Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Intelligent Automation with VMware
  • Toc
  • feedback
Intelligent Automation with VMware

Intelligent Automation with VMware

By : Kundan
5 (2)
close
Intelligent Automation with VMware

Intelligent Automation with VMware

5 (2)
By: Kundan

Overview of this book

This book presents an introductory perspective on how machine learning plays an important role in a VMware environment. It offers a basic understanding of how to leverage machine learning primitives, along with a deeper look into integration with the VMware tools used for automation today. This book begins by highlighting how VMware addresses business issues related to its workforce, customers, and partners with emerging technologies such as machine learning to create new, intelligence-driven, end user experiences. You will learn how to apply machine learning techniques incorporated in VMware solutions for data center operations. You will go through management toolsets with a focus on machine learning techniques. At the end of the book, you will learn how the new vSphere Scale-Out edition can be used to ensure that HPC, big data performance, and other requirements can be met (either through development or by fine-tuning guidelines) with mainstream products.
Table of Contents (19 chapters)
close
Free Chapter
1
Section 1: VMware Approach with ML Technology
7
Section 2: ML Use Cases with VMware Solutions
13
Section 3: Dealing with Big Data, HPC , IoT, and Coud Application Scalability through ML

Intent-Based Manifest with AppDefense

This chapter will cover the strategies you can use to host applications, so that you can provide freedom to end users and full control to administrators. You will learn about business values by using AppDefense, which uses machine learning to create an intent-based manifest for an app running in a VM. It can properly secure the app against malicious behavior with an algorithm that measures the running state against the intended state.

After going through this chapter, you will have learned how to get relevant alerts in a security operations center by defining an application-centric policy to detect, protect, and enforce the desired state of an application. This will also help you to design a security operations center (SOC) based on a precise decision engine, rather than having to perform guesswork.

In this chapter, we will cover...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete