Managing Microservice Deployments on AWS with HashiCorp Consul

Experts from HashiCorp and AWS demo how to use Consul's service discovery and service mesh capabilities to deploy microservices on AWS Fargate and ECS.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Big data test infrastructure webinar

The Big Data Test Infrastructure (BDTI) supports public administrations with the necessary technical documentation, tools and services to test and prototype analytics and Big Data solutions.
Watch Now

Threat Actors in Critical Infrastructure: New Trends and Risk Factors

Tripwire

Critical infrastructure is a prime target for threat actors and nation-state attacks. With the significant risk these issues pose, cyber defenders in Federal agencies and commercial organizations can share vital information on vulnerabilities and indicators of compromise. In this live webcast, guest presenter Mike Chaney, who supports the DHS, National Cybersecurity & Communications Integration Center (NCCIC), and David Meltzer, Tripwire CTO, will share best practices to reduce the likelihood and severity of incidents that may significantly compromise the security and resilience of the critical infrastructure.
Watch Now

Why the most efficient data centers use open computing solution

Large data center operators, including the biggest cloud service providers (SPs), have invested significant time and effort to optimize and run their data centers efficiently at scale. While some large cloud SPs keep their data center designs confidential, others—like Facebook and Microsoft—share their best practices openly through initiatives such as the Open Compute Project (OCP). OCP technologies are gaining broader adoption. For example, one-third of all servers shipped in 2020 were based on an OCP specification. Many of those will be located at the edge as latency increasingly becomes a performance determinant for workloads like content delivery, connected device management and AI.
Watch Now

SIP Fraud Detection – Scenarios and Challenges

WeDo Technologies

We all know that SIP technology provides ample benefits and opportunities for the user to save money whilst increasing productivity. However, these types of systems also create more opportunities for fraud attacks. As SIP technology becomes more widely adopted, fraud threats have grown as well. The key to preventing this is to closely monitor a CSP network — the last thing you want is your system to be hacked when you want to keep the business profitable.
Watch Now