Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
AWS re:Invent 2016: Understanding IoT Data: How to Leverage Amazon Kinesis in...Amazon Web Services
The growing popularity and breadth of use cases for IoT are challenging the traditional thinking of how data is acquired, processed, and analyzed to quickly gain insights and act promptly. Today, the potential of this data remains largely untapped. In this session, we explore architecture patterns for building comprehensive IoT analytics solutions using AWS big data services. We walk through two production-ready implementations. First, we present an end-to-end solution using AWS IoT, Amazon Kinesis, and AWS Lambda. Next, Hello discusses their consumer IoT solution built on top of Amazon Kinesis, Amazon DynamoDB, and Amazon Redshift.
Hybrid Infrastructure Integration is an approach to connect on-premises IT resources with AWS and bridge processes, services, and technologies used in common enterprise customer environments. This session addresses connectivity patterns, security controls, account governance, and operations monitoring approaches successfully implemented in enterprise engagements. Infrastructure architects and IT professionals can get an overview of various integration types, approaches, methodologies, and common service patterns, helping them to better understand and overcome typical challenges in hybrid enterprise environments.
Analyzing and debugging production distributed applications built using a service-oriented or microservices architecture is a challenging task. In this session, we will introduce AWS X-Ray, a new service that makes it easier to identify performance bottlenecks and errors, pinpoint issues to specific service(s) in your application, identify the impact of issues on users of your application, and visualize a request call graph and service call graph for your applications. We will show interactive demos, and code samples for the demo will be available to all session attendees.
AWS re:Invent 2016: Discovery Channel's Broadcast Workflows and Channel Origi...Amazon Web Services
Media delivery requirements are continually changing, driven by accelerating mobile, tablet, smart TV, and set-top technology advances. Broadcasters need agile solutions to the changing media and entertainment landscape that don't require multiyear projects with large upfront investments. In this session, we walk through Discovery Communications' migration of its broadcast playout and channel origination to AWS. Discovery Communications is a leader in nonfiction media, reaching more than 3 billion cumulative viewers in 220 countries and territories. Traditionally, broadcast origination for content delivered to telecommunications companies, cable TV, and satellite has existed only in on-premises data centers. In this session, we walk through Discovery's migration of broadcast playout supporting hundreds of channels worldwide to AWS. We show how Discovery has not only reduced their TCO but also has improved their agility by launching new channels on demand. We also walk through how channel origination is being deployed in a secure, automated fashion, and with a level of high availability that exceeds what is possible in a traditional data center.
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
AWS re:Invent 2016: Understanding IoT Data: How to Leverage Amazon Kinesis in...Amazon Web Services
The growing popularity and breadth of use cases for IoT are challenging the traditional thinking of how data is acquired, processed, and analyzed to quickly gain insights and act promptly. Today, the potential of this data remains largely untapped. In this session, we explore architecture patterns for building comprehensive IoT analytics solutions using AWS big data services. We walk through two production-ready implementations. First, we present an end-to-end solution using AWS IoT, Amazon Kinesis, and AWS Lambda. Next, Hello discusses their consumer IoT solution built on top of Amazon Kinesis, Amazon DynamoDB, and Amazon Redshift.
Hybrid Infrastructure Integration is an approach to connect on-premises IT resources with AWS and bridge processes, services, and technologies used in common enterprise customer environments. This session addresses connectivity patterns, security controls, account governance, and operations monitoring approaches successfully implemented in enterprise engagements. Infrastructure architects and IT professionals can get an overview of various integration types, approaches, methodologies, and common service patterns, helping them to better understand and overcome typical challenges in hybrid enterprise environments.
Analyzing and debugging production distributed applications built using a service-oriented or microservices architecture is a challenging task. In this session, we will introduce AWS X-Ray, a new service that makes it easier to identify performance bottlenecks and errors, pinpoint issues to specific service(s) in your application, identify the impact of issues on users of your application, and visualize a request call graph and service call graph for your applications. We will show interactive demos, and code samples for the demo will be available to all session attendees.
AWS re:Invent 2016: Discovery Channel's Broadcast Workflows and Channel Origi...Amazon Web Services
Media delivery requirements are continually changing, driven by accelerating mobile, tablet, smart TV, and set-top technology advances. Broadcasters need agile solutions to the changing media and entertainment landscape that don't require multiyear projects with large upfront investments. In this session, we walk through Discovery Communications' migration of its broadcast playout and channel origination to AWS. Discovery Communications is a leader in nonfiction media, reaching more than 3 billion cumulative viewers in 220 countries and territories. Traditionally, broadcast origination for content delivered to telecommunications companies, cable TV, and satellite has existed only in on-premises data centers. In this session, we walk through Discovery's migration of broadcast playout supporting hundreds of channels worldwide to AWS. We show how Discovery has not only reduced their TCO but also has improved their agility by launching new channels on demand. We also walk through how channel origination is being deployed in a secure, automated fashion, and with a level of high availability that exceeds what is possible in a traditional data center.
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...Amazon Web Services
Cloud computing offers many advantages, such as the ability to scale your web applications or website on demand. But how do you scale your security and compliance infrastructure along with the business? Join this session to understand best practices for scaling your security resources as you grow from zero to millions of users. Specifically, you learn the following:
How to scale your security and compliance infrastructure to keep up with a rapidly expanding threat base.
