ºÝºÝߣshows by User: TimMackey / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: TimMackey / Mon, 29 Jan 2018 22:49:00 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: TimMackey A question of trust - understanding Open Source risks /slideshow/a-question-of-trust-understanding-open-source-risks/86881400 bayareacybersecuritymeetup-180129224900
As presented at the Bay Area Cyber Security Meetup on January 25th, 2018. Open source development paradigms have become the norm for most software development. This is regardless of whether you're making the next great IoT device, a new container microservice, or desktop application. While open source components are often viewed as free, and definately help solve problems in a scalable way, using them in a secure manner requires an understanding of how open source development really works. In this sesssion, I covered how secure development practices with data center regulations can benefit from an understanding of open source development. Specifically, we looked at fork management, community engagement and patch management. We ended with an open source maturity model.]]>

As presented at the Bay Area Cyber Security Meetup on January 25th, 2018. Open source development paradigms have become the norm for most software development. This is regardless of whether you're making the next great IoT device, a new container microservice, or desktop application. While open source components are often viewed as free, and definately help solve problems in a scalable way, using them in a secure manner requires an understanding of how open source development really works. In this sesssion, I covered how secure development practices with data center regulations can benefit from an understanding of open source development. Specifically, we looked at fork management, community engagement and patch management. We ended with an open source maturity model.]]>
Mon, 29 Jan 2018 22:49:00 GMT /slideshow/a-question-of-trust-understanding-open-source-risks/86881400 TimMackey@slideshare.net(TimMackey) A question of trust - understanding Open Source risks TimMackey As presented at the Bay Area Cyber Security Meetup on January 25th, 2018. Open source development paradigms have become the norm for most software development. This is regardless of whether you're making the next great IoT device, a new container microservice, or desktop application. While open source components are often viewed as free, and definately help solve problems in a scalable way, using them in a secure manner requires an understanding of how open source development really works. In this sesssion, I covered how secure development practices with data center regulations can benefit from an understanding of open source development. Specifically, we looked at fork management, community engagement and patch management. We ended with an open source maturity model. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bayareacybersecuritymeetup-180129224900-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As presented at the Bay Area Cyber Security Meetup on January 25th, 2018. Open source development paradigms have become the norm for most software development. This is regardless of whether you&#39;re making the next great IoT device, a new container microservice, or desktop application. While open source components are often viewed as free, and definately help solve problems in a scalable way, using them in a secure manner requires an understanding of how open source development really works. In this sesssion, I covered how secure development practices with data center regulations can benefit from an understanding of open source development. Specifically, we looked at fork management, community engagement and patch management. We ended with an open source maturity model.
A question of trust - understanding Open Source risks from Tim Mackey
]]>
625 1 https://cdn.slidesharecdn.com/ss_thumbnails/bayareacybersecuritymeetup-180129224900-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Open Source 360 Survey Results /slideshow/open-source-360-survey-results/77305362 oss360webinartnm06212017v5-170627154557
As presented via webinar. The Open Source 360 survey is in its 11th year and surveyed over 800 IT professionals about their use of open source components and technologies. In prior years, this survey was known as the Future Of Open Source. Key takeaways include: - Open Source usage is growing within global organizations - Organizations recognize risks of consumption exist - Tooling to keep pace with risks is limited - Contributions to project communities are key to success]]>

As presented via webinar. The Open Source 360 survey is in its 11th year and surveyed over 800 IT professionals about their use of open source components and technologies. In prior years, this survey was known as the Future Of Open Source. Key takeaways include: - Open Source usage is growing within global organizations - Organizations recognize risks of consumption exist - Tooling to keep pace with risks is limited - Contributions to project communities are key to success]]>
Tue, 27 Jun 2017 15:45:57 GMT /slideshow/open-source-360-survey-results/77305362 TimMackey@slideshare.net(TimMackey) Open Source 360 Survey Results TimMackey As presented via webinar. The Open Source 360 survey is in its 11th year and surveyed over 800 IT professionals about their use of open source components and technologies. In prior years, this survey was known as the Future Of Open Source. Key takeaways include: - Open Source usage is growing within global organizations - Organizations recognize risks of consumption exist - Tooling to keep pace with risks is limited - Contributions to project communities are key to success <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/oss360webinartnm06212017v5-170627154557-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As presented via webinar. The Open Source 360 survey is in its 11th year and surveyed over 800 IT professionals about their use of open source components and technologies. In prior years, this survey was known as the Future Of Open Source. Key takeaways include: - Open Source usage is growing within global organizations - Organizations recognize risks of consumption exist - Tooling to keep pace with risks is limited - Contributions to project communities are key to success
Open Source 360 Survey Results from Tim Mackey
]]>
1248 7 https://cdn.slidesharecdn.com/ss_thumbnails/oss360webinartnm06212017v5-170627154557-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security in the age of open source - Myths and misperceptions /slideshow/security-in-the-age-of-open-source-myths-and-misperceptions/76105431 interopitx-securityintheageofopensource-mythsandmisperceptions-170518193817
As delivered at Interop ITX 2017. The security of open source software is a function of the security of its components. For most applications, open source technologies are at their core, but security related issues may not be disclosed directly against the application because its use of the open-source component is hidden. In this talk, I explored how information flow benefits attackers, but how awareness can help defenders. I presented key attributes any vulnerability solution should have - including deep understanding of how open source development works and being DevOps aware.]]>

As delivered at Interop ITX 2017. The security of open source software is a function of the security of its components. For most applications, open source technologies are at their core, but security related issues may not be disclosed directly against the application because its use of the open-source component is hidden. In this talk, I explored how information flow benefits attackers, but how awareness can help defenders. I presented key attributes any vulnerability solution should have - including deep understanding of how open source development works and being DevOps aware.]]>
Thu, 18 May 2017 19:38:17 GMT /slideshow/security-in-the-age-of-open-source-myths-and-misperceptions/76105431 TimMackey@slideshare.net(TimMackey) Security in the age of open source - Myths and misperceptions TimMackey As delivered at Interop ITX 2017. The security of open source software is a function of the security of its components. For most applications, open source technologies are at their core, but security related issues may not be disclosed directly against the application because its use of the open-source component is hidden. In this talk, I explored how information flow benefits attackers, but how awareness can help defenders. I presented key attributes any vulnerability solution should have - including deep understanding of how open source development works and being DevOps aware. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/interopitx-securityintheageofopensource-mythsandmisperceptions-170518193817-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As delivered at Interop ITX 2017. The security of open source software is a function of the security of its components. For most applications, open source technologies are at their core, but security related issues may not be disclosed directly against the application because its use of the open-source component is hidden. In this talk, I explored how information flow benefits attackers, but how awareness can help defenders. I presented key attributes any vulnerability solution should have - including deep understanding of how open source development works and being DevOps aware.
Security in the age of open source - Myths and misperceptions from Tim Mackey
]]>
298 3 https://cdn.slidesharecdn.com/ss_thumbnails/interopitx-securityintheageofopensource-mythsandmisperceptions-170518193817-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure Application Development in the Age of Continuous Delivery /slideshow/secure-application-development-in-the-age-of-continuous-delivery/66800302 containerconeu-secureapplicationdevelopmentintheageofcontinuousdelivery-161006090513
As delivered at LinuxCon and ContainerCon in Berlin 2016. Traditionally, when datacenter operators talk about application security, they've tended to focus on issues related to key management, firewalls and data access. By contrast, application developers have a security focus which is more aligned with code analysis and fuzzing techniques. The reality is, secure application deployment principles extend from the infrastructure layer through the application and include how the application is deployed. With the prevalence of continuous deployment of micro-services, it’s imperative to focus efforts on what attackers’ view as vulnerable; particularly in an environment where new exploits are being disclosed almost daily. In this session we’ll present: • How known vulnerabilities can make their way into production deployments • How deployment of vulnerable code can be minimized • How to determine the vulnerability status of a container • How to determine the risk associated with a specific package]]>

As delivered at LinuxCon and ContainerCon in Berlin 2016. Traditionally, when datacenter operators talk about application security, they've tended to focus on issues related to key management, firewalls and data access. By contrast, application developers have a security focus which is more aligned with code analysis and fuzzing techniques. The reality is, secure application deployment principles extend from the infrastructure layer through the application and include how the application is deployed. With the prevalence of continuous deployment of micro-services, it’s imperative to focus efforts on what attackers’ view as vulnerable; particularly in an environment where new exploits are being disclosed almost daily. In this session we’ll present: • How known vulnerabilities can make their way into production deployments • How deployment of vulnerable code can be minimized • How to determine the vulnerability status of a container • How to determine the risk associated with a specific package]]>
Thu, 06 Oct 2016 09:05:13 GMT /slideshow/secure-application-development-in-the-age-of-continuous-delivery/66800302 TimMackey@slideshare.net(TimMackey) Secure Application Development in the Age of Continuous Delivery TimMackey As delivered at LinuxCon and ContainerCon in Berlin 2016. Traditionally, when datacenter operators talk about application security, they've tended to focus on issues related to key management, firewalls and data access. By contrast, application developers have a security focus which is more aligned with code analysis and fuzzing techniques. The reality is, secure application deployment principles extend from the infrastructure layer through the application and include how the application is deployed. With the prevalence of continuous deployment of micro-services, it’s imperative to focus efforts on what attackers’ view as vulnerable; particularly in an environment where new exploits are being disclosed almost daily. In this session we’ll present: • How known vulnerabilities can make their way into production deployments • How deployment of vulnerable code can be minimized • How to determine the vulnerability status of a container • How to determine the risk associated with a specific package <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/containerconeu-secureapplicationdevelopmentintheageofcontinuousdelivery-161006090513-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As delivered at LinuxCon and ContainerCon in Berlin 2016. Traditionally, when datacenter operators talk about application security, they&#39;ve tended to focus on issues related to key management, firewalls and data access. By contrast, application developers have a security focus which is more aligned with code analysis and fuzzing techniques. The reality is, secure application deployment principles extend from the infrastructure layer through the application and include how the application is deployed. With the prevalence of continuous deployment of micro-services, it’s imperative to focus efforts on what attackers’ view as vulnerable; particularly in an environment where new exploits are being disclosed almost daily. In this session we’ll present: • How known vulnerabilities can make their way into production deployments • How deployment of vulnerable code can be minimized • How to determine the vulnerability status of a container • How to determine the risk associated with a specific package
Secure Application Development in the Age of Continuous Delivery from Tim Mackey
]]>
489 3 https://cdn.slidesharecdn.com/ss_thumbnails/containerconeu-secureapplicationdevelopmentintheageofcontinuousdelivery-161006090513-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The How and Why of Container Vulnerability Management /slideshow/the-how-and-why-of-container-vulnerability-management/65862550 openshiftcommons-thehowandwhyofcontainervulnerabilitymanagement-160909142141
As presented at OpenShift Commons Sept 8, 2016. Cyber threats consistently rank as a high priority for data center operators and their reliability teams. As increasingly sophisticated attacks mount, the risk associated with a zero-day attack is significant. Traditional responses include perimeter monitoring and associated network defenses. Since those defenses are reactive to application issues attackers choose to exploit, it’s critical to have visibility into both what is in your container library, but also what the current state of vulnerability activity might be. Current vulnerability information for container images can readily be obtained by using the scan action on Atomic hosts in your OpenShift Container Platform. In this session we’ll cover how an issue becomes a disclosed vulnerability, how to determine the risk associated with your container usage, and potential mitigation patterns you might choose to utilize to limit any potential scope of compromise. ]]>

