When you have a microservices architectural style, much of the communication between components is done over the network. In order to achieve what microservices promise, this communication must happen in a loosely coupled manner. In this session, we discuss some fundamental application integration patterns mostly based on messaging, and we connect them to real-world use cases in a microservices scenario. We also highlight the benefits that asynchronous messaging can have over REST APIs for communication between microservices.
Serverless SecOps Automation on AWS at AWS UG Krakow, PolandDennis Traub
This is the slide deck of my presentation "Serverless SecOps Automation on AWS - How to automatically detect and handle security events in the cloud", that I presented at AWS UG Krakow, Poland, on Nov 26, 2020
Serverless Security Automation on AWS - Hamburg AWS User GroupDennis Traub
Presented at Hamburg AWS User Group, June 6th, 2019.
IT is inherently insecure and moving to the cloud could expose your workload to all new kinds of potential risks. However, AWS provides you with a large set of integrated tools to be just as secure as your on-premises solution.
In this talk, you will learn how to combine these built-in tools with serverless technologies to monitor your environment and automatically detect, contain, and remediate security risks on AWS.
AWS PrivateLink enables you to securely access services hosted on AWS. Come to this session and learn the fundamentals of AWS PrivateLink, including VPC design, VPC endpoint, Network Load Balancer, and more. Discover the benefits and use cases for connecting your VPC with services based on AWS over AWS PrivateLink, and hear about the AWS services that are related to AWS PrivateLink, including AWS Direct Connect, Amazon Route 53, and others. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision makers who want to understand how to connect their Amazon VPCs to SaaS services in a secure and scalable manner.
This document provides an overview of AWS security essentials. It discusses AWS security models and compliance programs, as well as security technologies and services like IAM, VPCs, security groups, firewalls, encryption, and logging. The shared responsibility model is explained for different AWS service categories.
In this session, we will explore common use cases for (server based or generally load balanced) workloads in AWS and how they compare with the on-prem deployment patterns. you will learn the architectural patterns and line of thinking for deploying security perimeters and segmentation across a multiple account/vpc strategy, Edge security. also, you how you can make sure the pattern you develop will be applied uniformly across your current and future environments.
Join us for this hands-on workshop where you will learn about a number of AWS services you can use to identify and respond to threats in your AWS environments. Learn about the capabilities of Amazon GuardDuty, Amazon Macie, Amazon Inspector, and AWS Security Hub as you walk through real-world threat scenarios. For each scenario, we will review methods to detect and respond to threats both manually and automated using services like Amazon CloudWatch Events and AWS Lambda.
AWS Business Essentials helps IT business leaders and professionals understand the benefits of cloud computing and how a cloud strategy can help you meet your business objectives. In this course we discuss the advantages of cloud computing for your business and the fundamentals of AWS, including financial benefits. This course also introduces you to successful cloud adoption frameworks so to help you consider the AWS platform within your cloud computing strategy. We have broken this training into 3 parts during the event, in order to complete the training please plan to attend all 3 sessions.
Serverless SecOps Automation on AWS at AWS UG Krakow, PolandDennis Traub
This is the slide deck of my presentation "Serverless SecOps Automation on AWS - How to automatically detect and handle security events in the cloud", that I presented at AWS UG Krakow, Poland, on Nov 26, 2020
Serverless Security Automation on AWS - Hamburg AWS User GroupDennis Traub
Presented at Hamburg AWS User Group, June 6th, 2019.
IT is inherently insecure and moving to the cloud could expose your workload to all new kinds of potential risks. However, AWS provides you with a large set of integrated tools to be just as secure as your on-premises solution.
In this talk, you will learn how to combine these built-in tools with serverless technologies to monitor your environment and automatically detect, contain, and remediate security risks on AWS.
AWS PrivateLink enables you to securely access services hosted on AWS. Come to this session and learn the fundamentals of AWS PrivateLink, including VPC design, VPC endpoint, Network Load Balancer, and more. Discover the benefits and use cases for connecting your VPC with services based on AWS over AWS PrivateLink, and hear about the AWS services that are related to AWS PrivateLink, including AWS Direct Connect, Amazon Route 53, and others. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision makers who want to understand how to connect their Amazon VPCs to SaaS services in a secure and scalable manner.
This document provides an overview of AWS security essentials. It discusses AWS security models and compliance programs, as well as security technologies and services like IAM, VPCs, security groups, firewalls, encryption, and logging. The shared responsibility model is explained for different AWS service categories.
In this session, we will explore common use cases for (server based or generally load balanced) workloads in AWS and how they compare with the on-prem deployment patterns. you will learn the architectural patterns and line of thinking for deploying security perimeters and segmentation across a multiple account/vpc strategy, Edge security. also, you how you can make sure the pattern you develop will be applied uniformly across your current and future environments.
Join us for this hands-on workshop where you will learn about a number of AWS services you can use to identify and respond to threats in your AWS environments. Learn about the capabilities of Amazon GuardDuty, Amazon Macie, Amazon Inspector, and AWS Security Hub as you walk through real-world threat scenarios. For each scenario, we will review methods to detect and respond to threats both manually and automated using services like Amazon CloudWatch Events and AWS Lambda.
AWS Business Essentials helps IT business leaders and professionals understand the benefits of cloud computing and how a cloud strategy can help you meet your business objectives. In this course we discuss the advantages of cloud computing for your business and the fundamentals of AWS, including financial benefits. This course also introduces you to successful cloud adoption frameworks so to help you consider the AWS platform within your cloud computing strategy. We have broken this training into 3 parts during the event, in order to complete the training please plan to attend all 3 sessions.