The security implications of scaling for numbers of users and numbers of applications, and how to satisfy both needs.
How agile development with integrated security testing and validation leads to a secure environment.
Best practices and design patterns of a continuous delivery pipeline and the appropriate security-focused testing for each.
The necessity of treating your security as code, just as you would do with infrastructure.
The services covered in this session include AWS IAM, Auto Scaling, Amazon Inspector, AWS WAF, and Amazon Cognito.
AWS re:Invent 2016: NextGen Networking: New Capabilities for Amazon’s Virtual...Amazon Web Services
Amazon’s Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the Amazon Web Services (AWS) cloud and gives you complete control over your virtual networking environment. Amazon VPC continues to evolve with new capabilities and enhancements. These features give you increasingly greater isolation, control, and visibility at the all-important networking layer. In this session, we review some of the latest changes, discuss their value, and describe their use cases.
(ARC346) Scaling To 25 Billion Daily Requests Within 3 Months On AWSAmazon Web Services
What if you were told that within three months, you had to scale your existing platform from 1,000 req/sec (requests per second) to handle 300,000 req/sec with an average latency of 25 milliseconds? And that you had to accomplish this with a tight budget, expand globally, and keep the project confidential until officially announced by well-known global mobile device manufacturers? That’s what exactly happened to us. This session explains how The Weather Company partnered with AWS to scale our data distribution platform to prepare for unpredictable global demand. We cover the many challenges that we faced as we worked on architecture design, technology and tools selection, load testing, deployment and monitoring, and how we solved these challenges using AWS.
Up-front design of your AWS account can be done in a way that creates a reliably secure and controlled environment no matter how the AWS resources are used. This session will focus on "Secure by Design" principles and show how an AWS environment can be configured to provide a reliable operational security control capability to meet the compliance needs across multiple industry verticals (e.g. HIPAA, FISMA, PCI, etc.). This will include operational reporting through the use of AWS services (e.g. Config/Config Rules, CloudTrail, Inspector, etc.) as well as partner integration capabilities with partner solutions such as Splunk and Allgress for real-time governance, risk, and compliance reporting. Key takeaways from this session include: learning AWS Security best practices and automation capabilities for securing your environment, Automation accelerators for configuration, compliance, and audit reporting using CloudFormation, Config/Config Rules, CloudTrail, Inspector, etc., and ISV integration for real-time notification and reporting for security, compliance, and auditing in the cloud.
VMware CloudTM on AWS brings VMware’s enterprise class Software-Defined Data Center software to Amazon’s public cloud, delivered as an on-demand, elastically scalable, cloud-based VMware sold, operated and supported service for any application and optimized for next-generation, elastic, bare metal AWS infrastructure. This solution enables customers to use a common set of software and tools to manage both their AWS-based and on-premises vSphere resources consistently. Further virtual machines in this environment have seamless access to the broad range of AWS services as well. This session will introduce this exciting new service and examine some of the use cases and benefits. The session will also include a VMware Tech Preview that demonstrates standing up a complete SDDC cluster on AWS and various operations using standard tools like vCenter.
AWS re:Invent 2016: Hybrid Architectures: Bridging the Gap to the Cloud( ARC2...Amazon Web Services
AWS provides many services to assist customers with their journey to the cloud. Hybrid solutions offer customers a way to continue leveraging existing investments on-premises, while expanding their footprint into the public cloud. This session covers the different technologies available to support hybrid architectures on AWS. We discuss common patterns and anti-patterns for solving enterprise workloads across a hybrid environment.
AWS has a number of services that help enterprise customers deploy solutions that meet high performance, security, and reliability requirements. SQL Server is no exception. In this session, we will explore the different options that exist today to help enterprises meet those types of requirements. Another key capability in AWS is flexibility. Multiple options exist for how enterprises can deploy SQL Server in AWS. We will talk in detail about how to choose between a managed database model like Relational Database Service (RDS) or core compute model like Elastic Compute Cloud (EC2). Finally, we’ll wrap up with an exploration of different operational aspects of SQL Server in AWS.
Level 100: Get Started and Migrate Your Data to AWS
Millions of customers are leveraging AWS for increased flexibility, scalability, and reliability. This "how-to" webinar will cover the basics of getting started with AWS and migrating your data to AWS. this session will also cover core AWS services, such as Amazon EC2 and Amazon S3, and provide demonstrations of how to set up and utilize those services to launch virtual machines in the cloud, backup and restore data. This session will also cover the storage options available today to upload/move your data to AWS.
Reasons to attend:
Learn how to create an AWS account and access its free services, to create and run a virtual machine in the cloud
Understand how to create backup and restore an Amazon EC2 instance
Store and share files online with Amazon S3
Learn how to manage costs and set up billing alerts
Leverage the different storage options to migrate your data
Five Steps to Creating a Secure Hybrid Cloud ArchitectureAmazon Web Services
A hybrid Architecture is one of the easiest ways to securely address new application requirements and cloud-first development initiatives. This approach allows you to start small and expand as your requirements change while maintaining a strong security posture. In this session, you will learn the 5 key steps to building a hybrid architecture on AWS using the VM-Series next-generation firewall.
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...Amazon Web Services
In this session, we focus on designing for high availability, with evaluation criteria for using services and features such as Amazon Route 53, Elastic Load Balancing, Auto Scaling, route tables, network interfaces, device clustering, and the Transit VPC architecture. We also explore how to create highly available networking between regions as well as on-premises.
