* 발표 동영상: https://youtu.be/tlHzD-UJmOA
기업 업무 환경이 원격으로 이동하면서 작업하며, 한 프로젝트에서 여러 다른 프로젝트로, 또한 국경, 시간대 및 조직의 경계 없이 협업하고 있습니다. AWS는 이런 변화에 대응할 수 있는 민첩성을 제공하기 위해 최종 사용자 컴퓨팅(EUC) 서비스를 구축했습니다. 본 세션을 통해 Amazon EUC인 WorkSpaces, AppStream 2.0, WorkDocs를 소개하고 데모를 통해 구성 방식을 확인할 수 있습니다.
* 발표 동영상: https://youtu.be/IF41bhP5P5w
컨테이너, 서버리스, 마이크로서비스 아키텍처 등 다양한 애플리케이션 현대화를 위한 기술이 쏟아져 나오고 있습니다. 본 세션에는 클라우드 기반의 앱 현대화를 고려하고 계신 분들이 먼저 고려해야 할 5가지 사항과 이를 위한 해법을 소개합니다. 2012년 부터 오랜 기간 클라우드 기반 서비스 개발 및 현대화를 진행해온 삼성전자의 갤럭시 서비스에서 어떻게 컨테이너와 마이크로서비스 기반 아키텍처 경험을 대담과 함께 알아봅니다.
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...Amazon Web Services
Secure user sign-up and sign-in is critical for many mobile and web applications. Amazon Cognito is the easiest way to secure your mobile and web applications by providing a comprehensive identity solution for end user management, registration, sign-in, and security. In this product deep dive, we will walk through Cognito’s feature set, which includes serverless flows for user management and sign-in, a fully managed user directory, integrations with existing corporate directories, and many other features. In addition, we will cover key use cases and discuss the associated benefits.
* 발표 동영상: https://youtu.be/NoCh_GFudiM
본 세션에서는 Amazon 컨테이너 환경에서 애플리케이션을 구동할 때 고려해야 하는 보안 요소들을 알아봅니다. 특히, 컨테이너 이미지 저장소인 Amazon ECR의 이미지 스캐닝, 그리고 접근제어, 민감 정보 처리 등의 컨테이너 보안 베스트 프랙티스를 다룹니다.
* 발표 동영상: https://youtu.be/emc8j-N_JUs
클라우드 환경에서 어플리케이션을 개발하는 것은 서버리스 서비스를 쉽게 활용하는 부분과 마이크로 서비스 아키텍처의 장점의 이해가 필요합니다. 이러한 요건에 대한 이해를 도울 수 있는 세션입니다. 중간에 적절한 Database 선택에 대한 옵션도 소개됩니다. Cloud Native Application에 관심 있는 분들에게 도움이 되는 소개 세션입니다.
Automating Compliance Defense in the Cloud - September 2016 Webinar SeriesAmazon Web Services
Governance, risk, and control of technology is critical for the performance of any organization’s assurance management process. In practice, implementation of this is a near impossible task given the constantly evolving regulatory landscape, massive amounts of incoming and outgoing data, and business units working within siloes. However, through automation, IT departments and compliance teams can efficiently support numerous audit demands imposed on organizations within highly regulated industries like Financial Services, Healthcare, and Life Science. AWS will share best practices around infrastructure design, configuration set-up, and monitoring to augment your compliance operating model so that you can easily automate updates and real-time notifications to take human error out of your compliance functions and demonstrate comprehensive governance of your business.
Learning Objectives:
• Learn what an comprehensive governance model looks like
• Learn why it's important for an organization to automate in its 3 lines of defense – operations, compliance, and internal audit
• Learn what AWS services you can enable to
Who Should Attend:
• Technology risk managers, third-party risk managers, compliance officers, information security executives
* 발표 동영상: https://youtu.be/DJlt1v4Gya8
AWS Single Sign-On(SSO)을 사용하면 여러 AWS 계정 및 비즈니스 애플리케이션에 대한 액세스를 중앙에서 손쉽게 관리하고 사용자에게 Single Sign-On 액세스를 제공하여 할당된 모든 계정 및 애플리케이션을 한 곳에서 액세스하도록 할 수 있습니다.
Getting Started with Cognito User Pools - September Webinar SeriesAmazon Web Services
You can now use Amazon Cognito to easily add user sign-up and sign-in to your mobile and web apps instead of worrying about user management, authentication, and sync across platforms and devices. With the User Pools feature, you can create your own user directory that can scale to hundreds of millions of users, and is fully managed so you don’t have to worry about building, securing, and scaling authentication to your apps. In this webinar, we will walk your through adding the process of adding user sign-up and sign-in to your mobile and web apps.
Learning Objectives:
*Learn to add user sign-up and sign-in to your mobile and web apps quickly and easily
*Authenticate users through social identity providers such as Facebook, Twitter, or Amazon and provide secure access to AWS resources
AWS는 다양한 서비스 빌딩 블록을 이용하여, 고객의 요구에 따른 다양한 사물 인터넷(IoT) 서비스를 구축할 수 있습니다. 본 온라인 세미나에서는 AWS IoT 서비스의 주요 개념과 함께 일반적인 인터넷 기기 및 스마트 홈을 위한 IoT 서비스 구현 패턴을 알아봅니다. 이를 위해 데이터 상태 관리, 데이터 분석 및 자원 관리 등의 패턴을 통해 비용 효율적이고 확장 가능한 아키텍처를 살펴봅니다.
AWS Lambda, API Gateway, DynamoDB 등 서버리스 빌딩 블록과 AWS IoT를 연계한 iRobot의 아카텍처 사례를 함께 살펴봄으로서 IoT 기반 서비스 구현 및 이전에 통찰력을 얻으실 수 있습니다.
* 발표 동영상: https://youtu.be/IF41bhP5P5w
컨테이너, 서버리스, 마이크로서비스 아키텍처 등 다양한 애플리케이션 현대화를 위한 기술이 쏟아져 나오고 있습니다. 본 세션에는 클라우드 기반의 앱 현대화를 고려하고 계신 분들이 먼저 고려해야 할 5가지 사항과 이를 위한 해법을 소개합니다. 2012년 부터 오랜 기간 클라우드 기반 서비스 개발 및 현대화를 진행해온 삼성전자의 갤럭시 서비스에서 어떻게 컨테이너와 마이크로서비스 기반 아키텍처 경험을 대담과 함께 알아봅니다.
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...Amazon Web Services
Secure user sign-up and sign-in is critical for many mobile and web applications. Amazon Cognito is the easiest way to secure your mobile and web applications by providing a comprehensive identity solution for end user management, registration, sign-in, and security. In this product deep dive, we will walk through Cognito’s feature set, which includes serverless flows for user management and sign-in, a fully managed user directory, integrations with existing corporate directories, and many other features. In addition, we will cover key use cases and discuss the associated benefits.
