Presentations

Horea Porutiu
Topic: Sponsored

Have you ever wanted to get into blockchain development, but haven’t found a good place to start? In this workshop, you will explore a use case of blockchain and implement a smart contract using VSCode on the popular, free, open-source blockchain platform hosted by the Linux Foundation: Hyperledger Fabric. Sponsored by IBM.

Cullen Taylor

Docker alongside Kubernetes is changing the way teams look at deployments of these microservices. Kubernetes provides powerful production-grade orchestration for your "Dockerized" microservices. In this workshop, you'll get an overview of Kubernetes, and what it provides for application development. You'll then go through the process of building & deploying a microservice application on Kubernetes. This is a hands-on lab, everyone should come with a laptop. Sponsored by IBM.

Juni Mukherjee
Audience: Everyone
Topic: Sponsored

Teams often spend days manually setting up pipelines and implementing continuous integration/continuous delivery (CI/CD) effectively. Jenkins X, an open source project introduced to the community by CloudBees, enables the rapid creation, delivery and orchestration of cloud-native applications based on continuous delivery best practices and the proven Kubernetes platform. In this workshop, you will get to know: Fundamentals of continuous everything and pipelines, Jenkins declarative pipeline-as-code, GitOps and more.  Sponsored by Cloudbees

Ken Hilmen
Topic: Sponsored

Learn to create and run Declarative Pipelines with the Blue Ocean Editor, which is the easiest and safest way to define a build. You’ll learn the structure of Declarative Pipeline, how to control the flow of execution, how to save artifacts of the build, and get practice using some of the features that give fit and finish to your Pipeline. The course consists of lectures with follow-along labs plus lab exercises that allow you to practice what you have learned. Sponsored by CloudBees

Belinda Vennam
Topic: Sponsored

In this lab, you'll learn about Knative, a new open source collaboration from IBM, Google, Pivotal, Red Hat, Cisco, and others. You'll create a new cluster on IBM Kubernetes Service (IKS), install Istio & Knative to that cluster, and then deploy a Node.js fibonacci application to Knative. Knative is built on top of Istio & Kubernetes, and is a set of primitives for enabling serverless applications on Kubernetes. Knative is made up of 3 components: Serving, Build, and Eventing. Join us to learn more about this exciting new project. Sponsored by IBM.

Fatih Nar
Topic: Kubeflow

Kubeflow is a machine learning toolkit for Kubernetes. The project is dedicated to making deployments of machine learning (ML) workflows on Kubernetes simple, portable, and scalable. In this session Fatih will walk though a Kubernetes Engine cluster deployment with standard Kubeflow installation. Training job that uses Tensorflow to generate a trained ML model. And use of serving container that provides predictions.

Michael Hrivnak, Matt Dorn
Audience: Developer

This is an entry-level workshop for application developers & system administrators interested in building & managing Operators for Kubernetes environments. It is designed for those who want to learn how to apply domain or application-specific knowledge to automate common operational tasks on Kubernetes. 

Mike Weilgart
Topic: Sponsored

Not ready to take the exams just yet? LPI certified partners will be offering a Linux Essential exam preparation session on Friday, March 8th.

Aleksey Tsalolikhin
Topic: Sponsored

Not ready to take the exams just yet? LPI certified partners will be offering a DevOps Tools Engineer exam preparation session on Friday, March 8th.

Matteo Rebeschini, Cami Lewis
Topic: Security

The Elastic Stack offers unique value in identifying security threats and reducing incident response times.&nbsp; During this session, learn how to eliminate potential blind spots by converging all data without limitations on size, source format, or artificial ingestion rate caps. Identify threats more quickly by interrogating data at the speed of thought and quickly pivoting through data to answer critical questions immediately. Reduce dwell time by alerting on potential threats earlier in the kill chain using relationship analysis and machine learning.<strong> Sponsored by Elastic</strong>