ºÝºÝߣshows by User: priti_desai / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: priti_desai / Wed, 06 Dec 2017 00:17:04 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: priti_desai Whisk Deploy - Syncing OpenWhisk Projects /slideshow/whisk-deploy-syncing-openwhisk-projects/83439542 syncing-openwhisk-project-171206001704
This presentation deck show how to sync OpenWhisk projects between client and server.]]>

This presentation deck show how to sync OpenWhisk projects between client and server.]]>
Wed, 06 Dec 2017 00:17:04 GMT /slideshow/whisk-deploy-syncing-openwhisk-projects/83439542 priti_desai@slideshare.net(priti_desai) Whisk Deploy - Syncing OpenWhisk Projects priti_desai This presentation deck show how to sync OpenWhisk projects between client and server. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/syncing-openwhisk-project-171206001704-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation deck show how to sync OpenWhisk projects between client and server.
Whisk Deploy - Syncing OpenWhisk Projects from Priti Desai
]]>
143 1 https://cdn.slidesharecdn.com/ss_thumbnails/syncing-openwhisk-project-171206001704-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
GitHub Slack Bot /slideshow/github-slack-bot/72751051 githubslackbot-170302201731
Introducing OpenWhisk GitHubSlack Bot: https://github.com/openwhisk/openwhisk-GitHubSlackBot Blog article is at: https://medium.com/openwhisk/openwhisk-drinking-our-own-champagne-c29a0dd04bee#.jccnv9rd1]]>

Introducing OpenWhisk GitHubSlack Bot: https://github.com/openwhisk/openwhisk-GitHubSlackBot Blog article is at: https://medium.com/openwhisk/openwhisk-drinking-our-own-champagne-c29a0dd04bee#.jccnv9rd1]]>
Thu, 02 Mar 2017 20:17:30 GMT /slideshow/github-slack-bot/72751051 priti_desai@slideshare.net(priti_desai) GitHub Slack Bot priti_desai Introducing OpenWhisk GitHubSlack Bot: https://github.com/openwhisk/openwhisk-GitHubSlackBot Blog article is at: https://medium.com/openwhisk/openwhisk-drinking-our-own-champagne-c29a0dd04bee#.jccnv9rd1 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/githubslackbot-170302201731-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Introducing OpenWhisk GitHubSlack Bot: https://github.com/openwhisk/openwhisk-GitHubSlackBot Blog article is at: https://medium.com/openwhisk/openwhisk-drinking-our-own-champagne-c29a0dd04bee#.jccnv9rd1
GitHub Slack Bot from Priti Desai
]]>
348 3 https://cdn.slidesharecdn.com/ss_thumbnails/githubslackbot-170302201731-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Deep Dive into Keystone Tokens and Lessons Learned /slideshow/deep-dive-into-keystone-tokens-and-lessons-learned/54414862 keystonetokens-151027060103-lva1-app6892
Keystone supports four different types of tokens, UUID, PKI, PKIZ, and Fernet. Let’s take a deep dive into: Understanding token formats Pros and Cons of each format in Production Performance across multiple data centers Token revocation workflow for each of the formats Horizon usage of the different token types We previously deployed UUID and PKI in Production and are now moving towards the latest format, Fernet. We would like to share our lessons learned with different formats and help you decide on which format is suitable for your cloud.]]>

Keystone supports four different types of tokens, UUID, PKI, PKIZ, and Fernet. Let’s take a deep dive into: Understanding token formats Pros and Cons of each format in Production Performance across multiple data centers Token revocation workflow for each of the formats Horizon usage of the different token types We previously deployed UUID and PKI in Production and are now moving towards the latest format, Fernet. We would like to share our lessons learned with different formats and help you decide on which format is suitable for your cloud.]]>
Tue, 27 Oct 2015 06:01:03 GMT /slideshow/deep-dive-into-keystone-tokens-and-lessons-learned/54414862 priti_desai@slideshare.net(priti_desai) Deep Dive into Keystone Tokens and Lessons Learned priti_desai Keystone supports four different types of tokens, UUID, PKI, PKIZ, and Fernet. Let’s take a deep dive into: Understanding token formats Pros and Cons of each format in Production Performance across multiple data centers Token revocation workflow for each of the formats Horizon usage of the different token types We previously deployed UUID and PKI in Production and are now moving towards the latest format, Fernet. We would like to share our lessons learned with different formats and help you decide on which format is suitable for your cloud. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/keystonetokens-151027060103-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Keystone supports four different types of tokens, UUID, PKI, PKIZ, and Fernet. Let’s take a deep dive into: Understanding token formats Pros and Cons of each format in Production Performance across multiple data centers Token revocation workflow for each of the formats Horizon usage of the different token types We previously deployed UUID and PKI in Production and are now moving towards the latest format, Fernet. We would like to share our lessons learned with different formats and help you decide on which format is suitable for your cloud.
Deep Dive into Keystone Tokens and Lessons Learned from Priti Desai
]]>
7843 12 https://cdn.slidesharecdn.com/ss_thumbnails/keystonetokens-151027060103-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure Multi Tenant Cloud with OpenContrail /slideshow/secure-multi-tenant-cloud-with-opencontrail/46865010 securemultitenantcloud-opencontrail-150410125152-conversion-gate01
Building a secure multi-tenant cloud necessitates proper tenant isolation and access control. Key network and security functions must scale independently based on the dynamic resource requirements across each tenant. Additionally, On-demand and self-service provisioning are required for achieving operational efficiencies. Robust, dynamic and elastic software abstractions are imperative to support applications built to run such complex environments. This slide deck covers: • Architectural design choices • Implementation blueprints • Operational best practices that have been made to build OpenStack cloud at Symantec.]]>