* 발표 동영상: https://youtu.be/NoCh_GFudiM
본 세션에서는 Amazon 컨테이너 환경에서 애플리케이션을 구동할 때 고려해야 하는 보안 요소들을 알아봅니다. 특히, 컨테이너 이미지 저장소인 Amazon ECR의 이미지 스캐닝, 그리고 접근제어, 민감 정보 처리 등의 컨테이너 보안 베스트 프랙티스를 다룹니다.
* 발표 동영상: https://youtu.be/emc8j-N_JUs
클라우드 환경에서 어플리케이션을 개발하는 것은 서버리스 서비스를 쉽게 활용하는 부분과 마이크로 서비스 아키텍처의 장점의 이해가 필요합니다. 이러한 요건에 대한 이해를 도울 수 있는 세션입니다. 중간에 적절한 Database 선택에 대한 옵션도 소개됩니다. Cloud Native Application에 관심 있는 분들에게 도움이 되는 소개 세션입니다.
Automating Compliance Defense in the Cloud - September 2016 Webinar SeriesAmazon Web Services
Governance, risk, and control of technology is critical for the performance of any organization’s assurance management process. In practice, implementation of this is a near impossible task given the constantly evolving regulatory landscape, massive amounts of incoming and outgoing data, and business units working within siloes. However, through automation, IT departments and compliance teams can efficiently support numerous audit demands imposed on organizations within highly regulated industries like Financial Services, Healthcare, and Life Science. AWS will share best practices around infrastructure design, configuration set-up, and monitoring to augment your compliance operating model so that you can easily automate updates and real-time notifications to take human error out of your compliance functions and demonstrate comprehensive governance of your business.
Learning Objectives:
• Learn what an comprehensive governance model looks like
• Learn why it's important for an organization to automate in its 3 lines of defense – operations, compliance, and internal audit
• Learn what AWS services you can enable to
Who Should Attend:
• Technology risk managers, third-party risk managers, compliance officers, information security executives
* 발표 동영상: https://youtu.be/DJlt1v4Gya8
AWS Single Sign-On(SSO)을 사용하면 여러 AWS 계정 및 비즈니스 애플리케이션에 대한 액세스를 중앙에서 손쉽게 관리하고 사용자에게 Single Sign-On 액세스를 제공하여 할당된 모든 계정 및 애플리케이션을 한 곳에서 액세스하도록 할 수 있습니다.
Getting Started with Cognito User Pools - September Webinar SeriesAmazon Web Services
You can now use Amazon Cognito to easily add user sign-up and sign-in to your mobile and web apps instead of worrying about user management, authentication, and sync across platforms and devices. With the User Pools feature, you can create your own user directory that can scale to hundreds of millions of users, and is fully managed so you don’t have to worry about building, securing, and scaling authentication to your apps. In this webinar, we will walk your through adding the process of adding user sign-up and sign-in to your mobile and web apps.
Learning Objectives:
*Learn to add user sign-up and sign-in to your mobile and web apps quickly and easily
*Authenticate users through social identity providers such as Facebook, Twitter, or Amazon and provide secure access to AWS resources
AWS는 다양한 서비스 빌딩 블록을 이용하여, 고객의 요구에 따른 다양한 사물 인터넷(IoT) 서비스를 구축할 수 있습니다. 본 온라인 세미나에서는 AWS IoT 서비스의 주요 개념과 함께 일반적인 인터넷 기기 및 스마트 홈을 위한 IoT 서비스 구현 패턴을 알아봅니다. 이를 위해 데이터 상태 관리, 데이터 분석 및 자원 관리 등의 패턴을 통해 비용 효율적이고 확장 가능한 아키텍처를 살펴봅니다.
AWS Lambda, API Gateway, DynamoDB 등 서버리스 빌딩 블록과 AWS IoT를 연계한 iRobot의 아카텍처 사례를 함께 살펴봄으로서 IoT 기반 서비스 구현 및 이전에 통찰력을 얻으실 수 있습니다.
Best Practices for Managing Security Operations in AWS - March 2017 AWS Onlin...Amazon Web Services
To help prevent unexpected access to your AWS resources, it is critical to maintain strong identity and access policies. It is equally important to track and alert on changes to your AWS resources. In this tech talk, you will learn how to use AWS Identity and Access Management (IAM) to control access to your AWS resources and integrate your existing authentication system with AWS IAM. We will cover how you can deploy and control your AWS infrastructure using code templates, including change management policies with AWS CloudFormation. In addition, we will explore different options for managing both your AWS access logs and your Amazon Elastic Compute Cloud (EC2) system logs using Amazon CloudWatch Logs. We also will cover how to use these logs to implement an audit and compliance validation process using services such as AWS Config, AWS CloudTrail, and Amazon Inspector.
Learning Objectives:
• Understand the AWS Shared Responsibility Model.
• Understand AWS account and identity management options and configuration.
• Learn the concept of infrastructure as code and change management using AWS CloudFormation.
• Learn how to audit and log your AWS service usage.
• Learn about AWS services to add automatic compliance checks to your AWS infrastructure.
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Amazon Web Services
Learn how AWS IAM enables you to control who can do what in your AWS environment. We discuss how IAM provides flexible access control that helps you maintain security while adapting to your evolving business needs. Wel review how to integrate AWS IAM with your existing identity directories via identity federation. We outline some of the unique challenges that make providing IAM for the cloud a little different. And throughout the presentation, we highlight recent features that make it even easier to manage the security of your workloads on the cloud.
(Diapositivas de presentación son en inglés.)
Las arquitecturas serverless permiten construir y ejecutar aplicaciones y servicios sin necesidad de manejar una infraestructura. En esta sesión veremos la filosofía de AWS y las mejores prácticas para construir aplicaciones basadas en microservicios, cómo servicios de AWS como Lambda y API Gateway benefician a los desarrolladores y cómo nuestros clientes están usando estos servicios y el resto de servicios de AWS para construir sus aplicaciones.
Curious about AWS Mobile Services and latest updates? Attend this session for a deep dive on recent updates to AWS Mobile Services aimed at helping you build scalable, reliable, and feature-rich mobile apps. We’ll dig into the new features and discuss the relevant use cases. Specifically, we will cover the following releases: Amazon Cognito Your User Pools - Add sign-up and sign-on to your mobile apps, Amazon Simple Notification Service Global SMS - Send SMS messages to phone numbers in 200+ countries, and AWS Device Farm Remote Access - Gesture, swipe, and interact with iOS and Android devices in real time, directly from your web browser.
An Overview of Designing Microservices Based Applications on AWS - March 2017...Amazon Web Services
Microservices are an architectural approach to decompose complex applications into smaller, independent services. AWS customers benefit from increased agility, simplified scalability, resiliency, and faster deployments by migrating from monoliths to microservices based architecture.
