Submit Search
Upload
Akamai Tech day Amsterdam 2019
•
0 likes
•
164 views
Akamai Netherlands
Follow
50 ways to ruin your ttfb
Read less
Read more
Technology
Report
Share
Report
Share
1 of 111
Download now
Download to read offline
Recommended
Moving away from Luna, a dev ops journey
Akamai Tech day Amsterdam 2019
Akamai Tech day Amsterdam 2019
Akamai Netherlands
Delivered in Akamai Japan Tech Conf 2018. Presented on various methods to measure a website, and how each of them can be off from what you expected.
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
Taisuke Yamada
Terraform, the first multi-vendor infrastructure tool from HashiCorp, helps you build, update, and version your infrastructure safely and efficiently. We love it for the simple syntax and because it lets us combine infrastructure from multiple vendors - reducing complexity and the effort that goes into managing multiple infrastructures. In this webinar we’ll explain what the Akamai Terraform Provider includes, how you can get started with the Akamai Terraform Provider, and we’ll showcase a demo for a variety of use-cases we documented from early adopters.
Manage Your Akamai-as-Code with Terraform
Manage Your Akamai-as-Code with Terraform
Akamai Developers & Admins
Chaos engineering is a discipline that focuses on improving system resilience through experiments that expose the inherent chaos and failure modes in our system, in a controlled fashion, before these failure modes manifest themselves like a wildfire in production and impact our users. Netflix is undoubtedly the leader in this field, but much of the publicised tools and articles focus on killing EC2 instances, and the efforts in the serverless community has been largely limited to moving those tools into AWS Lambda functions. But how can we apply the same principles of chaos to a serverless architecture built around AWS Lambda functions? These serverless architectures have more inherent chaos and complexity than their serverful counterparts, and, we have less control over their runtime behaviour. In short, there are far more unknown unknowns with these systems. Can we adapt existing practices to expose the inherent chaos in these systems? What are the limitations and new challenges that we need to consider?
Applying principles of chaos engineering to serverless (reinvent DVC305)
Applying principles of chaos engineering to serverless (reinvent DVC305)
Yan Cui
In this session, we discuss Machine Learning on Kubernetes and the advantages for running it on AWS. We also show you a demo of the updates to Escalator - a cluster auto scaling component tuned for batch/ML workloads, and EC2 GPU instance auto-scaling.
Machine Learning with Kubernetes- AWS Container Day 2019 Barcelona
Machine Learning with Kubernetes- AWS Container Day 2019 Barcelona
Amazon Web Services
If you were not at the GitLab Commit conferences in New York and London, here’s an opportunity to attend our popular talk on using chaos engineering in Gitlab pipelines for faster hardening. As cloud native applications are coming to life faster than anyone could have imagined, the explosion of microservices empowers developers while also making it increasingly difficult to build pipelines that validate changes outside of their (or their SREs') control. Chaos engineering has emerged as a way to introduce faults into systems to increase their resiliency and Litmus, part of OpenEBS Enterprise Platform, can shake out a lot of bugs. We are also glad to announce that OpenEBS 1.3 has been released and we will review the new features added.
Use GitLab with Chaos Engineering to Harden your Applications + OpenEBS 1.3 ...
Use GitLab with Chaos Engineering to Harden your Applications + OpenEBS 1.3 ...
MayaData Inc
Chaos Engineering: Why Breaking Things Should Be Practiced - AWS Developer Workshop at Web Summit 2018 Ever wondered how companies delivering global services like Amazon or Netflix are architecting and testing their software systems? If you are curious and want to learn how they do it - this session is for you! With the rise of micro-services and large-scale distributed architectures, software systems have grow increasingly complex and hard to understand. Adding to that complexity, the velocity of software delivery has also dramatically increased, resulting in failures being harder to predict and contain. While the cloud allows for high availability, redundancy and fault-tolerance, no single component can guarantee 100% uptime. Therefore, we have to understand availability but especially learn how to design architectures with failure in mind. And since failures have become more and more chaotic in nature, we must turn to chaos engineering in order to identify failures before they become outages. In this talk, I will deep dive into availability, reliability and large-scale architectures and make an introduction to chaos engineering, a discipline that promotes breaking things on purpose in order to learn how to build more resilient systems. Speaker: Adrian Hornsby - Technical Evangelist, AWS
Chaos Engineering: Why Breaking Things Should Be Practiced - AWS Developer Wo...
Chaos Engineering: Why Breaking Things Should Be Practiced - AWS Developer Wo...
Amazon Web Services
Java 應用程序一直都是企業當中不可或缺的重要平台之一,隨著市場變化與追求更好地應對市場挑戰,將傳統的 Java 應用程序搬遷上雲成了當前重要的話題。在這個主題當中我們將探討在整個 Java Eco-System 的變化,以及有哪些工具可以幫助企業在做應用系統重整與搬遷時,帶來雲端服務便利與整合的好處。
Java Developer on AWS 在AWS上開發Java應用
Java Developer on AWS 在AWS上開發Java應用
Amazon Web Services
Recommended
Moving away from Luna, a dev ops journey
Akamai Tech day Amsterdam 2019
Akamai Tech day Amsterdam 2019
Akamai Netherlands
Delivered in Akamai Japan Tech Conf 2018. Presented on various methods to measure a website, and how each of them can be off from what you expected.
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
Taisuke Yamada
Terraform, the first multi-vendor infrastructure tool from HashiCorp, helps you build, update, and version your infrastructure safely and efficiently. We love it for the simple syntax and because it lets us combine infrastructure from multiple vendors - reducing complexity and the effort that goes into managing multiple infrastructures. In this webinar we’ll explain what the Akamai Terraform Provider includes, how you can get started with the Akamai Terraform Provider, and we’ll showcase a demo for a variety of use-cases we documented from early adopters.
Manage Your Akamai-as-Code with Terraform
Manage Your Akamai-as-Code with Terraform
Akamai Developers & Admins
Chaos engineering is a discipline that focuses on improving system resilience through experiments that expose the inherent chaos and failure modes in our system, in a controlled fashion, before these failure modes manifest themselves like a wildfire in production and impact our users. Netflix is undoubtedly the leader in this field, but much of the publicised tools and articles focus on killing EC2 instances, and the efforts in the serverless community has been largely limited to moving those tools into AWS Lambda functions. But how can we apply the same principles of chaos to a serverless architecture built around AWS Lambda functions? These serverless architectures have more inherent chaos and complexity than their serverful counterparts, and, we have less control over their runtime behaviour. In short, there are far more unknown unknowns with these systems. Can we adapt existing practices to expose the inherent chaos in these systems? What are the limitations and new challenges that we need to consider?
Applying principles of chaos engineering to serverless (reinvent DVC305)
Applying principles of chaos engineering to serverless (reinvent DVC305)
Yan Cui
In this session, we discuss Machine Learning on Kubernetes and the advantages for running it on AWS. We also show you a demo of the updates to Escalator - a cluster auto scaling component tuned for batch/ML workloads, and EC2 GPU instance auto-scaling.
Machine Learning with Kubernetes- AWS Container Day 2019 Barcelona
Machine Learning with Kubernetes- AWS Container Day 2019 Barcelona
Amazon Web Services
If you were not at the GitLab Commit conferences in New York and London, here’s an opportunity to attend our popular talk on using chaos engineering in Gitlab pipelines for faster hardening. As cloud native applications are coming to life faster than anyone could have imagined, the explosion of microservices empowers developers while also making it increasingly difficult to build pipelines that validate changes outside of their (or their SREs') control. Chaos engineering has emerged as a way to introduce faults into systems to increase their resiliency and Litmus, part of OpenEBS Enterprise Platform, can shake out a lot of bugs. We are also glad to announce that OpenEBS 1.3 has been released and we will review the new features added.
Use GitLab with Chaos Engineering to Harden your Applications + OpenEBS 1.3 ...
Use GitLab with Chaos Engineering to Harden your Applications + OpenEBS 1.3 ...
MayaData Inc
Chaos Engineering: Why Breaking Things Should Be Practiced - AWS Developer Workshop at Web Summit 2018 Ever wondered how companies delivering global services like Amazon or Netflix are architecting and testing their software systems? If you are curious and want to learn how they do it - this session is for you! With the rise of micro-services and large-scale distributed architectures, software systems have grow increasingly complex and hard to understand. Adding to that complexity, the velocity of software delivery has also dramatically increased, resulting in failures being harder to predict and contain. While the cloud allows for high availability, redundancy and fault-tolerance, no single component can guarantee 100% uptime. Therefore, we have to understand availability but especially learn how to design architectures with failure in mind. And since failures have become more and more chaotic in nature, we must turn to chaos engineering in order to identify failures before they become outages. In this talk, I will deep dive into availability, reliability and large-scale architectures and make an introduction to chaos engineering, a discipline that promotes breaking things on purpose in order to learn how to build more resilient systems. Speaker: Adrian Hornsby - Technical Evangelist, AWS
Chaos Engineering: Why Breaking Things Should Be Practiced - AWS Developer Wo...
Chaos Engineering: Why Breaking Things Should Be Practiced - AWS Developer Wo...
Amazon Web Services
Java 應用程序一直都是企業當中不可或缺的重要平台之一,隨著市場變化與追求更好地應對市場挑戰,將傳統的 Java 應用程序搬遷上雲成了當前重要的話題。在這個主題當中我們將探討在整個 Java Eco-System 的變化,以及有哪些工具可以幫助企業在做應用系統重整與搬遷時,帶來雲端服務便利與整合的好處。
Java Developer on AWS 在AWS上開發Java應用
Java Developer on AWS 在AWS上開發Java應用
Amazon Web Services
A Modern Approach to Performance Monitoring by Cliff Crocker, VP of Product Management, SOASTA "How fast are you? How fast should you be? How do you get there? In this talk Cliff will discuss traditional approaches to performance measurement and introduce a ""RUM First"" methodology. This approach begins with capturing performance directly from the end user as the single source of truth for cross-functional organizations focused on performance. Along the way, you will discover the relationship between RUM and synthetic monitoring, learn what to measure and how to capture it and finally how perceived performance impacts human behavior and your bottom line. Akamai Edge is the premier event for Internet innovators, tech professionals and online business pioneers who together are forging a Faster Forward World. At Edge, the architects, experts and implementers of the most innovative global online businesses gather face-to-face for an invaluable three days of sharing, learning and together pushing the limits of the Faster Forward World. Learn more at: http://www.akamai.com/edge
Edge 2014: A Modern Approach to Performance Monitoring
Edge 2014: A Modern Approach to Performance Monitoring
Akamai Technologies
Slides from TL;DR Web Performance Workshop presented by Gareth Hughes & Michael at Fluent 2017
TL;DR Web Performance Workshop
TL;DR Web Performance Workshop
Gareth Hughes
AWS Container services presentation from AWS DevDay Kiev 2018
AWS Container services
AWS Container services
Aleksandr Maklakov
Most modern businesses depend on a portfolio of technology solutions to successfully operate every day. How do you know whether your team is following best practices or what the risks are in your architectures? In this session, we show how the AWS Well-Architected Framework provides prescriptive advice on best practices as well as how the AWS Well-Architected Tool enables you to measure and improve your technology portfolio. We explain how other customers are using AWS Well-Architected in their businesses, and we share what we learned from reviewing tens of thousands of architectures across operational excellence, security, reliability, performance efficiency, and cost optimization. Most modern businesses depend on a portfolio of technology solutions to successfully operate every day. How do you know whether your team is following best practices or what the risks are in your architectures? In this session, we show how the AWS Well-Architected Framework provides prescriptive advice on best practices as well as how the AWS Well-Architected Tool enables you to measure and improve your technology portfolio. We explain how other customers are using AWS Well-Architected in their businesses, and we share what we learned from reviewing tens of thousands of architectures across operational excellence, security, reliability, performance efficiency, and cost optimization.
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Amazon Web Services
Talk by Bhuvaneswari Subramani and Vijaya Nirmala G on the topic "CI/CD using AWS developer tools" at AWS Community Day, Bangalore 2018
CI/CD using AWS developer tools
CI/CD using AWS developer tools
AWS User Group Bengaluru
How The Washington Post is using Akamai APIs to grow Arc Publishing
Akamai-as-Code with The Washington Post
Akamai-as-Code with The Washington Post
Akamai Developers & Admins
開發團隊在面對各式不同的工作流程,應該如何與原有的工作流程銜接?藉由 AWS 與客戶的合作案例中帶您看到如何在舊有的開發流程與雲上的服務工具緊密的結合。
AWS 如何協助客戶建立 DevOps 流程
AWS 如何協助客戶建立 DevOps 流程
Amazon Web Services
Learning Objectives: - Learn how to set-up a CI/CD pipeline with AWS Fargate or Amazon ECS - Understand how CodePipeline can help your team release high quality code, faster - See a working sample of a CI/CD pipeline with AWS Fargate and AWS CodePipeline
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Amazon Web Services
Talk about Chaos Engineering for XPUG group
Chaos engineering
Chaos engineering
Alberto Acerbis
Containers are a lightweight and very fast alternative to virtual machines. But keeping track of and coordinating a vast array of individuals containers is no small feat and requires orchestration for all of the components to act as one. Amazon Elastic Container Service for Kubernetes (Amazon EKS) is the tool to handle this task. In this session, you learn how to containerize and migrate existing applications to Amazon EKS without needing to refactor your code or tooling. We show you how with Amazon EKS you can easily deploy, manage, and scale containerized applications using Kubernetes on AWS.
Modernizing legacy applications with Amazon EKS - MAD301 - Chicago AWS Summit
Modernizing legacy applications with Amazon EKS - MAD301 - Chicago AWS Summit
Amazon Web Services
With CQRS rising and more formal event-sourcing solutions increasing in adoption, event-storming is demonstrated as a powerful technique for event-driven development of microservices in the enterprise. With such an approach, the elusive, but powerful promise of the ubiquitous language from DDD finally emerges from EDD (event driven development). In this talk, the audience will journey through a “hello-streams” github project. This journey embarks with a specific emphasis on the stream first mindset. Problems with current solutions are introduced, a high level overview of event storming is presented, then the talk transitions through an opinionated version of event storming through a classic, simple project (e.g. hello-streams). The project is a simple UI built on a stream-based coffee service. The stream first mindset entails, event sourcing, command events as first class citizens, storing those events in an event store, aggregating those command events into state called domain events, and then further enriching those domain events into business events used to report/monitor the overall health of the business — all in real time. Github Open Source project here: https://github.com/homeaway/hello-streams
hello-streams :: Introducing the Stream First Mindset (Rene Parra, Homeaway) ...
hello-streams :: Introducing the Stream First Mindset (Rene Parra, Homeaway) ...
confluent
AWS provides a suite of services and tools to deploy business-critical SAP HANA workloads on the AWS Cloud. In this session, we discuss how you can use AWS services, native SAP HANA high availability (HA) tools, and third-party software to achieve HA for SAP HANA systems on the AWS Cloud. We review multiple options that use different AWS features, Availability Zones, and global regions, and discuss the pros, cons, and related costs of each option.
GPSTEC312-SAP HANA HA on AWS Preventing Production Facepalms
GPSTEC312-SAP HANA HA on AWS Preventing Production Facepalms
Amazon Web Services
This presentation will include a deep dive into the code behind multiple security automation and remediation functions. This session will consider potential use cases, as well as feature a demonstration of a proposed script, and then walk through the code set to explain the various challenges and solutions of the intended script. All examples of code will be previously unreleased and will feature integration with services such as Trusted Advisor and Macie. All code will be released as OSS after re:Invent.
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Amazon Web Services
https://www.gremlin.com/webinars/ce-on-azure/ Join us for a walkthrough on how to get started with Chaos Engineering on Azure. Learn the fundamentals of Chaos Engineering and how to build more reliable applications on Azure. In this live session, we’ll show you how to get started running experiments on Azure’s managed Kubernetes (AKS) and how to implement continuous Chaos Engineering using Azure Pipelines. Then be sure to stay until the end for live Q&A. AGENDA - Learn the history, principles and practice of Chaos Engineering - How to get started with Chaos Engineering on Azure - Run chaos experiments to simulate common real-world failures on AKS - How to implement Chaos Engineering Experiments on Azure Pipelines
Introduction to Chaos Engineering with Microsoft Azure
Introduction to Chaos Engineering with Microsoft Azure
Ana Medina
Moving your entire CI/CD pipeline to AWS can be a daunting task. You have put years into building out your current system and perfecting it. How do you know the new world will be better, easier, and more scalable? The good news is you don’t have to go “all in”. When developing software, we have learned that small, incremental steps are usually the safest and fastest way to go. Why would modifying your CI/CD pipeline be any different? In this session, we move a .NET application from a VSTS environment into AWS incrementally, allowing you to go as deep as you want.
Move Your .NET Apps to AWS Without Betting the House - WIN303 - re:Invent 2017
Move Your .NET Apps to AWS Without Betting the House - WIN303 - re:Invent 2017
Amazon Web Services
Join us for this talk and learn how to programmatically create a fully managed continuous deployment pipelines for containerized applications.This talk will demonstrate the creation of end to end CI/CD pipelines utilizing the AWS Developer Tools suite and open source tools.We will focus on the integration with AWS container orchestrators as deployment targets, Mainly Amazon EKS.The talk will present and discuss advanced container based CI/CD Architecture patterns.
