The drive to simplify IT tasks has led to Cisco developing an open application-centric policy model as the foundation for datacenter automation.
In this session, you’ll learn how:
- To incorporate an application-centric SDN policy model for Red Hat Enterprise Linux and OVS deployments.
- The ACI model can easily be incorporated into an OpenStack management framework.
- Cisco is opening up the ACI framework and working with various open source communities.
Network Functions Virtualization (NFV) and software-defined networking (SDN) are opening up new possibilities for service providers looking to reduce costs and deliver new revenue-generating services. In this session, you’ll learn more about the Intel Open Network Platform for servers, Intel’s reference design for NFV and SDN. This platform is based on commercially available, industry-standard Intel architecture-based servers and is geared to the evaluation, development, benchmarking, and deployment of NFV. It also supports Open vSwitch deployments used in the service chaining of multiple virtualized network functions and is the basis for validating and developing an SDN framework with OpenDaylight.
Data is emerging as the world’s newest resource for competitive advantage. As the value of insight from data continues to grow, companies are struggling with their current systems to keep pace as their present IT infrastructures and IT budgets can’t keep up with the increased demand for insights and the volume of data.
In this session, we’ll explore how top-performing organizations confront this reality by taking a different approach. You’ll learn how companies are gaining competitive advantage with new innovation and design that puts data to work faster with their Linux solutions. These systems are easy to consume and manage with open source technologies, simplified virtualization management, and flexible capabilities.
Through your Red Hat subscription, you have access to a range of tools and services that can help you resolve issues quickly and efficiently.
In this session, we’ll:
- Provide an overview of the Red Hat tools available for automatic problem determination and problem resolution.
- Deliver a roadmap on how subscriber services are being seamlessly integrated into the Red Hat portfolio to make it easier for you to resolve problems and interact with Red Hat subscription services.
- Demonstrate Red Hat’s new in-product intelligence and diagnostics engine that enables you to find relevant Red Hat knowledge and solutions from within your product, based on data gathered around your specific issue
- Discuss how you can achieve continuous uptime using dynamic kernel updates with Red Hat Enterprise Linux 7 beta.
- Discuss and demonstrate the Red Hat Support Tool and the various new Red Hat Access plug-ins that provide Red Hat knowledge, diagnostic services, and support case creation from within your Red Hat products using your relevant system information.
- Share recommended practices and Red Hat’s roadmap for delivering more integrated subscriber services, which create a seamless experience between using and managing your Red Hat systems.
Bottom line: You’ll leave this session knowing how to use the portfolio of available support tools and will have a better understanding of how subscriber services are being integrated into Red Hat’s portfolio to deliver maximum value.
In this highly interactive session, you’ll learn how Red Hat collaboratively works with the National Security Agency (NSA), Defense Information Systems Agency (DISA), and other stakeholders to develop government and industry policy to secure Red Hat products using open source principles. In addition, you’ll hear how a similar methodology can be applied to other government and industry regulations like PCI, the Health Insurance Portability and Accountability Act (HIPAA), and the Sarbanes-Oxley Act (SOX).
Using the SCAP (Security Content Automation Protocol) Security Guide as a case study, you’ll also learn how human-interpreted policy can be embodied in machine-interpreted SCAP. See how that same SCAP content can be used to help securely lock down systems when provisioned and aided with continuous monitoring using Red Hat Satellite. The DISA STIG (security technical information guide) for Red Hat Enterprise Linux will also be used as a case study in this session.
This session is an update to the 2013 presentation, extended to demonstrate:
- Patch and vulnerability scanning through SCAP.
- Centralized security compliance scans through Red Hat Satellite.
- Automated remediation capabilities via bash.
- Content tailoring via SCAP Workbench.
How do some of the largest IT organizations around the world migrate, configure, and manage their Red Hat JBoss Middleware installations? What are the steps they take to factor in security, performance, and tuning to ensure they get the most out of their application server tiers?
In this session, we’ll describe how Red Hat’s own IT department migrated its existing Red Hat JBoss Enterprise Application Platform 4 and 5 infrastructures to version 6. We’ll reveal how the team followed industry-wide best practices–under a tight deadline–and used open source tools to configure and manage the company’s new installations.
Looking to make the jump to the cloud? We’ll also illustrate how these same tools and concepts can be used to prepare, configure, and manage Red Hat JBoss Middleware installations within a cloud architecture. And with concrete examples and use cases you can use in your environment, you’ll learn best practices for:
- Managing middleware configurations in large-scale production environments.
- Effectively controlling and managing access to server resources.
- Using existing open source tools to automate the configuration and deployment process.
- Promoting deployments through environments with an emphasis on logging, security, messaging, and application support.
- Migrating existing applications and server configurations from older versions of Red Hat JBoss Middleware.
- Implementing existing configurations to provision within a cloud environment.
Unlock the secrets to master your middleware.
In this session, you’ll learn how to obtain the best possible performance with Red Hat Storage Server—with information relevant to all phases of deployment. Specifically, we’ll cover the following Red Hat Storage Server topics:
- Best practices for deployment and software configuration, including virtualized deployments.
- Integration strategies with hardware technologies such as SSD.
- Configuration and tuning techniques for the best possible performance.
- Behavior analysis under relevant, real-world workloads.
- Upcoming enhancements currently in upstream development.
Red Hat JBoss Operations Network, a solution to monitor and manage your application servers, follows a hub and spoke architecture with a central server and agents on machines with resources to manage them. Customers can interact with the system using a comprehensive user interface on the server or a command-line interface and a REST API.
In this session, you’ll see the latest Red Hat JBoss Operations Network version and learn about its various changes and enhancements since previous versions, including:
- A new storage backend.
- Enhancements in bundles.
- REST API.
You’ll also learn about some of the changes we’re working on for the next Red Hat JBoss Operations Network version.