In this session, we will provide an overview of the benefits and challenges of microservices, and share best practices for architecting and deploying microservices on AWS. We will dive into different approaches you can take to run microservices applications at scale and explore how services like Amazon ECS, AWS Lambda, and AWS X-Ray make it simpler to design and maintain these applications.
Learning Objectives:
1. Understand the fundamentals of the microservices architectural approach
2. Learn best practices for designing microservices on AWS
3. Learn the basics of Amazon EC2 Container Service, AWS Lambda, and AWS X-Ray
AWS provides several security capabilities and services to increase privacy and control infrastructure access. Built-in firewalls allow you to create private networks within AWS, and also control network access to your instances and subnets. Identity and access management capabilities enable you to define individual user accounts with permissions across AWS resources. AWS also provides tools and features that enable you to see exactly what’s happening in your AWS environment. In this session, you will gain an understanding of preventive and detective controls at the infrastructure level on AWS. We will cover Identity and Access Management as well as the security aspects of Amazon EC2, Virtual Private Cloud (VPC), Elastic Load Balancing (ELB), and CloudTrail.
DevOps en Amazon: Un vistazo a nuestras herramientas y procesosAmazon Web Services
(Diapositivas de presentación son en inglés.)
Mientras equipos de desarrollo transicionan a arquitecturas basadas en la nube y adoptan procesos más ágiles, las herramientas que necesitan para ayudarles en sus ciclos de desarrollo cambiarán. En esta sesión, os llevaremos por la transición que Amazon hizo a una arquitectura orientada a servicios hace más de una década. Compartiermos las lecciones aprendidas, los procesos que adoptamos y las herramientas que construimos para incrementar la agilidad y la fiabilidad. También os introduciremos a AWS CodeCommit, AWS CodePipeline, y AWS CodeDeploy, tres servicios que han nacido de la propia experiencia interna de DevOps en Amazon.
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. This webinar will introduce the best practices for IoT Security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, as well as integrate devices with other AWS services to create secure solutions.
Learning Objectives:
• Common IoT Thing Management Issues
• Learn about AWS IoT Security and Access Control Mechanisms
• Build Secure interactions with the AWS Cloud
Who Should Attend:
• Technical Decision Makers, Developers, Makers
Accelerating Cloud Services and How to Match your Workload to the Right Intel...Amazon Web Services
This presentation will take you through the underlying Intel technologies available in AWS EC2 Instances, what benefits these technologies can provide and how to use these technologies to maximise your use case workloads AWS EC2 Instances provide a wide selection of instance types, optimised to fit a broad and diverse set of use cases, all supported by the latest Intel Xeon processors and technologies providing you with confidence to choose an AWS EC2 instance type that best meet your performance needs for compute intensive, memory intensive, or IOPS intensive applications.
So, if you are interested in how to maximise your existing code optimisations and investments or thinking about migrating workloads to AWS come to this session.
Speaker: Peter Kerney, Lead Enterprise Architect, Cloud, SDI and NFV, Intel
이제는 말할 수 있다: KBS, beNX의 AWS 활용법 – 선영진 KBS 부장, 강진우 beNX 팀장, 강호성 beNX 엔지니어:: AW...Amazon Web Services Korea
AWS를 활용하여 다양한 혁신을 이루는 고객분들 중에서 KBS와 beNX의 활용사례를 전달드립니다. 최근 KBS는 미디어 자산의 디지털 프로세스인 Media Factory 프로젝트를 완료하셨고, beNX는 Weverse 플랫폼을 AWS에서 운영하면서 다양한 서비스를 결합하여 팬들과의 소통 채널을 확보하였습니다. 이러한 고객분들이 왜 클라우드 환경과 AWS를 선택하였는지, 그리고 어떠한 문제점들을 극복하였는지 전달드립니다.
Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016Amazon Web Services
The AWS cloud provides a rich set of options around identity and access management. On the identity side, AWS has built-in identities that you can directly manage or synchronize, rich federation support with corporate or web identity systems, and also integration with AWS Directory Service. On the access management side, all AWS services share a powerful access control model and policy language, and some provide resource-based policies as well. In this session, we survey these rich capabilities and show how they integrate with existing identity systems.
현대백화점 리테일테크랩과 AWS Prototyping 팀 개발자가 들려주는 인공 지능 무인 스토어 개발 여정 - 최권열 AWS 프로토타이핑...Amazon Web Services Korea
더 현대 서울에 최근 오픈한 언커먼스토어 개발에 참여했던 개발자들로부터 생생한 개발 경험을 데모와 함께 이야기 나눕니다. 개발에 적용된 인공지능/기계학습 기술 중의 하나인 딥러닝 기반 컴퓨터 비전 기술 적용 사례를 알아 보고, 민첩하고 빠른 개발을 통하여 단기간에 상용화할 수 있도록 이끌어준 AWS 서비스들과 Practice들(Modern Application, MLOps, Agile)에 대해서 속깊은 이야기를 나눠봅니다.
AWS is architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely. When using AWS, not only are infrastructure headaches removed, but so are many of the security issues that come with them.
Best Practices for Managing Security Operations in AWS - March 2017 AWS Onlin...Amazon Web Services
To help prevent unexpected access to your AWS resources, it is critical to maintain strong identity and access policies. It is equally important to track and alert on changes to your AWS resources. In this tech talk, you will learn how to use AWS Identity and Access Management (IAM) to control access to your AWS resources and integrate your existing authentication system with AWS IAM. We will cover how you can deploy and control your AWS infrastructure using code templates, including change management policies with AWS CloudFormation. In addition, we will explore different options for managing both your AWS access logs and your Amazon Elastic Compute Cloud (EC2) system logs using Amazon CloudWatch Logs. We also will cover how to use these logs to implement an audit and compliance validation process using services such as AWS Config, AWS CloudTrail, and Amazon Inspector.
Learning Objectives:
• Understand the AWS Shared Responsibility Model.
• Understand AWS account and identity management options and configuration.
• Learn the concept of infrastructure as code and change management using AWS CloudFormation.
• Learn how to audit and log your AWS service usage.
• Learn about AWS services to add automatic compliance checks to your AWS infrastructure.
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Amazon Web Services
Learn how AWS IAM enables you to control who can do what in your AWS environment. We discuss how IAM provides flexible access control that helps you maintain security while adapting to your evolving business needs. Wel review how to integrate AWS IAM with your existing identity directories via identity federation. We outline some of the unique challenges that make providing IAM for the cloud a little different. And throughout the presentation, we highlight recent features that make it even easier to manage the security of your workloads on the cloud.
(Diapositivas de presentación son en inglés.)
