Ansible In Depth

Ansible is an open source IT configuration management, deployment, and orchestration tool. It is unique from other management tools in many respects, aiming to provide large productivity gains to a wide variety of automation challenges as a more productive drop-in replacement for many core capabilities in other automation solutions. Furthermore, Ansible seeks to solve major unsolved IT challenges such as clear orchestration of complex multi- tier workflows and cleanly unifying OS configuration and application software deployment under a single banner.

Ansible is designed to be minimal in nature, consistent, secure, and highly reliable, with an extremely low learning curve for administrators, developers, and IT managers. Ansible seeks to keep descriptions of IT easy to build, and easy to understand – such that new users can be quickly brought into new IT projects, and longstanding automation content is easily understood even after months of being away from a project. Ansible seeks to make things powerful for expert users, but equally accessible for all skill levels, ensuring a quicker time to market for IT projects and faster, less-error prone turnaround on IT configuration change.

Few topics will be discussed in depth:

  • Architecture, Agents, and Security
  • Playbooks and Roles
  • Advanced Features
  • Using Playbooks For Complex Orchestration
  • Extensibility
  • Tool Unification
  • Cloud and Infrastructure Integration
  • Network Automation

Download this whitepaper to find out more.

Please follow and like us:

Strategic agility in a changing world

Over the past two decades, advances in technology have triggered unprecedented changes across all aspects of society. In the business world, this tech-shift has created a context of constantly evolving customer and market needs. Developments in digital technologies, such as smart devices, the Internet of Things (IoT), artificial intelligence (AI) and blockchain, have disrupted and transformed markets at astonishing speed. The world as we know it today is volatile, uncertain, complex and ambiguous1. As a result, the strategies that once delivered deep market power and long-term dominance are no longer effective.

In a world that is constantly changing, the target state is no longer static, but ‘will constantly move as the wider context changes and evolves. In this paper, we will look at:

  • How organizations need to adapt their approach to strategy to survive in the current business context.
  • How adopting and embracing AgileSHIFT™ practices and principles can support them in this.

Download this whitepaper to learn more.

Please follow and like us:

Leadership within Lean-Agile Enterprises

The move towards more responsive and higher performing IT organizations is well-established, using terms like Lean, Agile and DevOps. These philosophies have proven to be successful in sufficient cases that many businesses are following the lead of the early adopters.

Leaders play a somewhat confused role in the move to becoming a more agile organization. They enthusiastically embrace the possibility of escaping the current siloed structure, in which the massive amounts of coordination required cause a slow response to rapidly changing market conditions. On the other hand, as with previous attempts to improve the performance of their organization, they see this transformation as something that primarily affects the operational teams. This leads to a ‘missing link’ in most transformations: a lack of adjustment of leadership behaviors.

This white paper categorized the work of leaders into 6 areas:

  • Organizing
  • Visioning
  • Planning
  • Cascading
  • Monitoring
  • Developing
Please follow and like us:

Continuous oversight in the cloud

Cloud computing services are increasingly mediating the connections. In this environment, information assurance professionals must not only address longstanding information security threats and vulnerabilities, but they also face new challenges relative to their experience in the field just a few years—or even months—before.

This white paper advocates for continuous oversight of the wide variety of cloud services used by organizations—a set of distinct, but related, management and assurance practices that address critical emerging risk domains, including security, privacy and compliance.

Continuous oversight includes:

  • Continuous assurance for data and processes
  • Continuous cloud assurance
  • Continuous supply chain management and oversight
  • Continuous improvement (CI)
Please follow and like us:

AWS Best Practices for DDoS Resiliency

A Denial of Service (DoS) attack is a deliberate attempt to make your website or application unavailable to users, such as by flooding it with network traffic. To achieve this, attackers use a variety of techniques that consume large amounts of network bandwidth or tie up other system resources, disrupting access for legitimate users. In its simplest form, a lone attacker uses a single source to execute a DoS attack against a target.

This whitepaper provides you with prescriptive DDoS guidance:

  • Different attack types, and which best practices are most effective to manage each attack type.
  • Services and features that fit into a DDoS mitigation strategy, and how each one can be used to help protect your applications.
Please follow and like us: