Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
AWS Cloud Adoption Framework and WorkshopsTom Laszewski
The presentation covers the AWS Cloud Adoption Framework (CAF). AWS CAF helps organization accelerate their cloud adoption journey. The framework includes six perspectives - business, people, governance, security, operations, and platform. These six perspectives are used during CAF Envision, Alignment, and Cloud Capability Assessment workshops to enable the art of the possible, identify and mitigate organizational and technology impediments, and score the cloud capabilities of an organization.
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...Amazon Web Services
Most modern businesses depend on a portfolio of technology solutions to operate and be successful every day. How do you know whether your team is following best practices or what the risks are in your architectures? This session shows how the AWS Well-Architected Framework provides prescriptive advice on best practices and how the AWS Well-Architected Tool enables you to measure and improve your technology portfolio. We explain how other customers are using AWS Well-Architected in their businesses, and we share what we learned from reviewing tens of thousands of architectures across operational excellence, security, reliability, performance efficiency, and cost optimization.
In the event of a disaster, you need to be able to recover lost data quickly to ensure business continuity. For critical applications, keeping your time to recover and data loss to a minimum and optimizing your overall capital expense can be challenging. This session presents AWS features and services along with disaster recovery architectures that you can leverage when building highly available and disaster-resilient strategies.
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
AWS Cloud Adoption Framework and WorkshopsTom Laszewski
The presentation covers the AWS Cloud Adoption Framework (CAF). AWS CAF helps organization accelerate their cloud adoption journey. The framework includes six perspectives - business, people, governance, security, operations, and platform. These six perspectives are used during CAF Envision, Alignment, and Cloud Capability Assessment workshops to enable the art of the possible, identify and mitigate organizational and technology impediments, and score the cloud capabilities of an organization.
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...Amazon Web Services
Most modern businesses depend on a portfolio of technology solutions to operate and be successful every day. How do you know whether your team is following best practices or what the risks are in your architectures? This session shows how the AWS Well-Architected Framework provides prescriptive advice on best practices and how the AWS Well-Architected Tool enables you to measure and improve your technology portfolio. We explain how other customers are using AWS Well-Architected in their businesses, and we share what we learned from reviewing tens of thousands of architectures across operational excellence, security, reliability, performance efficiency, and cost optimization.
In the event of a disaster, you need to be able to recover lost data quickly to ensure business continuity. For critical applications, keeping your time to recover and data loss to a minimum and optimizing your overall capital expense can be challenging. This session presents AWS features and services along with disaster recovery architectures that you can leverage when building highly available and disaster-resilient strategies.
Adapting the capacity of your compute infrastructure to the demands of your applications is the domain of Auto Scaling. Adding and removing Amazon EC2 instances is only part of the story, though – there is more to it than first meets the eye. This session introduces the basics of how to use Auto Scaling before moving on to more advanced topics such as mixing Spot and On-Demand instances to optimize cost or strategies for blue/green deployments. If you have used Auto Scaling before, you can learn about useful new features like lifecycle hooks and step scaling policies that make Auto Scaling even more widely applicable.
AWS is architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely. When using AWS, not only are infrastructure headaches removed, but so are many of the security issues that come with them.
This AWS Tutorial ( Amazon AWS Blog Series: https://goo.gl/qQwZLz ) will give you an introduction to AWS and its domains. This AWS tutorial is ideal for those who want to become AWS Certified Solutions Architect.
Below are the topics covered in this tutorial:
1. What is Cloud?
2. What is AWS?
3. Different Domains in AWS
4. AWS Pricing
5. Migrate Your Application to AWS Infrastructure
6. Use case
#awstraining #cloudcomputing #awstutorial
Your Virtual Data Center: VPC Fundamentals and Connectivity Options (NET201) ...Amazon Web Services
In this session, we walk through the fundamentals of Amazon VPC. First, we cover build-out and design fundamentals for VPCs, including picking your IP space, subnetting, routing, security, NAT, and much more. We then transition to different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision makers interested in understanding the building blocks that AWS makes available with Amazon VPC. Learn how you can connect VPCs with your offices and current data center footprint.
Auto Scaling helps you ensure that you have the correct number of Amazon EC2 instances available to handle the load for your application. You create collections of EC2 instances, called Auto Scaling groups.
You can specify the minimum number of instances in each Auto Scaling group, and Auto Scaling ensures that your group never goes below this size.
You can specify the maximum number of instances in each Auto Scaling group, and Auto Scaling ensures that your group never goes above this size.
If you specify the desired capacity, either when you create the group or at any time thereafter, Auto Scaling ensures that your group has this many instances.
If you specify scaling policies, then Auto Scaling can launch or terminate instances as demand on your application increases or decreases
Amazon Route 53 is a highly available, scalable, and easy to use cloud Domain Name System (DNS) web service. With an SLA of 100% availability, Route 53 is designed to give developers and businesses an extremely reliable and cost effective way to route end users to Internet applications. By using Route 53 as your DNS provider, you can ensure your application’s up-time, run architecture that delivers better performance, and provide your end users with a better experience through lower latency and faster load times, all at the fraction of the cost of other DNS providers. Learning Objective: In this webinar, you will learn the following: - General overview of DNS, and how Route 53 is built to provide reliable and secure DNS - Using the Route 53 console to manage your DNS, easily and seamlessly - Utilizing health checks and failover to ensure high availability - Configuring advanced routing policies, including running your application in multiple regions with LBR and Geo for better performance for your end users. - Saving costs by using Route 53 - Registering or transferring your domains into Route 53 to manage all of your domain resources from one place - How to start using Route 53, including migrating your DNS without experiencing any downtime.
Amazon EC2 provides a broad selection of instance types to accommodate a diverse mix of workloads. In this session, we provide an overview of the Amazon EC2 instance platform, key features, and the concept of instance generations.
발표자: 이정훈 솔루션즈 아키텍트, AWS / 이상규 솔루션즈 아키텍트, AWS / 현륜식 솔루션즈 아키텍트, AWS / 강동환 솔루션즈 아키텍트, AWS
Part 1 : Cloud 로의 전환
Cloud로 전환하는 과정에서 검토되는 Windows 서버 운영 및 Cloud Endure에 대한 기본 개념 등을 소개합니다.
Part 2 : SAP 에 대한 고민
본 세션에서는 기업들이 가지고 있는 SAP 가치를 극대화하고 비용절감 및 업무자동화를 실천하는 방법에 대해 소개합니다
Part 3 : 백업 및 복구
기업들이 가지고 있는 데이터 통합관리 및 재해복구 방안, 그리고 데이터 내구성을 확보하고 비용절감하는 방안에 대해 소개합니다.
Part 4 : 하이브리드 클라우드 아키텍처
하이브리드 클라우드 아키텍처를 제시하고, VMware Cloud on AWS, Outposts와 같은 고객의 On-Premise 환경과 밀접한 관련이 있는 제품 및 서비스를 알아봅니다.
In this session we’ll take a high-level overview of AWS Lambda, a serverless compute platform that has changed the way that developers around the world build applications. We’ll explore how Lambda works under the hood, the capabilities it has, and how it is used. By the end of this talk you’ll know how to create Lambda based applications and deploy and manage them easily.
Speaker: Chris Munns - Principal Developer Advocate, AWS Serverless Applications, AWS
Amazon Web Services (AWS) provides on-demand computing resources and services in the cloud, with pay-as-you-go pricing. This session provides an overview and describes how using AWS resources instead of your own is like purchasing electricity from a power company instead of running your own generator. Using AWS resources provides many of the same benefits as a public utility: Capacity exactly matches your need, you pay only for what you use, economies of scale result in lower costs, and the service is provided by a vendor experienced in running large-scale networks. A high-level overview of AWS infrastructure (such as AWS Regions and Availability Zones) and AWS services is provided as part of this session.
Speaker: Tom Whateley, Solutions Architect and Stephanie Zieno, Account Manager, Amazon Web Services
Amazon Web Services or simply known as AWS has been continually expanding its services to support virtually any cloud workload, and it now has more than 40 services.
For more details - http://www.i2k2.com/services/amazon-web-services/aws/
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
Adapting the capacity of your compute infrastructure to the demands of your applications is the domain of Auto Scaling. Adding and removing Amazon EC2 instances is only part of the story, though – there is more to it than first meets the eye. This session introduces the basics of how to use Auto Scaling before moving on to more advanced topics such as mixing Spot and On-Demand instances to optimize cost or strategies for blue/green deployments. If you have used Auto Scaling before, you can learn about useful new features like lifecycle hooks and step scaling policies that make Auto Scaling even more widely applicable.
AWS is architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely. When using AWS, not only are infrastructure headaches removed, but so are many of the security issues that come with them.
This AWS Tutorial ( Amazon AWS Blog Series: https://goo.gl/qQwZLz ) will give you an introduction to AWS and its domains. This AWS tutorial is ideal for those who want to become AWS Certified Solutions Architect.
Below are the topics covered in this tutorial:
1. What is Cloud?
2. What is AWS?
3. Different Domains in AWS
4. AWS Pricing
5. Migrate Your Application to AWS Infrastructure
6. Use case
#awstraining #cloudcomputing #awstutorial
Your Virtual Data Center: VPC Fundamentals and Connectivity Options (NET201) ...Amazon Web Services
In this session, we walk through the fundamentals of Amazon VPC. First, we cover build-out and design fundamentals for VPCs, including picking your IP space, subnetting, routing, security, NAT, and much more. We then transition to different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision makers interested in understanding the building blocks that AWS makes available with Amazon VPC. Learn how you can connect VPCs with your offices and current data center footprint.
Auto Scaling helps you ensure that you have the correct number of Amazon EC2 instances available to handle the load for your application. You create collections of EC2 instances, called Auto Scaling groups.
You can specify the minimum number of instances in each Auto Scaling group, and Auto Scaling ensures that your group never goes below this size.
You can specify the maximum number of instances in each Auto Scaling group, and Auto Scaling ensures that your group never goes above this size.
If you specify the desired capacity, either when you create the group or at any time thereafter, Auto Scaling ensures that your group has this many instances.
If you specify scaling policies, then Auto Scaling can launch or terminate instances as demand on your application increases or decreases
Amazon Route 53 is a highly available, scalable, and easy to use cloud Domain Name System (DNS) web service. With an SLA of 100% availability, Route 53 is designed to give developers and businesses an extremely reliable and cost effective way to route end users to Internet applications. By using Route 53 as your DNS provider, you can ensure your application’s up-time, run architecture that delivers better performance, and provide your end users with a better experience through lower latency and faster load times, all at the fraction of the cost of other DNS providers. Learning Objective: In this webinar, you will learn the following: - General overview of DNS, and how Route 53 is built to provide reliable and secure DNS - Using the Route 53 console to manage your DNS, easily and seamlessly - Utilizing health checks and failover to ensure high availability - Configuring advanced routing policies, including running your application in multiple regions with LBR and Geo for better performance for your end users. - Saving costs by using Route 53 - Registering or transferring your domains into Route 53 to manage all of your domain resources from one place - How to start using Route 53, including migrating your DNS without experiencing any downtime.
Amazon EC2 provides a broad selection of instance types to accommodate a diverse mix of workloads. In this session, we provide an overview of the Amazon EC2 instance platform, key features, and the concept of instance generations.
발표자: 이정훈 솔루션즈 아키텍트, AWS / 이상규 솔루션즈 아키텍트, AWS / 현륜식 솔루션즈 아키텍트, AWS / 강동환 솔루션즈 아키텍트, AWS
Part 1 : Cloud 로의 전환
Cloud로 전환하는 과정에서 검토되는 Windows 서버 운영 및 Cloud Endure에 대한 기본 개념 등을 소개합니다.
Part 2 : SAP 에 대한 고민
본 세션에서는 기업들이 가지고 있는 SAP 가치를 극대화하고 비용절감 및 업무자동화를 실천하는 방법에 대해 소개합니다
Part 3 : 백업 및 복구
기업들이 가지고 있는 데이터 통합관리 및 재해복구 방안, 그리고 데이터 내구성을 확보하고 비용절감하는 방안에 대해 소개합니다.
Part 4 : 하이브리드 클라우드 아키텍처
하이브리드 클라우드 아키텍처를 제시하고, VMware Cloud on AWS, Outposts와 같은 고객의 On-Premise 환경과 밀접한 관련이 있는 제품 및 서비스를 알아봅니다.
In this session we’ll take a high-level overview of AWS Lambda, a serverless compute platform that has changed the way that developers around the world build applications. We’ll explore how Lambda works under the hood, the capabilities it has, and how it is used. By the end of this talk you’ll know how to create Lambda based applications and deploy and manage them easily.
Speaker: Chris Munns - Principal Developer Advocate, AWS Serverless Applications, AWS
Amazon Web Services (AWS) provides on-demand computing resources and services in the cloud, with pay-as-you-go pricing. This session provides an overview and describes how using AWS resources instead of your own is like purchasing electricity from a power company instead of running your own generator. Using AWS resources provides many of the same benefits as a public utility: Capacity exactly matches your need, you pay only for what you use, economies of scale result in lower costs, and the service is provided by a vendor experienced in running large-scale networks. A high-level overview of AWS infrastructure (such as AWS Regions and Availability Zones) and AWS services is provided as part of this session.
Speaker: Tom Whateley, Solutions Architect and Stephanie Zieno, Account Manager, Amazon Web Services
Amazon Web Services or simply known as AWS has been continually expanding its services to support virtually any cloud workload, and it now has more than 40 services.
For more details - http://www.i2k2.com/services/amazon-web-services/aws/
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
This session will start with an overview of the AWS security & compliance programs that enable financial services institutions to create secure workloads as they move to the cloud. We will dive into Financial Services Institutions (FSI) specific security considerations and regional regulations that may need to be considered.
Tom Jones, Solution Architect at Amazon Web Services leads a 60-minute tour through everything you need to know to develop, deploy and operate your first secure applications and services on AWS.