If you Searching for best classroom training centers for Amazon Web Service (AWS) in Mumbai and Pune? . Technogeeks is for you .TECHNOGEEKS” AWS Syllabus is designed by industry veterans. Get Demo class contact https://qr.ae/TWv2M6
This document provides an overview of security aspects of AWS Lambda. It discusses how Lambda allows customers to run code without managing servers, scales continuously based on demand, meters usage at millisecond granularity, enables innovation by focusing on business logic over infrastructure, and integrates with a rich ecosystem of AWS services. It also covers Lambda's shared responsibility model, function isolation technologies, monitoring and auditing options, and best practices for architecting and operating Lambda functions securely and for compliance purposes.
This session will help you to get basic understanding of the AWS platform and discuss the core services of Infrastructure, compute, network and storage components. In addition, we will discuss the higher level managed services that will allow you to focus on your core business and leave the heavy lifting to AWS.
This document provides an overview of an AWS Cloud School training on Amazon Web Services (AWS). It includes an agenda that outlines five modules covering topics like AWS storage, compute and networking, managed services and databases, and deployment and management. Each module is designed to describe fundamental AWS services and help attendees learn how to use AWS technologies. The document also provides copyright information and contact details for questions.
AWS Security, IAM, Databases, Elasticity, Management Tools - AWSome Day Phila...Amazon Web Services
Part 3 of 3.
This free, one-day training will provide a step-by-step introduction to the core AWS services for compute, storage, database, and networking.
AWS technical experts will explain key features and use cases, share best practices, walk through technical demos, and be available to answer your questions one-on-one.
Who should attend?
AWSome Day is ideal for IT managers, system engineers, system administrators, and architects who are eager to learn more about cloud computing and how to get started on the AWS Cloud.
1) The document provides 9 security best practices for using AWS, including understanding AWS's shared responsibility model where customers manage security of the operating systems and applications while AWS manages security of the cloud infrastructure.
2) It recommends designing an information security management system (ISMS) to protect assets on AWS and managing AWS accounts, users, groups, and roles using least privilege.
3) The document also discusses securing infrastructure using AWS features like VPC, monitoring systems using CloudWatch Logs, and recording API calls using CloudTrail.
Datensicherheit mit AWS - AWS Security Web DayAWS Germany
This document provides an overview of security on AWS. It discusses AWS regions and availability zones, the shared responsibility model for security between AWS and customers, and security features available on AWS like network security, access control, monitoring and logging, encryption, IAM, and securing data at rest. It also provides best practices for IAM configuration and using features like roles, MFA, and monitoring for security events.
AWS Auto Scaling allows automatically scaling Amazon EC2 capacity up or down according to conditions defined through CloudWatch alarms and scheduled actions. Auto Scaling groups contain a minimum and maximum number of EC2 instances and will dynamically add or remove instances to match the desired capacity based on performance metrics and alarms. This helps ensure there is sufficient application capacity available to handle changes in usage while optimizing costs.
Learning Objectives:
- Understand Amazon RDS for SQL Server capabilities
- Review various migration methods for SQL server into AWS
- Learn how to configure AWS DMS and SCT in migrating databases to AWS
* 발표 동영상: https://youtu.be/IF41bhP5P5w
컨테이너, 서버리스, 마이크로서비스 아키텍처 등 다양한 애플리케이션 현대화를 위한 기술이 쏟아져 나오고 있습니다. 본 세션에는 클라우드 기반의 앱 현대화를 고려하고 계신 분들이 먼저 고려해야 할 5가지 사항과 이를 위한 해법을 소개합니다. 2012년 부터 오랜 기간 클라우드 기반 서비스 개발 및 현대화를 진행해온 삼성전자의 갤럭시 서비스에서 어떻게 컨테이너와 마이크로서비스 기반 아키텍처 경험을 대담과 함께 알아봅니다.
There are four common challenges that CISOs and their security teams struggle with, even in the most secure and mature organizational datacenters – visibility, resilience, defense-in-depth, and automation. Learn how these challenges become benefits of using the AWS Cloud and why Cybersecurity is becoming a driving force behind commercial cloud adoption. This is an executive level presentation that covers key technical concepts and capabilities to meet business security and compliance objectives. Intended audience includes CIOs, CISOs, Technical Managers, senior architects and engineers new to AWS, and Technically-savvy Business Managers.
This document provides an overview and agenda for an AWSome Day training on Amazon Web Services (AWS). It consists of 5 modules that cover: 1) AWS Introduction, 2) Storage, 3) Compute and Networking, 4) Managed Services and Databases, and 5) Deployment and Management. The training will provide an introduction to AWS services and components, how to navigate the management console, security measures, and deploying resources on AWS.
Learning Objectives:
- Learn how to enable users to access their AWS accounts and business applications using their corporate credentials
- Learn how to manage SSO access to all of your AWS accounts managed in AWS Organizations
- Learn how to centrally manage user permissions to AWS resources when they access the AWS Management Console using AWS SSO
1) Enterprises are increasingly adopting cloud technologies like AWS to gain agility, reduce costs, and extend their datacenters.
2) Many enterprises are deploying enterprise applications from vendors like Microsoft, Oracle, SAP, and IBM on AWS to take advantage of the flexibility of the cloud.
3) Agility and reduced costs have become the main drivers for enterprise adoption of cloud technologies today.