From Code to a running container | AWS Summit Tel Aviv 2019
From Code to a running container | AWS Summit Tel Aviv 2019
AWS Summits
Well-Architected の特徴や利用ポイントについてまとめてます。Well-Architectedを活用してよりよいAWSライフを!
Well-Architected フレームワーク概要
Well-Architected フレームワーク概要
淳 千葉
Chaos Engineering is described as “the discipline of experimenting on a distributed system in order to build confidence in the system’s capability to withstand turbulent conditions in production.” Going beyond Chaos Monkey, this session covers the specifics of designing a Chaos Engineering solution, how to increment your solution technically and culturally, the socialization and evangelism pieces that tend to get overlooked in the process, and how to get developers excited about purposefully injected failure. This session provides examples of getting started with Chaos Engineering at startups, performing chaos at Netflix scale, integrating your tools with AWS, and the road to cultural acceptance within your company. There are several different “levels” of chaos you can introduce before unleashing a full-blown chaos solution. We provide a focus on each of these levels, so you can leave this session with a game plan you can culturally and technically introduce.
Performing Chaos at Netflix Scale - DEV334 - re:Invent 2017
Performing Chaos at Netflix Scale - DEV334 - re:Invent 2017
Amazon Web Services
Security practitioners face new and evolving threats every day. BrightEdge needed to take a more proactive and efficient stance to monitor, investigate and triage threats, and maintain their security posture on the AWS Cloud. Splunk’s analytics-driven security solution made it easy for BrightEdge to gain visibility across their entire cloud environment to secure critical customer data and ensure compliance. In this webinar, you’ll hear how BrightEdge gained the end-to-end visibility required to respond quickly and effectively to security threats using Splunk.
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
Amazon Web Services
Puru Hemnani - ICF Interactive The session will go over the advantages of CDN in general and Akamai caching in particular. Akamai is one of the most commonly used caching option with AEM and several clients use it. There are several features and akamai tuning options such as Error caching, GeoRouting, ESI, Siteshield, WAF that can help developers and system engineers make the sites faster and secure. Configuring it correctly can also reduce the licensing requirements for AEM as well as infrastructure costs as you can serve much higher amount of traffic with less number of origin servers.
CIRCUIT 2015 - Akamai: Caching and Beyond
CIRCUIT 2015 - Akamai: Caching and Beyond
ICF CIRCUIT
Challenges behind the scenes of the large Swiss e-Commerce shop apfelkiste.ch and the role of CloudFlare - Sven Härtwig, CTO narf-studios GmbH Full video recording of the Talk: https://youtu.be/PlQhYAzYx3M
Challenges behind the scenes of the large Swiss e-Commerce shop apfelkiste.ch...
Challenges behind the scenes of the large Swiss e-Commerce shop apfelkiste.ch...
nine
The Web Experience Foundry will be dedicated to researching and prototyping projects and technologies that the Web Experience business unit feels are potentially important for the future of its product lines. The primary goals will be: - Gain a solid understanding of new technology and how it could (or could not) be used in Web Experience products (Discovery). - Prototype new technologies and create proof of concepts to validate or invalidate a technologies potential utility. - Research new concepts and look for ways they can improve our existing product lines.”
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2
Akamai Technologies
More Related Content
What's hot
A Modern Approach to Performance Monitoring by Cliff Crocker, VP of Product Management, SOASTA "How fast are you? How fast should you be? How do you get there? In this talk Cliff will discuss traditional approaches to performance measurement and introduce a ""RUM First"" methodology. This approach begins with capturing performance directly from the end user as the single source of truth for cross-functional organizations focused on performance. Along the way, you will discover the relationship between RUM and synthetic monitoring, learn what to measure and how to capture it and finally how perceived performance impacts human behavior and your bottom line. Akamai Edge is the premier event for Internet innovators, tech professionals and online business pioneers who together are forging a Faster Forward World. At Edge, the architects, experts and implementers of the most innovative global online businesses gather face-to-face for an invaluable three days of sharing, learning and together pushing the limits of the Faster Forward World. Learn more at: http://www.akamai.com/edge
Edge 2014: A Modern Approach to Performance Monitoring
Edge 2014: A Modern Approach to Performance Monitoring
Akamai Technologies
Slides from TL;DR Web Performance Workshop presented by Gareth Hughes & Michael at Fluent 2017
TL;DR Web Performance Workshop
TL;DR Web Performance Workshop
Gareth Hughes
AWS Container services presentation from AWS DevDay Kiev 2018
AWS Container services
AWS Container services
Aleksandr Maklakov
Most modern businesses depend on a portfolio of technology solutions to successfully operate every day. How do you know whether your team is following best practices or what the risks are in your architectures? In this session, we show how the AWS Well-Architected Framework provides prescriptive advice on best practices as well as how the AWS Well-Architected Tool enables you to measure and improve your technology portfolio. We explain how other customers are using AWS Well-Architected in their businesses, and we share what we learned from reviewing tens of thousands of architectures across operational excellence, security, reliability, performance efficiency, and cost optimization. Most modern businesses depend on a portfolio of technology solutions to successfully operate every day. How do you know whether your team is following best practices or what the risks are in your architectures? In this session, we show how the AWS Well-Architected Framework provides prescriptive advice on best practices as well as how the AWS Well-Architected Tool enables you to measure and improve your technology portfolio. We explain how other customers are using AWS Well-Architected in their businesses, and we share what we learned from reviewing tens of thousands of architectures across operational excellence, security, reliability, performance efficiency, and cost optimization.
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Amazon Web Services
Talk by Bhuvaneswari Subramani and Vijaya Nirmala G on the topic "CI/CD using AWS developer tools" at AWS Community Day, Bangalore 2018
CI/CD using AWS developer tools
CI/CD using AWS developer tools
AWS User Group Bengaluru
How The Washington Post is using Akamai APIs to grow Arc Publishing
Akamai-as-Code with The Washington Post
Akamai-as-Code with The Washington Post
Akamai Developers & Admins
開發團隊在面對各式不同的工作流程,應該如何與原有的工作流程銜接?藉由 AWS 與客戶的合作案例中帶您看到如何在舊有的開發流程與雲上的服務工具緊密的結合。
AWS 如何協助客戶建立 DevOps 流程
AWS 如何協助客戶建立 DevOps 流程
Amazon Web Services
Learning Objectives: - Learn how to set-up a CI/CD pipeline with AWS Fargate or Amazon ECS - Understand how CodePipeline can help your team release high quality code, faster - See a working sample of a CI/CD pipeline with AWS Fargate and AWS CodePipeline
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Amazon Web Services
Talk about Chaos Engineering for XPUG group
Chaos engineering
Chaos engineering
Alberto Acerbis
Containers are a lightweight and very fast alternative to virtual machines. But keeping track of and coordinating a vast array of individuals containers is no small feat and requires orchestration for all of the components to act as one. Amazon Elastic Container Service for Kubernetes (Amazon EKS) is the tool to handle this task. In this session, you learn how to containerize and migrate existing applications to Amazon EKS without needing to refactor your code or tooling. We show you how with Amazon EKS you can easily deploy, manage, and scale containerized applications using Kubernetes on AWS.
Modernizing legacy applications with Amazon EKS - MAD301 - Chicago AWS Summit
Modernizing legacy applications with Amazon EKS - MAD301 - Chicago AWS Summit
Amazon Web Services
With CQRS rising and more formal event-sourcing solutions increasing in adoption, event-storming is demonstrated as a powerful technique for event-driven development of microservices in the enterprise. With such an approach, the elusive, but powerful promise of the ubiquitous language from DDD finally emerges from EDD (event driven development). In this talk, the audience will journey through a “hello-streams” github project. This journey embarks with a specific emphasis on the stream first mindset. Problems with current solutions are introduced, a high level overview of event storming is presented, then the talk transitions through an opinionated version of event storming through a classic, simple project (e.g. hello-streams). The project is a simple UI built on a stream-based coffee service. The stream first mindset entails, event sourcing, command events as first class citizens, storing those events in an event store, aggregating those command events into state called domain events, and then further enriching those domain events into business events used to report/monitor the overall health of the business — all in real time. Github Open Source project here: https://github.com/homeaway/hello-streams
hello-streams :: Introducing the Stream First Mindset (Rene Parra, Homeaway) ...
hello-streams :: Introducing the Stream First Mindset (Rene Parra, Homeaway) ...
confluent
AWS provides a suite of services and tools to deploy business-critical SAP HANA workloads on the AWS Cloud. In this session, we discuss how you can use AWS services, native SAP HANA high availability (HA) tools, and third-party software to achieve HA for SAP HANA systems on the AWS Cloud. We review multiple options that use different AWS features, Availability Zones, and global regions, and discuss the pros, cons, and related costs of each option.
GPSTEC312-SAP HANA HA on AWS Preventing Production Facepalms
GPSTEC312-SAP HANA HA on AWS Preventing Production Facepalms
Amazon Web Services
This presentation will include a deep dive into the code behind multiple security automation and remediation functions. This session will consider potential use cases, as well as feature a demonstration of a proposed script, and then walk through the code set to explain the various challenges and solutions of the intended script. All examples of code will be previously unreleased and will feature integration with services such as Trusted Advisor and Macie. All code will be released as OSS after re:Invent.
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Amazon Web Services
https://www.gremlin.com/webinars/ce-on-azure/ Join us for a walkthrough on how to get started with Chaos Engineering on Azure. Learn the fundamentals of Chaos Engineering and how to build more reliable applications on Azure. In this live session, we’ll show you how to get started running experiments on Azure’s managed Kubernetes (AKS) and how to implement continuous Chaos Engineering using Azure Pipelines. Then be sure to stay until the end for live Q&A. AGENDA - Learn the history, principles and practice of Chaos Engineering - How to get started with Chaos Engineering on Azure - Run chaos experiments to simulate common real-world failures on AKS - How to implement Chaos Engineering Experiments on Azure Pipelines
Introduction to Chaos Engineering with Microsoft Azure
Introduction to Chaos Engineering with Microsoft Azure
Ana Medina
Moving your entire CI/CD pipeline to AWS can be a daunting task. You have put years into building out your current system and perfecting it. How do you know the new world will be better, easier, and more scalable? The good news is you don’t have to go “all in”. When developing software, we have learned that small, incremental steps are usually the safest and fastest way to go. Why would modifying your CI/CD pipeline be any different? In this session, we move a .NET application from a VSTS environment into AWS incrementally, allowing you to go as deep as you want.
Move Your .NET Apps to AWS Without Betting the House - WIN303 - re:Invent 2017
Move Your .NET Apps to AWS Without Betting the House - WIN303 - re:Invent 2017
Amazon Web Services
Join us for this talk and learn how to programmatically create a fully managed continuous deployment pipelines for containerized applications.This talk will demonstrate the creation of end to end CI/CD pipelines utilizing the AWS Developer Tools suite and open source tools.We will focus on the integration with AWS container orchestrators as deployment targets, Mainly Amazon EKS.The talk will present and discuss advanced container based CI/CD Architecture patterns.
From Code to a running container | AWS Summit Tel Aviv 2019
From Code to a running container | AWS Summit Tel Aviv 2019
AWS Summits
Well-Architected の特徴や利用ポイントについてまとめてます。Well-Architectedを活用してよりよいAWSライフを!
Well-Architected フレームワーク概要
Well-Architected フレームワーク概要
淳 千葉
Chaos Engineering is described as “the discipline of experimenting on a distributed system in order to build confidence in the system’s capability to withstand turbulent conditions in production.” Going beyond Chaos Monkey, this session covers the specifics of designing a Chaos Engineering solution, how to increment your solution technically and culturally, the socialization and evangelism pieces that tend to get overlooked in the process, and how to get developers excited about purposefully injected failure. This session provides examples of getting started with Chaos Engineering at startups, performing chaos at Netflix scale, integrating your tools with AWS, and the road to cultural acceptance within your company. There are several different “levels” of chaos you can introduce before unleashing a full-blown chaos solution. We provide a focus on each of these levels, so you can leave this session with a game plan you can culturally and technically introduce.
Performing Chaos at Netflix Scale - DEV334 - re:Invent 2017
Performing Chaos at Netflix Scale - DEV334 - re:Invent 2017
Amazon Web Services
Security practitioners face new and evolving threats every day. BrightEdge needed to take a more proactive and efficient stance to monitor, investigate and triage threats, and maintain their security posture on the AWS Cloud. Splunk’s analytics-driven security solution made it easy for BrightEdge to gain visibility across their entire cloud environment to secure critical customer data and ensure compliance. In this webinar, you’ll hear how BrightEdge gained the end-to-end visibility required to respond quickly and effectively to security threats using Splunk.
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
Amazon Web Services
Puru Hemnani - ICF Interactive The session will go over the advantages of CDN in general and Akamai caching in particular. Akamai is one of the most commonly used caching option with AEM and several clients use it. There are several features and akamai tuning options such as Error caching, GeoRouting, ESI, Siteshield, WAF that can help developers and system engineers make the sites faster and secure. Configuring it correctly can also reduce the licensing requirements for AEM as well as infrastructure costs as you can serve much higher amount of traffic with less number of origin servers.
CIRCUIT 2015 - Akamai: Caching and Beyond
CIRCUIT 2015 - Akamai: Caching and Beyond
ICF CIRCUIT
What's hot
(20)
Edge 2014: A Modern Approach to Performance Monitoring
Edge 2014: A Modern Approach to Performance Monitoring
TL;DR Web Performance Workshop
TL;DR Web Performance Workshop
AWS Container services
AWS Container services
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
CI/CD using AWS developer tools
CI/CD using AWS developer tools
Akamai-as-Code with The Washington Post
Akamai-as-Code with The Washington Post
AWS 如何協助客戶建立 DevOps 流程
AWS 如何協助客戶建立 DevOps 流程
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Chaos engineering
Chaos engineering
Modernizing legacy applications with Amazon EKS - MAD301 - Chicago AWS Summit
Modernizing legacy applications with Amazon EKS - MAD301 - Chicago AWS Summit
hello-streams :: Introducing the Stream First Mindset (Rene Parra, Homeaway) ...
hello-streams :: Introducing the Stream First Mindset (Rene Parra, Homeaway) ...
GPSTEC312-SAP HANA HA on AWS Preventing Production Facepalms
GPSTEC312-SAP HANA HA on AWS Preventing Production Facepalms
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Introduction to Chaos Engineering with Microsoft Azure
Introduction to Chaos Engineering with Microsoft Azure
Move Your .NET Apps to AWS Without Betting the House - WIN303 - re:Invent 2017
Move Your .NET Apps to AWS Without Betting the House - WIN303 - re:Invent 2017
From Code to a running container | AWS Summit Tel Aviv 2019
From Code to a running container | AWS Summit Tel Aviv 2019
Well-Architected フレームワーク概要
Well-Architected フレームワーク概要
Performing Chaos at Netflix Scale - DEV334 - re:Invent 2017
Performing Chaos at Netflix Scale - DEV334 - re:Invent 2017
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
CIRCUIT 2015 - Akamai: Caching and Beyond
CIRCUIT 2015 - Akamai: Caching and Beyond
Similar to Akamai Tech day Amsterdam 2019
Challenges behind the scenes of the large Swiss e-Commerce shop apfelkiste.ch and the role of CloudFlare - Sven Härtwig, CTO narf-studios GmbH Full video recording of the Talk: https://youtu.be/PlQhYAzYx3M
Challenges behind the scenes of the large Swiss e-Commerce shop apfelkiste.ch...
Challenges behind the scenes of the large Swiss e-Commerce shop apfelkiste.ch...
nine
The Web Experience Foundry will be dedicated to researching and prototyping projects and technologies that the Web Experience business unit feels are potentially important for the future of its product lines. The primary goals will be: - Gain a solid understanding of new technology and how it could (or could not) be used in Web Experience products (Discovery). - Prototype new technologies and create proof of concepts to validate or invalidate a technologies potential utility. - Research new concepts and look for ways they can improve our existing product lines.”
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2
Akamai Technologies
Sebastiaan Mannem shares the results of an interesting research.
60000 TPS: How many CPUs?, Enterprise Postgres Day
60000 TPS: How many CPUs?, Enterprise Postgres Day
EDB
In this working session, bring your live video streaming application. Learn what can be done to help you improve the latency of your video streaming solution.
Configure an End-to-End Video Channel to Deliver Low Latency (CTD411-R3) - AW...
Configure an End-to-End Video Channel to Deliver Low Latency (CTD411-R3) - AW...
Amazon Web Services
CA Application Performance Management 10 dramatically reduces the time needed to find and solve app problems. In this session you will learn about common problem-solving techniques used by experts to solve real-world app problems. You will get a chance to put these techniques to the test in a hands-on lab that mimics an interesting application performance problem. For more information, please visit http://cainc.to/Nv2VOe
Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10
CA Technologies
This is a talk given at ApacheCon 2015 If data is the lifeblood of high technology, Apache Kafka is the circulatory system in use at LinkedIn. It is used for moving every type of data around between systems, and it touches virtually every server, every day. This can only be accomplished with multiple Kafka clusters, installed at several sites, and they must all work together to assure no message loss, and almost no message duplication. In this presentation, we will discuss the architectural choices behind how the clusters are deployed, and the tools and processes that have been developed to manage them. Todd Palino will also discuss some of the challenges of running Kafka at this scale, and how they are being addressed both operationally and in the Kafka development community. Note - there are a significant amount of slide notes on each slide that goes into detail. Please make sure to check out the downloaded file to get the full content!
Kafka at Scale: Multi-Tier Architectures
Kafka at Scale: Multi-Tier Architectures
Todd Palino
The “caching ecosystem” has evolved over the years – what, where, and how long you cache your web assets are now important considerations for anyone doing business on the internet. Browser cache, html5 application cache, sophisticated reverse proxies like Varnish, and the evolution of CDNs have all elevated caching as the single most effective tool for creating high performing and scalable web applications. Using live demos, we will dive into some advance caching concepts that will enable you to squeeze the most benefits from this caching ecosystem, including: Prefresh Prefetching for sites Prefetching for single page apps Burst caching: caching for an extremely short burst of time, even a few seconds Dynamic page caching Cache invalidation and revalidation However, with caching power comes caching responsibility. If not implemented correctly, these advanced techniques can degrade or even break site functionality. We will conclude with some practical exercises to define the caching strategy for key use cases: E-commerce website Mobile application High traffic events.
Advanced Caching Concepts @ Velocity NY 2015
Advanced Caching Concepts @ Velocity NY 2015
Rakesh Chaudhary
As part of Bitmovin's NAB 2020 Virtual event series, we were joined by OTT Solutions expert, Will Law, from Akamai Technologies. In the discussion, Will and Bitmovin Technical Product Manager, Sean McCarthy, discussed the bandwidth expenditure problems that the streaming industry is facing in the midst of COVID-19. In the talk, Will and Sean used real case examples to display the issues of peak bandwidth performance and how your organization can reduce that expenditure while maintaining (if not IMPROVING) a user's quality of experience (QoE) View the full discussion on demand here: https://go.bitmovin.com/nab-live-tech-talk-akamai?utm_source=slideshare
Bitmovin LIVE Tech Talks: Reducing Peak Bandwidth for OTT (ft. Akamai)
Bitmovin LIVE Tech Talks: Reducing Peak Bandwidth for OTT (ft. Akamai)
Bitmovin Inc
With over-the-top (OTT) video streaming, reducing end-to-end latency is a timely topic. Hearing neighbors cheer for a goal, or reading results on Twitter before seeing them live. is a compromised viewing experience. In this chalk talk, learn why latency for streaming video is a challenge, how it is measured, what new technologies are coming to help, and what viewer expectations are for broadcast and faster-than-broadcast. We discuss what can be done to help you meet low- and ultra-low latency requirements, either within existing video workflows or by refreshing your workflows.
OTT Video Streaming Better-than-Broadcast Latency (CTD404-R1) - AWS reInvent ...
OTT Video Streaming Better-than-Broadcast Latency (CTD404-R1) - AWS reInvent ...
Amazon Web Services
Traditionally, content delivery networks (CDNs) were known to accelerate static content. Amazon CloudFront has come a long way and now supports delivery of entire websites that include dynamic and static content. In this session, we introduce you to CloudFront’s dynamic delivery features that help improve the performance, scalability, and availability of your website while helping you lower your costs. We talk about architectural patterns such as SSL termination, close proximity connection termination, origin offload with keep-alive connections, and last-mile latency improvement. Also learn how to take advantage of Amazon Route 53's health check, automatic failover, and latency-based routing to build highly available web apps on AWS.
Dynamic Content Acceleration: Lightning Fast Web Apps with Amazon CloudFront ...
Dynamic Content Acceleration: Lightning Fast Web Apps with Amazon CloudFront ...
Amazon Web Services
Cloudera’s performance engineering team recently completed a new round of benchmark testing based on Impala 2.5 and the most recent stable releases of the major SQL engine options for the Apache Hadoop platform, including Apache Hive-on-Tez and Apache Spark/Spark SQL. This presentation explains the methodology and results.
Impala Performance Update
Impala Performance Update
Cloudera, Inc.
In Amazon CloudFront, a lot happens in just a few milliseconds. Come dive deep into the infrastructure and architecture of AWS edge services, including CloudFront, Amazon Route 53, AWS Shield, and AWS WAF. We break down the life of an HTTP request (and any request in general) and walk you through how all AWS edge services work together in just a few milliseconds to consistently deliver your application’s content with high availability, security, and performance. Learn how edge services intelligently route requests to the most ideal edge location, secure your content behind the scenes, and leverage the AWS private network for improved performance.
A few milliseconds in the life of an HTTP request - SVC303 - New York AWS Summit
A few milliseconds in the life of an HTTP request - SVC303 - New York AWS Summit
Amazon Web Services
WebSocket is cool, and you probably already played with it. But it’s just a transport technology. If you have thousands of client connections you need to do lots of improvements to make it scalable, reliable and achieve high performance. You need to implement many things on top of it. We are building financial data streaming platform for thousands of traders using WebSocket. I’m going to share my experience and cover such techniques as delta delivery, conflation, dynamic throttling, bandwidth and frequency limitation and other. I will also do a live demo of how to build scalable WebSocket backend from scratch using Java and Spring.
VoxxedDays Minsk - Building scalable WebSocket backend
VoxxedDays Minsk - Building scalable WebSocket backend
Constantine Slisenka
Traditionally, content delivery networks (CDNs) were known to accelerate static content. Amazon CloudFront has come a long way and now supports delivery of entire websites that include dynamic and static content. In this session, we introduce you to CloudFront’s dynamic delivery features that help improve the performance, scalability, and availability of your website while helping you lower your costs. We talk about architectural patterns such as SSL termination, close proximity connection termination, origin offload with keep-alive connections, and last-mile latency improvement. Also learn how to take advantage of Amazon Route 53's health check, automatic failover, and latency-based routing to build highly available web apps on AWS.
Dynamic Content Acceleration: Amazon CloudFront and Amazon Route 53 (ARC309) ...
Dynamic Content Acceleration: Amazon CloudFront and Amazon Route 53 (ARC309) ...
Amazon Web Services
This session is recommended for people who are new to content distribution networks (CDNs) and have a need to decrease server load and speed up their website’s load time. In this mid-level technical session you will be able to learn more about improving the performance of web sites and web applications using Amazon CloudFront and Amazon Router 53. Learn how to assess whether your web applications will benefit from caching and how to optimize the delivery of static and dynamic content to boost performance and improve your customers' experience in using your applications.
AWS Summit London 2014 | Dynamic Content Acceleration (300)
AWS Summit London 2014 | Dynamic Content Acceleration (300)
Amazon Web Services
CTO Tyler McMullen details what can be learned from CDNs when developing applications.
What we can learn from CDNs about Web Development, Deployment, and Performance
What we can learn from CDNs about Web Development, Deployment, and Performance
Fastly
DEFCON 23 - Etienne Martineau - inter vm data exfiltration
DEFCON 23 - Etienne Martineau - inter vm data exfiltration
DEFCON 23 - Etienne Martineau - inter vm data exfiltration
Felipe Prado
These are the slides to <a href="https://youtu.be/eiydITTdDAQ" target=_blank">https://youtu.be/eiydITTdDAQ</a>
SmartDB Office Hours: Connection Pool Sizing Concepts
SmartDB Office Hours: Connection Pool Sizing Concepts
Koppelaars
SD Times - Docker v2
SD Times - Docker v2
Alvin Richards
In this session, create a live channel in minutes using a video streaming solution on AWS. Learn how to customize a video workflow for live streaming to meet specific requirements, such as adjusting bitrate, adding outputs to social media platforms, enabling content protection, adding a scheduler for input switching, and inserting ad markers to enable monetization. You also implement comprehensive monitoring for confidence that audiences are getting a good experience, and provide alerts for any issues. Leave with a fully featured live channel ready for thousands of viewers. This well-architected solution automatically provisions services including AWS Elemental MediaLive, AWS Elemental MediaPackage, Amazon CloudFront, AWS Step Functions, AWS Lambda, and Amazon S3 to build a scalable, distributed, and global live streaming workflow on AWS.
Deploy, Customize, Start, & Monitor a Channel with Live Streaming on AWS (CTD...
Deploy, Customize, Start, & Monitor a Channel with Live Streaming on AWS (CTD...
Amazon Web Services
Similar to Akamai Tech day Amsterdam 2019
(20)
Challenges behind the scenes of the large Swiss e-Commerce shop apfelkiste.ch...
Challenges behind the scenes of the large Swiss e-Commerce shop apfelkiste.ch...