Las arquitecturas serverless permiten construir y ejecutar aplicaciones y servicios sin necesidad de manejar una infraestructura. En esta sesión veremos la filosofía de AWS y las mejores prácticas para construir aplicaciones basadas en microservicios, cómo servicios de AWS como Lambda y API Gateway benefician a los desarrolladores y cómo nuestros clientes están usando estos servicios y el resto de servicios de AWS para construir sus aplicaciones.
Curious about AWS Mobile Services and latest updates? Attend this session for a deep dive on recent updates to AWS Mobile Services aimed at helping you build scalable, reliable, and feature-rich mobile apps. We’ll dig into the new features and discuss the relevant use cases. Specifically, we will cover the following releases: Amazon Cognito Your User Pools - Add sign-up and sign-on to your mobile apps, Amazon Simple Notification Service Global SMS - Send SMS messages to phone numbers in 200+ countries, and AWS Device Farm Remote Access - Gesture, swipe, and interact with iOS and Android devices in real time, directly from your web browser.
An Overview of Designing Microservices Based Applications on AWS - March 2017...Amazon Web Services
Microservices are an architectural approach to decompose complex applications into smaller, independent services. AWS customers benefit from increased agility, simplified scalability, resiliency, and faster deployments by migrating from monoliths to microservices based architecture.
In this session, we will provide an overview of the benefits and challenges of microservices, and share best practices for architecting and deploying microservices on AWS. We will dive into different approaches you can take to run microservices applications at scale and explore how services like Amazon ECS, AWS Lambda, and AWS X-Ray make it simpler to design and maintain these applications.
Learning Objectives:
1. Understand the fundamentals of the microservices architectural approach
2. Learn best practices for designing microservices on AWS
3. Learn the basics of Amazon EC2 Container Service, AWS Lambda, and AWS X-Ray
AWS provides several security capabilities and services to increase privacy and control infrastructure access. Built-in firewalls allow you to create private networks within AWS, and also control network access to your instances and subnets. Identity and access management capabilities enable you to define individual user accounts with permissions across AWS resources. AWS also provides tools and features that enable you to see exactly what’s happening in your AWS environment. In this session, you will gain an understanding of preventive and detective controls at the infrastructure level on AWS. We will cover Identity and Access Management as well as the security aspects of Amazon EC2, Virtual Private Cloud (VPC), Elastic Load Balancing (ELB), and CloudTrail.
DevOps en Amazon: Un vistazo a nuestras herramientas y procesosAmazon Web Services
(Diapositivas de presentación son en inglés.)
Mientras equipos de desarrollo transicionan a arquitecturas basadas en la nube y adoptan procesos más ágiles, las herramientas que necesitan para ayudarles en sus ciclos de desarrollo cambiarán. En esta sesión, os llevaremos por la transición que Amazon hizo a una arquitectura orientada a servicios hace más de una década. Compartiermos las lecciones aprendidas, los procesos que adoptamos y las herramientas que construimos para incrementar la agilidad y la fiabilidad. También os introduciremos a AWS CodeCommit, AWS CodePipeline, y AWS CodeDeploy, tres servicios que han nacido de la propia experiencia interna de DevOps en Amazon.
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. This webinar will introduce the best practices for IoT Security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, as well as integrate devices with other AWS services to create secure solutions.
Learning Objectives:
• Common IoT Thing Management Issues
• Learn about AWS IoT Security and Access Control Mechanisms
• Build Secure interactions with the AWS Cloud
Who Should Attend:
• Technical Decision Makers, Developers, Makers
Accelerating Cloud Services and How to Match your Workload to the Right Intel...Amazon Web Services
This presentation will take you through the underlying Intel technologies available in AWS EC2 Instances, what benefits these technologies can provide and how to use these technologies to maximise your use case workloads AWS EC2 Instances provide a wide selection of instance types, optimised to fit a broad and diverse set of use cases, all supported by the latest Intel Xeon processors and technologies providing you with confidence to choose an AWS EC2 instance type that best meet your performance needs for compute intensive, memory intensive, or IOPS intensive applications.
So, if you are interested in how to maximise your existing code optimisations and investments or thinking about migrating workloads to AWS come to this session.
Speaker: Peter Kerney, Lead Enterprise Architect, Cloud, SDI and NFV, Intel
이제는 말할 수 있다: KBS, beNX의 AWS 활용법 – 선영진 KBS 부장, 강진우 beNX 팀장, 강호성 beNX 엔지니어:: AW...Amazon Web Services Korea
AWS를 활용하여 다양한 혁신을 이루는 고객분들 중에서 KBS와 beNX의 활용사례를 전달드립니다. 최근 KBS는 미디어 자산의 디지털 프로세스인 Media Factory 프로젝트를 완료하셨고, beNX는 Weverse 플랫폼을 AWS에서 운영하면서 다양한 서비스를 결합하여 팬들과의 소통 채널을 확보하였습니다. 이러한 고객분들이 왜 클라우드 환경과 AWS를 선택하였는지, 그리고 어떠한 문제점들을 극복하였는지 전달드립니다.
Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016Amazon Web Services
The AWS cloud provides a rich set of options around identity and access management. On the identity side, AWS has built-in identities that you can directly manage or synchronize, rich federation support with corporate or web identity systems, and also integration with AWS Directory Service. On the access management side, all AWS services share a powerful access control model and policy language, and some provide resource-based policies as well. In this session, we survey these rich capabilities and show how they integrate with existing identity systems.
현대백화점 리테일테크랩과 AWS Prototyping 팀 개발자가 들려주는 인공 지능 무인 스토어 개발 여정 - 최권열 AWS 프로토타이핑...Amazon Web Services Korea
더 현대 서울에 최근 오픈한 언커먼스토어 개발에 참여했던 개발자들로부터 생생한 개발 경험을 데모와 함께 이야기 나눕니다. 개발에 적용된 인공지능/기계학습 기술 중의 하나인 딥러닝 기반 컴퓨터 비전 기술 적용 사례를 알아 보고, 민첩하고 빠른 개발을 통하여 단기간에 상용화할 수 있도록 이끌어준 AWS 서비스들과 Practice들(Modern Application, MLOps, Agile)에 대해서 속깊은 이야기를 나눠봅니다.
AWS is architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely. When using AWS, not only are infrastructure headaches removed, but so are many of the security issues that come with them.
Amazon Web Services Federation Integration Governance Workshop with Layer 7CA API Management
For these customers needing a way to bridge the enterprise and public cloud without limiting scale out, Layer 7 demonstrates a simple solution for addressing the challenges of federation, integration and governance using the Layer 7 AWS Gateway.
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014Amazon Web Services
This session brings together the interests of engineering, compliance, and security experts, and shows you how to align your AWS workload to the controls in the HIPAA Security Rule. You hear from customers who process and store Protected Health Information (PHI) on AWS, and you learn how they satisfied their compliance requirements while maintaining agility. This session helps security and compliance experts find out what is technically possible on AWS and learn how implementing the Technical Safeguards in the HIPAA Security Rule can be simple and familiar. We walk through the Technical Safeguards of the Security Rule and map them to AWS features and design choices to help developers, operations teams, and engineers speak the language of their security and compliance peers.
Transitioning to the Next Generation Hybrid Cloud Operating Model- AWS Summit...Amazon Web Services
AWS provides many services to assist customers with their journey to the cloud. Hybrid solutions offer customers a way to continue leveraging existing investments on-premises, while expanding their footprint into the public cloud. This session covers the different technologies available to support hybrid architectures on AWS. We discuss common patterns and anti-patterns for solving enterprise workloads across a hybrid environment.
Pragmatic Approach to Workload Migrations - London Summit Enteprise Track RePlayAmazon Web Services
Migrating a portfolio of legacy applications to AWS cloud infrastructure requires careful planning as each phase needs balancing between risk tolerance and the speed of migration. This session will present a set of successful best practices, tools and techniques that help migration speed of delivery and increase success rate. We will also cover the complete lifecycle of an application portfolio migration including a special focus on how to organise and conduct the assessment and identify elements that can benefit from cloud architecture.
In this session, learn how you evaluate, design, build, and manage distributed applications over hybrid infrastructures using Amazon Web Services. This session follows the evolution of a simple legacy data center expansion with basic connectivity into managing complex hybrid applications. Along the way, we investigate best practice designs in use by AWS customers. Topics covered include interconnectivity, availability, security, and hybrid networks with Amazon VPC and AWS Direct Connect, as well as automated provisioning with AWS CloudFormation and configuration management with AWS OpsWorks.
In this session, learn how you evaluate, design, build, and manage distributed applications over hybrid infrastructures using Amazon Web Services. This session follows the evolution of a simple legacy data center expansion with
basic connectivity into managing complex hybrid applications. Along the way, we investigate best practice designs in use by AWS customers. Topics covered include: interconnectivity, availability, security, hybrid networks with Amazon VPC and AWS Direct Connect as well as automated provisioning with AWS CloudFormation, and configuration management with AWS OpsWorks.
Speakers:
Miha Kralj, AWS Solutions Architect
Amarpal S. Attwal, Senior Technical Lead, ICT Engineering, Just Eat
Koen van den Biggelaar, AWS Solutions Architect
사례로 알아보는 Database Migration Service : 데이터베이스 및 데이터 이관, 통합, 분리, 분석의 도구 - 발표자: ...Amazon Web Services Korea
Database Migration Service(DMS)는 RDBMS 이외에도 다양한 데이터베이스 이관을 지원합니다. 실제 고객사 사례를 통해 DMS가 데이터베이스 이관, 통합, 분리를 수행하는 데 어떻게 활용되는지 알아보고, 동시에 데이터 분석을 위한 데이터 수집(Data Ingest)에도 어떤 역할을 하는지 살펴보겠습니다.
Amazon Elasticache - Fully managed, Redis & Memcached Compatible Service (Lev...Amazon Web Services Korea
Amazon ElastiCache는 Redis 및 MemCached와 호환되는 완전관리형 서비스로서 현대적 애플리케이션의 성능을 최적의 비용으로 실시간으로 개선해 줍니다. ElastiCache의 Best Practice를 통해 최적의 성능과 서비스 최적화 방법에 대해 알아봅니다.
Internal Architecture of Amazon Aurora (Level 400) - 발표자: 정달영, APAC RDS Speci...Amazon Web Services Korea
ccAmazon Aurora 데이터베이스는 클라우드용으로 구축된 관계형 데이터베이스입니다. Aurora는 상용 데이터베이스의 성능과 가용성, 그리고 오픈소스 데이터베이스의 단순성과 비용 효율성을 모두 제공합니다. 이 세션은 Aurora의 고급 사용자들을 위한 세션으로써 Aurora의 내부 구조와 성능 최적화에 대해 알아봅니다.
[Keynote] 슬기로운 AWS 데이터베이스 선택하기 - 발표자: 강민석, Korea Database SA Manager, WWSO, A...Amazon Web Services Korea
오랫동안 관계형 데이터베이스가 가장 많이 사용되었으며 거의 모든 애플리케이션에서 널리 사용되었습니다. 따라서 애플리케이션 아키텍처에서 데이터베이스를 선택하기가 더 쉬웠지만, 구축할 수 있는 애플리케이션의 유형이 제한적이었습니다. 관계형 데이터베이스는 스위스 군용 칼과 같아서 많은 일을 할 수 있지만 특정 업무에는 완벽하게 적합하지는 않습니다. 클라우드 컴퓨팅의 등장으로 경제적인 방식으로 더욱 탄력적이고 확장 가능한 애플리케이션을 구축할 수 있게 되면서 기술적으로 가능한 일이 달라졌습니다. 이러한 변화는 전용 데이터베이스의 부상으로 이어졌습니다. 개발자는 더 이상 기본 관계형 데이터베이스를 사용할 필요가 없습니다. 개발자는 애플리케이션의 요구 사항을 신중하게 고려하고 이러한 요구 사항에 맞는 데이터베이스를 선택할 수 있습니다.
Demystify Streaming on AWS - 발표자: 이종혁, Sr Analytics Specialist, WWSO, AWS :::...Amazon Web Services Korea
실시간 분석은 AWS 고객의 사용 사례가 점점 늘어나고 있습니다. 이 세션에 참여하여 스트리밍 데이터 기술이 어떻게 데이터를 즉시 분석하고, 시스템 간에 데이터를 실시간으로 이동하고, 실행 가능한 통찰력을 더 빠르게 얻을 수 있는지 알아보십시오. 일반적인 스트리밍 데이터 사용 사례, 비즈니스에서 실시간 분석을 쉽게 활성화하는 단계, AWS가 Amazon Kinesis와 같은 AWS 스트리밍 데이터 서비스를 사용하도록 지원하는 방법을 다룹니다.
Amazon EMR - Enhancements on Cost/Performance, Serverless - 발표자: 김기영, Sr Anal...Amazon Web Services Korea
Amazon EMR은 Apache Spark, Hive, Presto, Trino, HBase 및 Flink와 같은 오픈 소스 프레임워크를 사용하여 분석 애플리케이션을 쉽게 실행할 수 있는 관리형 서비스를 제공합니다. Spark 및 Presto용 Amazon EMR 런타임에는 오픈 소스 Apache Spark 및 Presto에 비해 두 배 이상의 성능 향상을 제공하는 최적화 기능이 포함되어 있습니다. Amazon EMR Serverless는 Amazon EMR의 새로운 배포 옵션이지만 데이터 엔지니어와 분석가는 클라우드에서 페타바이트 규모의 데이터 분석을 쉽고 비용 효율적으로 실행할 수 있습니다. 이 세션에 참여하여 개념, 설계 패턴, 라이브 데모를 사용하여 Amazon EMR/EMR 서버리스를 살펴보고 Spark 및 Hive 워크로드, Amazon EMR 스튜디오 및 Amazon SageMaker Studio와의 Amazon EMR 통합을 실행하는 것이 얼마나 쉬운지 알아보십시오.
Amazon OpenSearch - Use Cases, Security/Observability, Serverless and Enhance...Amazon Web Services Korea
로그 및 지표 데이터를 쉽게 가져오고, OpenSearch 검색 API를 사용하고, OpenSearch 대시보드를 사용하여 시각화를 구축하는 등 Amazon OpenSearch의 새로운 기능과 기능에 대해 자세히 알아보십시오. 애플리케이션 문제를 디버깅할 수 있는 OpenSearch의 Observability 기능에 대해 알아보세요. Amazon OpenSearch Service를 통해 인프라 관리에 대해 걱정하지 않고 검색 또는 모니터링 문제에 집중할 수 있는 방법을 알아보십시오.
Enabling Agility with Data Governance - 발표자: 김성연, Analytics Specialist, WWSO,...Amazon Web Services Korea
데이터 거버넌스는 전체 프로세스에서 데이터를 관리하여 데이터의 정확성과 완전성을 보장하고 필요한 사람들이 데이터에 액세스할 수 있도록 하는 프로세스입니다. 이 세션에 참여하여 AWS가 어떻게 분석 서비스 전반에서 데이터 준비 및 통합부터 데이터 액세스, 데이터 품질 및 메타데이터 관리에 이르기까지 포괄적인 데이터 거버넌스를 제공하는지 알아보십시오. AWS에서의 스트리밍에 대해 자세히 알아보십시오.
Amazon Redshift Deep Dive - Serverless, Streaming, ML, Auto Copy (New feature...Amazon Web Services Korea
이 세션에 참여하여 Amazon Redshift의 새로운 기능을 자세히 살펴보십시오. Amazon Data Sharing, Amazon Redshift Serverless, Redshift Streaming, Redshift ML 및 자동 복사 등에 대한 자세한 내용과 데모를 통해 Amazon Redshift의 새로운 기능을 알고 싶은 사용자에게 적합합니다.
From Insights to Action, How to build and maintain a Data Driven Organization...Amazon Web Services Korea
데이터는 혁신과 변혁의 토대입니다. 비즈니스 혁신을 이끄는 혁신은 특정 시점의 전략이나 솔루션이 아니라 성장을 위한 반복적이고 집단적인 계획입니다. 혁신에 이러한 접근 방식을 채택하는 기업은 전략과 비즈니스 문화에서 데이터를 기반으로 하는 경우가 많습니다. 이러한 접근 방식을 개발하려면 리더가 데이터를 조직의 자산처럼 취급하고 조직이 더 나은 비즈니스 성과를 위해 데이터를 활용할 수 있도록 권한을 부여해야 합니다. AWS와 Amazon이 어떻게 데이터와 분석을 활용하여 확장 가능한 비즈니스 효율성을 창출하고 고객의 가장 복잡한 문제를 해결하는 메커니즘을 개발했는지 알아보십시오.
[Keynote] Accelerating Business Outcomes with AWS Data - 발표자: Saeed Gharadagh...Amazon Web Services Korea
데이터는 최종 소비자의 성공에 초점을 맞춘 디지털 혁신에서 중추적인 역할을 하고 있습니다. 모든 기업들은 데이터를 자산으로 사용하여 사례 제공을 추진하고 까다로운 결과를 해결하고 있습니다. AWS 클라우드 기술과 분석 솔루션의 강력한 성능을 통해 고객은 혁신 여정을 가속화할 수 있습니다. 이 세션에서는 기업 고객들이 클라우드에서 데이터의 힘을 활용하여 혁신 목표를 달성하고 필요한 결과를 제공하는 방법에 대해 다룹니다.
LG전자 - Amazon Aurora 및 RDS 블루/그린 배포를 이용한 데이터베이스 업그레이드 안정성 확보 - 발표자: 이은경 책임, L...Amazon Web Services Korea
LG ThinQ는 LG전자의 가전제품과 서비스를 아우르는 플랫폼 브랜드로서 앱 하나로 간편한 컨트롤, 똑똑한 케어, 스마트한 쇼핑까지 한번에 가능한 플랫폼입니다. ThinQ 플랫폼은 글로벌 서비스로 제공되고 있어, 작업 시간을 최소화하고, 서비스의 영향을 최소화 할 필요가 있었습니다. 따라서 DB 버전 업그레이드 작업 시 애플리케이션 배포가 필요없는 Blue/Green Deployment 방식은 최선의 선택이 되었습니다.
KB국민카드 - 클라우드 기반 분석 플랫폼 혁신 여정 - 발표자: 박창용 과장, 데이터전략본부, AI혁신부, KB카드│강병억, Soluti...Amazon Web Services Korea
온프레미스 분석 플랫폼에는 자원 증설 비용, 자원 관리 비용, 신규 자원 도입 및 환경 설정의 리드타임 등 다양한 측면에서의 한계가 존재합니다. 이에 KB국민카드에서는 기존 분석 플랫폼의 한계를 극복함과 동시에 시너지를 낼 수 있는 클라우드 기반 분석 플랫폼을 설계 및 도입하였습니다. 본 사례 소개는 KB국민카드의 데이터 혁신 여정과 노하우를 소개합니다.
SK Telecom - 망관리 프로젝트 TANGO의 오픈소스 데이터베이스 전환 여정 - 발표자 : 박승전, Project Manager, ...Amazon Web Services Korea
SK Telecom의 망관리 프로젝트인 TANGO에서는 오라클을 기반으로 시스템을 구축하여 운영해 왔습니다. 하지만 늘어나는 사용자와 데이터로 인해 유연하고 비용 효율적인 인프라가 필요하게 되었고, 이에 클라우드 도입을 검토 및 실행에 옮기게 되었습니다. TANGO 프로젝트의 클라우드 도입을 위한 검토부터 준비, 실행 및 이를 통해 얻게 된 교훈과 향후 계획에 대해 소개합니다.