Amazon EC2 changes the economics of computing and provides you with complete control of your computing resources. It is designed to make web-scale cloud computing easier for developers. In this session, we will take you on a journey, starting with the basics of key management and security groups and ending with an explanation of Auto Scaling and how you can use it to match capacity and costs to demand using dynamic policies. We will also discuss tools and best practices that will help you build failure resilient applications that take advantage of the scale and robustness of AWS regions.
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. In this session, we will discuss how constrained devices can leverage AWS IoT to send data to the cloud and receive commands back to the device using the protocol of their choice. We will discuss how devices can connect securely using MQTT and HTTP protocols, and how can developers and businesses can leverage the AWS IoT Rules Engine, Thing Shadows, and accelerate prototype development using AWS IoT Device SDKs. We will cover major hardware platforms from Arduino, Marvell, Dragonboard and MediaTek.
AWS IoT is a managed cloud platform that allows connected IoT devices to easily and securely interact with cloud applications and other devices. In this session, we will discuss how constrained devices can leverage the AWS IoT service to send data to the cloud and receive commands back to the device using the protocol of their choice. We will discuss how devices can connect securely using MQTT and HTTP protocols, and how developers and businesses can leverage the AWS IoT Rules Engine, Thing Shadows, and accelerate prototype development using AWS IoT Device SDKs. Finally, we will cover new features released since the launch of AWS IoT including integration with Amazon Machine Learning and Amazon ElasticSearch Service.
Learn how Amazon Redshift, our fully managed, petabyte-scale data warehouse, can help you quickly and cost-effectively analyze all of your data using your existing business intelligence tools. Get an introduction to how Amazon Redshift uses massively parallel processing, scale-out architecture, and columnar direct-attached storage to minimize I/O time and maximize performance. Learn how you can gain deeper business insights and save money and time by migrating to Amazon Redshift. Take away strategies for migrating from on-premises data warehousing solutions, tuning schema and queries, and utilizing third party solutions.
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...Amazon Web Services
Cloud computing offers many advantages, such as the ability to scale your web applications or website on demand. But how do you scale your security and compliance infrastructure along with the business? Join this session to understand best practices for scaling your security resources as you grow from zero to millions of users. Specifically, you learn the following:
How to scale your security and compliance infrastructure to keep up with a rapidly expanding threat base.
The security implications of scaling for numbers of users and numbers of applications, and how to satisfy both needs.
How agile development with integrated security testing and validation leads to a secure environment.
Best practices and design patterns of a continuous delivery pipeline and the appropriate security-focused testing for each.
The necessity of treating your security as code, just as you would do with infrastructure.
The services covered in this session include AWS IAM, Auto Scaling, Amazon Inspector, AWS WAF, and Amazon Cognito.
AWS re:Invent 2016: NextGen Networking: New Capabilities for Amazon’s Virtual...Amazon Web Services
Amazon’s Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the Amazon Web Services (AWS) cloud and gives you complete control over your virtual networking environment. Amazon VPC continues to evolve with new capabilities and enhancements. These features give you increasingly greater isolation, control, and visibility at the all-important networking layer. In this session, we review some of the latest changes, discuss their value, and describe their use cases.
(ARC346) Scaling To 25 Billion Daily Requests Within 3 Months On AWSAmazon Web Services
What if you were told that within three months, you had to scale your existing platform from 1,000 req/sec (requests per second) to handle 300,000 req/sec with an average latency of 25 milliseconds? And that you had to accomplish this with a tight budget, expand globally, and keep the project confidential until officially announced by well-known global mobile device manufacturers? That’s what exactly happened to us. This session explains how The Weather Company partnered with AWS to scale our data distribution platform to prepare for unpredictable global demand. We cover the many challenges that we faced as we worked on architecture design, technology and tools selection, load testing, deployment and monitoring, and how we solved these challenges using AWS.
Up-front design of your AWS account can be done in a way that creates a reliably secure and controlled environment no matter how the AWS resources are used. This session will focus on "Secure by Design" principles and show how an AWS environment can be configured to provide a reliable operational security control capability to meet the compliance needs across multiple industry verticals (e.g. HIPAA, FISMA, PCI, etc.). This will include operational reporting through the use of AWS services (e.g. Config/Config Rules, CloudTrail, Inspector, etc.) as well as partner integration capabilities with partner solutions such as Splunk and Allgress for real-time governance, risk, and compliance reporting. Key takeaways from this session include: learning AWS Security best practices and automation capabilities for securing your environment, Automation accelerators for configuration, compliance, and audit reporting using CloudFormation, Config/Config Rules, CloudTrail, Inspector, etc., and ISV integration for real-time notification and reporting for security, compliance, and auditing in the cloud.
VMware CloudTM on AWS brings VMware’s enterprise class Software-Defined Data Center software to Amazon’s public cloud, delivered as an on-demand, elastically scalable, cloud-based VMware sold, operated and supported service for any application and optimized for next-generation, elastic, bare metal AWS infrastructure. This solution enables customers to use a common set of software and tools to manage both their AWS-based and on-premises vSphere resources consistently. Further virtual machines in this environment have seamless access to the broad range of AWS services as well. This session will introduce this exciting new service and examine some of the use cases and benefits. The session will also include a VMware Tech Preview that demonstrates standing up a complete SDDC cluster on AWS and various operations using standard tools like vCenter.
AWS re:Invent 2016: Hybrid Architectures: Bridging the Gap to the Cloud( ARC2...Amazon Web Services
AWS provides many services to assist customers with their journey to the cloud. Hybrid solutions offer customers a way to continue leveraging existing investments on-premises, while expanding their footprint into the public cloud. This session covers the different technologies available to support hybrid architectures on AWS. We discuss common patterns and anti-patterns for solving enterprise workloads across a hybrid environment.
AWS has a number of services that help enterprise customers deploy solutions that meet high performance, security, and reliability requirements. SQL Server is no exception. In this session, we will explore the different options that exist today to help enterprises meet those types of requirements. Another key capability in AWS is flexibility. Multiple options exist for how enterprises can deploy SQL Server in AWS. We will talk in detail about how to choose between a managed database model like Relational Database Service (RDS) or core compute model like Elastic Compute Cloud (EC2). Finally, we’ll wrap up with an exploration of different operational aspects of SQL Server in AWS.
Level 100: Get Started and Migrate Your Data to AWS
Millions of customers are leveraging AWS for increased flexibility, scalability, and reliability. This "how-to" webinar will cover the basics of getting started with AWS and migrating your data to AWS. this session will also cover core AWS services, such as Amazon EC2 and Amazon S3, and provide demonstrations of how to set up and utilize those services to launch virtual machines in the cloud, backup and restore data. This session will also cover the storage options available today to upload/move your data to AWS.
Reasons to attend:
Learn how to create an AWS account and access its free services, to create and run a virtual machine in the cloud
Understand how to create backup and restore an Amazon EC2 instance
Store and share files online with Amazon S3
Learn how to manage costs and set up billing alerts
Leverage the different storage options to migrate your data
Five Steps to Creating a Secure Hybrid Cloud ArchitectureAmazon Web Services
A hybrid Architecture is one of the easiest ways to securely address new application requirements and cloud-first development initiatives. This approach allows you to start small and expand as your requirements change while maintaining a strong security posture. In this session, you will learn the 5 key steps to building a hybrid architecture on AWS using the VM-Series next-generation firewall.
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...Amazon Web Services
In this session, we focus on designing for high availability, with evaluation criteria for using services and features such as Amazon Route 53, Elastic Load Balancing, Auto Scaling, route tables, network interfaces, device clustering, and the Transit VPC architecture. We also explore how to create highly available networking between regions as well as on-premises.
Amazon EC2 changes the economics of computing and provides you with complete control of your computing resources. It is designed to make web-scale cloud computing easier for developers. In this session, we will take you on a journey, starting with the basics of key management and security groups and ending with an explanation of Auto Scaling and how you can use it to match capacity and costs to demand using dynamic policies. We will also discuss tools and best practices that will help you build failure resilient applications that take advantage of the scale and robustness of AWS regions.
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. In this session, we will discuss how constrained devices can leverage AWS IoT to send data to the cloud and receive commands back to the device using the protocol of their choice. We will discuss how devices can connect securely using MQTT and HTTP protocols, and how can developers and businesses can leverage the AWS IoT Rules Engine, Thing Shadows, and accelerate prototype development using AWS IoT Device SDKs. We will cover major hardware platforms from Arduino, Marvell, Dragonboard and MediaTek.
AWS IoT is a managed cloud platform that allows connected IoT devices to easily and securely interact with cloud applications and other devices. In this session, we will discuss how constrained devices can leverage the AWS IoT service to send data to the cloud and receive commands back to the device using the protocol of their choice. We will discuss how devices can connect securely using MQTT and HTTP protocols, and how developers and businesses can leverage the AWS IoT Rules Engine, Thing Shadows, and accelerate prototype development using AWS IoT Device SDKs. Finally, we will cover new features released since the launch of AWS IoT including integration with Amazon Machine Learning and Amazon ElasticSearch Service.
Learn how Amazon Redshift, our fully managed, petabyte-scale data warehouse, can help you quickly and cost-effectively analyze all of your data using your existing business intelligence tools. Get an introduction to how Amazon Redshift uses massively parallel processing, scale-out architecture, and columnar direct-attached storage to minimize I/O time and maximize performance. Learn how you can gain deeper business insights and save money and time by migrating to Amazon Redshift. Take away strategies for migrating from on-premises data warehousing solutions, tuning schema and queries, and utilizing third party solutions.
Delaware Tech Meetup Session held on Oct 1st, 2019 at the Route9 library and Innovation Center. For more events like these, check our LinkedIn group "Delaware Tech Meetup" or its link - https://www.linkedin.com/groups/4181233/
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
Enterprise Service Delivery from the AWS Cloud (ARC208) | AWS re:Invent 2013Amazon Web Services
(Presented by Citrix)
As we move to a world where all users are mobile and apps are increasingly delivered from the cloud, security, compliance, and user experience service-level expectations are higher than ever, necessitating that IT look beyond traditional methods for delivering applications. However, there are intelligent cloud networking and provisioning solutions on AWS that can be leveraged to create a service delivery model that addresses the new paradigm. Learn how Citrix NetScaler VPX on AWS provides full application visibility and control through a combination of customer case studies and demos.
In this session, you learn how to:
-Deploy Citrix application delivery technologies (NetScaler, NetScaler Gateway, CloudBridge) into AWS
-Optimize next-gen web applications delivered from AWS, using traffic management and application acceleration capabilities
-Provide global application availability across on-premises data centers and multiple AWS regions using CloudBridge, global server load balancing, and Amazon Route 53 DNS
This session will start with an overview of the AWS security & compliance programs that enable financial services institutions to create secure workloads as they move to the cloud. We will dive into Financial Services Institutions (FSI) specific security considerations and regional regulations that may need to be considered.
Utah Code Camp is a computer technology conference hosted annually by Utah Geek Events in Salt Lake City, UT. This presentation is an introduction to cloud computing and the Amazon AWS Cloud platform.
The Getting Started on AWS deck serves to introduce Amazon users and prospective customers to the Amazon VPC, EC2 and the concepts and components that are necessary building Fault Tolerant & High Available environments on AWS. It also serves to introduce services like Direct Connect, Router53 (Amazon DNS Service) and one of our new additions, the Amazon
Application Load Balancer (ALB). After perusing this deck, users should have a better understanding of what these services are and their propose benefits.
Pragmatic Approach to Workload Migrations - London Summit Enteprise Track RePlayAmazon Web Services
Migrating a portfolio of legacy applications to AWS cloud infrastructure requires careful planning as each phase needs balancing between risk tolerance and the speed of migration. This session will present a set of successful best practices, tools and techniques that help migration speed of delivery and increase success rate. We will also cover the complete lifecycle of an application portfolio migration including a special focus on how to organise and conduct the assessment and identify elements that can benefit from cloud architecture.
Deep dive into cloud security - Jaimin Gohel & Virendra RathoreNSConclave
Cloud services are the new favorite of attackers. AWS holds a large part of these cloud services. The speakers are going to conduct a hands-on workshop on techniques to conduct a security assessment of the AWS environment.
https://nsconclave.net-square.com/deep-dive-into-cloud-security.html
Talking about modern cloud architectures. AWS being the key component. The sides show how cloud solutions can be incorporated for different businesses. Different components of a cloud are explained in detail. With pictorial representations o the architecture.
Similar to AWS Architecture Fundamentals - Houston (20)
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
6. Breadth and depth with AWS
Original and current AWS
Premier Consulting Partner
Managed Service Partner
100% certified engineers
and architects
Competencies:
DevOps
Big Data
Marketing & Commerce
Life Sciences
SharePoint
Migration
Financial Services
Microsoft Workloads
7. FULLY-MANAGED SECURITY, DELIVERED AS A SERVICE
• Full-stack security
• Integrated analytics & experts
• Built for cloud
• Cost-effective outcomes
We protect cloud workloads & web applications
Data
Center
Hosting
ASSESS
BLOCK COMPLY
DETECT
10. New IT Business Model
Cloud Computing
is first and foremost a
Business Model
10
11. Business Reasons for Adopting Cloud Computing
GoodNot Good
Go global in minutes
Remove undifferentiated
heavy lifting
Stop guessing capacity
Increased agility
Lower variable expense than they
could achieve on their own
Move from capital expense to
variable expense$
11
12. Defining Cloud Computing
NIST defined a well accepted, industry
standard definition of Cloud Computing
url: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
Covers:
5 Key Characteristics of Cloud Computing
3 Service Model
4 Deployment Models
plus
5 Cloud Actors
A Cloud Reference Architecture
Shared Security model
12
13. What is Cloud Computing?
NIST 5 Key Characteristics
#1 On-demand self service
“as easy as buying candy from a vending machine”
#2 Broad network access
“access it anytime from anywhere”
#3 Resource pooling
“you’re not the only user”
#4 Rapid elasticity
“scale up and scale down in real-time”
#5 Measured service
“pay only for what you consume”
13
14. AWS Today - 2017
Public cloud market share
Amazon Web Services: 45%
per Synergy Research Group
AWS generating > $12 billion a year.
14
“It is the overwhelming market share leader, with over 10 times more cloud IaaS
compute capacity in use than the aggregate total of the other 14 providers in this Magic
Quadrant” Gartner Report May, 2015.
18. What are we learning today? Load
balanced Website
• AZ = physical data center
• VPC = virtual data center
• EC2 Instance = virtual machine, VMs
• Security Group = firewall
• AMI = gold image
18
25. VPC – Network and Subnets
• Network Topology
o Private address space
Any range is valid, but we suggest a non-routable CIDR
Public CIDR ranges are only reachable via a Virtual Private Gateway
CIDR ranges can be as large as a /16 to as small as a /28
• Subnets
o Public subnets have a 0.0.0.0/0 route to the Internet Gateway (IGW)
Instances that require a public IP need to reside in a public subnet
o Private subnets do not have an outbound route through the IGW
NAT instances are commonly used as an outbound gateway for private instances
o Subnets cannot span AZ’s, but can share routing tables, which provides similar functionality.
25
26. VPC – Route Tables
• Route Tables
o Can be applied to multiple subnets
o Typical routing entries
10.0.0.0/16 = Local
0.0.0.0/0 = Internet Gateway
(Public Subnet)
-or-
0.0.0.0/0 = eni-12345678 (Private
Subnet)
26
29. Route53 - Basic Feature Set
• Zone Creation
• Zone Import
o Import your zone file from a previous provider
o Delegate this zone to the AWS name servers
• Record Types
o A
o CNAME
o TXT,MX
o Alias
o S3 buckets and ELBs can be an alias target, allows zone apex magic
29
30. Route53 - Advanced Feature Set
• Weighted Resource Record Sets
• Health Checks
• Global Load Balancer
– Using weighted record sets, you can create a pool of
endpoints from which to balance traffic
– Enabling a health-check on this pool allows for a DNS based
load balancer which can be applied to any resource (AWS
or non-AWS)
• Latency Resource Record Sets
• Geolocation Resource Record Sets
30
31. Route53 – Global Failover
• Global Failover Pattern
• Uses R53 Health Checks
Route 53
Virginia Region
myapp.example.com
Ireland Region
31
33. AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge
Locations
Client-side Data
Encryption
Server-side Data
Encryption
Network Traffic
Protection
Platform, Applications, Identity & Access Management
Operating System, Network & Firewall Configuration
Customer content
Customers
Customers are
responsible for
their security IN
the Cloud
AWS is responsible
for the security OF
the Cloud
Security and Compliance – Shared Security Model
34. Shared Responsibility Model is not Static
• Can shift or differ based on technology, business
purpose, architecture
Infrastructure Services Container Services Abstracted Services
35. Current vs AWS
• Network ACLs = access control lists
• Security group = firewall
• CloudTrail = audit tool
• IAM = Active Directory
36. Network ACLs
Behavior:
• Allow/Deny traffic at the subnet level
• Stateless
• Default is Allow All
Pro – further defines permissible traffic
Con – adds complexity and can
complicate troubleshooting
36
37. Security Group Behavior
• Work at instance level
• Stateful
• Deny by default
• IP Whitelisting (CIDR)
• Allow port and protocol
– Can allow TCP, UDP, ICMP or a
combination of all three
• SG Trust Relationships
– Scoped to the VPC
37
38. Client Ingress
SSH and RDP Ingress
Platform Server Ingress
Platform Server Egress
Database Access
SID App
APP
SID_App_Ingress
SID Database
SID View
VIEW
SID_Admin_Ingress
Protocol Port Range Source
TCP 22 10.99.101.0/24
TCP 3389 10.99.101.0/24
SID_App_Egress
Protocol Port Range Destination
TCP 443 10.87.14.29/32
TCP 3306 10.24.3.102/32
SID_DB_Ingress
Protocol Port Range Source
TCP 3306 SID_APP_SG
SID_View_Ingress
Protocol Port Range Source
TCP 80 10.12.0.0/16
TCP 80 10.45.2.0/24
TCP 80 10.62.31.0/24
View Firewall Policies
SID_View_Ingress
SID_Admin_Ingress
App Firewall Policies
SID_App_Ingress
SID_Admin_Ingress
SID_App_Egress
Database Firewall Policies
SID_DB_Ingress
Protocol Port Range Source
TCP 80 10.241.25.0/24
TCP 443 10.241.25.0/24
TCP 8080 SID_VIEW_SG
Security Group/Firewall Rules
38
39. CloudTrail
• Record of API requests and response elements
• who did what and when, from where
• Identity
• Time
• Source
• Parameters
• Response
44. IAM Terms
• User: an entity that you create in AWS to represent the
person or service that uses it to interact with AWS
• Groups: lets you assign permissions to a collection of
users
• Roles: delegate access to users or services that normally
don't have access to your organization's AWS resources
• Policy: Permissions granted to a users, groups and roles
• Instance Profile: a container for an IAM role that you can
use to pass role information to an EC2 instance when the
instance starts
45. IAM Users
o Identity and Access Management
o Create Users and Groups
o Establish Trust Relationships
o Govern Access via Policy Documents
45
47. IAM – AWS Master Account
AWS Account
Master/Root Account Permissions
Allow by default
MFA
Always treat the master account
credentials as if they could launch an
ICBM!
