This document provides an overview of designing reliable cloud services. It discusses key concepts like reliability versus resiliency and recovery-oriented computing. The document outlines a design process including failure mode and effects analysis to plan for failures. Designing for resilience, data integrity, and recoverability are essential principles. Coping strategies should allow services to degrade gracefully when failures occur. The goal is to minimize downtime and keep services available through redundancy and rapid recovery.
Windows Azure Active Directory presentation will show you how to set up your Azure AD account and how to connect existing ASP.NET MVC Web Application with Azure Active Directory to provide Single-Sign-On
AWS Webcast - High Availability with Route 53 DNS FailoverAmazon Web Services
This webinar will be discussing how to use DNS Failover to a range of high-availability architectures, from a simple backup website to advanced multi-region architectures.
Agenda:
What is AAD Connect?
Features provided with AAD Connect
Syncing your on-premises identities using AAD Connect
Setting up AAD Connect
Conclusion
Windows Azure Active Directory presentation will show you how to set up your Azure AD account and how to connect existing ASP.NET MVC Web Application with Azure Active Directory to provide Single-Sign-On
AWS Webcast - High Availability with Route 53 DNS FailoverAmazon Web Services
This webinar will be discussing how to use DNS Failover to a range of high-availability architectures, from a simple backup website to advanced multi-region architectures.
Agenda:
What is AAD Connect?
Features provided with AAD Connect
Syncing your on-premises identities using AAD Connect
Setting up AAD Connect
Conclusion
Amazon CloudWatch Logs and AWS Lambda: A Match Made in HeavenAmazon Web Services
In this session, we cover three common scenarios that include Amazon CloudWatch Logs and AWS Lambda. Learn how to build an Elasticsearch cluster from historical data using Amazon S3, Lambda, and CloudWatch Logs. Discover how to add details to CloudWatch alarm notifications using Amazon SNS and Lambda. Finally, understand how to bring Elastic Load Balancing logs to CloudWatch Logs using S3 bucket triggers from Lambda.
Speaker: Leo Zhadanovsky, Principle Solutions Architect. Amazon Web Services
Level: 300
Azure Automation delivers cloud-based automation, operating system updates, and configuration service that supports consistent management across your Azure and non-Azure environments. It includes process automation, configuration management, update management, shared capabilities, and heterogeneous features.
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...Edureka!
** AWS Certification Training: https://www.edureka.co/cloudcomputing **
** Migration Training to AWS: https://www.edureka.co/migrating-to-aws **
This Edureka "AWS Cloud Computing Tutorial” will introduce you to the fundamentals of AWS and Cloud Computing and also explain various migration concepts. Following is the list of content covered in this tutorial:
1. What is Cloud?
2. Cloud Computing Basics
3. What Is AWS?
4. Migration
5. Migration Strategies
6. Demo
Check out our AWS Playlist: https://goo.gl/8qrfKU
AWS CLI Installation : https://goo.gl/gjniYx
AWS Migration Codes: https://goo.gl/veyZvW
AWS Identity, Directory, and Access Services: An Overview Amazon Web Services
Every journey to the AWS Cloud is unique. Some customers are migrating existing applications, while others are building Approved applications using cloud-native services. Along each journey, identity and access management helps customers protect their applications and resources. Come to this session and learn how AWS identity services provide you with a secure, flexible, and easy solution for managing identities and access on the AWS Cloud. With AWS identity services, you do not have to adapt to AWS. Instead, you have a choice of services designed to meet you anywhere along your journey to the AWS Cloud.
This webinar discussed strategies to help save money in the AWS Cloud. From turning systems off at night, to implementing bidding strategies on the spot market, there are many ways in which you can manage and your reduce costs with AWS.
This webinar dived into the differences between instance types; explain how you can reduce costs with Reserved Instances, the spot market and by architecting to reduce costs. It also discussed how to combine on-demand pricing with spot pricing to perform cost effective big data analysis, and introduce customer examples to illustrate how AWS customers gain the most from AWS whilst at the same time managing their spend.
The AWS Well-Architected Framework helps you understand the pros and cons of decisions you make while building systems on AWS. By using the Framework you will learn architectural best practices for designing and operating reliable, secure, efficient, and cost-effective systems in the cloud. It provides a way for you to consistently measure your architectures against best practices and identify areas for improvement. The process for reviewing an architecture is a constructive conversation about architectural decisions, and is not an audit mechanism. We believe that having well-architected systems greatly increases the likelihood of business success.
https://runfrictionless.com/b2b-white-paper-service/
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Okta-Inc
If you run a website, operate a customer or partner portal or your business is running a cloud service, you need a way to manage users and their access to applications. Okta’s enterprise grade, zero downtime identity service can help you innovate faster, decrease IT costs, increase revenue and ensure a seamless user experience.
Okta automates account creation and user registration, enabling single sign-on across your sites. The Okta UI is fully customizable, with built-in tools or by using Okta’s REST APIs.
Configuration is flexible and simple, with support for individual, 3rd party enterprise or social authentication. Okta comes pre-integrated with over 2,000 apps and can easily connect to custom cloud and on-premises applications.
This presentation provides an overview of external identity management and how Okta can provide identity services for your web presence.
Link for more information: http://www.okta.com/problems-we-solve/managing-external-identities.html
Top 40 MVC Interview Questions and Answers | EdurekaEdureka!
YouTube Link: https://youtu.be/Mlkgr6SOkUM
** Edureka Online Courses: https://www.edureka.co **
This Edureka video on "Top 40 MVC Interview Questions and Answers" will help you to prepare yourself for the MVC Questions asked in Interviews. It covers mvc questions for beginners, intermediate and experienced professionals. Below topics are covered in this video:
Beginner Level MVC Interview Questions
Intermediate Level MVC Interview Questions
Advanced Level MVC Interview Questions
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...Amazon Web Services
The implementation of highly scalable, easy-to-deploy technology is transforming the public sector, but it’s not a one-size-fits-all approach. Organizations begin their cloud adoption journeys in many ways. Some start with pilot projects and others jump into mission critical programs, but they are all starting with an existing infrastructure. Adopting cloud doesn’t mean scrapping it all and starting over. This session explores how organizations are using cloud while building on their existing technology and lessons they’ve learned along the way. Learn More: https://aws.amazon.com/government-education/
Best pratices reliability & scalability on AzureAlex Danvy
Software will have bugs, hardware will fail and humans will make mistakes but your application might have to run 24/7 and scale as needed. Let's dive into how Microsoft Azure can help you to build such app using a powerful modern cloud capabilities.
Webinar: Implementation of 10 Integration Patterns on iPaaS PlatformAPPSeCONNECT
We recently had a #Webinar on Integration Patterns for iPaaS Platform. The key points discussed over the webinar were:
1. Understanding the best practices that should be followed to correctly utilize an iPaaS platform.
2. Some of the best use cases of the iPaaS platform.
3. A walkthrough of APPSeCONNECT Integration Platform to feature the scenarios of an iPaaS platform.
#iPaaS #IntegrationPlatform
Integrate your business applications under one single platform: https://www.appseconnect.com/integrations/
Veeam backup for Office 365 is a product that lets you backup Exchange Online mailboxes . This product can be combined with Microsoft Azure to give a cloud-to-cloud backup as a service solution to customers.
Best Practices for Building Partner-Managed Services on AWSAmazon Web Services
As more and more customers move mission-critical workloads to AWS, there is increasing demand for Managed Service Providers (MSPs) to help customers migrate and then operate those customer environments on an ongoing basis. So how do you find an MSP to help you realize the benefits of AWS? What should you consider if you are going to undertake the ongoing management in-house? This session will describe the AWS Managed Service Program, from the perspective of what customers should look for when engaging an AWS MSP, and includes a framework for customers or Partners wanting to build successful AWS operations. You will also hear directly from Partners who have learned and adapted their operations to provide high-quality managed services on AWS.
Amazon CloudWatch Logs and AWS Lambda: A Match Made in HeavenAmazon Web Services
In this session, we cover three common scenarios that include Amazon CloudWatch Logs and AWS Lambda. Learn how to build an Elasticsearch cluster from historical data using Amazon S3, Lambda, and CloudWatch Logs. Discover how to add details to CloudWatch alarm notifications using Amazon SNS and Lambda. Finally, understand how to bring Elastic Load Balancing logs to CloudWatch Logs using S3 bucket triggers from Lambda.
Speaker: Leo Zhadanovsky, Principle Solutions Architect. Amazon Web Services
Level: 300
Azure Automation delivers cloud-based automation, operating system updates, and configuration service that supports consistent management across your Azure and non-Azure environments. It includes process automation, configuration management, update management, shared capabilities, and heterogeneous features.
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...Edureka!
** AWS Certification Training: https://www.edureka.co/cloudcomputing **
** Migration Training to AWS: https://www.edureka.co/migrating-to-aws **
This Edureka "AWS Cloud Computing Tutorial” will introduce you to the fundamentals of AWS and Cloud Computing and also explain various migration concepts. Following is the list of content covered in this tutorial:
1. What is Cloud?
2. Cloud Computing Basics
3. What Is AWS?
4. Migration
5. Migration Strategies
6. Demo
Check out our AWS Playlist: https://goo.gl/8qrfKU
AWS CLI Installation : https://goo.gl/gjniYx
AWS Migration Codes: https://goo.gl/veyZvW
AWS Identity, Directory, and Access Services: An Overview Amazon Web Services
Every journey to the AWS Cloud is unique. Some customers are migrating existing applications, while others are building Approved applications using cloud-native services. Along each journey, identity and access management helps customers protect their applications and resources. Come to this session and learn how AWS identity services provide you with a secure, flexible, and easy solution for managing identities and access on the AWS Cloud. With AWS identity services, you do not have to adapt to AWS. Instead, you have a choice of services designed to meet you anywhere along your journey to the AWS Cloud.
This webinar discussed strategies to help save money in the AWS Cloud. From turning systems off at night, to implementing bidding strategies on the spot market, there are many ways in which you can manage and your reduce costs with AWS.
This webinar dived into the differences between instance types; explain how you can reduce costs with Reserved Instances, the spot market and by architecting to reduce costs. It also discussed how to combine on-demand pricing with spot pricing to perform cost effective big data analysis, and introduce customer examples to illustrate how AWS customers gain the most from AWS whilst at the same time managing their spend.
The AWS Well-Architected Framework helps you understand the pros and cons of decisions you make while building systems on AWS. By using the Framework you will learn architectural best practices for designing and operating reliable, secure, efficient, and cost-effective systems in the cloud. It provides a way for you to consistently measure your architectures against best practices and identify areas for improvement. The process for reviewing an architecture is a constructive conversation about architectural decisions, and is not an audit mechanism. We believe that having well-architected systems greatly increases the likelihood of business success.
https://runfrictionless.com/b2b-white-paper-service/
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Okta-Inc
If you run a website, operate a customer or partner portal or your business is running a cloud service, you need a way to manage users and their access to applications. Okta’s enterprise grade, zero downtime identity service can help you innovate faster, decrease IT costs, increase revenue and ensure a seamless user experience.
Okta automates account creation and user registration, enabling single sign-on across your sites. The Okta UI is fully customizable, with built-in tools or by using Okta’s REST APIs.
Configuration is flexible and simple, with support for individual, 3rd party enterprise or social authentication. Okta comes pre-integrated with over 2,000 apps and can easily connect to custom cloud and on-premises applications.
This presentation provides an overview of external identity management and how Okta can provide identity services for your web presence.
Link for more information: http://www.okta.com/problems-we-solve/managing-external-identities.html
Top 40 MVC Interview Questions and Answers | EdurekaEdureka!
YouTube Link: https://youtu.be/Mlkgr6SOkUM
** Edureka Online Courses: https://www.edureka.co **
This Edureka video on "Top 40 MVC Interview Questions and Answers" will help you to prepare yourself for the MVC Questions asked in Interviews. It covers mvc questions for beginners, intermediate and experienced professionals. Below topics are covered in this video:
Beginner Level MVC Interview Questions
Intermediate Level MVC Interview Questions
Advanced Level MVC Interview Questions
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...Amazon Web Services
The implementation of highly scalable, easy-to-deploy technology is transforming the public sector, but it’s not a one-size-fits-all approach. Organizations begin their cloud adoption journeys in many ways. Some start with pilot projects and others jump into mission critical programs, but they are all starting with an existing infrastructure. Adopting cloud doesn’t mean scrapping it all and starting over. This session explores how organizations are using cloud while building on their existing technology and lessons they’ve learned along the way. Learn More: https://aws.amazon.com/government-education/
Best pratices reliability & scalability on AzureAlex Danvy
Software will have bugs, hardware will fail and humans will make mistakes but your application might have to run 24/7 and scale as needed. Let's dive into how Microsoft Azure can help you to build such app using a powerful modern cloud capabilities.