코리안리 - 데이터 분석 플랫폼 구축 여정, 그 시작과 과제 - 발표자: 김석기 그룹장, 데이터비즈니스센터, 메가존클라우드 ::: AWS ...Amazon Web Services Korea
2022년 코리안리는 핵심업무시스템(기간계/정보계 시스템)을 AWS 클라우드로 전환하는 사업과 AWS 클라우드 기반에서 손익분석을 위한 어플리케이션 구축 사업을 동시에 진행하고 있었습니다. 이에 따라 클라우드 전환 이후 시스템 간 상호운용성과 호환성을갖춘 데이터 분석 플랫폼 또한 필요하게 되었습니다. 코리안리 IT 환경에 적합한 플랫폼 선정을 위하여 AWS Native Analytics Platform, 3rd Party Analytics Platform (클라우데라, 데이터브릭스)과의 PoC를 진행하고, 최종적으로 AWS Native Analytics Platform 으로 확정하였습니다. 코리안리는 메가존클라우드와 함께 2022년 10월부터 4개월(구축 3개월, 안정화 및 교육 1개월) 동안 AWS 기반 데이터 분석 플랫폼을 구축하고 활용 범위를 지속적으로 확대하고 있습니다.
LG 이노텍 - Amazon Redshift Serverless를 활용한 데이터 분석 플랫폼 혁신 과정 - 발표자: 유재상 선임, LG이노...Amazon Web Services Korea
LG 이노텍은 세계 시장을 선도하는 글로벌 소재·부품기업으로, Amazon Redshift 을 데이터 분석 플랫폼의 핵심 서비스로 활용하고 있습니다.지속적인 데이터 증가와 업무 확대에 따른 유연한 아키텍처 개선의 필요성에 대처하기 위해, 2022년에 AWS 에서 발표된 Redshift Serverless 를 활용한, 비용 최적화된 아키텍처 개선 과정의 실사례를 엿볼수 있는 기회가 됩니다.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
2. Agenda
data center is changing
Overview of Amazon WorkSpaces
Overview of Amazon AppStream 2.0
Overview of Amazon WorkDocs
Design considerations
3. More than the data center is changing
1 in 5
jobs
are held by contractors
79%
of organizations
expect an increase in M&A
70%
of workers
worked remotely
1 in 4
data breaches
involve lost or stolen devices
Moving to Desktop-as-a-Service (DaaS):
51%
up from 43% in 2017
Workforce increasingly agile Security increasingly important
1 2 3 4
5
1. https://www.npr.org/2018/01/23/579690595/the-mystery-of-contract-work-why-so-many-guys
2. https://www2.deloitte.com/us/en/pages/mergers-and-acquisitions/articles/m-a-trends-report.html
3. https://www.cnbc.com/2018/05/30/70-percent-of-people-globally-work-remotely-at-least-once-a-week-iwg-study.html
4. https://www.trendmicro.com/vinfo/us/security/definition/data-breach
5. https://reprints.forrester.com/#/assets/2/374/RES135901/reports
4. Customers are choosing AWS
Contractors
Remote
employees
Mergers and
acquisitions
Specialized
applications
VDI
replacement
AWS
User experience
Cost optimization
Global scale
Security
Reliability
Agility and elasticity
5. AWS end-user computing services
Desktop-as-a-Service
Application streaming Mobile web access
File storage
Fully-managed
Pay-as-you-go
Reliable & secure
6. VDI on AWS Amazon EUC servicesVDI on premises
Fully managed
9. Amazon WorkSpaces
Improve security
and compliance posture
Simplify desktop
management
Access desktops from
anywhere on any device
Optimize costs with
flexible bundles and
pricing options
Fully managed, secure Linux or
Windows desktops on AWS
11. Improves security
Desktop stream
encrypted in transit
No sensitive data on
user devices
Storage encrypted
at rest
Amazon WorkSpaces encrypts data and streams
and keeps information off devices
12. Plays well with existing tools
Microsoft Active
Directory
Multifactor
authentication
(MFA)
(RADIUS-based)
Systems/patch
management
(SCCM, BigFix, WSUS)
Intranet
Amazon WorkSpaces integrates easily with your on-premises tools and network
Certificate
authority
18. Amazon AppStream 2.0
Deliver desktop applications to any computer
It integrates with
existing IT
Centrally manage
applications
Secure application
streaming
Scale without
infrastructure
20. Multiple instance families
• One session – one VM = consistent performance
• Match application workload to instance characteristics
• General purpose: Knowledge-worker applications
• Compute optimized: Compute-bound applications that benefit
from high-performance processors
• Memory optimized: Applications that process large datasets
in memory
• Graphics optimized: High graphics requirements
22. AppStream 2.0 administrator workflow
Image builder
Used to install
and configure
business
applications
Image assistant
Used to define
and optimize
applications
presented,
configure default
user settings, and
create an image
Define a fleet
Configurations
include image,
instance types,
networking,
and scaling
configurations
Provision a stack
Configurations
include fleet, user
storage, access
permission options,
and customer
branding
AD + SAML or
user pools
Used to define
users and grant
stack access
User
User
User
Administrator
23. AppStream 2.0 - Network Flow
Fleet
Streaming
Gateway
File share, license servers,
databases, design vaults
S3-persistent user and
settings storage (optional)
AWS services/resources
VPN or
Direct Connect
Microsoft Active
Directory (optional)
On-premises
User identity via
SAML, API, or User
Pool
Streaming VPCE
(optional)
Customer VPC
AppStream 2.0 VPC (198.19.x)
1. Connectivity to AppStream 2.0 uses HTTPS via TCP443 over the internet
a) Using the optional streaming VPCE maintains the pixel, USB, user input, audio, clipboard, file
upload/download, and printer traffic within the customer VPC
b) The user needs internet access for the AppStream 2.0 web assets and authentication
2. Security groups are used to control network access to the customer VPC
3. AppStream 2.0 streaming instance access to the internet is through the customer VPC
1
1
1
2
AWS Cloud
Image Builders
3rd party storage
integrations
(optional)
3
HPC cluster
Rendering farm
Microsoft Active
Directory (optional)
24. Private subnet
AppStream 2.0 - Instance network details
Customer VPCAppStream 2.0 VPC (198.19.x)
Streaming
gateway
Streaming
instance
Security group
On-premises network
File share, license servers, databases,
design vaults
Internet access
1. Connectivity to AppStream 2.0 uses HTTPS via TCP443 over the
Internet
a) Using the optional streaming VPCE maintains the pixel, USB, user
input, audio, clipboard, file upload/download, and printer traffic
within the customer VPC
b) The user needs Internet access for the AppStream 2.0 web assets and
authentication
2. Security groups are used to control network access to the customer
VPC
3. All user-generated traffic is through the customer network
interface/VPC
Interactive pixel
stream via HTTPS
Security group
Interactive pixel
stream via HTTPS
Security group
Security group
1
1
2
3
• The AppStream 2.0 streaming instance is in the AWS-managed VPC with an Elastic Network Interface
(ENI) in the customer-selected VPC/subnet
• Fleet streaming instances are ephemeral; they are terminated after the user session completes
• Streaming instances are launched from the customer-created image with the instance type and size
chosen
AWS services/resources
Private subnet Private subnet
Private subnet