47
49. Directory Service - Overview
Three types of directory services:
o Microsoft AD (Enterprise Edition)
o A managed Microsoft Active Directory service running on Windows Server 2012 R2
o Highly availability (multi-AZ), patched, and monitored
o Automatic daily backups (encrypted)
o Can support up to 50,000 users
o Fully functional MS AD
o Simple AD
o Powered by Samba 4 Active Directory
o Users and Groups can be created directly in the AWS console
o Windows servers can auto-join this domain as they would in an AD environment
o Can support 5,000 users
o AD Connector
o Connect your on-prem AD to your AWS account
o Associate AD users/groups with IAM users/groups
o Windows servers can auto-join this domain as they would in an AD environment
o Manage the AWS console using your AD credentials
49
51. Current vs AWS
Now AWS
Server, VM Instance
Template, Image, Host Profile AMI, Instance Type
Hypervisor (usually ESXi, or Hyper-V) Hypervisor (Xen)
VM Snapshot Snapshot
52. EC2 – Elastic Cloud Compute
AMI
• Instances are based on an Amazon Machine
Image
• You can create new AMIs from a running
instance
• AMIs are unique to each region
52
53. EC2 - Instance Types
Choosing the correct instance type for the required workload
o T2 for light weight general purpose – but with burstable performance
o M4 for general purpose
o R3, X1 for memory and database heavy applications
o C3, C4 for compute heavy applications
o G2, P2 for GPU intensive applications
o I2, D2 for storage heavy applications (random)
o HS1 for storage heavy applications (sequential)
Example of M4 family of instance type
53
Model vCPU
Mem
(GiB)
Dedicated EBS
Bandwidth (Mbps)
m4.large 2 8 450
m4.xlarge 4 16 750
m4.2xlarge 8 32 1,000
m4.4xlarge 16 64 2,000
m4.10xlarge 40 160 4,000
m4.16xlarge 64 256 10,000
54. EC2 - Running Instances
Running instances
•Instances are launched into an existing VPC subnet
•CloudWatch monitoring is enabled by default
o CPU Utilization, Network I/O are the primary data points of interest
o Memory and Disk require an additional script that will post a to a custom
CloudWatch metric
•Status checks
o OS check
o Network reachability check
54
55. EC2 – Instance Recovery
• CloudWatch monitors instance
• Automatically recovers if it becomes impaired
– underlying hardware failure
– problem that requires AWS involvement to repair
• During instance recovery, the instance is migrated during
an instance reboot, and any data that is in-memory is lost
55
57. EC2 - Bootstrapping
User Data
• Provides a hook to inject scripting into any standard instance you decide
to launch
o These include the Amazon Linux, Windows and Ubuntu AMIs
o User Data can only be modified while the instance is stopped
• Suggested patterns
o Install security updates
yum update -y
o Install middleware
yum install -y httpd
chkconfig httpd on
o Download and execute a remote script
Assign an IAM Profile to the EC2 instance
Aws s3 cp s3://mybucket/myscript.sh /tmp/myscript.sh
./tmp/myscript.sh
57
58. EC2 - Pricing
On Demand Instance
• This is the most common and flexible pricing option
• Pay only for what you use
• Stopped instances will not accrue hourly compute costs
• Pay by the instance hour
Reserved Instance (RI)
• 1 or 3 year commitment
• Pay for EC2 hourly at reduced rates (from On Demand rates)
• Payment Options
• No Upfront payment: no CapEx, lower hourly rate than On Demand
• Partial Upfront payment: some CapEx, lower hourly rate than No Upfront
• All Upfront payment: larger Capex, lowest hourly rate possible
58
59. EC2 - Pricing
Spot
• Useful for “worker pool”
scenarios
oTranscode, map reduce
task nodes
• Can be lost as soon as
someone is willing to pay
more for that instance
59
62. ELB - Elastic Load Balancer
Public Side
• Consists of an endpoint which is the equivalent to a
traditional VIP
• Does not use a static IPv4, but rather an Alias/CNAME
• The endpoint will not always resolve to the same IP
Private Side
• Minimum of one virtual ELB node per AZ
Certificate Termination
• Only one SSL certificate per ELB
• Multi-Domain certificates are valid
62
64. Auto Scaling Key Features
• Adds or removes servers based on load
• Self-healing pool of resources
• Every instance is based on a “gold” master image
Auto Scaling - Overview
64
65. Auto scaling group
• Instance location
o Subnet
o Load Balancer
• Number of instances
o Min
o Max
o Desired
Launch config
• Instance details
o Size
o PEM key
o IAM Profile
o Security Group(s)
o User data
Auto Scaling - Components
65
66. Auto Scaling - Multi-AZ
Multi-AZ Auto Scaling
• Highly Available
• Production Standard
• Spans Datacenters
66
67. Auto Scaling - CloudWatch
CloudWatch is the final piece of the auto scaling puzzle. You can create alarms
based on instance metrics which trigger auto scaling actions.
Scaling policies
Scale up alarm
• Execute policy when: CPU is greater than 60%
• Take the action: Add 2 instances
• And then wait: 10 minutes
Scale down alarm
• Execute policy when: CPU is less than 20%
• Take the action: Remove 2 instances
• And then wait: 10 minutes
67
69. Traditional Platform - Storage Architecture
In the old days…
• Hardware acquisition and datacenter space required
advanced planning
• Disk space and I/O allocation juggling for the entire
application lifecycle
• Volume and file redundancy not built-in
• Capital commitment and refresh budget
considerations
/root C:
/swap
Pagefile
Temp Dir
/app
/data
Program
Files
Data
Server Head
NAS or Fileserver
/DirShare 01/
File01
File02
/DirShare 02/
File01
Tape Library
ArchiveVol02
ArchiveVol 01
SMB /CIFS
Platform Monitoring Tools
69
70. AWS Instance Volumes and Data Storage
The new [improved] way of doing things…
• Elastic pay-as-you-go model
• Redundancy and snapshot utilities built-in
• New APIs and tools simplify application development,
administration and data lifecycle management
70
71. Storage Services
• EBS – Elastic Block Store (not actually a ”service”)
• S3 – Simple Storage Service (object storage)
• Standard
• Standard I/A – Infrequent Access
• Reduced Redundancy Storage (RRS) – 4 9’s of durability (1 facility)
• Glacier – Archival/Long-term
• Expedited – 1-5 minutes
• Standard – 3-5 hours
• Bulk – 5-12 hours