Datensicherheit mit AWS - AWS Security Web DayAWS Germany
Vortrag "Datensicherheit mit AWS" von Bertram Dorn beim AWS Security Web Day 2016. Alle Videos und Präsentationen finden Sie hier: http://amzn.to/1NFtR5P
Dieser Vortrag bietet Ihnen eine Übersicht über mögliche Leistungsmerkmale und Optionen von Amazon Web Services, mit denen Ihre Daten gesichert werden können. Die AWS Dienste folgen spezifischen Bauplänen auf Basis von Regionen und Verfügbarkeitszonen. Das Verstehen dieser Baupläne ermöglicht es Ihnen, die richtige Wahl zu treffen, um erfolgreich Anwendungen auf AWS laufen zu lassen. Auch existieren verschiedenste Optionen welche von AWS zur Sicherung der Anwendungen empfohlen werden. Der Vortrag wird einen Überblick über diese Optionen geben und einige bewährte Verfahren im Bereich Verschlüsselung und AWS-Konto-Verwaltung beschreiben.
AWS provides several security capabilities and services to increase privacy and control infrastructure access. Built-in firewalls allow you to create private networks within AWS, and also control network access to your instances and subnets. Identity and access management capabilities enable you to define individual user accounts with permissions across AWS resources. AWS also provides tools and features that enable you to see exactly what’s happening in your AWS environment. In this session, you will gain an understanding of preventive and detective controls at the infrastructure level on AWS. We will cover Identity and Access Management as well as the security aspects of Amazon EC2, Virtual Private Cloud (VPC), Elastic Load Balancing (ELB), and CloudTrail.
My slides from the re:Invent Recap Conferences.
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, and cost optimisation when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud. In this session, you'll learn how to follow AWS guidelines and best practices. By developing a strategy based on Amazon Web Services's Well-Architected Framework, you will be able to significantly increase the frequency of code deployments and reduce deployment times. As a result, you will be able to deliver more scalable, dynamic and resilient applications.
Introduction to AWS VPC, Guidelines, and Best PracticesGary Silverman
I crafted this presentation for the AWS Chicago Meetup. This deck covers the rationale, building blocks, guidelines, and several best practices for Amazon Web Services Virtual Private Cloud. I classify it as a somewhere between a 101 and 201 level presentation.
If you like the presentation, I would appreciate you clicking the Like button.
AWS Canberra WWPS Summit 2013 - AWS Governance and Security OverviewAmazon Web Services
As you look to go beyond your cloud and how you will manage governance for it, there are things you need to consider as you build your strategy. Come to this session to understand data protection policies, your relevant control areas, what shared responsibility means and what you need to do to put the right components together for your organisation's Cloud governance strategy.
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...Amazon Web Services
Most law enforcement agencies today manage, store, process, analyze, and report on digital forensics using on-premises data centers for computing. Digital forensics is a spiky workload that requires ever increasing storage. Workloads for digital evidence are increasing as it becomes routine to collect laptops, thumb drives, phones, and media (video, images, etc.) during criminal investigations. With oscillating workloads and a need for large amounts of storage, digital forensics is prime workload for the AWS Cloud. This session explores the use of AWS in the tracking and evolution of digital forensics. Learn how to tackle CJIS evidence management in the cloud using AWS GovCloud (US). Learn More: https://aws.amazon.com/government-education/
Deploy a DoD Secure Cloud Computing Architecture Environment in AWSAmazon Web Services
The Department of Defense's Secure Cloud Computing Architecture (SCCA) guidance provides DoD mission owners the security requirements for building a DoD compliant and secure application environment in the cloud. This session will review the DoD Cloud Security Requirements Guide and the DoD SCCA pillars and how they apply to AWS services. We will demonstrate how to build a DoD SCCA environment through automation and configuration management tools as well as discuss how to document security controls implementations. We will answer common questions, such as: how do we connect to a DoD Cloud Access Point? How do we implement a least privilege access control model? And how do we automate security event notifications and remediate issues? This session is designed for both technical and information assurance professionals that want to understand the process to move DoD systems into AWS, secure them, and get them accredited.
In this session, you'll learn how to architect your applications based on Amazon Web Services' Well-Architected Framework principles and Adrian’s 10+ years of experience using AWS.
Similar to Aws Architecture Fundamentals | Dallas (20)
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
5. New IT Business Model
Cloud Computing
is first and foremost a
Business Model
5
6. Business Reasons for Adopting Cloud Computing
GoodNot Good
Go global in minutes
Remove undifferentiated
heavy lifting
Stop guessing capacity
Increased agility
Lower variable expense than they
could achieve on their own
Move from capital expense to
variable expense$
6
7. Defining Cloud Computing
NIST defined a well accepted, industry
standard definition of Cloud Computing
url: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
Covers:
5 Key Characteristics of Cloud Computing
3 Service Model
4 Deployment Models
plus
5 Cloud Actors
A Cloud Reference Architecture
Shared Security model
7
8. What is Cloud Computing?
NIST 5 Key Characteristics
#1 On-demand self service
“as easy as buying candy froma vending machine”
#2 Broad network access
“access it anytime fromanywhere”
#3 Resource pooling
“you’renotthe only user”
#4 Rapid elasticity
“scaleup and scale down in real-time”
#5 Measured service
“pay only for whatyou consume”
8
9. Why Amazon Web Services?
“It is the overwhelming market share leader, with over 10 times more cloud IaaS
compute capacity in use than the aggregate totalof the other14 providers in this Magic
Quadrant” Gartner Report May, 2015.
In 2013, IT researchfirm
Gartner had to rescale its
famedinfrastructure-as-
a- service “Magic
Quadrant” to
accommodate Amazon
Web Services’ enormous
competitive lead.
9
10. AWS Today - 2017 Public cloud market share
Amazon Web Services: 45%
per Synergy Research Group
AWS generating > $12 billion a year.
10
16. Regions and Availability Zones
Global Resources
» IAM Users
» Route 53 Records
Regional Resources
» S3 Buckets
» VPCs
» ELB
» EIPs
AZ Resources
» EBS Volumes
» EC2 Instances
» RDS Instances
» Subnets
» ENIs
16
17. Edge Locations
• CDN Endpoints for CloudFront (PoPs)
• Edge Locations != Regions
• More Edge Locations than Regions
• ~70 Edge locations and growing
17
21. VPC – Network and Subnets
• Network Topology
o Private address space
Any range is valid, but we suggest a non-routableCIDR
Public CIDR ranges are only reachablevia a VirtualPrivate Gateway
CIDR ranges can be as large as a /16 to as small as a /28
• Subnets
o Public subnets have a 0.0.0.0/0 route to the Internet Gateway(IGW)
Instances that require a public IP need to reside in a public subnet
o Private subnets do not have an outbound route through the IGW
NAT instances are commonly used as an outboundgatewayfor privateinstances
o Subnets cannot span AZ’s, but can share routing tables, which provides similar functionality.
21
22. VPC – Route Tables
• Route Tables
o Can be applied to multiple subnets
o Typical routing entries
10.0.0.0/16 = Local
0.0.0.0/0 = Internet Gateway
(Public Subnet)
-or-
0.0.0.0/0 = eni-12345678 (Private
Subnet)
22
25. VPC– Peering
• Peering
o Not Transitive
o VPC -> VPC peering
o Unique CIDR
o VPN solutions
OpenVPN
OpenSwan
25
26. Route53 - Basic Feature Set
• Zone Creation
• Zone Import
o Import your zone file from a previous provider
o Delegate this zone to the AWS name servers
• Record Types
o A
o CNAME
o TXT,MX
o Alias
o S3 buckets and ELBs can be an alias target, allows zone apex magic
26
27. Route53 - Advanced Feature Set
• Weighted Resource Record Sets
• Health Checks
• Global Load Balancer
– Using weighted record sets, you can create a pool of
endpoints from which to balance traffic
– Enabling a health-check on this pool allows for a DNS based
load balancer which can be applied to any resource (AWS
or non-AWS)
• Latency Resource Record Sets
• Geolocation Resource Record Sets
27
28. Route53 – Global Failover
• Global Failover Pattern
• Uses R53 Health Checks
Route 53
Virginia Region
myapp.example.com
Ireland Region
28
31. Network ACLs
Behavior:
• Allow/Denytraffic at the subnet level
• Stateless
• Default is Allow All
Pro – further defines permissible traffic
Con – adds complexity and can
complicatetroubleshooting
31
32. Security Groups
• Security Groups are similar to firewall rules
• Can be associated to resources independent
of a subnet or CIDR range
• Security Groups are limited only to the VPC
in which you create them
Example of Security Group configuration
32
33. Security Group Behavior
• Work at instance level
• Stateful
• Deny by default
• IP Whitelisting (CIDR)
• Allow port and protocol
– Can allow TCP, UDP, ICMP or a
combination of all three
• SG Trust Relationships
– Scoped to the VPC
33
34. Client Ingress
SSH and RDP Ingress
Platform Server Ingress
Platform Server Egress
Database Access
SID App
APP
SID_App_Ingress
SID Database
SID View
VIEW
SID_Admin_Ingress
Protocol Port Range Source
TCP 22 10.99.101.0/24
TCP 3389 10.99.101.0/24
SID_App_Egress
Protocol Port Range Destination
TCP 443 10.87.14.29/32
TCP 3306 10.24.3.102/32
SID_DB_Ingress
Protocol Port Range Source
TCP 3306 SID_APP_SG
SID_View_Ingress
Protocol Port Range Source
TCP 80 10.12.0.0/16
TCP 80 10.45.2.0/24
TCP 80 10.62.31.0/24
View Firewall Policies
SID_View_Ingress
SID_Admin_Ingress
App Firewall Policies
SID_App_Ingress
SID_Admin_Ingress
SID_App_Egress
Database Firewall Policies
SID_DB_Ingress
Protocol Port Range Source
TCP 80 10.241.25.0/24
TCP 443 10.241.25.0/24
TCP 8080 SID_VIEW_SG
Security Group/Firewall Rules
34
37. IAM Users
o Identity and Access Management
o Create Users and Groups
o Establish Trust Relationships
o Govern Access via Policy Documents
37
38. IAM - Groups, Roles & Instance Profiles
o Deny by default
Explicit allow required to grant access
Explicit deny always trumps an explicit allow
o Users/Groups
Policies can be applied at the group or user level
o Roles
Policies can be applied to roles
o Instance Profile
An instance profile is a container for an IAM role that you can use to pass
role information to an EC2 instance when the instance starts
Assumesrole
Credentials are stored in instance metadata
Only Access Key ID and Temporary Token
38
40. IAM – AWS Master Account
AWS Account
Master/Root AccountPermissions
Allow by default
MFA
Always treat the master account
credentials as if they could launch an
ICBM!