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2
60000 TPS: How many CPUs?, Enterprise Postgres Day
60000 TPS: How many CPUs?, Enterprise Postgres Day
Configure an End-to-End Video Channel to Deliver Low Latency (CTD411-R3) - AW...
Configure an End-to-End Video Channel to Deliver Low Latency (CTD411-R3) - AW...
Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10
Kafka at Scale: Multi-Tier Architectures
Kafka at Scale: Multi-Tier Architectures
Advanced Caching Concepts @ Velocity NY 2015
Advanced Caching Concepts @ Velocity NY 2015
Bitmovin LIVE Tech Talks: Reducing Peak Bandwidth for OTT (ft. Akamai)
Bitmovin LIVE Tech Talks: Reducing Peak Bandwidth for OTT (ft. Akamai)
OTT Video Streaming Better-than-Broadcast Latency (CTD404-R1) - AWS reInvent ...
OTT Video Streaming Better-than-Broadcast Latency (CTD404-R1) - AWS reInvent ...
Dynamic Content Acceleration: Lightning Fast Web Apps with Amazon CloudFront ...
Dynamic Content Acceleration: Lightning Fast Web Apps with Amazon CloudFront ...
Impala Performance Update
Impala Performance Update
A few milliseconds in the life of an HTTP request - SVC303 - New York AWS Summit
A few milliseconds in the life of an HTTP request - SVC303 - New York AWS Summit
VoxxedDays Minsk - Building scalable WebSocket backend
VoxxedDays Minsk - Building scalable WebSocket backend
Dynamic Content Acceleration: Amazon CloudFront and Amazon Route 53 (ARC309) ...
Dynamic Content Acceleration: Amazon CloudFront and Amazon Route 53 (ARC309) ...
AWS Summit London 2014 | Dynamic Content Acceleration (300)
AWS Summit London 2014 | Dynamic Content Acceleration (300)
What we can learn from CDNs about Web Development, Deployment, and Performance
What we can learn from CDNs about Web Development, Deployment, and Performance
DEFCON 23 - Etienne Martineau - inter vm data exfiltration
DEFCON 23 - Etienne Martineau - inter vm data exfiltration
SmartDB Office Hours: Connection Pool Sizing Concepts
SmartDB Office Hours: Connection Pool Sizing Concepts
SD Times - Docker v2
SD Times - Docker v2
Deploy, Customize, Start, & Monitor a Channel with Live Streaming on AWS (CTD...
Deploy, Customize, Start, & Monitor a Channel with Live Streaming on AWS (CTD...
Recently uploaded
BooK Now Call us at +918448380779 to hire a gorgeous and seductive call girl for sex. Take a Delhi Escort Service. The help of our escort agency is mostly meant for men who want sexual Indian Escorts In Delhi NCR. It should be noted that any impersonator will get 100 attention from our Young Girls Escorts in Delhi. They will assume the position of reliable allies. VIP Call Girl With Original Photos Book Tonight +918448380779 Our Cheap Price 1 Hour not available 2 Hours 5000 Full Night 8000 TAG: Call Girls in Delhi, Noida, Gurgaon, Ghaziabad, Connaught Place, Greater Kailash Delhi, Lajpat Nagar Delhi, Mayur Vihar Delhi, Chanakyapuri Delhi, New Friends Colony Delhi, Majnu Ka Tilla, Karol Bagh, Malviya Nagar, Saket, Khan Market, Noida Sector 18, Noida Sector 76, Noida Sector 51, Gurgaon Mg Road, Iffco Chowk Gurgaon, Rajiv Chowk Gurgaon All Delhi Ncr Free Home Deliver
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Created by Mozilla Research in 2012 and now part of Linux Foundation Europe, the Servo project is an experimental rendering engine written in Rust. It combines memory safety and concurrency to create an independent, modular, and embeddable rendering engine that adheres to web standards. Stewardship of Servo moved from Mozilla Research to the Linux Foundation in 2020, where its mission remains unchanged. After some slow years, in 2023 there has been renewed activity on the project, with a roadmap now focused on improving the engine’s CSS 2 conformance, exploring Android support, and making Servo a practical embeddable rendering engine. In this presentation, Rakhi Sharma reviews the status of the project, our recent developments in 2023, our collaboration with Tauri to make Servo an easy-to-use embeddable rendering engine, and our plans for the future to make Servo an alternative web rendering engine for the embedded devices industry. (c) Embedded Open Source Summit 2024 April 16-18, 2024 Seattle, Washington (US) https://events.linuxfoundation.org/embedded-open-source-summit/ https://ossna2024.sched.com/event/1aBNF/a-year-of-servo-reboot-where-are-we-now-rakhi-sharma-igalia
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Heather Hedden, Senior Consultant at Enterprise Knowledge, presented “The Role of Taxonomy and Ontology in Semantic Layers” at a webinar hosted by Progress Semaphore on April 16, 2024. Taxonomies at their core enable effective tagging and retrieval of content, and combined with ontologies they extend to the management and understanding of related data. There are even greater benefits of taxonomies and ontologies to enhance your enterprise information architecture when applying them to a semantic layer. A survey by DBP-Institute found that enterprises using a semantic layer see their business outcomes improve by four times, while reducing their data and analytics costs. Extending taxonomies to a semantic layer can be a game-changing solution, allowing you to connect information silos, alleviate knowledge gaps, and derive new insights. Hedden, who specializes in taxonomy design and implementation, presented how the value of taxonomies shouldn’t reside in silos but be integrated with ontologies into a semantic layer. Learn about: - The essence and purpose of taxonomies and ontologies in information and knowledge management; - Advantages of semantic layers leveraging organizational taxonomies; and - Components and approaches to creating a semantic layer, including the integration of taxonomies and ontologies
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
My presentation at the Lehigh Carbon Community College (LCCC) NSA GenCyber Cyber Security Day event that is intended to foster an interest in the cyber security field amongst college students.
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Presentation on the progress in the Domino Container community project as delivered at the Engage 2024 conference
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
BooK Now Call us at +918448380779 to hire a gorgeous and seductive call girl for sex. Take a Delhi Escort Service. The help of our escort agency is mostly meant for men who want sexual Indian Escorts In Delhi NCR. It should be noted that any impersonator will get 100 attention from our Young Girls Escorts in Delhi. They will assume the position of reliable allies. VIP Call Girl With Original Photos Book Tonight +918448380779 Our Cheap Price 1 Hour not available 2 Hours 5000 Full Night 8000 TAG: Call Girls in Delhi, Noida, Gurgaon, Ghaziabad, Connaught Place, Greater Kailash Delhi, Lajpat Nagar Delhi, Mayur Vihar Delhi, Chanakyapuri Delhi, New Friends Colony Delhi, Majnu Ka Tilla, Karol Bagh, Malviya Nagar, Saket, Khan Market, Noida Sector 18, Noida Sector 76, Noida Sector 51, Gurgaon Mg Road, Iffco Chowk Gurgaon, Rajiv Chowk Gurgaon All Delhi Ncr Free Home Deliver
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
With more memory available, system performance of three Dell devices increased, which can translate to a better user experience Conclusion When your system has plenty of RAM to meet your needs, you can efficiently access the applications and data you need to finish projects and to-do lists without sacrificing time and focus. Our test results show that with more memory available, three Dell PCs delivered better performance and took less time to complete the Procyon Office Productivity benchmark. These advantages translate to users being able to complete workflows more quickly and multitask more easily. Whether you need the mobility of the Latitude 5440, the creative capabilities of the Precision 3470, or the high performance of the OptiPlex Tower Plus 7010, configuring your system with more RAM can help keep processes running smoothly, enabling you to do more without compromising performance.
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
What are drone anti-jamming systems? The drone anti-jamming systems and anti-spoof technology protect against interference, jamming, and spoofing of the UAVs. To protect their security, countries are beginning to research drone anti-jamming systems, also known as drone strike weapons. The anti-jam and anti-spoof technology protects against interference, jamming and spoofing. A drone strike weapon is a drone attack weapon that can attack and destroy enemy drones. So what is so unique about this amazing system?