AWS Certified Solutions Architect Professional Course S6-S9Neal Davis
This deck contains the slides from our AWS Certified Solutions Architect Professional video course. It covers:
Section 6 Hybrid Connectivity
Section 7 Compute, Auto Scaling, and Load Balancing
Section 8 AWS Storage Services
Section 9 DNS, Caching, and Performance Optimization
Full course can be found here: https://digitalcloud.training/courses/aws-certified-solutions-architect-professional-video-course/
Authorised Training Partner AWS
Architecting on AWS
Advanced Architecting on AWS
Developing on AWS
Dev ops Engineering on AWS
System operations on AWS
Big data on AWS
Security operations on AWS
AWS technical Essentials
Presentación completa expuesta durante el training de CAPSiDE y Amazon Web Services durante el AWSome Day (formerly CloudSchool) de Barcelona del 26/2/2015
Link del evento:
http://www.eventbrite.co.uk/e/registro-awsome-day-barcelona-feb-26-2015-15616576601?aff=capside
Ponentes:
http://twitter.com/capside
http://twitter.com/pplu_io
http://twitter.com/sysvalve
Cursos Oficiales AWS de CAPSiDE:
https://capside.com/tech-training/cursos/
This document provides guidance for introverted attendees of AWS re:Invent. It discusses how introverts may prefer lower stimulation environments compared to extroverts. It then offers tips for introverted attendees to focus on topics of interest, allow time for learning and recharging, but also to connect with others. Specific session recommendations are provided. Attendees are encouraged to find ways to socialize without feeling overwhelmed, such as joining others for meals and asking questions. The document emphasizes the value of networking at the event and joining local AWS user groups.
This session shows how you can use AWS Lambda with Amazon CloudWatch to capture, monitor, analyse and run custom code on live actions and events across your entire AWS infrastructure. View webinar on demand here: https://www.brighttalk.com/webcast/9019/195165
The document discusses serverless computing on AWS and several serverless integration services, including Amazon Simple Queue Service (SQS), Amazon Simple Notification Service (SNS), and Amazon API Gateway. SQS offers standard and FIFO message queues to decouple microservices. SNS provides asynchronous messaging between publishers and subscribers. API Gateway allows creating, publishing, and securing REST and HTTP APIs at scale. Demos and references are also included.
If you Searching for best classroom training centers for Amazon Web Service (AWS) in Mumbai and Pune? . Technogeeks is for you .TECHNOGEEKS” AWS Syllabus is designed by industry veterans. Get Demo class contact https://qr.ae/TWv2M6
This document provides an overview of security aspects of AWS Lambda. It discusses how Lambda allows customers to run code without managing servers, scales continuously based on demand, meters usage at millisecond granularity, enables innovation by focusing on business logic over infrastructure, and integrates with a rich ecosystem of AWS services. It also covers Lambda's shared responsibility model, function isolation technologies, monitoring and auditing options, and best practices for architecting and operating Lambda functions securely and for compliance purposes.
This session will help you to get basic understanding of the AWS platform and discuss the core services of Infrastructure, compute, network and storage components. In addition, we will discuss the higher level managed services that will allow you to focus on your core business and leave the heavy lifting to AWS.
This document provides an overview of an AWS Cloud School training on Amazon Web Services (AWS). It includes an agenda that outlines five modules covering topics like AWS storage, compute and networking, managed services and databases, and deployment and management. Each module is designed to describe fundamental AWS services and help attendees learn how to use AWS technologies. The document also provides copyright information and contact details for questions.
AWS Security, IAM, Databases, Elasticity, Management Tools - AWSome Day Phila...Amazon Web Services
Part 3 of 3.
This free, one-day training will provide a step-by-step introduction to the core AWS services for compute, storage, database, and networking.
AWS technical experts will explain key features and use cases, share best practices, walk through technical demos, and be available to answer your questions one-on-one.
Who should attend?
AWSome Day is ideal for IT managers, system engineers, system administrators, and architects who are eager to learn more about cloud computing and how to get started on the AWS Cloud.
1) The document provides 9 security best practices for using AWS, including understanding AWS's shared responsibility model where customers manage security of the operating systems and applications while AWS manages security of the cloud infrastructure.
2) It recommends designing an information security management system (ISMS) to protect assets on AWS and managing AWS accounts, users, groups, and roles using least privilege.
3) The document also discusses securing infrastructure using AWS features like VPC, monitoring systems using CloudWatch Logs, and recording API calls using CloudTrail.
Datensicherheit mit AWS - AWS Security Web DayAWS Germany
This document provides an overview of security on AWS. It discusses AWS regions and availability zones, the shared responsibility model for security between AWS and customers, and security features available on AWS like network security, access control, monitoring and logging, encryption, IAM, and securing data at rest. It also provides best practices for IAM configuration and using features like roles, MFA, and monitoring for security events.
AWS Auto Scaling allows automatically scaling Amazon EC2 capacity up or down according to conditions defined through CloudWatch alarms and scheduled actions. Auto Scaling groups contain a minimum and maximum number of EC2 instances and will dynamically add or remove instances to match the desired capacity based on performance metrics and alarms. This helps ensure there is sufficient application capacity available to handle changes in usage while optimizing costs.
Learning Objectives:
- Understand Amazon RDS for SQL Server capabilities
- Review various migration methods for SQL server into AWS
- Learn how to configure AWS DMS and SCT in migrating databases to AWS
* 발표 동영상: https://youtu.be/IF41bhP5P5w
컨테이너, 서버리스, 마이크로서비스 아키텍처 등 다양한 애플리케이션 현대화를 위한 기술이 쏟아져 나오고 있습니다. 본 세션에는 클라우드 기반의 앱 현대화를 고려하고 계신 분들이 먼저 고려해야 할 5가지 사항과 이를 위한 해법을 소개합니다. 2012년 부터 오랜 기간 클라우드 기반 서비스 개발 및 현대화를 진행해온 삼성전자의 갤럭시 서비스에서 어떻게 컨테이너와 마이크로서비스 기반 아키텍처 경험을 대담과 함께 알아봅니다.
There are four common challenges that CISOs and their security teams struggle with, even in the most secure and mature organizational datacenters – visibility, resilience, defense-in-depth, and automation. Learn how these challenges become benefits of using the AWS Cloud and why Cybersecurity is becoming a driving force behind commercial cloud adoption. This is an executive level presentation that covers key technical concepts and capabilities to meet business security and compliance objectives. Intended audience includes CIOs, CISOs, Technical Managers, senior architects and engineers new to AWS, and Technically-savvy Business Managers.
This document provides an overview and agenda for an AWSome Day training on Amazon Web Services (AWS). It consists of 5 modules that cover: 1) AWS Introduction, 2) Storage, 3) Compute and Networking, 4) Managed Services and Databases, and 5) Deployment and Management. The training will provide an introduction to AWS services and components, how to navigate the management console, security measures, and deploying resources on AWS.
Learning Objectives:
- Learn how to enable users to access their AWS accounts and business applications using their corporate credentials
- Learn how to manage SSO access to all of your AWS accounts managed in AWS Organizations
- Learn how to centrally manage user permissions to AWS resources when they access the AWS Management Console using AWS SSO
1) Enterprises are increasingly adopting cloud technologies like AWS to gain agility, reduce costs, and extend their datacenters.
2) Many enterprises are deploying enterprise applications from vendors like Microsoft, Oracle, SAP, and IBM on AWS to take advantage of the flexibility of the cloud.
3) Agility and reduced costs have become the main drivers for enterprise adoption of cloud technologies today.
AWS Certified Solutions Architect Professional Course S6-S9Neal Davis
This deck contains the slides from our AWS Certified Solutions Architect Professional video course. It covers:
Section 6 Hybrid Connectivity
Section 7 Compute, Auto Scaling, and Load Balancing
Section 8 AWS Storage Services
Section 9 DNS, Caching, and Performance Optimization
Full course can be found here: https://digitalcloud.training/courses/aws-certified-solutions-architect-professional-video-course/
Authorised Training Partner AWS
Architecting on AWS
Advanced Architecting on AWS
Developing on AWS
Dev ops Engineering on AWS
System operations on AWS
Big data on AWS
Security operations on AWS
AWS technical Essentials
Presentación completa expuesta durante el training de CAPSiDE y Amazon Web Services durante el AWSome Day (formerly CloudSchool) de Barcelona del 26/2/2015
Link del evento:
http://www.eventbrite.co.uk/e/registro-awsome-day-barcelona-feb-26-2015-15616576601?aff=capside
Ponentes:
http://twitter.com/capside
http://twitter.com/pplu_io
http://twitter.com/sysvalve
Cursos Oficiales AWS de CAPSiDE:
https://capside.com/tech-training/cursos/
This document provides guidance for introverted attendees of AWS re:Invent. It discusses how introverts may prefer lower stimulation environments compared to extroverts. It then offers tips for introverted attendees to focus on topics of interest, allow time for learning and recharging, but also to connect with others. Specific session recommendations are provided. Attendees are encouraged to find ways to socialize without feeling overwhelmed, such as joining others for meals and asking questions. The document emphasizes the value of networking at the event and joining local AWS user groups.
This session shows how you can use AWS Lambda with Amazon CloudWatch to capture, monitor, analyse and run custom code on live actions and events across your entire AWS infrastructure. View webinar on demand here: https://www.brighttalk.com/webcast/9019/195165
The document discusses serverless computing on AWS and several serverless integration services, including Amazon Simple Queue Service (SQS), Amazon Simple Notification Service (SNS), and Amazon API Gateway. SQS offers standard and FIFO message queues to decouple microservices. SNS provides asynchronous messaging between publishers and subscribers. API Gateway allows creating, publishing, and securing REST and HTTP APIs at scale. Demos and references are also included.
Content Delivery: accelerare in modo sicuro e flessibile siti web e applicazioniAmazon Web Services
This document discusses using Amazon CloudFront, Lambda@Edge, AWS Shield, and AWS WAF to provide flexible, secure content delivery. It describes how Amazon CloudFront's global network of edge locations can improve performance and availability. Lambda@Edge allows running code at edge locations to customize content for users. AWS Shield provides DDoS protection, and AWS WAF provides web application firewall capabilities to filter malicious traffic and protect applications.
An overview of the Brokered Messaging feature on the Windows Azure Platform. Brokered Messaging supports Queues, Topics and Subscriptions providing message-based sollutions for load balancing, load leveling and pub/sub scenarios.
AWS September Webinar Series - Infrastructure Deployment and Monitoring with ...Amazon Web Services
Monitoring AWS resources and automating infrastructure deployments in real time can become difficult as your business scales.