As presented at OpenShift Commons Sept 8, 2016. Cyber threats consistently rank as a high priority for data center operators and their reliability teams. As increasingly sophisticated attacks mount, the risk associated with a zero-day attack is significant. Traditional responses include perimeter monitoring and associated network defenses. Since those defenses are reactive to application issues attackers choose to exploit, it’s critical to have visibility into both what is in your container library, but also what the current state of vulnerability activity might be. Current vulnerability information for container images can readily be obtained by using the scan action on Atomic hosts in your OpenShift Container Platform. In this session we’ll cover how an issue becomes a disclosed vulnerability, how to determine the risk associated with your container usage, and potential mitigation patterns you might choose to utilize to limit any potential scope of compromise. ]]>
Fri, 09 Sep 2016 14:21:41 GMT /slideshow/the-how-and-why-of-container-vulnerability-management/65862550 TimMackey@slideshare.net(TimMackey) The How and Why of Container Vulnerability Management TimMackey As presented at OpenShift Commons Sept 8, 2016. Cyber threats consistently rank as a high priority for data center operators and their reliability teams. As increasingly sophisticated attacks mount, the risk associated with a zero-day attack is significant. Traditional responses include perimeter monitoring and associated network defenses. Since those defenses are reactive to application issues attackers choose to exploit, it’s critical to have visibility into both what is in your container library, but also what the current state of vulnerability activity might be. Current vulnerability information for container images can readily be obtained by using the scan action on Atomic hosts in your OpenShift Container Platform. In this session we’ll cover how an issue becomes a disclosed vulnerability, how to determine the risk associated with your container usage, and potential mitigation patterns you might choose to utilize to limit any potential scope of compromise. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/openshiftcommons-thehowandwhyofcontainervulnerabilitymanagement-160909142141-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As presented at OpenShift Commons Sept 8, 2016. Cyber threats consistently rank as a high priority for data center operators and their reliability teams. As increasingly sophisticated attacks mount, the risk associated with a zero-day attack is significant. Traditional responses include perimeter monitoring and associated network defenses. Since those defenses are reactive to application issues attackers choose to exploit, it’s critical to have visibility into both what is in your container library, but also what the current state of vulnerability activity might be. Current vulnerability information for container images can readily be obtained by using the scan action on Atomic hosts in your OpenShift Container Platform. In this session we’ll cover how an issue becomes a disclosed vulnerability, how to determine the risk associated with your container usage, and potential mitigation patterns you might choose to utilize to limit any potential scope of compromise.
The How and Why of Container Vulnerability Management from Tim Mackey
]]>
994 3 https://cdn.slidesharecdn.com/ss_thumbnails/openshiftcommons-thehowandwhyofcontainervulnerabilitymanagement-160909142141-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Using hypervisor and container technology to increase datacenter security posture /slideshow/using-hypervisor-and-container-technoloy-to-increase-datacenter-security-posture/65326391 linuxconna-usinghypervisorandcontainertechnoloytoincreasedatacentersecurityposture-160824163629
As presented at LinuxCon/ContainerCon 2016: Cyber threats consistently rank as a high priority for data center operators and their reliability teams. As increasingly sophisticated attacks mount, the risk associated with a zero-day attack is significant. Traditional responses include perimeter monitoring and anti-malware agents. Unfortunately, those techniques introduce performance and management challenges when used at large VM densities, and may not work well with containerized applications. Fortunately, the Xen Project community has collaborated to create a solution which reduces the potential of success associated with rootkit attack vectors. When combined with recent advancements in processor capabilities, and secure development models for container deployment, it’s possible to both protect against and be proactively alerted to potential zero-day attacks. In this session, we’ll cover models to limit the scope of compromise should an attack be mounted against your infrastructure. Two attack vectors will be illustrated, and we’ll see how it’s possible to be proactively alerted to potential zero-day actions without requiring significant reconfiguration of your datacenter environment. Technology elements explored include those from Black Duck, Bitdefender, Citrix, Intel and Guardicore. ]]>

As presented at LinuxCon/ContainerCon 2016: Cyber threats consistently rank as a high priority for data center operators and their reliability teams. As increasingly sophisticated attacks mount, the risk associated with a zero-day attack is significant. Traditional responses include perimeter monitoring and anti-malware agents. Unfortunately, those techniques introduce performance and management challenges when used at large VM densities, and may not work well with containerized applications. Fortunately, the Xen Project community has collaborated to create a solution which reduces the potential of success associated with rootkit attack vectors. When combined with recent advancements in processor capabilities, and secure development models for container deployment, it’s possible to both protect against and be proactively alerted to potential zero-day attacks. In this session, we’ll cover models to limit the scope of compromise should an attack be mounted against your infrastructure. Two attack vectors will be illustrated, and we’ll see how it’s possible to be proactively alerted to potential zero-day actions without requiring significant reconfiguration of your datacenter environment. Technology elements explored include those from Black Duck, Bitdefender, Citrix, Intel and Guardicore. ]]>
Wed, 24 Aug 2016 16:36:29 GMT /slideshow/using-hypervisor-and-container-technoloy-to-increase-datacenter-security-posture/65326391 TimMackey@slideshare.net(TimMackey) Using hypervisor and container technology to increase datacenter security posture TimMackey As presented at LinuxCon/ContainerCon 2016: Cyber threats consistently rank as a high priority for data center operators and their reliability teams. As increasingly sophisticated attacks mount, the risk associated with a zero-day attack is significant. Traditional responses include perimeter monitoring and anti-malware agents. Unfortunately, those techniques introduce performance and management challenges when used at large VM densities, and may not work well with containerized applications. Fortunately, the Xen Project community has collaborated to create a solution which reduces the potential of success associated with rootkit attack vectors. When combined with recent advancements in processor capabilities, and secure development models for container deployment, it’s possible to both protect against and be proactively alerted to potential zero-day attacks. In this session, we’ll cover models to limit the scope of compromise should an attack be mounted against your infrastructure. Two attack vectors will be illustrated, and we’ll see how it’s possible to be proactively alerted to potential zero-day actions without requiring significant reconfiguration of your datacenter environment. Technology elements explored include those from Black Duck, Bitdefender, Citrix, Intel and Guardicore. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/linuxconna-usinghypervisorandcontainertechnoloytoincreasedatacentersecurityposture-160824163629-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As presented at LinuxCon/ContainerCon 2016: Cyber threats consistently rank as a high priority for data center operators and their reliability teams. As increasingly sophisticated attacks mount, the risk associated with a zero-day attack is significant. Traditional responses include perimeter monitoring and anti-malware agents. Unfortunately, those techniques introduce performance and management challenges when used at large VM densities, and may not work well with containerized applications. Fortunately, the Xen Project community has collaborated to create a solution which reduces the potential of success associated with rootkit attack vectors. When combined with recent advancements in processor capabilities, and secure development models for container deployment, it’s possible to both protect against and be proactively alerted to potential zero-day attacks. In this session, we’ll cover models to limit the scope of compromise should an attack be mounted against your infrastructure. Two attack vectors will be illustrated, and we’ll see how it’s possible to be proactively alerted to potential zero-day actions without requiring significant reconfiguration of your datacenter environment. Technology elements explored include those from Black Duck, Bitdefender, Citrix, Intel and Guardicore.
Using hypervisor and container technology to increase datacenter security posture from Tim Mackey
]]>
834 5 https://cdn.slidesharecdn.com/ss_thumbnails/linuxconna-usinghypervisorandcontainertechnoloytoincreasedatacentersecurityposture-160824163629-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure application deployment in the age of continuous delivery /slideshow/secure-application-deployment-in-the-age-of-continuous-delivery/63922188 secureapplicationdeploymentintheageofcontinuousdelivery-extraceted-160711185654
As presented at Open Source Open Standards (GovNet) (http://opensourceconference.co.uk/), this deck covers some of the material which operators of open source data centers and users of container and cloud technologies should be aware of when seeking to be security conscious. Traditionally, when datacentre operators talk about application security, there has been a tendency to focus on issues related to key management, firewalls and data access. By contrast, application developers have a security focus which is more aligned with code analysis and fuzzing techniques. The reality is, secure application deployment principles extend from the infrastructure layer through the application and include how the application is deployed. With the prevalence of continuous deployment, it’s imperative to focus efforts on what attackers’ view as vulnerable; particularly in an environment where new exploits are being disclosed almost daily. In this session we’ll present: - How known vulnerabilities can make their way into production deployments - How vulnerability impact is maximized - A methodology for ensuring deployment of vulnerable code can be minimized - A methodology to minimize the potential for vulnerable code to be redistributed]]>