Webinar: Implementation of 10 Integration Patterns on iPaaS PlatformAPPSeCONNECT
We recently had a #Webinar on Integration Patterns for iPaaS Platform. The key points discussed over the webinar were:
1. Understanding the best practices that should be followed to correctly utilize an iPaaS platform.
2. Some of the best use cases of the iPaaS platform.
3. A walkthrough of APPSeCONNECT Integration Platform to feature the scenarios of an iPaaS platform.
#iPaaS #IntegrationPlatform
Integrate your business applications under one single platform: https://www.appseconnect.com/integrations/
Veeam backup for Office 365 is a product that lets you backup Exchange Online mailboxes . This product can be combined with Microsoft Azure to give a cloud-to-cloud backup as a service solution to customers.
Best Practices for Building Partner-Managed Services on AWSAmazon Web Services
As more and more customers move mission-critical workloads to AWS, there is increasing demand for Managed Service Providers (MSPs) to help customers migrate and then operate those customer environments on an ongoing basis. So how do you find an MSP to help you realize the benefits of AWS? What should you consider if you are going to undertake the ongoing management in-house? This session will describe the AWS Managed Service Program, from the perspective of what customers should look for when engaging an AWS MSP, and includes a framework for customers or Partners wanting to build successful AWS operations. You will also hear directly from Partners who have learned and adapted their operations to provide high-quality managed services on AWS.
Breve descripción de los principales lineamientos del Programa Jóvenes en Acción de la Unión Europea, utilizado como base de la exposición realizada el día 31-10-2010 en el II Congreso de Jóvenes Descendientes de Españoles del Uruguay. Club Español de Montevideo.
InfTo improve the quality of network performance through advanced communication
services and authorized users in equal access to state-of-the-art technology.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
The cloud revolution is less about the technology it's built on, and more about the peoples and processes that make it go. As many claim that the cloud is reforming the IT practice, it's more important to see the efforts and intuition behind the implementation of the cloud.
Discover why the cloud is optimizing businesses and what is making this automation of organizations both efficient and measurable.
Cloud computing is a technique that has a great capabilities and benefits for users. Cloud characteristics
encourage many organizations to move to this technology. But many consideration faces transmission
process. This paper outline some of these considerations and considerable efforts solved cloud scalability
issues.
SERVICE LEVEL AGREEMENT BASED FAULT TOLERANT WORKLOAD SCHEDULING IN CLOUD COM...ijgca
Cloud computing is a concept of providing user and application oriented services in a virtual environment.Users can use the various cloud services as per their requirements dynamically. Different users have
different requirements in terms of application reliability, performance and fault tolerance. Static and rigid
fault tolerance policies provide a consistent degree of fault tolerance as well as overhead. In this research
work we have proposed a method to implement dynamic fault tolerance considering customerrequirements. The cloud users have been classified in to sub classes as per the fault olerance requirements.Their jobs have also been classified into compute intensive and data intensive categories. The varying
degree of fault tolerance has been applied consisting of replication and input buffer. From the simulation
based experiments we have found that the proposed dynamic method performs better than the existing methods.
SERVICE LEVEL AGREEMENT BASED FAULT TOLERANT WORKLOAD SCHEDULING IN CLOUD COM...ijgca
Cloud computing is a concept of providing user and application oriented services in a virtual environment.
Users can use the various cloud services as per their requirements dynamically. Different users have
different requirements in terms of application reliability, performance and fault tolerance. Static and rigid
fault tolerance policies provide a consistent degree of fault tolerance as well as overhead. In this research
work we have proposed a method to implement dynamic fault tolerance considering customer
requirements. The cloud users have been classified in to sub classes as per the fault tolerance requirements.
Their jobs have also been classified into compute intensive and data intensive categories. The varying
degree of fault tolerance has been applied consisting of replication and input buffer. From the simulation
based experiments we have found that the proposed dynamic method performs better than the existing
methods.
SERVICE LEVEL AGREEMENT BASED FAULT TOLERANT WORKLOAD SCHEDULING IN CLOUD COM...ijgca
Cloud computing is a concept of providing user and application oriented services in a virtual environment.
Users can use the various cloud services as per their requirements dynamically. Different users have
different requirements in terms of application reliability, performance and fault tolerance. Static and rigid
fault tolerance policies provide a consistent degree of fault tolerance as well as overhead. In this research
work we have proposed a method to implement dynamic fault tolerance considering customer
requirements. The cloud users have been classified in to sub classes as per the fault tolerance requirements.
Their jobs have also been classified into compute intensive and data intensive categories. The varying
degree of fault tolerance has been applied consisting of replication and input buffer. From the simulation
based experiments we have found that the proposed dynamic method performs better than the existing
methods.
Microsoft Teams Phone
Stay connected with voice and video calling using Microsoft Teams Phone on your computer, tablet, mobile device, or desk phone.
Stay connected with a modern calling solution
Make and receive voice and video calls directly in Microsoft Teams. Stay in touch and get more done anywhere.
Calling in the flow of work
Work smarter with an all-in-one app that brings together calling, chat, meetings, and collaboration.
Business-critical calling
Use built-in, innovative, and AI-powered calling experiences and integrated partner software solutions.
Devices for any calling scenario
Benefit from a wide portfolio of devices for any business need and get flexible financing options.
Simple set up and management
Easily add, monitor, and manage voice and video calling from the Teams admin center.
Microsoft Teams Phone with Calling Plan includes:
Cloud-based phone system with advanced features including call transfer, multilevel auto attendants, and call queues.
A domestic calling plan with 3,000 minutes2 per user, per month within the US and Canada.
Call from anywhere, on any device through the Microsoft Teams app on desktop, mobile, web, and desk phones.
Around-the-clock customer support seven days a week, backed by Microsoft.
Teams Phone with Calling Plan requires a Microsoft 365 subscription that includes Microsoft Teams
Microsoft Teams
Built for hybrid work
Feel seen and heard no matter where you are and do your best work, your way.
Empower people and teams in a hybrid work world
Flexible work is here to stay, and embracing it is critical to your future success. The latest tools from Microsoft empower hybrid work environments and enable flexible work beyond organizational boundaries.
Whats New in Microsoft Teams Hybrid Meetings November 2021David J Rosenthal
Microsoft Teams
Built for hybrid work
Feel seen and heard no matter where you are and do your best work, your way.
Empower people and teams in a hybrid work world
Flexible work is here to stay, and embracing it is critical to your future success. The latest tools from Microsoft empower hybrid work environments and enable flexible work beyond organizational boundaries.
Microsoft Viva Connections
A curated, company-branded experience that brings together relevant news, conversations, and resources in the apps and devices you use every day. Viva Connections is included in all Microsoft 365 plans with SharePoint Online.
Create connection
Encourage meaningful connections across the organization in a hybrid workplace.
Drive alignment
Rally the entire organization around your vision, mission, and strategic priorities.
Empower contribution
Foster a culture of inclusion by empowering every employee to contribute ideas and share feedback.
Built on Microsoft 365
Deploy and manage Viva Connections through your existing infrastructure.
Protect your hybrid workforce across the attack chainDavid J Rosenthal
Security is one of the most important considerations for SMBs. In fact, 77% of SMBs in a recent survey consider security a top feature when purchasing new PCs.1
Last year alone, 67% of SMBs experienced a security breach that cost, on average, 3.3% of their revenue.1 That’s a big risk to both profitability and reputation, and it shows how critical strong security protections are for businesses.
The good news is that 69% of SMBs in a recent survey agreed that new Windows 10 Pro devices offered better security and data protection than older devices.1
Research shows that modern devices help business owners by preventing identity attacks, minimizing phishing, and reducing the risk of malware attacks. These are all common ways that bad actors steal business data, steal personal information, or hold our devices hostage in exchange for huge amounts of ransom money.
And with modern PCs, most security functions can happen in the cloud, without interrupting worker productivity.
Connections is a company branded employee app in Teams. It is a gateway to your employee experience, with personalized news, communications, tasks, people and resources. It provides a single curated employee destination that can be configured for specific roles like frontline workers. So, leaders can communicate and engage their employees, and employees can get easy access to the tools and resources they need from one place.. Connections builds on existing capabilities in Microsoft 365 like SharePoint and Yammer. And it pulls your communications together into a pre-configured app in Teams, designed for both desktop and mobile workers. It also acts as a launching pad to the other 3 Viva modules
Insights brings together Workplace Analytics, MyAnalytics and Glint into a unified insights app in Teams to provide data-driven and privacy-protected insights for individuals, managers and leaders. For example, employees get personalized insights, only they can see, that help them protect their time for breaks, focused work, and learning in order to promote improved productivity and wellbeing.
Topics focuses on knowledge and expertise. Topics applies AI to identify knowledge and experts and organize them into shared topics. AI automatically creates a topic page for each topic. It’s like Wikipedia for the enterprise where AI does the first draft. And these topic pages are surfaced as Topic Cards right in the flow of work in Office and Teams.
Finally, Learning allows employees to easily discover informal and formal learning in the flow of work. It aggregates content from LinkedIn Learning, Microsoft Learn and 3rd party training content and your own organizations content – all in one place. Along with providing aggregation and recommendations, it also allows managers to assign and track training, as well as report on training within and across teams.
Connections is a company branded employee app in Teams. It is a gateway to your employee experience, with personalized news, communications, tasks, people and resources. It provides a single curated employee destination that can be configured for specific roles like frontline workers. So, leaders can communicate and engage their employees, and employees can get easy access to the tools and resources they need from one place.. Connections builds on existing capabilities in Microsoft 365 like SharePoint and Yammer. And it pulls your communications together into a pre-configured app in Teams, designed for both desktop and mobile workers. It also acts as a launching pad to the other 3 Viva modules
Insights brings together Workplace Analytics, MyAnalytics and Glint into a unified insights app in Teams to provide data-driven and privacy-protected insights for individuals, managers and leaders. For example, employees get personalized insights, only they can see, that help them protect their time for breaks, focused work, and learning in order to promote improved productivity and wellbeing.
Topics focuses on knowledge and expertise. Topics applies AI to identify knowledge and experts and organize them into shared topics. AI automatically creates a topic page for each topic. It’s like Wikipedia for the enterprise where AI does the first draft. And these topic pages are surfaced as Topic Cards right in the flow of work in Office and Teams.
Finally, Learning allows employees to easily discover informal and formal learning in the flow of work. It aggregates content from LinkedIn Learning, Microsoft Learn and 3rd party training content and your own organizations content – all in one place. Along with providing aggregation and recommendations, it also allows managers to assign and track training, as well as report on training within and across teams.
Connections is a company branded employee app in Teams. It is a gateway to your employee experience, with personalized news, communications, tasks, people and resources. It provides a single curated employee destination that can be configured for specific roles like frontline workers. So, leaders can communicate and engage their employees, and employees can get easy access to the tools and resources they need from one place.. Connections builds on existing capabilities in Microsoft 365 like SharePoint and Yammer. And it pulls your communications together into a pre-configured app in Teams, designed for both desktop and mobile workers. It also acts as a launching pad to the other 3 Viva modules
Insights brings together Workplace Analytics, MyAnalytics and Glint into a unified insights app in Teams to provide data-driven and privacy-protected insights for individuals, managers and leaders. For example, employees get personalized insights, only they can see, that help them protect their time for breaks, focused work, and learning in order to promote improved productivity and wellbeing.
Topics focuses on knowledge and expertise. Topics applies AI to identify knowledge and experts and organize them into shared topics. AI automatically creates a topic page for each topic. It’s like Wikipedia for the enterprise where AI does the first draft. And these topic pages are surfaced as Topic Cards right in the flow of work in Office and Teams.
Finally, Learning allows employees to easily discover informal and formal learning in the flow of work. It aggregates content from LinkedIn Learning, Microsoft Learn and 3rd party training content and your own organizations content – all in one place. Along with providing aggregation and recommendations, it also allows managers to assign and track training, as well as report on training within and across teams.
Our end-to-end, integrated portfolio of cloud solutions across Microsoft 365, Dynamics 365, and Azure is built on a foundation of security and privacy and helps every organization in every industry build resilience and improve the bottom line.
Azure Arc offers simplified management, faster app development, and consistent Azure services. Easily organize, govern, and secure Windows, Linux, SQL Server, and Kubernetes clusters across data centers, the edge, and multicloud environments right from Azure. Architect, design, and build cloud-native apps anywhere without sacrificing central visibility and control. Get Azure innovation and cloud benefits by deploying consistent Azure data, application, and machine learning services on any infrastructure.
Gain central visibility, operations, and compliance
Centrally manage a wide range of resources including Windows and Linux servers, SQL server, Kubernetes clusters, and Azure services.
Establish central visibility in the Azure portal and enable multi-environment search with Azure Resource Graph.
Meet governance and compliance standards for apps, infrastructure, and data with Azure Policy.
Delegate access and manage security policies for resources using role-based access control (RBAC) and Azure Lighthouse.
Organize and inventory assets through a variety of Azure scopes, such as management groups, subscriptions, resource groups, and tags.
Learn more about hybrid and multicloud management in the Microsoft Cloud Adoption Framework for Azure.