40
42. EC2 – Elastic Cloud Compute
AMI
• Instances are based on an Amazon Machine
Image
• You can create new AMIs from a running
instance
• AMIs are stored in S3 for 11 9’s of durability
• AMIs are unique to each region
42
43. EC2 - Instance Types
Choosing the correct instance type for the required workload
o T2 for light weight general purpose – but with burstable performance
o M4 for general purpose
o R3, X1 for memory and database heavy applications
o C3, C4 for compute heavy applications
o G2, P2 for GPU intensive applications
o I2, D2 for storage heavy applications (random)
o HS1 for storage heavy applications (sequential)
Example of M3 familyof instance type
43
44. EC2 - Running Instances
Running instances
•Instances are launched into an existing VPC subnet
•CloudWatch monitoring is enabled by default
o CPU Utilization, Network I/O are the primary data points of interest
o Memory and Disk require an additional script that will post a to a custom
CloudWatch metric
•Statuschecks
o OS check
o Network reachability check
44
45. EC2 – Instance Recovery
• CloudWatch monitors instance
• Automatically recovers if it becomes impaired
– underlying hardwarefailure
– problem that requiresAWS involvement to repair
• During instance recovery, the instance is migrated during
an instance reboot, and any data that is in-memory is lost
45
47. EC2 - Bootstrapping
User Data
• Provides a hook to inject scripting into any standard instance you decide
to launch
o These include the Amazon Linux, Windows and Ubuntu AMIs
o User Data can only be modified while the instance is stopped
• Suggested patterns
o Installsecurity updates
yum update -y
o Install middleware
yum install-y httpd
chkconfig httpd on
o Download and execute a remote script
Assign an IAM Profile to the EC2 instance
Aws s3 cp s3://mybucket/myscript.sh /tmp/myscript.sh
./tmp/myscript.sh
47
48. EC2 - Pricing
1 > On Demand Instance
• This is the most common and flexible pricing option
• Pay only for what you use
• Stopped instances will not accrue hourly compute costs
• Pay by the instance hour
2 > Reserved Instance (RI)
• 1 or 3 year commitment
• Pay for EC2 hourly at reduced rates (from On Demand rates)
• Payment Options
• No Upfront payment: no CapEx, lower hourly rate than On Demand
• Partial Upfront payment: some CapEx, lower hourly rate than No Upfront
• All Upfront payment:larger Capex, lowest hourly rate possible
48
49. EC2 - Pricing
3 > Spot
• Useful for “worker pool”
scenarios
oTranscode, map reduce
task nodes
• Can be lost as soon as
someone is willing to pay
more for that instance
49
51. ELB - Elastic Load Balancer
Elastic Pool of Virtual Load Balancers
Public Side
• Consists of an endpointwhich is the equivalentto a
traditional VIP
• Does not use a static IPv4, but rather an Alias/CNAME
• The endpointwill not alwaysresolve to the same IP
Private Side
• Minimum of one virtual ELB node per AZ
Certificate Termination
• Only one SSL certificate per ELB
• Multi-Domaincertificates are valid
51
53. Auto Scaling Key Features
• Adds or removes servers based on load
• Self-healing pool of resources
• Every instance is based on a “gold” master image
Auto Scaling - Overview
53
54. Auto scaling group
• Instance location
o Subnet
o Load Balancer
• Number of instances
o Min
o Max
o Desired
Launch config
• Instance details
o Size
o PEM key
o IAM Profile
o Security Group(s)
o User data
Auto Scaling - Components
54
55. Auto Scaling - Multi-AZ
Multi-AZ Auto Scaling
• Highly Available
• Production Standard
• Spans Datacenters
55
56. Auto Scaling - CloudWatch
CloudWatch is the final piece of the auto scaling puzzle. You can create alarms
based on instance metrics which trigger auto scaling actions.
Scaling policies
Scale up alarm
• Execute policy when: CPU is greater than 60%
• Take the action: Add 2 instances
• And then wait: 10 minutes
Scale down alarm
• Execute policy when: CPU is less than 20%
• Take the action: Remove 2 instances
• And then wait: 10 minutes
56
58. Directory Service - Overview
Three types of directory services:
o Microsoft AD
o A managed MicrosoftActive Directory service running on Windows Server 2012R12
o Highly availability (multi-AZ), patched,and monitored
o Can support up to 50,000users
o Fully functional MS AD
o Simple AD
o Powered by Samba 4 Active Directory
o Users and Groupscan be created directly in the AWS console
o Windows servers can auto-join this domain as they would in an AD environment
o Can support 5,000users
o AD Connector
o Connect your on-prem AD to your AWS account
o Associate AD users/groupswith IAM users/groups
o Windows servers can auto-join this domain as they would in an AD environment
o Manage the AWS console using your AD credentials
58
59. Directory Service – AD Connector
• Active Directory Connector instances
are launched into your VPC
• AD Connectors communicatewith on-
prem AD servers
• AD credentials are no longer
necessary when joining instances to a
domain (Auto-Join)
59
62. Storage Services
• EBS – ElasticBlock Store - (not actually a ”service”)
• S3 – Simple Storage Service - (objectstorage)
• Standard
• Standard I/A – InfrequentAccess
• Reduced RedundancyStorage (RRS) – 4 9’s of durability (1 facility)
• Glacier – Archival/Long-term
• Expedited – 1-5 minutes
• Standard – 3-5 hours
• Bulk – 5-12 hours
• AWS Storage Gateway
• Gateway-cached volumes – store primary data in AWS and cache most recently used data locally
• Gateway-stored volumes – store entire dataset onsite and asynchronously replicate data back to S3
• Gateway-virtual tape library – storeyour virtual tapes in either S3 or Glacier
• EFS – Elastic File System
62
63. Traditional Platform - Storage Architecture
In the old days…
• Hardware acquisitionand datacenterspace required
advancedplanning
• Disk space and I/O allocation jugglingfor the entire
applicationlifecycle
• Volume and file redundancy not built-in
• Capitalcommitment and refresh budget
considerations
/root C:
/swap
Pagefile
Temp Dir
/app
/data
Program
Files
Data
Server Head
NAS or Fileserver
/DirShare 01/
File01
File02
/DirShare 02/
File01
Tape Library
ArchiveVol 02
ArchiveVol 01
SMB /CIFS
Platform Monitoring Tools
63
64. AWS Instance Volumes and Data Storage
The new [improved] way of doing things…
• Elastic pay-as-you-go model
• Redundancyand snapshot utilities built-in
• New APIs and tools simplify application development,
administrationand data lifecycle management
64
65. EBS - Elastic Block Store
Block storage ideal for creating versatile OS volumes
• Define type, size and optionallyI/O capacities[within service limits]
• Magnetic, SSD and ProvisionedIOPS
• Mount to a single instance,similar to localdrive
• SimplifiedEncryption options
Persistent and durable
• Redundantcopies stored in single AZ
• Not permanentlybound to a server instance and will survive server crash or shutdown
Snapshot capabilities for point-in-time backups
• Resizing and duplicatingvolumes
• Moving across AZs; Exporting across Regions
Performance metrics available through CloudWatch
65
66. Elastic Block Store (EBS) – Best Practices
Recommended for applications
• Making frequent data changes
• Requiring consistentI/O performance
• Needing to persist data beyond server instance stop/start
cycles
• Requiring fine-grain control of raw, unformatted data blocks
Define appropriate configuration options
• EBS Optimized instances can handle higher I/O bandwidth
• Underlying technology (Magnetic, General Purpose (SSD),
Provisioned IOPS (SSD)
/root C:
/swap
Pagefile
Temp Dir
/app
/data
Program
Files
Data
Server Virtual Head
66
67. Ephemeral Drives (EC2 Instance Store) Overview
Block device attached to the host machine
• Available to server instance
• May be mounted and used for temporary storage
• No additional usage charges for disk space or I/O
Not redundant: no built-in RAID or snapshot function
Data loss will result if any of the following occur:
• Host server or instance crash
• Instance termination
• Disk failure
/root C:
/swap
Pagefile
Temp Dir
/app
/data
Program
Files
Data
Server Virtual Head
67
68. S3 - Simple Storage Service
Object storage container with virtually unlimited capacity
• Store files (objects) in containers (buckets)
• Redundant copies for high durability and reliability
• Available on the internet via REST requests directly or through SDK
• Multiple strategies to secure contents