As presented at Open Source Open Standards (GovNet) (http://opensourceconference.co.uk/), this deck covers some of the material which operators of open source data centers and users of container and cloud technologies should be aware of when seeking to be security conscious. Traditionally, when datacentre operators talk about application security, there has been a tendency to focus on issues related to key management, firewalls and data access. By contrast, application developers have a security focus which is more aligned with code analysis and fuzzing techniques. The reality is, secure application deployment principles extend from the infrastructure layer through the application and include how the application is deployed. With the prevalence of continuous deployment, it’s imperative to focus efforts on what attackers’ view as vulnerable; particularly in an environment where new exploits are being disclosed almost daily. In this session we’ll present: - How known vulnerabilities can make their way into production deployments - How vulnerability impact is maximized - A methodology for ensuring deployment of vulnerable code can be minimized - A methodology to minimize the potential for vulnerable code to be redistributed]]>
Mon, 11 Jul 2016 18:56:54 GMT /slideshow/secure-application-deployment-in-the-age-of-continuous-delivery/63922188 TimMackey@slideshare.net(TimMackey) Secure application deployment in the age of continuous delivery TimMackey As presented at Open Source Open Standards (GovNet) (http://opensourceconference.co.uk/), this deck covers some of the material which operators of open source data centers and users of container and cloud technologies should be aware of when seeking to be security conscious. Traditionally, when datacentre operators talk about application security, there has been a tendency to focus on issues related to key management, firewalls and data access. By contrast, application developers have a security focus which is more aligned with code analysis and fuzzing techniques. The reality is, secure application deployment principles extend from the infrastructure layer through the application and include how the application is deployed. With the prevalence of continuous deployment, it’s imperative to focus efforts on what attackers’ view as vulnerable; particularly in an environment where new exploits are being disclosed almost daily. In this session we’ll present: - How known vulnerabilities can make their way into production deployments - How vulnerability impact is maximized - A methodology for ensuring deployment of vulnerable code can be minimized - A methodology to minimize the potential for vulnerable code to be redistributed <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/secureapplicationdeploymentintheageofcontinuousdelivery-extraceted-160711185654-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As presented at Open Source Open Standards (GovNet) (http://opensourceconference.co.uk/), this deck covers some of the material which operators of open source data centers and users of container and cloud technologies should be aware of when seeking to be security conscious. Traditionally, when datacentre operators talk about application security, there has been a tendency to focus on issues related to key management, firewalls and data access. By contrast, application developers have a security focus which is more aligned with code analysis and fuzzing techniques. The reality is, secure application deployment principles extend from the infrastructure layer through the application and include how the application is deployed. With the prevalence of continuous deployment, it’s imperative to focus efforts on what attackers’ view as vulnerable; particularly in an environment where new exploits are being disclosed almost daily. In this session we’ll present: - How known vulnerabilities can make their way into production deployments - How vulnerability impact is maximized - A methodology for ensuring deployment of vulnerable code can be minimized - A methodology to minimize the potential for vulnerable code to be redistributed
Secure application deployment in the age of continuous delivery from Tim Mackey
]]>
1349 8 https://cdn.slidesharecdn.com/ss_thumbnails/secureapplicationdeploymentintheageofcontinuousdelivery-extraceted-160711185654-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure application deployment in Apache CloudStack /slideshow/secure-application-deployment-in-apache-cloudstack/62866446 secureapplicationdeployment-160608184012
At the Apache CloudStack Collaboration Conference in Montreal, I presented a potential pathway to secure template management in CloudStack. Under this model, cloud providers can assess the templates their users have and potentially advise if deployed instances have application security issues which have either public disclosures, or better still remediation. ]]>

At the Apache CloudStack Collaboration Conference in Montreal, I presented a potential pathway to secure template management in CloudStack. Under this model, cloud providers can assess the templates their users have and potentially advise if deployed instances have application security issues which have either public disclosures, or better still remediation. ]]>
Wed, 08 Jun 2016 18:40:11 GMT /slideshow/secure-application-deployment-in-apache-cloudstack/62866446 TimMackey@slideshare.net(TimMackey) Secure application deployment in Apache CloudStack TimMackey At the Apache CloudStack Collaboration Conference in Montreal, I presented a potential pathway to secure template management in CloudStack. Under this model, cloud providers can assess the templates their users have and potentially advise if deployed instances have application security issues which have either public disclosures, or better still remediation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/secureapplicationdeployment-160608184012-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> At the Apache CloudStack Collaboration Conference in Montreal, I presented a potential pathway to secure template management in CloudStack. Under this model, cloud providers can assess the templates their users have and potentially advise if deployed instances have application security issues which have either public disclosures, or better still remediation.
Secure application deployment in Apache CloudStack from Tim Mackey
]]>
1302 5 https://cdn.slidesharecdn.com/ss_thumbnails/secureapplicationdeployment-160608184012-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
XenServer Design Workshop /slideshow/xenserver-design-workshop/55434704 xenserverdesignworkshop-151123203953-lva1-app6892
The XenServer virtualization platform is used by well over 100,000 organizations to fulfill their IT objectives. Common scenarios include traditional server virtualization such as that found with VMware vSphere, delivery of large scale cloud services via Apache CloudStack or OpenStack, and as a platform for high performance desktop virtualization through XenDesktop. These use cases all have requirements of scale and manageability which imply solid deployments. The content in this deck was presented in workshop form at FOSSETCON in 2015. Much of the information contained will work for any XenServer version, but XenServer 6.5 was covered. The audience was assumed to have some familiarity with virtualization concepts, but no assumptions about XenServer was made. Core concepts covered included; storage design, network design and operations, scalability and failure domains, as well as core features such as virtualized graphics.]]>