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
In an era where artificial intelligence (AI) stands at the forefront of business innovation, Information Architecture (IA) is at the core of functionality. See “There’s No AI Without IA” – (from 2016 but even more relevant today) Understanding and leveraging how Information Architecture (IA) supports AI synergies between knowledge engineering and prompt engineering is critical for senior leaders looking to successfully deploy AI for internal and externally facing knowledge processes. This webinar be a high-level overview of the methodologies that can elevate AI-driven knowledge processes supporting both employees and customers. Core Insights Include: Strategic Knowledge Engineering: Delve into how structuring AI's knowledge base is required to prevent hallucinations, enable contextual retrieval of accurate information. This will include discussion of gold standard libraries of use cases support testing various LLMs and structures and configurations of knowledge base. Precision in Prompt Engineering: Learn the art of crafting prompts that direct AI to deliver targeted, relevant responses, thereby optimizing customer experiences and business outcomes. Unified Approach for Enhanced AI Performance: Explore the intersection of knowledge and prompt engineering to develop AI systems that are not only more responsive but also aligned with overarching business strategies. Guiding Principles for Implementation: Equip yourself with best practices, ethical guidelines, and strategic considerations for embedding these technologies into your business ecosystem effectively. This webinar is designed to empower business and technology leaders with the knowledge to harness the full potential of AI, ensuring their organizations not only keep pace with digital transformation but lead the charge. Join us to map a roadmap to fully leverage Information Architecture (IA) and AI chart a course towards a future where AI is a key pillar of strategic innovation and business success.
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
I've been in the field of "Cyber Security" in its many incarnations for about 25 years. In that time I've learned some lessons, some the hard way. Here are my slides presented at BSides New Orleans in April 2024.
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
This project focuses on implementing real-time object detection using Raspberry Pi and OpenCV. Real-time object detection is a critical aspect of computer vision applications, allowing systems to identify and locate objects within a live video stream instantly.
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Microsoft's Threat Matrix for Kubernetes helps organizations understand the attack surface a Kubernetes deployment introduces to their environments. This ensures that adequate detections and mitigations are in place. By covering over 40 different attacker techniques, defenders can learn about Kubernetes-specific mitigations and controls to deploy to their environments. In this session, we will explore the MS-TA9013 Host Path Mount technique, which is commonly used by attackers to perform privilege escalation in a Kubernetes cluster. Attendees will learn how attackers and defenders can: * Escape the container's host volume mount to gain persistence on an underlying node * Move laterally from the underlying node into the customer's cloud environment * Analyze Kubernetes audit logs to detect pods deployed with a hostPath mount * Deploy an admission controller that prevents new pods from using a hostPath mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
An excellent report on AI technology, specifically generative AI, the next step after ChatGPT from Epam. Impact Assessments, Road Charts with fully updated Results and new charts.
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
In this session, we will delve into strategic approaches for optimizing knowledge management within Microsoft 365, amidst the evolving landscape of Copilot. From leveraging automatic metadata classification and permission governance with SharePoint Premium, to unlocking Viva Engage for the cultivation of knowledge and communities, you will gain actionable insights to bolster your organization's knowledge-sharing initiatives. In this session, we will also explore how to facilitate solutions to enable your employees to find answers and expertise within Microsoft 365. You will leave equipped with practical techniques and a deeper understanding of how there is more to effective knowledge management than just enabling Copilot, but building actual solutions to prepare the knowledge that Copilot and your employees can use.
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Discord is a free app offering voice, video, and text chat functionalities, primarily catering to the gaming community. It serves as a hub for users to create and join servers tailored to their interests. Discord’s ecosystem comprises servers, each functioning as a distinct online community with its own channels dedicated to specific topics or activities. Users can engage in text-based discussions, voice calls, or video chats within these channels. Understanding Discord Servers Discord servers are virtual spaces where users congregate to interact, share content, and build communities. Servers may revolve around gaming, hobbies, interests, or fandoms, providing a platform for like-minded individuals to connect. Communication Features Discord offers a range of communication tools, including text channels for messaging, voice channels for real-time audio conversations, and video channels for face-to-face interactions. These features facilitate seamless communication and collaboration. What Does NSFW Mean? The acronym NSFW stands for “Not Safe For Work,” indicating content that may be inappropriate for professional or public settings. NSFW Content NSFW content encompasses material that is sexually explicit, violent, or otherwise graphic in nature. It often includes nudity, profanity, or depictions of sensitive topics.
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Read about the journey the Adobe Experience Manager team has gone through in order to become and scale API-first throughout the organisation.
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Discover the advantages of hiring UI/UX design services! Our blog explores how professional design can enhance user experiences, boost brand credibility, and increase customer engagement. Learn about the latest design trends and strategies that can help your business stand out in the digital landscape. Elevate your online presence with Pixlogix's expert UI/UX design services.
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
The presentation explores the development and application of artificial intelligence (AI) from its inception to its current status in the modern world. The term "artificial intelligence" was first coined by John McCarthy in 1956 to describe efforts to develop computer programs capable of performing tasks that typically require human intelligence. This concept was first introduced at a conference held at Dartmouth College, where programs demonstrated capabilities such as playing chess, proving theorems, and interpreting texts. In the early stages, Alan Turing contributed to the field by defining intelligence as the ability of a being to respond to certain questions intelligently, proposing what is now known as the Turing Test to evaluate the presence of intelligent behavior in machines. As the decades progressed, AI evolved significantly. The 1980s focused on machine learning, teaching computers to learn from data, leading to the development of models that could improve their performance based on their experiences. The 1990s and 2000s saw further advances in algorithms and computational power, which allowed for more sophisticated data analysis techniques, including data mining. By the 2010s, the proliferation of big data and the refinement of deep learning techniques enabled AI to become mainstream. Notable milestones included the success of Google's AlphaGo and advancements in autonomous vehicles by companies like Tesla and Waymo. A major theme of the presentation is the application of generative AI, which has been used for tasks such as natural language text generation, translation, and question answering. Generative AI uses large datasets to train models that can then produce new, coherent pieces of text or other media. The presentation also discusses the ethical implications and the need for regulation in AI, highlighting issues such as privacy, bias, and the potential for misuse. These concerns have prompted calls for comprehensive regulations to ensure the safe and equitable use of AI technologies. Artificial intelligence has also played a significant role in healthcare, particularly highlighted during the COVID-19 pandemic, where it was used in drug discovery, vaccine development, and analyzing the spread of the virus. The capabilities of AI in healthcare are vast, ranging from medical diagnostics to personalized medicine, demonstrating the technology's potential to revolutionize fields beyond just technical or consumer applications. In conclusion, AI continues to be a rapidly evolving field with significant implications for various aspects of society. The development from theoretical concepts to real-world applications illustrates both the potential benefits and the challenges that come with integrating advanced technologies into everyday life. The ongoing discussion about AI ethics and regulation underscores the importance of managing these technologies responsibly to maximize their their benefits while minimizing potential harms.
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Recently uploaded
(20)
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Akamai Tech day Amsterdam 2019
1.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential1 50 ways to ruin your TTFB April, 2019 Tim Vereecke, Web Performance Architect
2.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential2 Redirect time 2019
3.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential3 Redirect time April 4th
4.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential4 Redirect time TTFB
5.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential5 First Paint (FP) First Contentful Paint (FCP) First Meaningful Paint (FMP) Time to Interactive (TTI) Time to Visually ready (TVR)
6.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential6 DOM CSSOM What is important?
7.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential7 DOM CSSOM What is important?
8.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential8 DOM CSSOM What is important?
9.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential9 Performance tuning Do it faster Do less Change order
10.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential10 Performance tuning Do it faster Do less Change order (get rid of noise)
11.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential11 How it works
12.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential12 How it works dns
13.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential13 How it works dns connect
14.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential14 How it works dns connect ssl
15.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential15 How it works dns connect ssl request
16.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential16 How it works dns connect ssl request response
17.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential17 How it works dns connect ssl request responsecache
18.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential18 How it works dns connect ssl request responseredirect cache
19.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential19 How it works dns connect ssl request responseredirect cache
20.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential20 How it works dns connect ssl request responseredirect cache
21.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential21 How it works dns connect ssl request responseredirect cache A? B?