• EFS – Elastic File System
• AWS Storage Gateway
• Gateway-cached volumes – store primary data in AWS and cache most recently used data locally
• Gateway-stored volumes – store entire dataset onsite and asynchronously replicate data back to S3
• Gateway-virtual tape library – store your virtual tapes in either S3 or Glacier
71
72. Ephemeral Drives (EC2 Instance Store) Overview
Block device attached to the host machine
• Available to server instance
• May be mounted and used for temporary storage
• No additional usage charges for disk space or I/O
Not redundant: no built-in RAID or snapshot function
Data loss will result if any of the following occur:
• Host server or instance crash
• Instance termination
• Disk failure
/root C:
/swap
Pagefile
Temp Dir
/app
/data
Program
Files
Data
Server Virtual Head
72
73. EBS - Elastic Block Store
Block storage ideal for creating versatile OS volumes
• Define type, size and optionally I/O capacities [within service limits]
• Magnetic, SSD and Provisioned IOPS
• Mount to a single instance, similar to local drive
• Simplified Encryption options
• Volume sizes from 1GiB to 16TiB
Persistent and durable
• Redundant copies stored in single AZ
• Not permanently bound to a server instance and will survive server crash or shutdown
Snapshot capabilities for point-in-time backups
• Resizing and duplicating volumes
• Moving across AZs; Exporting across Regions
Performance metrics available through CloudWatch
73
74. S3 - Simple Storage Service
Object storage container with virtually unlimited capacity
• Store files (objects) in containers (buckets)
• Redundant copies for high durability and reliability
• Available on the internet via REST requests directly or through SDK
• Multiple strategies to secure contents
• Set permissions, access policies and optionally require MFA
• Encryption: Server (simplified) or Client-side
• Audit logging (optional) will record all access requests via APIs
• Built-in tools for managing versioning, object lifecycle and creating static websites
• Provides 99.999999999% durability (11 ‘9s’)
• Provides 99.99% availability
• Unlimited storage, but 5TB limit on file size
/mybucket01/
File01
File02
/mybucket02/
File01
Http / Https
Amazon S3
74
75. Amazon Glacier - Overview
Storage service optimized for reliable and low cost storage of archive data
• Data objects are securely archived, however not immediately accessible
• Create vaults (containers) to hold archives (any file based object)
• Upload archives programmatically
• Submit requests to retrieve archives. Available in about 4 hours
• Cost is approximately $.01/GB/Month plus modest API and retrieval charges [if
applicable]
• Single archive limited to 40TB, but no limit in total amount of storage
75
76. EFS – Elastic File System
Fully managed file server storage
• Uses NFS (v4.1) protocol
• Linux server only, Windows support planned for future release
• Can be mounted by 1,000s of EC2s
• Can be accessed from on-prem Data Center if using Direct Connect
• Highly available, redundant across multiple Azs
• Can grow from empty file system to multiple petabytes automatically
76
81. RDS - Relational Database Service
Fully managed relational database service with the following key advantages:
• Amazon manages resource redundancy, software patching, backups, failure
detection and recovery
• Ability to configure specific resources to cost-effectively scale your application
• Pay-as-you-go model offering included license or license portability [see fine print
to ensure license compliance]
• Streamlined management options to easily configure highly available topologies,
create database snapshots and deploy test instances
81
82. RDS - Relational Database Service
6 Platforms
1. Oracle
2. MS SQL
3. MySQL
4. PostgreSQL
5. MariaDB
6. Amazon Aurora
Fully managed
Zero admin
82
83. AWS Aurora
Fully managed relational database engine that combines the speed and
availability of high-end commercial databases with the simplicity and cost
effectiveness of open source databases.
Key features:
o Architected for 99.99% availability
o Automatic failover < 30s (Possible Oracle RAC solution)
o Enterprise performance (5x) at 1/10 the cost
o Compatible with MySQL and PostgreSQL
o Automatically grows storage as needed, up to 64 TB
o Easy migration from MySQL
o Up to 15 Aurora Replicas in a region
o Cross-region replication
o Encryption in-transit and at rest
o Continuous backup to S3 (11 9’s data durability)
o Fully managed
83
84. DynamoDB
Fully managed NoSQL database service offering the following key advantages:
• Seamless and virtually unlimited scalability conveniently managed
automatically by Amazon
• Ability to define specific resource allocation limits to ensure predictable
performance while containing costs
• Easy administration and well-supported development model
• Integration with other core Amazon data services (for example Redshift and
EMR)
84
85. Redshift
Fully managed Enterprise-class data warehouse service offering the following
advantages:
• High performance, massively parallel columnar storage architecture providing
streamlined scalability
• Mainstream SQL query syntax allowing for rapid platform adoption
• Flexible node type and RI options allowing for workload alignment and cost
efficiency
• Massively scalable 160 GB -> 1.6 PB
85
86. Database Migration Service (DMS)
• AWS Database Migration Service helps you migrate databases to AWS
easily and securely.
• The source database remains fully operational during the migration,
minimizing downtime to applications that rely on the database.
• Homogenous (Oracle to Oracle) & heterogeneous migrations (ie Oracle
to Aurora, or Microsoft SQL Server to MySQL) using Schema Conversion
Tool
• Can also be used for continuous data replication with high-availability
86
87. 87
General Information
1-888-317-7920
info@2ndwatch.com
www.2ndwatch.com
Contact Us
Larry Cusick
Solutions Architect
lcusick@2ndwatch.com
Locations
BOSTON
SEATTLE
NEW YORK
VIRGINIA
ATLANTA
PHILADELPHIA
DALLAS
LIBERTY LAKE
LOS ANGELES
CHICAGO
Marissa Bybee
Regional Territory Manager
mbybee@2ndwatch.com
Matt Curie
Solutions Engineering
mcurie@alertlogic.com