The XenServer virtualization platform is used by well over 100,000 organizations to fulfill their IT objectives. Common scenarios include traditional server virtualization such as that found with VMware vSphere, delivery of large scale cloud services via Apache CloudStack or OpenStack, and as a platform for high performance desktop virtualization through XenDesktop. These use cases all have requirements of scale and manageability which imply solid deployments. The content in this deck was presented in workshop form at FOSSETCON in 2015. Much of the information contained will work for any XenServer version, but XenServer 6.5 was covered. The audience was assumed to have some familiarity with virtualization concepts, but no assumptions about XenServer was made. Core concepts covered included; storage design, network design and operations, scalability and failure domains, as well as core features such as virtualized graphics.]]>
Mon, 23 Nov 2015 20:39:53 GMT /slideshow/xenserver-design-workshop/55434704 TimMackey@slideshare.net(TimMackey) XenServer Design Workshop TimMackey The XenServer virtualization platform is used by well over 100,000 organizations to fulfill their IT objectives. Common scenarios include traditional server virtualization such as that found with VMware vSphere, delivery of large scale cloud services via Apache CloudStack or OpenStack, and as a platform for high performance desktop virtualization through XenDesktop. These use cases all have requirements of scale and manageability which imply solid deployments. The content in this deck was presented in workshop form at FOSSETCON in 2015. Much of the information contained will work for any XenServer version, but XenServer 6.5 was covered. The audience was assumed to have some familiarity with virtualization concepts, but no assumptions about XenServer was made. Core concepts covered included; storage design, network design and operations, scalability and failure domains, as well as core features such as virtualized graphics. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/xenserverdesignworkshop-151123203953-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The XenServer virtualization platform is used by well over 100,000 organizations to fulfill their IT objectives. Common scenarios include traditional server virtualization such as that found with VMware vSphere, delivery of large scale cloud services via Apache CloudStack or OpenStack, and as a platform for high performance desktop virtualization through XenDesktop. These use cases all have requirements of scale and manageability which imply solid deployments. The content in this deck was presented in workshop form at FOSSETCON in 2015. Much of the information contained will work for any XenServer version, but XenServer 6.5 was covered. The audience was assumed to have some familiarity with virtualization concepts, but no assumptions about XenServer was made. Core concepts covered included; storage design, network design and operations, scalability and failure domains, as well as core features such as virtualized graphics.
XenServer Design Workshop from Tim Mackey
]]>
3573 7 https://cdn.slidesharecdn.com/ss_thumbnails/xenserverdesignworkshop-151123203953-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
XenServer Virtualization In Cloud Environments /slideshow/xenserver-virtualization-in-cloud-environments/53542831 cloudstacksiliconvalley-151005105311-lva1-app6891
= As presented at the CloudStack Silicon Valley Meetup in September 2015. = XenServer is a virtualization platform which has been deployed in a variety of industries and to support a multitude of workloads. In this session we discuss some of the components which make it valuable not just for traditional server and desktop virtualization, but also within "the cloud". This includes discussion of VM density, network scalability, containers (such as Docker) and GPU virtualization. We end with coverage of how XenServer templates are represented within Apache CloudStack.]]>

= As presented at the CloudStack Silicon Valley Meetup in September 2015. = XenServer is a virtualization platform which has been deployed in a variety of industries and to support a multitude of workloads. In this session we discuss some of the components which make it valuable not just for traditional server and desktop virtualization, but also within "the cloud". This includes discussion of VM density, network scalability, containers (such as Docker) and GPU virtualization. We end with coverage of how XenServer templates are represented within Apache CloudStack.]]>
Mon, 05 Oct 2015 10:53:10 GMT /slideshow/xenserver-virtualization-in-cloud-environments/53542831 TimMackey@slideshare.net(TimMackey) XenServer Virtualization In Cloud Environments TimMackey = As presented at the CloudStack Silicon Valley Meetup in September 2015. = XenServer is a virtualization platform which has been deployed in a variety of industries and to support a multitude of workloads. In this session we discuss some of the components which make it valuable not just for traditional server and desktop virtualization, but also within "the cloud". This includes discussion of VM density, network scalability, containers (such as Docker) and GPU virtualization. We end with coverage of how XenServer templates are represented within Apache CloudStack. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudstacksiliconvalley-151005105311-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> = As presented at the CloudStack Silicon Valley Meetup in September 2015. = XenServer is a virtualization platform which has been deployed in a variety of industries and to support a multitude of workloads. In this session we discuss some of the components which make it valuable not just for traditional server and desktop virtualization, but also within &quot;the cloud&quot;. This includes discussion of VM density, network scalability, containers (such as Docker) and GPU virtualization. We end with coverage of how XenServer templates are represented within Apache CloudStack.
XenServer Virtualization In Cloud Environments from Tim Mackey
]]>
1812 7 https://cdn.slidesharecdn.com/ss_thumbnails/cloudstacksiliconvalley-151005105311-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Selecting the correct hypervisor for CloudStack 4.5 /slideshow/selecting-the-correct-hypervisor-for-cloudstack-45/51878115 cloudstackday-seattle-hypervisorselection-150820213252-lva1-app6891
Apache CloudStack supports multiple hypervisors out of the box, and the obvious question is which hypervisor is best for CloudStack. In this session we cover core CloudStack components such as networking, storage and virtualization functions to present which hypervisor is able to meet a given requirement. The core take-away is that with an understanding of the services to be delivered the correct hypervisor, or hypervisors, can be selected with relative ease. This deck is as delivered at CloudStack Days 2015 in Seattle.]]>

Apache CloudStack supports multiple hypervisors out of the box, and the obvious question is which hypervisor is best for CloudStack. In this session we cover core CloudStack components such as networking, storage and virtualization functions to present which hypervisor is able to meet a given requirement. The core take-away is that with an understanding of the services to be delivered the correct hypervisor, or hypervisors, can be selected with relative ease. This deck is as delivered at CloudStack Days 2015 in Seattle.]]>
Thu, 20 Aug 2015 21:32:52 GMT /slideshow/selecting-the-correct-hypervisor-for-cloudstack-45/51878115 TimMackey@slideshare.net(TimMackey) Selecting the correct hypervisor for CloudStack 4.5 TimMackey Apache CloudStack supports multiple hypervisors out of the box, and the obvious question is which hypervisor is best for CloudStack. In this session we cover core CloudStack components such as networking, storage and virtualization functions to present which hypervisor is able to meet a given requirement. The core take-away is that with an understanding of the services to be delivered the correct hypervisor, or hypervisors, can be selected with relative ease. This deck is as delivered at CloudStack Days 2015 in Seattle. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudstackday-seattle-hypervisorselection-150820213252-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Apache CloudStack supports multiple hypervisors out of the box, and the obvious question is which hypervisor is best for CloudStack. In this session we cover core CloudStack components such as networking, storage and virtualization functions to present which hypervisor is able to meet a given requirement. The core take-away is that with an understanding of the services to be delivered the correct hypervisor, or hypervisors, can be selected with relative ease. This deck is as delivered at CloudStack Days 2015 in Seattle.
Selecting the correct hypervisor for CloudStack 4.5 from Tim Mackey
]]>
1271 8 https://cdn.slidesharecdn.com/ss_thumbnails/cloudstackday-seattle-hypervisorselection-150820213252-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
User Transparent Service Migration to the Cloud /slideshow/user-transparent-service-migration-to-the-cloud-51877956/51877956 cloudopen-na-transparentservicemigration-150820212558-lva1-app6892
While creating a cloud such as OpenStack is fairly easy, template management is more challenging. In this session we discuss how systems engineering and tooling can be combined to allow legacy infrastructure and virtual machines to be converted to templates without downtime. These templates can then be deployed within the cloud and users migrated with minimal interruption. This deck is as delivered at CloudOpen 2015 in Seattle.]]>