Learn how you can use AWS Lambda with Amazon CloudWatch to capture, monitor, analyze, and run custom code on live actions and events across your entire AWS infrastructure. You can add intelligence to your alarms, queues, and workflows by creating Lambda functions to respond to Amazon SNS topics and Amazon SWF jobs. You can automate infrastructure deployment and logging, and create alarms for custom health checks, all in real time with only a few lines of code.
Learning Objectives:
Understand the basics of AWS Lambda
How to use AWS Lambda to run code in response to events across your infrastructure
How to automate infrastructure deployment and logging
Who Should Attend:
Developers, system admins
Message-Driven Architecture is the foundation for building reactive microservices (responsive, resilient, elastic).
See why in this presentation and how to do it on AWS.
(ARC342) Designing & Building An End-To-End Email Solution Using AWSAmazon Web Services
Email continues to be a critical medium for communications between businesses and customers and remains an important channel for building automation around sending and receiving messages. Email automation enables use cases like updating a ticketing system or a forum via email, logging and auditing an email conversation, subscribing and unsubscribing from email lists via email, transferring small files via email, and updating email contents before delivery. This session implements and presents live code that covers a use case supported by Amazon.com's seller business: how to protect your customers' privacy by anonymizing email for third-party business-to-business communication on your platform. With Amazon SES and the help of Amazon S3, AWS Lambda, and Amazon DynamoDB, we cover architecture, walk through code as we build an application live, and present a demonstration of the final implementation.
AWS re:Invent 2016: How Netflix Achieves Email Delivery at Global Scale with ...Amazon Web Services
Companies around the world are using Amazon Simple Email Service (Amazon SES) to send millions of emails to their customers every day, and scaling linearly, at cost. In this session, you learn how to use the scalable and reliable infrastructure of Amazon SES. In addition, Netflix talks about their advanced Messaging program, their challenges, how SES helped them with their goals, and how they architected their solution for global scale and deliverability.
A peek into the middle of the enterprise software architecture stack.
A curtain raiser into the middleware of the software technology stack. Showcases Types of middleware, configuration possibilities, high level components, features, messaging models, deployment,
The document discusses security best practices when using AWS. It recommends using AWS services like IAM for identity and access management, enabling encryption, monitoring with services like GuardDuty and CloudTrail, and designing infrastructure as code for scalability and automation. The AWS shared responsibility model means customers are responsible for security within AWS resources, while AWS is responsible for the underlying cloud infrastructure.
This document provides an overview of implementing messaging security in Exchange Server 2010. It covers deploying Edge Transport servers, antivirus solutions, anti-spam filtering, and secure SMTP messaging. The key topics discussed include the role of Edge Transport servers, infrastructure requirements, Edge synchronization, configuring Forefront Protection 2010 for antivirus scanning, sender ID, sender reputation and content-based spam filtering, and securing SMTP traffic using TLS and domain security. Demonstrations are provided for configuring these various security components.
The document discusses best practices for building DDoS resilient services using AWS technologies. It provides an overview of common DDoS attack types and threats. It then details several AWS services that can be used to detect and mitigate DDoS attacks, including Amazon CloudFront, Route 53, WAF, VPC, and EC2. It also discusses AWS' global network and how traffic is routed to improve resilience against large DDoS attacks.
Zombie Apocalypse Workshop by Warren Santer and Kyle Somers, Solutions Archit...Amazon Web Services
The document provides an overview of a workshop on building serverless microservices using AWS Lambda. The workshop will introduce AWS Lambda, Amazon API Gateway, Amazon DynamoDB, and Amazon Cognito. Attendees will work in teams to build a secure, scalable chat service for zombie apocalypse survivors using these AWS serverless technologies. The workshop includes breakout sessions where attendees will add features like typing indicators, SMS integration with Twilio, messaging search with Elasticsearch, integration with Slack, and zombie sensor data integration with Intel Edison.
AWS re:Invent 2016: Migrating Enterprise Messaging to the Cloud (ENT217)Amazon Web Services
Enterprises rely on messaging to integrate services and applications and to exchange information critical to running their business. However, managing and operating dedicated message-oriented middleware and underlying infrastructure creates costly overhead and can compromise reliability. In this session, enterprise architects and developers learn how to improve scalability, availability, and operational efficiency by migrating on-premises messaging middleware to a managed cloud service using Amazon SQS. Hear how Capital One is using SQS to migrate several core banking applications to the cloud to ensure high availability and cost efficiency. We also share some exciting new SQS features that allow even more workloads to take advantage of the cloud.
Amazon Web Services provides multiple messaging options that you can use to create scalable, distributed systems, implement event sourcing to unlock hidden context and utilise CQRS for efficient data access. In this session we will look at various messaging patterns and discuss techniques and use cases for Amazon SQS, Amazon SNS, Amazon Kinesis, Amazon DynamoDB and Amazon Web Services IoT in your application.
Speaker: Stephen Liedig, Solutions Architect, Amazon Web Services
Best Practices for Deploying Microsoft Workloads on AWSZlatan Dzinic
This document provides best practices for deploying Microsoft workloads on AWS. It discusses identity management best practices including AWS IAM, server identity management, and federation. It also covers deploying SQL Server for high availability and disaster recovery. Additional sections discuss deploying Exchange, SharePoint, and other Microsoft server products on AWS, as well as developer best practices and DevOps automation. The document concludes with information on licensing options for Microsoft software on AWS.