Building a secure multi-tenant cloud necessitates proper tenant isolation and access control. Key network and security functions must scale independently based on the dynamic resource requirements across each tenant. Additionally, On-demand and self-service provisioning are required for achieving operational efficiencies. Robust, dynamic and elastic software abstractions are imperative to support applications built to run such complex environments. This slide deck covers: • Architectural design choices • Implementation blueprints • Operational best practices that have been made to build OpenStack cloud at Symantec.]]>
Fri, 10 Apr 2015 12:51:52 GMT /slideshow/secure-multi-tenant-cloud-with-opencontrail/46865010 priti_desai@slideshare.net(priti_desai) Secure Multi Tenant Cloud with OpenContrail priti_desai Building a secure multi-tenant cloud necessitates proper tenant isolation and access control. Key network and security functions must scale independently based on the dynamic resource requirements across each tenant. Additionally, On-demand and self-service provisioning are required for achieving operational efficiencies. Robust, dynamic and elastic software abstractions are imperative to support applications built to run such complex environments. This slide deck covers: • Architectural design choices • Implementation blueprints • Operational best practices that have been made to build OpenStack cloud at Symantec. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securemultitenantcloud-opencontrail-150410125152-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Building a secure multi-tenant cloud necessitates proper tenant isolation and access control. Key network and security functions must scale independently based on the dynamic resource requirements across each tenant. Additionally, On-demand and self-service provisioning are required for achieving operational efficiencies. Robust, dynamic and elastic software abstractions are imperative to support applications built to run such complex environments. This slide deck covers: • Architectural design choices • Implementation blueprints • Operational best practices that have been made to build OpenStack cloud at Symantec.
Secure Multi Tenant Cloud with OpenContrail from Priti Desai
]]>
3267 1 https://cdn.slidesharecdn.com/ss_thumbnails/securemultitenantcloud-opencontrail-150410125152-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure Keystone Deployment /slideshow/secure-keystonedeployment/43262340 securekeystonedeployment-150106180605-conversion-gate02
In the Juno summit, Symantec presented it's perspective on securing Keystone. Security is really a mindset and process. We proposed a layered security approach starting with the process for securing Keystone architecture, followed by securing the environment where Keystone is deployed and configured. Since then we have been implementing those security measures in our production environment. In this talk, we will discuss exactly how we have made our Keystone deployment secure and what we have learnt along the way.]]>

In the Juno summit, Symantec presented it's perspective on securing Keystone. Security is really a mindset and process. We proposed a layered security approach starting with the process for securing Keystone architecture, followed by securing the environment where Keystone is deployed and configured. Since then we have been implementing those security measures in our production environment. In this talk, we will discuss exactly how we have made our Keystone deployment secure and what we have learnt along the way.]]>
Tue, 06 Jan 2015 18:06:04 GMT /slideshow/secure-keystonedeployment/43262340 priti_desai@slideshare.net(priti_desai) Secure Keystone Deployment priti_desai In the Juno summit, Symantec presented it's perspective on securing Keystone. Security is really a mindset and process. We proposed a layered security approach starting with the process for securing Keystone architecture, followed by securing the environment where Keystone is deployed and configured. Since then we have been implementing those security measures in our production environment. In this talk, we will discuss exactly how we have made our Keystone deployment secure and what we have learnt along the way. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securekeystonedeployment-150106180605-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In the Juno summit, Symantec presented it&#39;s perspective on securing Keystone. Security is really a mindset and process. We proposed a layered security approach starting with the process for securing Keystone architecture, followed by securing the environment where Keystone is deployed and configured. Since then we have been implementing those security measures in our production environment. In this talk, we will discuss exactly how we have made our Keystone deployment secure and what we have learnt along the way.
Secure Keystone Deployment from Priti Desai
]]>
1017 2 https://cdn.slidesharecdn.com/ss_thumbnails/securekeystonedeployment-150106180605-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OpenStack 101 /slideshow/openstack-101-43105955/43105955 openstack101-141230184410-conversion-gate01
]]>

]]>
Tue, 30 Dec 2014 18:44:10 GMT /slideshow/openstack-101-43105955/43105955 priti_desai@slideshare.net(priti_desai) OpenStack 101 priti_desai <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/openstack101-141230184410-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
OpenStack 101 from Priti Desai
]]>
1120 1 https://cdn.slidesharecdn.com/ss_thumbnails/openstack101-141230184410-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-priti_desai-48x48.jpg?cb=1586294689 With 7 years of experience in Software Development: - Evangelizing OpenStack at Symantec, promoting OpenStack contributions within the company, facilitating it by hosting meetups, hackthons, lunch and learns, and much more. - OpenStack Active Technical Contributor (ATC), contributing to Keystone (Identity Service) and OpenStack Security Group (OSSG). - Leading identity management of Symantec's Private Cloud providing infrastructure and platform services for next generation Symantec products. - Lead Developer of Symantec Data Analytics Platform hosting Symantec’s security intelligence data and predictive analytics applications that protect PCs and mobile devices. http://www.symantec.com/connect/user/pritidesai https://cdn.slidesharecdn.com/ss_thumbnails/syncing-openwhisk-project-171206001704-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/whisk-deploy-syncing-openwhisk-projects/83439542 Whisk Deploy - Syncing... https://cdn.slidesharecdn.com/ss_thumbnails/githubslackbot-170302201731-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/github-slack-bot/72751051 GitHub Slack Bot https://cdn.slidesharecdn.com/ss_thumbnails/keystonetokens-151027060103-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/deep-dive-into-keystone-tokens-and-lessons-learned/54414862 Deep Dive into Keyston...