Windows Server 2022 is now in preview, the next release in our Long-Term Servicing Channel (LTSC), which will be generally available later this calendar year. It builds on Windows Server 2019, our fastest adopted Windows Server ever. This release includes advanced multi-layer security, hybrid capabilities with Azure, and a flexible platform to modernize applications with containers.
Windows 365 also creates a new hybrid personal computing category called Cloud PC, which uses both the power of the cloud and the capabilities of the device to provide a full, personalized Windows experience. This new Windows experience comes as organizations around the world grapple with the best ways to facilitate hybrid work models where employees are both on-site and distributed across the globe.
The Windows 365 Cloud PC experience is:
Versatile, familiar and productive by delivering users their personalized content, settings, and applications
Simple to deploy and manage from a single console, easy for anyone to use
Secure by design, leaving no data on the device
Available on any device and optimized for the best experience on a Windows PC at a predictable price
And lastly, it’s scalable and resilient to support changing workforce needs and new business scenarios
Designed for hybrid work
Productive
Improve employee productivity and focus with a simple, powerful user experience.
Collaborative
Discover a smarter way to collaborate with Microsoft Teams integration.
Secure
Protect data and secure access with a Zero Trust-ready operating system.
Consistent
Make adoption easy with app compatibility and cloud management.
Productive and collaborative
Reach your individual and team goals with built-in assistance features in Windows 11.
Simple, modern visuals
Snap assist
Personalized widgets
Intelligent video conferencing
Share a window while presenting
Meet now in Microsoft Teams
The Microsoft Teams call and chat function in the taskbar of Windows 11.
Meet now in Microsoft Teams
Connect with anyone on any platform with fast, easy-to-use calling and chat right from the taskbar.
The most secure Windows yet
Increase security with hardware-based integrity protection in Windows 11, from the silicon to the cloud.
Go passwordless
Get secure, multifactor single sign-on from devices to the cloud and apps with Windows Hello for Business.
Perfect for remote work
Ship employees a corporate-owned device secured by company policy and easily provisioned by them.
Microsoft Scheduler for M365 - Personal Digital AssistantDavid J Rosenthal
An assistant for everyone
Enjoy the speed of a virtual assistant augmented with human understanding.
Easy scheduling
Save time by handing off the time-consuming task of scheduling using your own words.
Works 24/7
Request a meeting at any time. Cortana works around the clock even when you are offline or busy.
You control your data
Scheduler works within your Microsoft 365 compliance boundaries and keeps the data inside your organization. You control your data.
Smart technology with human assistance
Increased reliability that will always complete your request by using human assistance to resolve ambiguities and context.
Grows with your needs
Available 24/7 and capable of handling thousands of requests at the same time.
What is New in Teams Meetings and Meeting Rooms July 2021David J Rosenthal
Chat
Share your opinion, and your personality. Send gifs, stickers, and emojis in a group chat or in one-to-one messages.
Instant messaging
Meet
Instantly go from group chat to video conference with the touch of a button. Teams of 2 or 10,000 can meet in one place, no matter how many places they’re in.
Online meetings
Call
Make and receive calls with internal and external groups using Microsoft Teams Phone, Operator Connect, or Direct Routing.
Voice calling
Collaborate
Easily find, share, and edit files in real time using familiar apps like Word, PowerPoint, and Excel in Teams.
Video conferencing
Make meetings more personal and increase your productivity by collaborating in real time.
Screen sharing
Keep everyone on the same page by sharing your screen so they can see the same content.
Custom backgrounds
Create the perfect virtual setting by choosing, uploading, or blurring your background.
Together mode
Digitally sit in a shared background, making it feel like you’re in the same room with everyone else.1
File sharing
Co-author files in real time. Securely store, access, share, and collaborate on files from anywhere.
Apps and workflows
Streamline tasks and critical business processes by integrating apps and workflows.
Market availability
Available in 53 languages and 181 markets. Connect across Windows, Mac, iOS, and Android.
Privacy and security
Meet regulatory, legal, and organizational needs with industry-leading compliance offerings.
The Java ecosystem is very broad, with different technologies including Java SE, Java EE/Jakarta EE, Spring, numerous application servers, and other frameworks. Wherever you are in Java, Azure supports your workload and process with an abundance of choice – from IaaS to fully managed services. You can run any application architecture, from monoliths, to containerized monoliths, all the way to completely microservices based apps.
We see three broad patterns for running Java applications in the cloud, depending on how much control or productivity you need.
The first is lift and shift with Virtual Machines:
Virtual machines provide the most flexibility, control and visibility while moving to the cloud, especially for initial lift and shift of Java workloads. Azure provides a variety of Java focused VM images and solutions templates in the Azure Marketplace to get you up and running quickly.
The second is modernization using containers:
Containers provide portability, flexibility, scalability, manageability, repeatability, and predictability.
Azure provides best of breed support for Docker and Kubernetes, especially through the Azure Kubernetes Service (AKS) and Azure Red Hat OpenShift.
Finally, Azure has the most managed hosting options for Java applications of any major cloud platform with fully managed PaaS for Spring, Tomcat, and JBoss EAP:
Managed services offer ease-of-use, ease-of-management, productivity, and lower total cost of ownership.
You can focus on building your applications, not managing infrastructure.
All of this is supported by managed databases and DevOps tooling:
Use fully managed SQL and NoSQL databases, including PostgreSQL, MySQL, Cosmos DB, and SQL.
Keep using the tools you love, with plugins for IntelliJ and Eclipse, integrations with a variety of DevOps tools like Maven, Gradle, Jenkins, and GitHub.
Get comprehensive protection across all your platforms and clouds
Protect your organization from threats across devices, identities, apps, data and clouds. Get unmatched visibility into your multiplatform environment that unifies Security Information and Event Management (SIEM) and Extended Detection and Response (XDR). Simplify your security stack with Azure Sentinel and Microsoft Defender.
Protect your business with a universal identity platform
The Azure Active Directory (Azure AD) enterprise identity service provides single sign-on and multi-factor authentication to help protect your users from 99.9 percent of cybersecurity attacks.
Gartner named Microsoft a leader in Magic Quadrant 2020 for Access Management
Single sign-on simplifies access to your apps from anywhere
Conditional Access and multi-factor authentication help protect and govern access
A single identity platform lets you engage with internal and external users more securely
Developer tools make it easy to integrate identity into your apps and services
Connect your workforce
Whether people are on-site or remote, give them seamless access to all their apps so they can stay productive from anywhere. Automate workflows for user lifecycle and provisioning. Save time and resources with self-service management.
Choose from thousands of SaaS apps
Simplify single sign-on. Azure AD supports thousands of pre-integrated software as a service (SaaS) applications.