Micro on NATS - Microservices with MessagingApcera
Micro is a toolkit for building microservice applications. It includes tools like Go Micro for building microservices and API for an API gateway. Micro integrates with NATS for service registration, synchronous RPC, and asynchronous messaging between services. NATS is chosen because it is lightweight, high performance, and simple to use from Go. The Micro-NATS integration implements the registry, transport, and broker interfaces to provide service discovery, request-response communication, and publish-subscribe messaging using NATS. This allows Micro services to leverage the scalability and reliability of NATS for building distributed systems.
This document discusses Amazon Web Services (AWS) Internet of Things (IoT). It describes key AWS IoT services like the message broker, rules engine, device shadows, and registry. The message broker securely connects devices to AWS using protocols like MQTT. The rules engine routes messages between devices and AWS services. Device shadows store device state information. The registry stores device identity and attribute information. AWS IoT aims to simplify and accelerate IoT development by connecting devices to AWS services and providing security and management features.
This document summarizes Harry Lin's presentation about securing critical workloads on AWS. The 3 main points are:
1) AWS provides security features at multiple layers including encryption, identity and access management, and auditing. Customers are responsible for security within their applications while AWS handles security of the cloud platform.
2) AWS services like CloudTrail, Config, and WAF can help customers with security monitoring, auditing changes, and blocking attacks.
3) A case study of an e-commerce company MyDress showed how moving to AWS improved availability during promotions and attacks while reducing costs compared to an on-premise infrastructure.
Similar to Application Integration Patterns (not only) for Microservices (20)
Cloud ist keine Strategie - Keynote des AWS Cloud Day, SolingenDennis Traub
Der Schritt in die Cloud ist für sich alleine noch keine Strategie. Vielmehr müssen Unternehmen die Cloud als mächtiges Werkzeug begreifen, das bei wohlüberlegtem Einsatz dabei helfen kann, schnell und kostengünstig mit neuen Geschäftsideen zu experimentieren.
Mit klugen Ideen und einer kleinen Portion Mut wagen immer mehr deutsche Unternehmen über alle Branchen hinweg den gefürchteten Umstieg in die digitale Welt und sind auf dem besten Weg, sich profitable und zukunftsfähige Geschäftsfelder zu erschließen.
Mit dem richtigen Vorgehensmodell und dem Ansatz “Einfach mal machen” kann jedes Unternehmen erstaunliche Dinge vollbringen.
Cloud ist keine Strategie - AWS Tech Community Summit Cologne, 2017Dennis Traub
Der Schritt in die Cloud ist für sich alleine noch keine Strategie. Vielmehr müssen Unternehmen die Cloud als mächtiges Werkzeug begreifen, das bei wohlüberlegtem Einsatz dabei helfen kann, schnell und kostengünstig mit neuen Geschäftsideen zu experimentieren.
Mit klugen Ideen und einer kleinen Portion Mut wagen immer mehr deutsche Unternehmen über alle Branchen hinweg den gefürchteten Umstieg in die digitale Welt und sind auf dem besten Weg, sich profitable und zukunftsfähige Geschäftsfelder zu erschließen. Mit dem richtigen Vorgehensmodell und dem Ansatz “Einfach mal machen” kann jedes Unternehmen erstaunliche Dinge vollbringen.
Taming the Monolith - Microservices Meetup HamburgDennis Traub
Taming the Monolith - Are Microservices just an Implementation Detail?
The slides of my presentation at the Microservices Meetup Hamburg on July 13th, 2015, hosted by Adobe Systems Engineering GmbH.
Event details: http://www.meetup.com/de/Microservices-Meetup-Hamburg/events/220839035/
These are the slides of my talk on June 22nd 2015 at the GOTO Night in Cologne
https://secure.trifork.com/berlin-2015/freeevent/index.jsp?eventOID=7123
Domain-Driven Design changed the way we reason about large software systems. Modern practices, tools and technologies like continuous delivery, NoSQL, and cloud-based virtualization allow the creation of fine-grained systems to solve the specific problems at hand.
Having DDD in mind and technical expertise at our hands, with microservice architectures we can build complex systems that reflect our businesses' complex realities and are easy to change at the same time. This talk will show what DDD and microservice architectures have in common and how you can use both to create software systems that fit your domain.
DDD / Microservices @ Trivento Spring Camp, Utrecht, 2015Dennis Traub
This document discusses how microservices and domain-driven design can work together. It provides three key rules: 1) Model useful abstractions, not reality. 2) Don't build models for everyone, build context-specific models. 3) Don't design monolithic architectures, design individual services. Microservices are high cohesion, loosely coupled services that represent business capabilities with their own models, persistence, technology stacks, deployability and scalability. They allow individual failure without bringing down the whole system.
Strategic Appplication Development with Domain-Driven Design (DDD)Dennis Traub
This document summarizes a presentation by Dennis Traub on Domain-Driven Design (DDD). It discusses key DDD concepts like the ubiquitous language, bounded contexts, subdomains and core domains. It provides an example of applying these concepts to an ambulance flight management system. It also discusses architectural approaches to applying DDD like separating domains, applications services and interfaces. The presentation emphasizes that DDD is about modeling the business domain and separating concerns, not about diagrams or class modeling. It is about applying object-oriented principles at the architectural level.
The document provides an introduction to the Command/Query Responsibility Segregation (CQRS) pattern. It outlines an agenda for the presentation that includes recapping domain-driven design principles, explaining CQRS, and providing a step-by-step approach towards implementing CQRS. The presentation argues that separating reading from writing allows for simpler and more scalable system designs compared to traditional architectures that try to support both with a single model.
