service team will discuss what it means to build and run a secure application and show how Kubernetes-as-a-service is the ideal platform. Learn how to achieve a secure Kubernetes cluster, how to handle network security, and how to build security awareness into you CI/CD pipeline. We will address how the IBM Container service provides this secure platform automatically and cover advanced capabilities such as Vulnerability Advisor, which provides image vulnerability scanning, configuration scanning based on ISO 27k, live container scanning, and integration with IBM X-force Exchange, to provide insight to the severity of discovered vulnerabilities. Network security will also be covered, including how to leverage network access policies with Calico and how to protect ingress traffic.

Participants: Chris Rosen – Program Director, Offering Management, IBM Container Service & IBM Container Registry, IBM

 

Building Persistent Applications in Containerized Environments

Time: 3:50pm – 4:30pm

Location: Mission City Ballroom, M1

This session will examine the components required for creating persistent applications in your container orchestration solution of choice, including a discussion of:

  • Storage drivers, dynamic provisioning etc., and how to use in your deployments and pods/clusters.
  • High availability
  • What happens to the volumes when you delete objects.

Making Container Security Accessible

Time: 3:50pm – 4:30pm

Location: Mission City Ballroom, B2

Most of the security options available on container management platforms map the kernel and operatingsystem features like Seccomp or Linux capabilities which require expert understanding to take full advantage of. This results in often incorrect and overpermissive security configurations. Docker is aiming to change that and make container security more broadly accessible by developing a set of high-level permissions for containers and services, dealing with the implementation internally. This feature would enable exposed security settings to be abstracted from the underlying OS and defined based on what the application or service does at a high-level. Moreover image publishers would able to advertise the best security settings for their users to protect them from potential bad security decisions. Image publishers can even to bake these permissions inside the image itself, as part of a trusted bundle, hosted in a trusted registry.

All Access, Conference, Startup Conference or Enterprise Conference pass required to attend this session.

Participants: Nassim Eddequiouaq – Security Engineer, Docker

 

Docker + Kubernetes

Time: 3:50pm – 4:30pm

In the past few months Docker added support for Kubernetes as an orchestration option in Docker Desktop and Docker EE, including an integration that allows developers and operators to use the Docker Compose files they use today to deploy applications to Kubernetes. In this talk we’ll show how to take a cloud native application from development to a production Kubernetes cluster using Docker, covering many aspects of the Developer to Ops workflow: local development and debugging on your laptop, with Docker compose files or kubectl, securing the software supply chain with signing and scanning images, the workflow to promote images from staging to production, integrating with logging and monitoring systems, performing rolling updates.

Location: Mission City Ballroom, B3

All Access, Conference, Startup Conference or Enterprise Conference pass required to attend this session.

Participants: Anusha Ragunathan – Software Engineer, Docker

 

container world 2018

Leave a Reply

Your email address will not be published. Required fields are marked *