Protect and govern access
Safeguard user credentials by enforcing strong authentication and conditional access policies. Efficiently manage your identities by ensuring that the right people have the right access to the right resources.
Engage with your customers and partners
Secure and manage customers and partners beyond your organizational boundaries, with one identity solution. Customize user journeys and simplify authentication with social identity and more.
Integrate identity into your apps
Accelerate adoption of your application in the enterprise by supporting single sign-on and user provisioning. Reduce sign-in friction and automate the creation, removal, and maintenance of user accounts.
The Nintex Platform is Easy-to-use, Powerful and Complete to manage, automate and optimize your processes.
Manage processes by discovering, mapping and sharing across process participants and owners.
This often leads to opportunities for process automation. Many processes involve the capture of information and our forms capability provides an ease-to-use, responsive design experience, often eliminating paper forms. With advanced workflow capabilities you can quickly design powerful applications using advanced logic and rules to eliminate manual work. Nintex RPA drives speed by automating those mundane, repetitive tasks. Since many processes involve the need to generate a document we have a DocGen offering to automatically create documents from both unstructured and structured data sources. With Nintex Sign powered by Adobe Sign you can easily integrate eSign into your signature-based workflows for total automation.
Once you have been managing and automating processes, imagine the amount of information available on how your business is operating. Leveraging Nintex Analytics you are able to get process intelligence allowing you to monitor, analyze and improve your business.
With the Nintex platform our customers and partners value our extensibility, using pre-built connecters as well as leveraging our Xtensions to build powerful bi-directional connectors to orchestrate processes across any systems in your organization.
Combining the power of Nintex with our customer success and vast partner network it is easy to see why our customers are so successful.
Microsoft Power BI is a unified self-service and enterprise business intelligence platform that combines an intuitive user experience with intelligent data visualizations to provide greater depth of data insight. Reports can be shared within Microsoft tools like Teams, SharePoint, PowerPoint, or within other productivity products.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Knowledge engineering: from people to machines and back
An Introduction to Designing Reliable Cloud Services January 2014
1. An introduction to designing
reliable cloud services
January 2014
Contents
Overview
2
Cloud service reliability versus resiliency
4
Recovery-oriented computing
5
Planning for failure
7
Designing for and responding to failure
9
Summary
13
Additional resources
14
Authors and contributors
14
Trustworthy Computing | An introduction to designing reliable cloud services
1
2. Overview
This paper describes reliability concepts and a reliability design-time process for organizations
that create, deploy, and/or consume cloud services. It explains fundamental concepts of
reliability and can help decision makers understand the factors and processes that make cloud
services more reliable. In addition, it provides architects, developers, and operations personnel
with insights into how to work together to increase the reliability of the services they design,
implement, and support.
Cloud service providers and their customers have varying degrees of responsibility, depending
on the cloud service model. The following figure shows the spectrum of responsibilities for both
providers and customers. For infrastructure as a service (IaaS) offerings, such as a virtual
machines, the provider and the customer share responsibilities. Although the customer is
responsible for ensuring that the solutions they build on the offering run in a reliable manner,
the provider is still ultimately responsible for the reliability of the infrastructure (core compute,
network, and storage) components. When customers purchase software as a service (SaaS)
offerings, such as Microsoft Office 365, cloud providers hold primary responsibility for ensuring
the reliability of the service. Platform as a service (PaaS) offerings, such as Windows Azure,
occupy the middle of this responsibility spectrum, with providers being responsible for the
infrastructure and fabric controller layers. If a customer purchases an infrastructure as a service
(IaaS) offering, such as Windows Azure, the cloud provider is largely responsible for host
management and physical security of the facility itself.
Trustworthy Computing | An introduction to designing reliable cloud services
2
3. Figure 1. Cloud customer and cloud provider responsibilities
With the emergence of cloud computing and online services, customers expect services to be
available whenever they need them—just like electricity or dial tone. This expectation requires
organizations that build and support cloud services to plan for probable failures and have
mechanisms that allow rapid recovery from such failures. Cloud services are complex and have
many dependencies, so it is important that all members of a service provider’s organization
understand their role in making the service they provide as reliable as possible.
This paper includes the following sections:
• Cloud service reliability versus resiliency
• Recovery-oriented computing
• Planning for failure
• Designing for and responding to failure
Although it is outside the scope of this paper, it is also important to understand that there are
cost tradeoffs associated with some reliability strategies that need consideration in order to
implement a service with sufficient reliability at optimal cost. Considerations could include
determining what features to include in the service and prioritizing the degree of reliability
associated with each feature.
Trustworthy Computing | An introduction to designing reliable cloud services
3
4. Cloud service reliability versus resiliency
The Institute of Electrical and Electronics Engineers (IEEE) Reliability Society states that reliability
[engineering] is “a design engineering discipline which applies scientific knowledge to assure
that a system will perform its intended function for the required duration within a given
environment, including the ability to test and support the system through its total lifecycle.”1 For
software, it defines reliability as “the probability of failure-free software operation for a specified
period of time in a specified environment.”2
If one assumes that all cloud service providers strive to deliver a reliable experience for their
customers, it is important to fully understand what comprises a reliable cloud service. In essence,
a reliable cloud service is one that functions as the designer intended, when the customer
expects it to function, and wherever the connected customer is located. However, not every
component needs to operate flawlessly 100 percent of the time.
Cloud service providers strive for reliability. Resiliency is the ability of a cloud-based service to
withstand certain types of failure and yet remain functional from the customers’ perspective. A
service could be characterized as reliable simply because no part of the service has ever failed,
and yet the service might not be considered resilient because it has not been tested.
A resilient service is one that is designed and built so that potential failures have minimal effect
on the service’s availability and functionality. In addition, despite constant and persistent
reliability threats, resilient services should remain fully functional and allow customers to
perform the tasks necessary to complete their work.
Services should be designed to:
• Minimize the impact a failure has on any given customer. For example, the service
should degrade gracefully, which means that non-critical components of the service may fail
but critical functions still work.
• Minimize the number of customers affected by a failure. For example, the service should
be designed so that faults can be isolated to a subset of customers.
• Reduce the number of minutes that a customer (or customers) cannot use the service
in its entirety. For example, the service should be able to transfer customer requests from
one data center to another if a major failure occurs.
1
2
IEEE Reliability Society, at http://rs.ieee.org
Ibid.