22.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential22 How it works dns connect ssl request responseredirect cache A? B mPulse Backend Time
23.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential23 How it works dns connect ssl request responseredirect cache A? B mPulse Backend Time
24.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential24 How it works dns connect ssl request responseredirect cache A? B mPulse Backend Time
25.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential25 How it works dns connect ssl request responseredirect cache A? B mPulse Backend Time
26.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential26 How it works dns connect ssl request responseredirect cache A? B mPulse Backend Time
27.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential27 How it works dns connect ssl request responseredirect cache A? B mPulse Backend Time
28.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential28 How it works dns connect ssl request responseredirect cache A? B mPulse Backend Time
29.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential29 How it works dns connect ssl request responseredirect cache A? B mPulse Backend Time
30.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential30 Analysis best practices dns connect ssl request responseredirect cache A? B mPulse Backend Time
31.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential31 Analysis best practices dns connect ssl request responseredirect cache A? B mPulse Backend Time Custom timer
32.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential32 Analysis best practices dns connect ssl request responseredirect cache A B mPulse Backend Time Custom timer Cust. timer
33.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential33 Analysis best practices dns connect ssl request responseredirect cache A B mPulse Backend Time Custom timer Cust. timer dns connect ssl request responseredirect cache
34.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential34 Analysis best practices dns connect ssl request responseredirect cache A B mPulse Backend Time Custom timer Cust. timer dns connect ssl request responseredirect cache dns connect ssl request responseredirect cache
35.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential35 Analysis best practices dns connect ssl request responseredirect cache A B mPulse Backend Time Custom timer dns connect ssl request responseredirect cache dns connect ssl request responseredirect cache
36.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential36 Analysis best practices dns connect ssl request responseredirect cache A B mPulse Backend Time Custom timer Cust. timer
37.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential37 Analysis best practices dns connect ssl request responseredirect cache A B mPulse Backend Time Custom timer Cust. timer Custom timer
38.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential38 Analysis best practices dns connect ssl request responseredirect cache A B mPulse Backend Time redirect ttfb base page
39.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential39 How it works dns connect ssl request responseredirect cache
40.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential40 How it works dns connect ssl request responseredirect cache
41.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential41 How it works dns connect ssl request responseredirect cache
42.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential42 How it works dns connect ssl request responseredirect cache
43.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential43
44.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential44
45.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential45 dataLayer.landingpage='Yes'; if(document.referrer.indexOf('www.scalemates.com')>-1){ dataLayer.landingpage='No'; }
46.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential46 Tuning best practices dns connect ssl request responseredirect cache
47.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential47 Tuning best practices dns connect ssl request responseredirect cache Client-Edge Edge-Origin
48.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential48 Tuning best practices Redirects Client-Edge Edge-Origin Avoid v Consolidate v v Execute them at the edge v Cache them v v HSTS Header v
49.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential49
50.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential50 DNS Client-Edge Edge-Origin Increase DNS TTL v v Consolidate DNS hostnames v v DNS prefresh/async v Tuning best practices
51.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential51 TCP Client-Edge Edge-Origin Pconns (301s - or modify Akamai) v Don’t hardcode IP v Tuning best practices
52.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential52 SSL Handshake Client-Edge Edge-Origin Use fast ciphers v v OCSP Stapling v v TLS 1.3 v v Avoid large SAN’s v v Tuning best practices
53.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential53 Dynamic Client-Edge Edge-Origin SureRoute (TTL/Object size) v Compression (Check Via header) v v Response buffering v WAF Outbound rules v Prefetching needed? v ESI v Tuning best practices
54.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential54 Dynamic Client-Edge Edge-Origin Config complexity v v Tuning best practices
55.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential55 Caching Client-Edge Edge-Origin Cache as much as you can v v Tiered Distribution v FastPurge for Long TTL’s v Check Vary header v Cache prefreshing v Tuning best practices
56.
Accelerating super dynamic
content
57.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential57 Why do you cache?
58.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential58 Edge hits for 1 object Time Edge view
59.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential59 Edge hits for 1 object Time Edge view TTL TTL
60.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential60 Edge hits for 1 object Time Edge view TTL TTL
61.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential61 Edge hits for 1 object ms Time Edge view TTL TTL
62.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential62 Edge hits for 1 object ms Time Edge view TTL TTL Performance risk
63.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential63 Edge hits for 1 object ms Time Edge view TTL TTL ms Time Origin view Performance risk Scalability risk
64.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential64 Edge hits for 1 object ms Time Edge view TTL TTL ms Time Origin view Performance risk Scalability risk Out of sync risk Version X Version X+1
65.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential65 Trade offs? ms Time Edge view TTL TTL ms Time Origin view Performance risk Scalability risk Out of sync risk Version X Version X+1
66.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential66 Is there a magic bullet? ms Time Edge view TTL TTL ms Time Origin view Performance risk Scalability risk Out of sync risk Version X Version X+1
67.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential67 Prefreshing ms Time Edge view TTL TTL ms Time Origin view Version X Version X+1
68.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential68 Prefreshing ms Time Edge view TTL TTL ms Time Origin view Version X Version X+1
69.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential69 Prefreshing ms Time Edge view TTL TTL ms Time Origin view Version X Version X+1
70.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential70 Prefreshing ms Time Edge view TTL TTL ms Time Origin view Version X Version X+1
71.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential71 Prefreshing ms Time Edge view TTL TTL ms Time Origin view Version X Version X+1
72.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential72 Prefreshing ms Time Edge view TTL TTL ms Time Origin view Version X Version X+1
73.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential73 Prefreshing ms Time Edge view TTL TTL ms Time Origin view Version X Version X+1
74.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential74 Impact ms Time Edge view TTL TTL ms Time Origin view Version X Version X+1 Performance risk reduced Scalability risk increased* Out of sync risk reduced
75.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential75 Tradeoffs ms Time Edge view TTL TTL ms Time Origin view Version X Version X+1 Performance risk Scalability risk Out of sync risk
76.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential76
77.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential77 1 session = 1 or more pages
78.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential78
79.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential79 Session limitations
80.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential80 Option 1: Cache
81.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential81 Option 1: Cache
82.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential82 Option 2: 100% Dynamic
83.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential83 Option 2: 100% Dynamic Performance
84.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential84 Option 3: XHR
85.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential85
86.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential86
87.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential87
88.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential88
89.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential89
90.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential90 Option 4: ESI
91.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential91
92.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential92
93.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential93
94.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential94 header(Edge-Control: dca="esi',false); <esi:include src="/esi/sidebox-all.php” ttl=”240s"/>
95.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential95 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer Online Online Online
96.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential96 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer Online Online Online
97.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential97 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer Online Online Online Generic 30 days Generic 30 days Generic 30 days
98.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential98 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer Online Online Online Generic 30 days Generic 30 days Generic 30 days PDP 30 days PDP 30 days
99.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential99 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer Online Online Online Generic 30 days Generic 30 days Generic 30 days Home 30 days PDP 30 days PDP 30 days
100.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential100 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer Online Online Online Generic 30 days Generic 30 days Generic 30 days Home 30 days PDP 30 days PDP 30 days Home 4 hours Specific dynamic Specific dynamic
101.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential101 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer Online Online Online Generic 30 days Generic 30 days Generic 30 days Home 30 days PDP 30 days PDP 30 days Home 4 hours Specific dynamic Specific dynamic
102.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential102 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer 2min 2min 2min Generic 30 days Generic 30 days Generic 30 days Home 30 days PDP 30 days PDP 30 days Home 4 hours Specific dynamic Specific dynamic ESI Use cases
103.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential103 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer 2min 2min 2min Generic 30 days Generic 30 days Generic 30 days Home 30 days PDP 30 days PDP 30 days Home 4 hours Specific dynamic Specific dynamic ESI Use cases
104.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential104 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer 4mins 4mins 4mins Generic 30 days Generic 30 days Generic 30 days Home 30 days PDP 30 days PDP 30 days Home 4 hours Specific dynamic Specific dynamic ESI Use cases 4mins 0s 0s 1) Increase TTL of cacheable pages by injecting lower TTL components 2) Increase cache efficiency by executing (component) logic at the Edge 3) Reduce weight of dynamic requests by injecting high TTL components Increased (perceived) performance and consistency
105.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential105 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer 4mins 4mins 4mins Generic 30 days Generic 30 days Generic 30 days Home 30 days PDP 30 days PDP 30 days Home 4 hours Specific dynamic Specific dynamic Results 4mins 0s 0s Increased offload
106.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential106
107.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential107
108.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential108 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer 4mins 4mins 4mins Generic 30 days Generic 30 days Generic 30 days Home 30 days PDP 30 days PDP 30 days Home 4 hours Specific dynamic Specific dynamic Results 4mins 0s 0s Increased (perceived) performance and consistency
109.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential109 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer 4mins 4mins 4mins Generic 30 days Generic 30 days Generic 30 days Home 30 days PDP 30 days PDP 30 days Home 4 hours Specific dynamic Specific dynamic Results 4mins 0s 0s Increased (perceived) performance and consistency
110.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential110 Content Header Side Box PDP #1Homepage (1x) Content Footer Header Side Box Content Footer Header Side Box PDP #2 Footer 4mins 4mins 4mins Generic 30 days Generic 30 days Generic 30 days Home 30 days PDP 30 days PDP 30 days Home 4 hours Specific dynamic Specific dynamic Results 4mins 0s 0s
111.
| 50 ways
to ruin your TTFB | © 2019 Akamai | Confidential111 Redirect time Thank you @TimVereecke
Download now