25. SAML 2.0 Built-in user pool Custom identity
Identity: Bring your own or built-in
26. Domain join: User experience
End user
Customer Active
Directory
Intranet site/SAML login
Customer Active
Directory
Access control
through Active
Directory group
SSO or Auth with
Active Directory login
+ 2FA
User login – once per
session
AppsApp catalog
Auth with
Active Directory login
29. Amazon WorkDocs
Secure, fully managed file
storage with an extensible SDK
Integrates with
existing IT
Secure and
auditable content
store
Extensible SDK
Global
access
30. Amazon WorkDocs Features
Secure File Sharing Real time auditing and
compliance
Smart search Mobile and field
productivity
Enterprise security
Tasks and simple
workflows
Replace network file
shares
Developer SDK
for integration
31. Security
Network security
SSL/TLS secure tunnel for files transmission
256-bit encryption applied to all data in rest and
transit
User security
Strong Authentication, authorization,
and access controls
Enterprise AD integration
OAuth 2.0 Authentication
Multi-factor Authentication
Governance and compliance
HIPAA compliant
PCI/DSS compliant
ISO 9001, 27001, 27017, 27018
Datacenter security
SSAE 16 and SAS 70 compliant
Disaster recovery policies
Continuous threat assessment
Physical security, 24-hour surveillance
Biometric access controls
File security controls
Auditing and reporting
Unlimited versions
Recycle restores within 180 days
Disable file downloads & print
Links with expiration and access code
Site security controls
Sharing controls
Storage limits
Real time site wide activity auditing
User management
32. AppStream 2.0 & WorkDocs - Network Flow
Fleet
Streaming
Gateway
File share, license servers,
databases, design vaults
S3-persistent user and
settings storage (optional)
AWS services/resources
VPN or
Direct Connect
Microsoft Active
Directory (optional)
On-premises
User identity via
SAML, API, or User
Pool
Streaming VPCE
(optional)
Customer VPC
AppStream 2.0 VPC (198.19.x)
AWS Cloud
Image Builders
3rd party storage
integrations
(optional)HPC cluster
Rendering farm
Microsoft Active
Directory (optional)
AWS Single Sign-OnAmazon WorkDocs
35. The approach
• Decide on user segmentation
• Select the initial use cases
• Evaluate performance
characteristics
• Build the pilot solution
• Run user acceptance testing
• Deploy
• Iterate
36. Task workers
Call center
WorkSpaces
Standard bundle
AppStream 2.0
General-purpose instances
Devices
Thin client,* zero client,* or
lower-end laptop
User experience
Willing to work as directed
Applications
Web and a few low-compute-intensity apps
Specialists
Designer, developer,
analyst, finance
WorkSpaces
PowerPro, Graphics, or GraphicsPro;
WorkSpaces for Linux for developers;
AppStream if only 1–2 apps
Devices
BYOD or corporate device
User experience
Near-native responsiveness and experience;
full desktop
Applications
A few high-intensity apps
Knowledge workers
Sales, marketing, finance,
operations, manufacturers
WorkSpaces
Standard, performance or Power
bundles
Devices
BYOD or agency device
User Experience
Near-native responsiveness and experience;
full desktop
Applications
Variety of applications over time
*Thin and zero clients for WorkSpaces require working directly with Teradici
Typical business drivers: End user experience | TCO | Security
Corporate personas and use cases
37. AWS account structure
Primary/payer account
Logging Config Billing
Dev
Prod
User
…Isolated app/
third party
Shared services
AD MFA ADFS
…
All log files flow to primary
VPC/VPN
peering
Linked accounts
Key recommendations
• Payer/linked account structure
• Only central logging in
payer account
• User environment in
separate account
38. Network design: Subnets
Amazon WorkSpaces requires two subnets in
different Availability Zones
AppStream 2.0 should be deployed across two
subnets in different Availability Zones
Subnets should be sized to accommodate the
target end-state capacity
39. Elastic network interfaces
An instance in either service has two
network interfaces
ETH0 is the service interface
ETH1 is the interface in your VPC
Routing rules and security groups affect ETH1;
you have full control of this interface
User traffic can route to file servers, backend
databases, licensing servers, and so on, either in
your VPC, in a peered VPC, or on premises
40. Directory integration
• All WorkSpaces will be joined
to an Active Directory domain
• AWS Directory Service is
required to connect users to
their WorkSpace
• Fleets can be domain-joined
or stand-alone
• AD-joined fleets integrate
via SAML2.0 with your
identity provider
41. Active Directory recommendations
• Extend your Active Directory into AWS on Amazon Elastic Compute
Cloud (Amazon EC2) instances
• AWS Transit Gateway/VPC Peering:
enable connectivity between Workspaces VPC and
the Shared Services VPC
• Define your VPCs in Active Directory
sites and services
• Separate Active Directory OUs by service and Region
42. Try it now
Try Amazon WorkSpaces;
free tier available!
Run two standard bundle
WorkSpaces for 40 hours a month
Amazon Linux 2 or Windows 10
experience, including WorkDocs
with 50 GB user storage
40 hours per month for use
of the stream.standard.large
instance type when using
Image Builder
Try sample applications—
business, design, engineering,
and developer
Upload your own files, test a
workflow, save your work,
and print
Try WorkDocs;
free tier available!
30-day free trial with 1 TB
of storage per user for up to
50 users
Amazon WorkSpaces users
get WorkDocs with 50 GB of
storage for no additional
charge
https://aws.amazon.com/free/
43. AWS 온라인 교육 과정
• AWS Cloud Practitioner Essentials
AWS 클라우드의 기초를 배우고, AWS Certified Cloud
Practitioner 공인 자격 시험을 준비할 수 있는 과정입니다.
https://www.aws.training/Details/Curriculum?id=32442
• AWS 클라우드 보안 기초
AWS 액세스 제어 및 관리, 거버넌스, 로깅 및 암호화 방법 등
AWS의 보안 개념을 소개합니다.
https://www.aws.training/Details/Curriculum?id=11048
• Amazon Elastic Block Storage (EBS) 소개
AWS 클라우드의 Amazon EC2 인스턴스에 사용할 블록
스토리지 볼륨을 제공하는 Amazon Elastic Block
Store(EBS)를 소개합니다.
https://www.aws.training/Details/Video?id=37393
자신의 속도에 맞춰 학습하세요.
무료 AWS 디지털 교육을 통해
편한 시간에 원하는 장소에서
최신 클라우드 기술을
학습할 수 있습니다.
44. AWS Builders Online Series에
참석해주셔서 대단히 감사합니다.
aws-korea-marketing@amazon.com
twitter.com/AWSKorea
facebook.com/amazonwebservices.ko
youtube.com/user/AWSKorea
slideshare.net/awskorea
twitch.tv/aws
저희가 준비한 내용, 어떻게 보셨나요?
더 나은 세미나를 위하여 설문을 꼭 작성해 주시기 바랍니다.