Trustworthy Computing | An introduction to designing reliable cloud services
4
5. Recovery-oriented computing
Traditional computing systems have been designed to avoid failure. Cloud-based systems have
an inherent issue of reliability, because of their scale and complexity. The recovery-oriented
computing (ROC) approach can help organizations frame software failure in a way that makes it
easier to design cloud services to respond to elements that are under their direct control as well
as to elements that are not.
The following three basic assumptions are associated with recovery-oriented computing:
• Devices and hardware will fail
• People make mistakes
• Software contains imperfections
Organizations that create cloud services must design them to mitigate these assumptions as
much as possible to provide reliability for their customers.
ROC research areas
ROC defines six research areas3 that can be adapted to cloud service design and implementation
recommendations. These research areas can help mitigate potential issues that are rooted in the
referenced three basic assumptions, and are explained in the following list:
• Fault zones. Organizations should partition cloud services into fault zones so failures can be
contained, which enables rapid recovery. Isolation and loose coupling of dependencies are
essential elements that contribute to fault containment and recovery capabilities. Fault
isolation mechanisms should apply to a wide range of failure scenarios, including software
imperfections and human-induced failures.
• Defense-in-depth. Organizations should use a defense-in-depth approach, which helps
ensure that a failure is contained if the first layer of protection does not isolate it. In other
words, organizations should not rely on a single protective measure but instead factor
multiple protective measures into their service design.
• Redundancy. Organizations should build redundancy into their systems to survive faults.
Redundancy enables isolation so that organizations can ensure the service continues to run,
perhaps in a degraded state, when a fault occurs and the system is in the process of being
recovered. Organizations should design fail-fast components that enable redundant systems
to detect failure quickly and isolate it during recovery.
• Diagnostic aids. Organizations should use diagnostic aids for root cause analysis of failures.
These aids must be suitable for use in non-production and production environments, and
should be able to rapidly detect the presence of failures and identify their root causes using
automated techniques.
3
Recovery-Oriented Computing Overview, at http://roc.cs.berkeley.edu/roc_overview.html
Trustworthy Computing | An introduction to designing reliable cloud services
5
6. • Automated rollback. Organizations should create systems that provide automated rollback
for most aspects of operations, from system configuration to application management to
hardware and software upgrades. This functionality does not prevent human error but can
help mitigate the impact of mistakes and make services more dependable.
• Recovery process drills. Organizations should conduct recovery process drills routinely to
test repair mechanisms, both during development and while in production mode. Testing
helps ensure that the repair mechanisms work as expected and do not compound failures in a
production environment.
Using the ROC approach can help an organization shift from strictly focusing on preventing
failures to also focusing on reducing the amount of time it takes to recover from a failure. In
other words, some degree of failure is inevitable, (that is, it cannot be avoided or prevented), so
it is important to have recovery strategies in place. Two terms can frame the shift in thinking that
is required to create more reliable cloud services: mean time to failure (MTTF) and mean time to
recover (MTTR).
MTTF is a measure of how frequently software and hardware fails, and the goal is to make the
time between failures as long as possible. It is a necessary measure and works well for packaged
software, because software publishers are able specify the computing environment in which the
software will optimally perform. However, focusing on MTTF by itself is insufficient for cloud
services, because portions of the computing environment are out of the direct control of the
provider and thus more unpredictable. It is important that cloud services are designed in such a
way that they can rapidly recover.
MTTR is the amount of time it takes to get a service running again after a failure. Shrinking
MTTR requires design and development practices that promote quicker detection and
subsequent recovery, and it also requires well-trained operations teams that are capable of
bringing components of the service back online as quickly as possible; an even better approach
would be for the system to automatically recover without human intervention. Organizations
should design cloud services so that they do not stop working, even when some components
fail; such an approach allows the service to degrade gracefully while still allowing users to
accomplish their work.
Embracing the ROC approach allows organizations to design services in ways that reduce MTTR
as much as possible and increase MTTF as much as possible.
Trustworthy Computing | An introduction to designing reliable cloud services
6
7. Planning for failure
To help reduce MTTR, organizations need to design ways for their services to continue operating
when known failure conditions occur. For example, what should the service do when another
cloud service that it depends on is not available? What should the service do when it cannot
connect to its primary database? What hardware redundancies are required and where should
they be located? Can the service detect and respond gracefully to incorrect configuration
settings, allowing rollback of the system to a “last known good” state? At what point is rollback
of a given change no longer possible, necessitating a “patch and roll forward” mitigation
strategy instead?
Organizations that create cloud services should consider the three primary causes of failure
shown in the following figure:
Figure 2. Causes of failure
Device and
infrastructure
failure
These failures range from expected, end-of-life failures to
catastrophic failures caused by natural disaster or accidents that
are out of an organization’s control.
Human
error
Administrator and configuration mistakes that are often out of an
organization’s control.
Software
imperfections
Code imperfections and software-related issues in the deployed
online service. Pre-release testing can control this to some degree.
Core design principles for reliable services
Organizations must address the following three essential reliability design principles when they
create specifications for a cloud service. These principles help to mitigate the effect of failures
when they occur:
• Design for resilience. The service must withstand component-level failures without requiring
human intervention. A service should be able to detect failures and automatically take
corrective measures so that users do not experience service interruptions. When failure does
occur, the service should degrade gracefully and provide partial functionality instead of going
completely offline. For example, a service should use fail-fast components and indicate
appropriate exceptions so that the system can automatically detect and resolve the issue.
There are also automated techniques that architects can include to predict service failure and
notify the organization about service degradation or failure.
• Design for data integrity. The service must capture, manipulate, store, or discard data in a
manner that is consistent with its intended operation. A service needs to preserve the integrity
of the information that customers have entrusted to it. For example, organizations should
Trustworthy Computing | An introduction to designing reliable cloud services
7
8. replicate customer data stores to prevent hardware failures from causing data loss, and
adequately secure data stores to prevent unauthorized access.
• Design for recoverability. When the unforeseen happens, the service must be recoverable.
As much as possible, a service or its components should recover quickly and automatically.
Teams should be able to restore a service quickly and completely if an interruption occurs. For
example, services should be designed for component redundancy and data failover so that
when failure is detected in a component, a group of servers, or an entire physical location or
data center, another component, group of servers, or physical location automatically takes
over to keep the service running.
When designing cloud services, organizations should adapt these essential principles as
minimum requirements for handling potential failures.
Trustworthy Computing | An introduction to designing reliable cloud services
8
9. Designing for and responding to failure
To build reliable cloud services, organizations should design for failure—that is, specify how a
service will respond gracefully when it encounters a failure condition. The process that is
illustrated in the following figure is intended for organizations that create SaaS solutions, and is
designed to help them identify and mitigate possible failures. However, organizations that
purchase cloud services can also use this process to develop an understanding of how the
services function and help them formulate questions to ask before entering into a service
agreement with a cloud provider.