While creating a cloud such as OpenStack is fairly easy, template management is more challenging. In this session we discuss how systems engineering and tooling can be combined to allow legacy infrastructure and virtual machines to be converted to templates without downtime. These templates can then be deployed within the cloud and users migrated with minimal interruption. This deck is as delivered at CloudOpen 2015 in Seattle.]]>
Thu, 20 Aug 2015 21:25:58 GMT /slideshow/user-transparent-service-migration-to-the-cloud-51877956/51877956 TimMackey@slideshare.net(TimMackey) User Transparent Service Migration to the Cloud TimMackey While creating a cloud such as OpenStack is fairly easy, template management is more challenging. In this session we discuss how systems engineering and tooling can be combined to allow legacy infrastructure and virtual machines to be converted to templates without downtime. These templates can then be deployed within the cloud and users migrated with minimal interruption. This deck is as delivered at CloudOpen 2015 in Seattle. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudopen-na-transparentservicemigration-150820212558-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> While creating a cloud such as OpenStack is fairly easy, template management is more challenging. In this session we discuss how systems engineering and tooling can be combined to allow legacy infrastructure and virtual machines to be converted to templates without downtime. These templates can then be deployed within the cloud and users migrated with minimal interruption. This deck is as delivered at CloudOpen 2015 in Seattle.
User Transparent Service Migration to the Cloud from Tim Mackey
]]>
892 8 https://cdn.slidesharecdn.com/ss_thumbnails/cloudopen-na-transparentservicemigration-150820212558-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CloudOpen Japan - Controlling the cost of your first cloud /slideshow/cloudopen-japan-controlling-the-cost-of-your-first-cloud/48973877 cloudopen-japan-controllingthecostofyourfirstcloud-150604055845-lva1-app6891
As presented at CloudOpen Japan in Tokyo in 2015. Today everyone is talking about clouds, and some are building them, but far fewer are operating successful clouds. In this session we'll examine a variety of paradigm shifts must IT make when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn't economical to operate, and which is more cumbersome to manage than a traditional virtualization farm. Key topics covered will include; transitioning the operational paradigm, the impact of VM density on operations and network management, and preventing storage cost from outpacing requirements.]]>

As presented at CloudOpen Japan in Tokyo in 2015. Today everyone is talking about clouds, and some are building them, but far fewer are operating successful clouds. In this session we'll examine a variety of paradigm shifts must IT make when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn't economical to operate, and which is more cumbersome to manage than a traditional virtualization farm. Key topics covered will include; transitioning the operational paradigm, the impact of VM density on operations and network management, and preventing storage cost from outpacing requirements.]]>
Thu, 04 Jun 2015 05:58:45 GMT /slideshow/cloudopen-japan-controlling-the-cost-of-your-first-cloud/48973877 TimMackey@slideshare.net(TimMackey) CloudOpen Japan - Controlling the cost of your first cloud TimMackey As presented at CloudOpen Japan in Tokyo in 2015. Today everyone is talking about clouds, and some are building them, but far fewer are operating successful clouds. In this session we'll examine a variety of paradigm shifts must IT make when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn't economical to operate, and which is more cumbersome to manage than a traditional virtualization farm. Key topics covered will include; transitioning the operational paradigm, the impact of VM density on operations and network management, and preventing storage cost from outpacing requirements. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudopen-japan-controllingthecostofyourfirstcloud-150604055845-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As presented at CloudOpen Japan in Tokyo in 2015. Today everyone is talking about clouds, and some are building them, but far fewer are operating successful clouds. In this session we&#39;ll examine a variety of paradigm shifts must IT make when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn&#39;t economical to operate, and which is more cumbersome to manage than a traditional virtualization farm. Key topics covered will include; transitioning the operational paradigm, the impact of VM density on operations and network management, and preventing storage cost from outpacing requirements.
CloudOpen Japan - Controlling the cost of your first cloud from Tim Mackey
]]>
743 1 https://cdn.slidesharecdn.com/ss_thumbnails/cloudopen-japan-controllingthecostofyourfirstcloud-150604055845-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CloudStack Day Japan 2015 - Hypervisor Selection in CloudStack 4.5 /slideshow/cloudstack-day-japan-2015-hypervisor-selection-in-cloudstack-45/48874552 cloudstackday-japan-hypervisorselection-150602060548-lva1-app6892
]]>

]]>
Tue, 02 Jun 2015 06:05:48 GMT /slideshow/cloudstack-day-japan-2015-hypervisor-selection-in-cloudstack-45/48874552 TimMackey@slideshare.net(TimMackey) CloudStack Day Japan 2015 - Hypervisor Selection in CloudStack 4.5 TimMackey <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudstackday-japan-hypervisorselection-150602060548-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
CloudStack Day Japan 2015 - Hypervisor Selection in CloudStack 4.5 from Tim Mackey
]]>
1625 2 https://cdn.slidesharecdn.com/ss_thumbnails/cloudstackday-japan-hypervisorselection-150602060548-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Taming the cost of your first cloud - CCCEU 2014 /slideshow/taming-the-cost-of-your-first-cloud-ccceu-2014/47210928 ccceu-tamingthecostofyourfirstcloud-150420143918-conversion-gate02
Today everyone is talking about clouds, and a few are building them, but far fewer are operating successful clouds. In this session we'll examine a variety of paradigm shifts IT makes when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and pre-existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn't economical to operate, and which is more cumbersome to manage than a traditional virtualization farm. Key topics covered include: - Successful transition of operational and management paradigm - How the VM density of clouds change Ops - What it means to monitor the network in a cloud environment, at hyper-dense virtualization levels - Preventing storage costs from outpacing delivery costs]]>