This document discusses moving from a traditional domain-driven design (DDD) architecture to an architecture using command query responsibility segregation (CQRS). It begins with an overview of DDD concepts like bounded contexts, the ubiquitous language, and core domains. It then discusses issues with a traditional "best practice" architecture, noting that reading and writing are different operations that may benefit from separation. The presentation introduces CQRS as a way to separate commands and queries on an architectural level to address these issues.
Strategischer Anwendungsentwurf mit Domain-Driven DesignDennis Traub
The document discusses strategic design using Domain-Driven Design. It introduces Domain-Driven Design and outlines that the core concepts could be described in two books - one covering tactical class design and one strategic design. It then defines key terminology for strategic design including domain, domain model, ubiquitous language, bounded context and subdomains. It notes that the domain model abstracts reality and the ubiquitous language is used by all team members. Bounded contexts define boundaries for domain models while subdomains focus on specific areas. The core domain is the most important and differentiates the application. An example domain of aviation and bounded context of ambulance flight management is then presented.
The document discusses moving from a simple CQRS architecture to an event-centric architecture using domain events. It describes how domain events can be used to build denormalized read models from an event stream and log events for future retrieval. Testing strategies are also covered, including validating that read models contain expected data given certain events and that commands emit the proper domain events.
1) CQRS is an architectural pattern that separates read and write operations into different models. This allows for optimized read and write models and behaviors.
2) The basic CQRS architecture involves separating the read and write concerns into different layers - a thin read layer for optimized querying and presentation, a domain model for business logic and validation, and command handlers that process commands to enact changes.
3) CQRS does not require eventual consistency - the read and write models can be kept perfectly consistent through mechanisms like event sourcing that propagate write events to the read models.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
6. Potential drawbacks of
synchronous systems
Synchronous systems are tightly
coupled
A problem in a synchronous
downstream dependency has
immediate impact on the upstream
callers
Retries from upstream callers can all
too easily fan out and amplify
problems
Photo: Dirk Fröhner
8. Message exchange
One way Request response
Message
channel
Receiver
No response expected
Synchronous vs. fire-and-forget
Response expected
Return address
Correlation ID
Sender
Message
channel
Responder
Requester
Message
channel
9. Message channels
Point-to-point (queue) Publish-subscribe (topic)
Consumed by one receiver
Easy to scale
Flatten peak loads
Consumed by all subscribers
Durable subscriber
Receivers
Sender
Queue
Subscribers
Publisher
Topic
10. Message channels
Point-to-point (queue) Publish-subscribe (topic)
AWS service for queue functionality:
Amazon Simple Queue Services (Amazon SQS)
Serverless & cloud-native
AWS service for topic functionality:
Amazon Simple Notification Service (Amazon SNS)
Serverless & cloud-native
Receivers
Sender
Subscribers
Publisher
Amazon SQS Amazon SNS
11. Message channels
Point-to-point (queue) Publish-subscribe (topic)
AWS service for queue functionality (nonserverless):
Amazon MQ (managed Apache Active MQ)
For applications constrained to protocols like JMS,
AMQP, etc.
AWS service for topic functionality (nonserverless):
Amazon MQ (managed Apache Active MQ)
For applications constrained to protocols like JMS,
AMQP, etc.
Receivers
Sender
Subscribers
Publisher
Amazon MQ Amazon MQ
15. Message channels
FIFO queue Message groups
Guaranteed ordering Messages grouped by discriminator attribute
Example: Amazon SQS with sender provided message
Group IDs: No further consumption as long as messages
with particular message group IDs are invisible
Queue
Receiver
Sender
Receivers
Sender
Queue
Order
16. Message channels
FIFO queue Message groups
Guaranteed ordering Messages grouped by discriminator attribute
Example: Amazon SQS with sender provided message
Group IDs: No further consumption as long as messages
with particular message group IDs are invisible
Queue
Receiver
Sender
Receivers
Sender
Queue
Order
17. Message channels
FIFO queue Message groups
Guaranteed ordering Messages grouped by discriminator attribute
Example: Amazon SQS with sender provided message
Group IDs: No further consumption as long as messages
with particular message group IDs are invisible
Queue
Receiver
Sender
Receivers
Sender
Queue
Order
18. Message channels
FIFO queue Message groups
Guaranteed ordering Messages grouped by discriminator attribute
Example: Amazon SQS with sender provided message
Group IDs: No further consumption as long as messages
with particular message group IDs are invisible
Queue
Receiver
Sender
Receivers
Sender
Queue
Order
19. Message channels
FIFO queue Message groups
Guaranteed ordering Messages grouped by discriminator attribute
Example: Amazon SQS with sender provided message
Group IDs: No further consumption as long as messages
with particular message group IDs are invisible
Queue
Receiver
Sender
Receivers
Sender
Queue
Order
20. Message channels
FIFO queue Message groups
Guaranteed ordering Messages grouped by discriminator attribute
Example: Amazon SQS with sender provided message
Group IDs: No further consumption as long as messages
with particular message group IDs are invisible
Queue
Receiver
Sender
Receivers
Sender
Queue
Order
21. Message channels
FIFO queue Message groups
Guaranteed ordering Messages grouped by discriminator attribute
Example: Amazon SQS with sender provided message
Group IDs: No further consumption as long as messages
with particular message group IDs are invisible
Queue
Receiver
Sender
Receivers
Sender
Queue
Order
22. Message channels
FIFO queue Message groups
Guaranteed ordering Messages grouped by discriminator attribute
Example: Amazon SQS with sender provided message
Group IDs: No further consumption as long as messages
with particular message group IDs are invisible
Queue
Receiver
Sender
Receivers
Sender
Queue
Order
23. Message channels
FIFO queue Message groups
Guaranteed ordering Messages grouped by discriminator attribute
Example: Amazon SQS with sender provided message
Group IDs: No further consumption as long as messages
with particular message group IDs are invisible
Queue
Receiver
Sender
Receivers
Sender
Queue
Order!