Figure 3. An overview of the design process
Create initial service design
Failure mode & effects analysis
Design coping strategies
Use fault injection
Capture unexpected faults
Monitor the live site
Designing a service for reliability and implementing recovery mechanisms based on recoveryoriented principles is an iterative process. Design iterations are fluid and take into account both
information garnered from pre-release testing and data about how the service performs after it
is deployed.
Failure mode and effects analysis
Failure mode and effects analysis (FMEA) is a key step in the design process for any online
service. Identifying the important interaction points and dependencies of a service enables the
engineering team to pinpoint changes that are required to ensure the service can be monitored
effectively for rapid detection of issues. This approach enables the engineering team to develop
ways for the service to withstand, or mitigate, faults. FMEA also helps the engineering teams
identify suitable test cases to validate whether the service is able to cope with faults, in test
environments as well as in production (otherwise known as fault injection).
Trustworthy Computing | An introduction to designing reliable cloud services
9
10. As part of FMEA, organizations should create a component inventory of all components that the
service uses, whether they are user interface (UI) components hosted on a web server, a
database hosted in a remote data center, or an external service that the service depends on. The
team can then capture possible faults in a spreadsheet or other document and incorporate
relevant information into design specifications.
The following example questions are the types of questions that an online service design team
should consider. In addition, teams should consider whether they have capacity to detect
failures, to analyze the root cause of the failure, and to recover the service.
• What external services will the service be dependent on?
• What data sources will the service be dependent on?
• What configuration settings will the service require to operate properly?
• What hardware dependencies does the service have?
• What are the relevant customer scenarios that should be modeled?
To fully analyze how the service will use its components, the team can create a matrix that
captures which components are accessed for each customer scenario. For example, an online
video service might contain scenarios for logging in, for browsing an inventory of available
videos, selecting a video and viewing it, and then rating the video after viewing. Although these
scenarios share common information and components, each is a separate customer usage
scenario, and each accesses components that are independent from the other scenarios. The
matrix should identify each of these usage scenarios and contain a list of all required
components for each scenario.
Using a matrix also allows the service design team to create a map of possible failure points at
each component interaction point, and define a fault-handling mechanism for each.
For more information on how Microsoft implements failure mode and effects analysis, read the
‘Resilience by design for cloud services’ whitepaper.
Designing and implementing coping strategies
Fault-handling mechanisms are also called coping strategies. In the design stage, architects
define what the coping strategies will be so that the software will do something reasonable
when a failure occurs. They should also define the types of instrumentation that engineers
should include in the service specification to enable monitors that can detect when a particular
type of failure occurs.
Designing coping strategies to do something reasonable depends on the functionality that the
service provides and the type of failure the coping strategy addresses. The key is to ensure that
when a component fails, it fails quickly and, if required, the service switches to a redundant
component. In other words, the service degrades gracefully but does not fail completely.
Trustworthy Computing | An introduction to designing reliable cloud services
10
11. For example, the architects of a car purchasing service design their application to include ratings
for specific makes and models of each car model type. They design the purchasing service with a
dependency on another service that provides comparative ratings of the models. If the rating
service fails or is unavailable, the coping strategy might mean the purchasing service displays a
list of models without the associated ratings rather than not displaying a list at all. In other
words, when a particular failure happens the service should produce a reasonable result,
regardless of the failure. The result may not be optimal, but it should be reasonable from the
customer’s perspective. For a car purchasing service, it is reasonable to still produce a list of
models with standard features, optional features, and pricing without any rating data instead of
an error message or a blank page; the information is not optimal, but it might be useful to the
customer. It is best to think in terms of “reasonable, but not necessarily optimal” when deciding
what the response to a failure condition should be.
When designing and implementing instrumentation, it is important to monitor at the
component level as well as from the user’s perspective. This approach can allow the service team
to identify a trend in component-level performance before it becomes an incident that affects
users. The data that this kind of monitoring can produce enables organizations to gain insight
into how to improve the service’s reliability for later releases.
Monitoring the live site
Accurate monitoring information can be used by teams to improve services in several ways. For
example, it can provide teams with information to troubleshoot known problems or potential
problems in a service. It can also provide organizations with insights into how their services
perform when handling live workloads. In addition, it can also be fed directly into servicealerting mechanisms to reduce the time to detect problems and therefore reduce MTTR.
Simulated workloads in test environments rarely capture the range of possible failures and faults
that live site workloads generate. Organizations can identify trends before they become failures
by carefully analyzing live site telemetry data and establishing thresholds, both upper and lower
ranges, that represent normal operating conditions. If the telemetry being collected in near real
time approaches either the upper or the lower threshold, an alarm can be triggered that
prompts the operations team to immediately triage the service and potentially prevent a failure.
They can also analyze failure and fault data that instrumentation and monitoring tools capture in
the production environment to better understand how the service operates and to determine
what monitoring improvements and new coping strategies they require.
Using fault injection
Fault injection can be viewed as using software that is designed to break other software. For
teams that design and deploy cloud services, it is software designed and written by the team to
cripple the service in a deliberate and programmatic way. Fault injection is often used with stress
testing and is widely considered an important part of developing robust software.
Trustworthy Computing | An introduction to designing reliable cloud services
11
12. When using fault injection on a service that is already deployed, organizations target locations
where coping strategies have been put in place so they can validate those strategies. In addition,
cloud providers can discover unexpected results that are generated by the service and that can
be used to appropriately harden the production environment.
Fault injection and recovery drills can provide valuable information, such as whether the service
functions as expected or whether unexpected faults occur under load. A service provider can use
this information to design new coping strategies to implement in future updates to the service.
Trustworthy Computing | An introduction to designing reliable cloud services
12
13. Summary
To design and implement a reliable cloud service requires organizations to assess how they
regard failure. Historically, reliability has been equated with preventing failure—that is,
delivering a tangible object free of faults or imperfections. Cloud services are complex and have
dependencies, so they become more reliable when they are designed to quickly recover from
unavoidable failures, particularly those that are out of an organization's control.
The processes that architects and engineers use to design cloud services can also affect the
reliability of a service. It is critical for service design to incorporate monitoring data from live
sites, especially when identifying the faults and failures that are addressed through coping
strategies that are tailored to a particular service. Organizations should also consider conducting
fault injection tests and recovery drills in their production environments. Doing so generates
data they can use to improve service reliability and that will help prepare organizations to
handle failures when they actually occur.
Trustworthy Computing | An introduction to designing reliable cloud services
13