• Set permissions,access policies and optionallyrequire MFA
• Encryption:Server (simplified)or Client-side
• Audit logging(optional)will record all access requests via APIs
• Built-in tools for managing versioning, object lifecycle and creating static websites
• Provides 99.999999999%durability (11 ‘9s’)
• Provides 99.99%availability
/mybucket01/
File01
File02
/mybucket02/
File01
Http / Https
Amazon S3
68
69. Amazon Glacier - Overview
Storage service optimized for reliable and low cost storage of archive data
• Data objects are securely archived, however not immediately accessible
• Create vaults (containers) to hold archives (any file based object)
• Upload archives programmatically
• Submit requests to retrieve archives. Available in about 4 hours
• Cost is approximately $.01/GB/Month plus modest API and retrieval charges [if
applicable]
69
70. EFS – Elastic File System
Fully managed file server storage
• Uses NFS (v4.1) protocol
• Linux server only, Windows support planned for future release
• Can be mounted by 1,000s of EC2s
• Can be accessed from on-prem Data Center if using Direct Connect
• Highly available, redundant across multiple AZs
70
73. AWS Structured Data Services
Deploying structured data systems(for example SQL, NoSQL and Data Warehouse
applications) in a traditional environment may be complex, costly, and time
consuming.
Amazon provides a set of structured data services with the following advantages:
• Simple to deploy, operate and scale
• Many commonadministrative and operational tasks are automated
• Pay-as-you-go pricing
• Support for a wide variety of standard and emerging application models
73
74. RDS - Relational Database Service
Fully managed relational database service offering popular platforms with the
following key advantages:
• Amazon manages resource redundancy, software patching, backups, failure
detection and recovery
• Ability to configure specific resourcesto cost-effectivelyscale your application
• Pay-as-you-go model offering included license or license portability [see fine print
to ensure license compliance]
• Streamlined management options to easily configure highly available topologies,
create database snapshots and deploy test instances
74
75. RDS - Relational Database Service
Key Concepts
Database Instance
Database Storage
DB Instance Class
6 Platforms
1. Oracle
2. MS SQL
3. MySQL
4. PostgreSQL
5. MariaDB
6. Amazon Aurora
75
76. AWS Aurora
Fully managed relational databaseengine that combines the speedand
availability of high-end commercial databaseswith the simplicity and cost
effectivenessof open source databases.
Key features:
o Architected for 99.99% availability
o Automatic failover < 30s (Possible Oracle RAC solution)
o Enterprise performance (5x) at 1/10 the cost
o Compatible with MySQL and PostgreSQL
o Automatically grows storage as needed, up to 64 TB
o Easy migration from MySQL
o Up to 15 Aurora Replicas in a region
o Cross-region replication
o Encryption in-transit and at rest
o Continuous backup to S3 (11 9’s data durability)
o Fully managed
76
77. DynamoDB
Fully managed NoSQL database service offering the following key advantages:
• Seamless and virtually unlimited scalability conveniently managed
automatically by Amazon
• Ability to define specific resource allocation limits to ensure predictable
performance while containing costs
• Easy administration and well-supported development model
• Integration with other core Amazon data services (for example Redshift and
EMR)
77
78. Redshift
Fully managed Enterprise-classdata warehouse service offering the following
advantages:
• High performance, massively parallel columnar storage architecture providing
streamlined scalability
• Mainstream SQL query syntax allowing for rapid platform adoption
• Flexible node type and RI options allowing for workload alignment and cost
efficiency
78
79. Database Migration Service (DMS)
• AWS Database Migration Service helps you migrate databases to AWS
easily and securely.
• The source database remains fully operational during the migration,
minimizing downtime to applications that rely on the database.
• Homogenous (Oracle to Oracle) & heterogeneous migrations (ie Oracle
to Aurora, or Microsoft SQL Server to MySQL) using Schema Conversion
Tool
• Can also be used for continuous data replication with high-availability
79
81. 81
General Information
1-888-317-7920
info@2ndwatch.com
www.2ndwatch.com
Contact Us
Larry Cusick
Solutions Architect
lcusick@2ndwatch.com
Locations
BOSTON
SEATTLE
NEW YORK
VIRGINIA
ATLANTA
PHILADELPHIA
DALLAS
LIBERTY LAKE
LOS ANGELES
CHICAGO
Marissa Bybee
Regional Territory Manager
mbybee@2ndwatch.com
David Nettles
Solutions Architect
dnettles@2ndwatch.com