Today everyone is talking about clouds, and a few are building them, but far fewer are operating successful clouds. In this session we'll examine a variety of paradigm shifts IT makes when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and pre-existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn't economical to operate, and which is more cumbersome to manage than a traditional virtualization farm. Key topics covered include: - Successful transition of operational and management paradigm - How the VM density of clouds change Ops - What it means to monitor the network in a cloud environment, at hyper-dense virtualization levels - Preventing storage costs from outpacing delivery costs]]>
Mon, 20 Apr 2015 14:39:17 GMT /slideshow/taming-the-cost-of-your-first-cloud-ccceu-2014/47210928 TimMackey@slideshare.net(TimMackey) Taming the cost of your first cloud - CCCEU 2014 TimMackey Today everyone is talking about clouds, and a few are building them, but far fewer are operating successful clouds. In this session we'll examine a variety of paradigm shifts IT makes when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and pre-existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn't economical to operate, and which is more cumbersome to manage than a traditional virtualization farm. Key topics covered include: - Successful transition of operational and management paradigm - How the VM density of clouds change Ops - What it means to monitor the network in a cloud environment, at hyper-dense virtualization levels - Preventing storage costs from outpacing delivery costs <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ccceu-tamingthecostofyourfirstcloud-150420143918-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Today everyone is talking about clouds, and a few are building them, but far fewer are operating successful clouds. In this session we&#39;ll examine a variety of paradigm shifts IT makes when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and pre-existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn&#39;t economical to operate, and which is more cumbersome to manage than a traditional virtualization farm. Key topics covered include: - Successful transition of operational and management paradigm - How the VM density of clouds change Ops - What it means to monitor the network in a cloud environment, at hyper-dense virtualization levels - Preventing storage costs from outpacing delivery costs
Taming the cost of your first cloud - CCCEU 2014 from Tim Mackey
]]>
663 1 https://cdn.slidesharecdn.com/ss_thumbnails/ccceu-tamingthecostofyourfirstcloud-150420143918-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Using Packer to Migrate XenServer Infrastructure to CloudStack /TimMackey/using-packer-to-migrate-xenserver-infrastructure-to-cloudstack-47210469 cloudstackday-austin-packer-150420142745-conversion-gate02
When adopting IaaS cloud solutions, one of the biggest challenges will be template management. Creating that first template can easily be more challenging that deploying the cloud software itself. In this presentation two options are presented for template creation, using a kickstart file or cloning a running VM with Packer from packer.io as the core framework. This presentation was delivered at CloudStack Days 2015 in Austin Texas. Two demos were given. The first demo used an existing XenServer environment to create a golden master from ISO and kickstart file, then automatically upload it to a CloudStack management server for deployment. The second demo cloned a running VM and created a template which was then uploaded to CloudStack. In the case of the running VM, migration occurred without any user interruption. The VM in question was a CentOS 7 image, and the hypervisor for both source infrastructure and CloudStack compute was XenServer based]]>

When adopting IaaS cloud solutions, one of the biggest challenges will be template management. Creating that first template can easily be more challenging that deploying the cloud software itself. In this presentation two options are presented for template creation, using a kickstart file or cloning a running VM with Packer from packer.io as the core framework. This presentation was delivered at CloudStack Days 2015 in Austin Texas. Two demos were given. The first demo used an existing XenServer environment to create a golden master from ISO and kickstart file, then automatically upload it to a CloudStack management server for deployment. The second demo cloned a running VM and created a template which was then uploaded to CloudStack. In the case of the running VM, migration occurred without any user interruption. The VM in question was a CentOS 7 image, and the hypervisor for both source infrastructure and CloudStack compute was XenServer based]]>
Mon, 20 Apr 2015 14:27:45 GMT /TimMackey/using-packer-to-migrate-xenserver-infrastructure-to-cloudstack-47210469 TimMackey@slideshare.net(TimMackey) Using Packer to Migrate XenServer Infrastructure to CloudStack TimMackey When adopting IaaS cloud solutions, one of the biggest challenges will be template management. Creating that first template can easily be more challenging that deploying the cloud software itself. In this presentation two options are presented for template creation, using a kickstart file or cloning a running VM with Packer from packer.io as the core framework. This presentation was delivered at CloudStack Days 2015 in Austin Texas. Two demos were given. The first demo used an existing XenServer environment to create a golden master from ISO and kickstart file, then automatically upload it to a CloudStack management server for deployment. The second demo cloned a running VM and created a template which was then uploaded to CloudStack. In the case of the running VM, migration occurred without any user interruption. The VM in question was a CentOS 7 image, and the hypervisor for both source infrastructure and CloudStack compute was XenServer based <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudstackday-austin-packer-150420142745-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> When adopting IaaS cloud solutions, one of the biggest challenges will be template management. Creating that first template can easily be more challenging that deploying the cloud software itself. In this presentation two options are presented for template creation, using a kickstart file or cloning a running VM with Packer from packer.io as the core framework. This presentation was delivered at CloudStack Days 2015 in Austin Texas. Two demos were given. The first demo used an existing XenServer environment to create a golden master from ISO and kickstart file, then automatically upload it to a CloudStack management server for deployment. The second demo cloned a running VM and created a template which was then uploaded to CloudStack. In the case of the running VM, migration occurred without any user interruption. The VM in question was a CentOS 7 image, and the hypervisor for both source infrastructure and CloudStack compute was XenServer based
Using Packer to Migrate XenServer Infrastructure to CloudStack from Tim Mackey
]]>
2925 1 https://cdn.slidesharecdn.com/ss_thumbnails/cloudstackday-austin-packer-150420142745-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hypervisor Selection in Apache CloudStack 4.4 /slideshow/hypervisor-selection-in-apache-cloudstack-44/41061624 bacd-hypervisorselectioninapachecloudstack4-141103112759-conversion-gate02
Building an infrastructure as a service cloud involves a number of technology decisions, many of which could have unforeseen impact. Hypervisors form the core of an IaaS cloud, and whether you are a fan of Microsoft Hyper-V, VMware vSphere, KVM in any Linux variant or XenServer from Citrix, each of these hypervisors provide unique capabilities within an Apache CloudStack 4.4 based cloud.]]>

Building an infrastructure as a service cloud involves a number of technology decisions, many of which could have unforeseen impact. Hypervisors form the core of an IaaS cloud, and whether you are a fan of Microsoft Hyper-V, VMware vSphere, KVM in any Linux variant or XenServer from Citrix, each of these hypervisors provide unique capabilities within an Apache CloudStack 4.4 based cloud.]]>
Mon, 03 Nov 2014 11:27:59 GMT /slideshow/hypervisor-selection-in-apache-cloudstack-44/41061624 TimMackey@slideshare.net(TimMackey) Hypervisor Selection in Apache CloudStack 4.4 TimMackey Building an infrastructure as a service cloud involves a number of technology decisions, many of which could have unforeseen impact. Hypervisors form the core of an IaaS cloud, and whether you are a fan of Microsoft Hyper-V, VMware vSphere, KVM in any Linux variant or XenServer from Citrix, each of these hypervisors provide unique capabilities within an Apache CloudStack 4.4 based cloud. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bacd-hypervisorselectioninapachecloudstack4-141103112759-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Building an infrastructure as a service cloud involves a number of technology decisions, many of which could have unforeseen impact. Hypervisors form the core of an IaaS cloud, and whether you are a fan of Microsoft Hyper-V, VMware vSphere, KVM in any Linux variant or XenServer from Citrix, each of these hypervisors provide unique capabilities within an Apache CloudStack 4.4 based cloud.
Hypervisor Selection in Apache CloudStack 4.4 from Tim Mackey
]]>
2357 2 https://cdn.slidesharecdn.com/ss_thumbnails/bacd-hypervisorselectioninapachecloudstack4-141103112759-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OSCON2014: Understanding Hypervisor Selection in Apache CloudStack /slideshow/oscon-hypervisor-selectioninapachecloudstack43/37203878 oscon-hypervisorselectioninapachecloudstack4-140721113430-phpapp01
A presented at OSCON 2014, this deck covers the matrix of capabilities each supported hypervisor brings to the Apache CloudStack table when building a cloud.]]>