24. Message channels
Message delivery QoS
At least once
At most once
Exactly once
Queue
Receiver
Sender
Exactly once? Well!
How to deal with a situation where the message was
consumed but never acknowledged?
→ Your systems still have to be able to
handle duplicate messages
→ Messages should be processed in
an idempotent manner
Choose between at least once or at most once
25. Message routing
Message filter Recipient list
Receive only a relevant subset of messages
Controlled by subscriber
Publisher remains completely unaware
Send only a relevant subset of messages to a subscriber
Controlled by publisher or separate component
Potentially adds coupling
Subscribers
Publisher
Subscribers
Publisher
Topic
color = blue
color = yellow
Recipient
list
27. Message routing
Pipes and filters
Event triggers chain of processing steps (“filters”)
Knowledge of destination for next steps is wired into each filter
Event source Pipe Filter Filter
Pipe Pipe Result target
…
Filter
Step 1 Step 2 Step n
28. Message routing
Saga orchestration
Event triggers orchestrated workflow
Knowledge of workflow is externalized into orchestrator component, as well as for potential rollback
Workflow participants remain as loosely coupled as possible
Processor
Processor
Processor
Processor
Event source Orchestrator
…
Step 1
Step 2 Step n-1
Step n
Result target
29. Message routing
Saga orchestration
AWS service for saga orchestration (serverless):
AWS Step Functions
Processor
Processor
Processor
Processor
Event source Orchestrator
…
Step 1
Step 2 Step n-1
Step n
Result target
33. Use case: Submit a ride completion
AWS Cloud
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
Unicorn
Wild Rydes
unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
management
service
34. Use case: Submit a ride completion
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
Unicorn
Wild Rydes
unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
management
service
35. Use case: Submit a ride completion
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
Interested in rides with
fare >= x
distance >= y
Rides
store
Unicorn
Wild Rydes
unicorn app
https://...
submit-ride-completion
Unicorn
management
service
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
36. Use case: Submit a ride completion
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
Unicorn
Wild Rydes
unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
Management
Service
Interested in rides with
fare >= x
distance >= y
Integration via database?
37. Use case: Submit a ride completion
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
Unicorn
Wild Rydes
unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
Management
Service
Integration via database?
Oh my!
Interested in rides with
fare >= x
distance >= y
38. Use case: Submit a ride completion
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
Unicorn
Wild Rydes
unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
Management
Service
Integration via REST APIs?
Interested in rides with
fare >= x
distance >= y
39. Use case: Submit a ride completion
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
Unicorn
Wild Rydes
unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
Management
Service
Integration via REST APIs?
Absolutely, but …
Interested in rides with
fare >= x
distance >= y
40. Use case: Submit a ride completion
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
https://...
https://...
https://...
https://...
https://...
Recipient list
Unicorn
Wild Rydes
unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
management
service
41. Use case: Submit a ride completion
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
https://...
https://...
https://...
https://...
https://...
Recipient list service
Unicorn
Request
distribution
service
https://...
Wild Rydes
unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
management
service
42. Use case: Submit a ride completion
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
https://...
https://...
https://...
https://...
https://...
Self-managed filtering
Unicorn
Request
distribution
service
https://...
Wild Rydes
Unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
management
service
Interested in rides with
fare >= x
distance >= y
43. Use case: Submit a ride completion
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
https://...
https://...
https://...
https://...
https://...
Self-managed filtering
Unicorn
Request
Distribution
Service
https://...
Wild Rydes
unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
Management
Service
Interested in rides with
fare >= x
distance >= y
Integration via messaging?
Absolutely!
44. Use case: Submit a ride completion
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
Publish-subscribe (topic)
Unicorn
Ride
completion
topic
Wild Rydes
unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
management
service
45. Use case: Submit a ride completion
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
SNS message filter:
fare >= x
distance >= y
Message filter
Unicorn
Ride
completion
topic
Wild Rydes
unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
management
service
46. Use case: Submit a ride completion
Unicorn
AWS Cloud
Customer
notification
service
Customer
accounting
service
Customer
loyalty
service
Data lake
ingestion
service
Extraordinary
rides
service
{
"from": "...",
"to": "...",
"duration": "...",
"distance": "...",
"customer": "...",
"fare": "..."
}
Ride
completion
topic
Topic-queue-chaining
Wild Rydes
unicorn app
https://...
submit-ride-completion
201 Created
Location: ...
Content-Location: ...
{
<cmpl-ride-repr>
}
Rides
store
Unicorn
management
service
SNS message filter:
fare >= x
distance >= y
70. Resources
AWS blogs and other content on messaging and application integration
https://aws.amazon.com/messaging/
https://aws.amazon.com/event-driven-architecture/
https://aws.amazon.com/blogs/compute/category/messaging/
The German-language AWS-Podcast
Keep in mind
Loose coupling is always better than lousy coupling
bit.ly/aws-podcast
71. Vielen Dank für’s Zuschauen!
Dennis Traub, Developer Advocate, Amazon Web Services
Twitter: @dtraub
Podcast: bit.ly/aws-podcast