A presented at OSCON 2014, this deck covers the matrix of capabilities each supported hypervisor brings to the Apache CloudStack table when building a cloud.]]>
Mon, 21 Jul 2014 11:34:30 GMT /slideshow/oscon-hypervisor-selectioninapachecloudstack43/37203878 TimMackey@slideshare.net(TimMackey) OSCON2014: Understanding Hypervisor Selection in Apache CloudStack TimMackey A presented at OSCON 2014, this deck covers the matrix of capabilities each supported hypervisor brings to the Apache CloudStack table when building a cloud. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/oscon-hypervisorselectioninapachecloudstack4-140721113430-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presented at OSCON 2014, this deck covers the matrix of capabilities each supported hypervisor brings to the Apache CloudStack table when building a cloud.
OSCON2014: Understanding Hypervisor Selection in Apache CloudStack from Tim Mackey
]]>
2577 3 https://cdn.slidesharecdn.com/ss_thumbnails/oscon-hypervisorselectioninapachecloudstack4-140721113430-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Make your first CloudStack Cloud successful /TimMackey/building-you-first-successful-cloudstack-cloud cloudstack-makeyourfirstcloudstackcloud-140415144920-phpapp01
As presented at the 2014 CloudStack Collaboration Conference in Denver (CCCNA14), this deck covers some of the decision points impacting a successful deployment of CloudStack within your organization. Critical elements such as storage and networking are discussed to create a blueprint which seeks to remove some of the learning curve associated with the transition from data center management to cloud management.]]>

As presented at the 2014 CloudStack Collaboration Conference in Denver (CCCNA14), this deck covers some of the decision points impacting a successful deployment of CloudStack within your organization. Critical elements such as storage and networking are discussed to create a blueprint which seeks to remove some of the learning curve associated with the transition from data center management to cloud management.]]>
Tue, 15 Apr 2014 14:49:20 GMT /TimMackey/building-you-first-successful-cloudstack-cloud TimMackey@slideshare.net(TimMackey) Make your first CloudStack Cloud successful TimMackey As presented at the 2014 CloudStack Collaboration Conference in Denver (CCCNA14), this deck covers some of the decision points impacting a successful deployment of CloudStack within your organization. Critical elements such as storage and networking are discussed to create a blueprint which seeks to remove some of the learning curve associated with the transition from data center management to cloud management. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudstack-makeyourfirstcloudstackcloud-140415144920-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As presented at the 2014 CloudStack Collaboration Conference in Denver (CCCNA14), this deck covers some of the decision points impacting a successful deployment of CloudStack within your organization. Critical elements such as storage and networking are discussed to create a blueprint which seeks to remove some of the learning curve associated with the transition from data center management to cloud management.
Make your first CloudStack Cloud successful from Tim Mackey
]]>
929 3 https://cdn.slidesharecdn.com/ss_thumbnails/cloudstack-makeyourfirstcloudstackcloud-140415144920-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Decisions behind hypervisor selection in CloudStack 4.3 /slideshow/cloud-stack-collab-hypervisor/33567660 cloudstackcollabhypervisor-140415144510-phpapp01
As presented at the 2014 CloudStack Collaboration Conference in Denver (CCCNA14), this deck covers the matrix of functions and features within each supported hypervisor in CloudStack 4.3. This deck forms an excellent reference document for those seeking to provide multi-hypervisor support within their Apache CloudStack based cloud, and for those seeking to determine which feature elements are supported by a given hypervisor.]]>

As presented at the 2014 CloudStack Collaboration Conference in Denver (CCCNA14), this deck covers the matrix of functions and features within each supported hypervisor in CloudStack 4.3. This deck forms an excellent reference document for those seeking to provide multi-hypervisor support within their Apache CloudStack based cloud, and for those seeking to determine which feature elements are supported by a given hypervisor.]]>
Tue, 15 Apr 2014 14:45:10 GMT /slideshow/cloud-stack-collab-hypervisor/33567660 TimMackey@slideshare.net(TimMackey) Decisions behind hypervisor selection in CloudStack 4.3 TimMackey As presented at the 2014 CloudStack Collaboration Conference in Denver (CCCNA14), this deck covers the matrix of functions and features within each supported hypervisor in CloudStack 4.3. This deck forms an excellent reference document for those seeking to provide multi-hypervisor support within their Apache CloudStack based cloud, and for those seeking to determine which feature elements are supported by a given hypervisor. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudstackcollabhypervisor-140415144510-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As presented at the 2014 CloudStack Collaboration Conference in Denver (CCCNA14), this deck covers the matrix of functions and features within each supported hypervisor in CloudStack 4.3. This deck forms an excellent reference document for those seeking to provide multi-hypervisor support within their Apache CloudStack based cloud, and for those seeking to determine which feature elements are supported by a given hypervisor.
Decisions behind hypervisor selection in CloudStack 4.3 from Tim Mackey
]]>
3296 5 https://cdn.slidesharecdn.com/ss_thumbnails/cloudstackcollabhypervisor-140415144510-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-TimMackey-48x48.jpg?cb=1618406099 https://www.blackducksoftware.com/ https://cdn.slidesharecdn.com/ss_thumbnails/bayareacybersecuritymeetup-180129224900-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/a-question-of-trust-understanding-open-source-risks/86881400 A question of trust - ... https://cdn.slidesharecdn.com/ss_thumbnails/oss360webinartnm06212017v5-170627154557-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/open-source-360-survey-results/77305362 Open Source 360 Survey... https://cdn.slidesharecdn.com/ss_thumbnails/interopitx-securityintheageofopensource-mythsandmisperceptions-170518193817-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/security-in-the-age-of-open-source-myths-and-misperceptions/76105431 Security in the age of...