In this session, we provide an overview of AWS identity services within the context of a typical cloud journey. We learn about each service, the high-level capabilities each provides, and how they all fit and work together to provide you with a robust identity foundation. We also learn how to better advance your own identity-services cloud journey with confidence and speed. Finally, we look more closely at several identity-based use cases where the power and programmability of the cloud is radically simplifying implementation and strengthening security.
Planning advanced AWS networking architectures - SVC304 - Chicago AWS SummitAmazon Web Services
The document discusses advanced AWS networking architectures including AWS Transit Gateway, AWS PrivateLink, and AWS Global Accelerator. It provides an overview of each service and how they can help interconnect VPCs at scale, provide private connectivity to services, and route traffic across regions with low latency. Examples of use cases are also presented, such as using Transit Gateway to interconnect multiple VPCs and VPNs through a single connection point.
Exploring the fundamentals of AWS networking - SVC210 - Chicago AWS SummitAmazon Web Services
The document is a presentation on AWS networking fundamentals that covers topics like VPCs, subnets, routing, security, internet connectivity, connecting VPCs, and connecting to on-premises networks. It provides examples and explanations of how to configure networking components in AWS like NAT gateways, VPC peering, Transit Gateways, and more. The presentation aims to explain core AWS networking concepts and help attendees explore networking options in AWS.
Building APIs from front to back - MAD314 - Chicago AWS SummitAmazon Web Services
APIs have become the norm for allowing applications to communicate with each other. On AWS, customers are turning to Amazon API Gateway to build HTTP, REST, or WebSocket APIs, providing communication endpoints between services and clients. However, Amazon API Gateway can do much more. In this session, we demo how to up a REST API using API Gateway. We walk though configuring a simple Lambda-based backend and then add on capabilities around data modeling and validation, custom responses, and functionless integration with backend services. Learn of some of the advanced functionality that can be done at the API level before it ever hits your backend service.
Detecting and mitigating threats with AWS - SEC301 - Chicago AWS SummitAmazon Web Services
Rarely does a day go by that we’re not reminded about the importance of the security of our online assets. Bad actors are continuously probing and looking for ways to compromise organizations’ defenses to gain access to valuable data or cause disruptions. In this session, learn how to address threat detection and remediation with AWS. We summarize the challenges of traditional threat detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of the key AWS services that detect and remediate threats, such as Amazon GuardDuty.
Introduction to AWS Global Accelerator - SVC211 - Chicago AWS SummitAmazon Web Services
No matter how much effort, money, and resources you invest in your applications to ensure high availability and low latency, it won’t matter if your users are accessing them via a slow or congested public network. In this session, we introduce AWS Global Accelerator, a new global service that enables you to optimally route traffic to your multi-regional endpoints via static Anycast IP addresses that are announced from the expansive AWS edge network. This session walks through various features and customer use cases, including several examples that demonstrate how you can use Global Accelerator to achieve near-zero application downtime and reduce latency for your global applications.
Exploring the fundamentals of AWS networking - SVC211 - New York AWS SummitAmazon Web Services
Although the basic concepts underpinning traditional networks and networks for the cloud are similar, there are many issues that are specific to each. In this session, we explore the fundamentals of networking in AWS. First we look at the basics of designing and building VPCs, including selecting your IP space, subnetting, routing, security, and more. We then discuss different approaches and scenarios for connecting your VPC to your data center with AWS VPN or AWS Direct Connect. This mid-level architecture discussion is for architects, network administrators, and technology decision-makers interested in understanding the building blocks that are available with Amazon VPC.
In this interactive chalk talk, learn how to publish self-service remediation actions with AWS Systems Manager and AWS Service Catalog. Also, understand how you can use AWS Config to manage configuration drift and governance on AWS. Finally, learn how Moody’s uses AWS Systems Manager to automate patching across multiple cloud providers. Bring your questions, and join us for this discussion.
Finding all the threats: AWS threat detection and remediation - SEC303 - Chic...Amazon Web Services
The struggle to safeguard valuable online assets is an ongoing and critical one. But to protect those assets, first we must detect the threats and then effectively respond. In this hands-on workshop, we walk through some real-world threat scenarios and show you the AWS services involved with threat detection and remediation. You learn about the threat detection capabilities of Amazon GuardDuty, Amazon Macie, and AWS Config and the available remediation options. For each hands-on scenario, we review methods to remediate the threat using GuardDuty, Macie, and AWS Config, as well as AWS CloudFormation, Amazon S3, AWS CloudTrail, Amazon VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, DNS logs, AWS Lambda, and Amazon Inspector.
Planning advanced AWS networking architectures - SVC304 - Chicago AWS SummitAmazon Web Services
The document discusses advanced AWS networking architectures including AWS Transit Gateway, AWS PrivateLink, and AWS Global Accelerator. It provides an overview of each service and how they can help interconnect VPCs at scale, provide private connectivity to services, and route traffic across regions with low latency. Examples of use cases are also presented, such as using Transit Gateway to interconnect multiple VPCs and VPNs through a single connection point.
Exploring the fundamentals of AWS networking - SVC210 - Chicago AWS SummitAmazon Web Services
The document is a presentation on AWS networking fundamentals that covers topics like VPCs, subnets, routing, security, internet connectivity, connecting VPCs, and connecting to on-premises networks. It provides examples and explanations of how to configure networking components in AWS like NAT gateways, VPC peering, Transit Gateways, and more. The presentation aims to explain core AWS networking concepts and help attendees explore networking options in AWS.
Building APIs from front to back - MAD314 - Chicago AWS SummitAmazon Web Services
APIs have become the norm for allowing applications to communicate with each other. On AWS, customers are turning to Amazon API Gateway to build HTTP, REST, or WebSocket APIs, providing communication endpoints between services and clients. However, Amazon API Gateway can do much more. In this session, we demo how to up a REST API using API Gateway. We walk though configuring a simple Lambda-based backend and then add on capabilities around data modeling and validation, custom responses, and functionless integration with backend services. Learn of some of the advanced functionality that can be done at the API level before it ever hits your backend service.
Detecting and mitigating threats with AWS - SEC301 - Chicago AWS SummitAmazon Web Services
Rarely does a day go by that we’re not reminded about the importance of the security of our online assets. Bad actors are continuously probing and looking for ways to compromise organizations’ defenses to gain access to valuable data or cause disruptions. In this session, learn how to address threat detection and remediation with AWS. We summarize the challenges of traditional threat detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of the key AWS services that detect and remediate threats, such as Amazon GuardDuty.
Introduction to AWS Global Accelerator - SVC211 - Chicago AWS SummitAmazon Web Services
No matter how much effort, money, and resources you invest in your applications to ensure high availability and low latency, it won’t matter if your users are accessing them via a slow or congested public network. In this session, we introduce AWS Global Accelerator, a new global service that enables you to optimally route traffic to your multi-regional endpoints via static Anycast IP addresses that are announced from the expansive AWS edge network. This session walks through various features and customer use cases, including several examples that demonstrate how you can use Global Accelerator to achieve near-zero application downtime and reduce latency for your global applications.
Exploring the fundamentals of AWS networking - SVC211 - New York AWS SummitAmazon Web Services
Although the basic concepts underpinning traditional networks and networks for the cloud are similar, there are many issues that are specific to each. In this session, we explore the fundamentals of networking in AWS. First we look at the basics of designing and building VPCs, including selecting your IP space, subnetting, routing, security, and more. We then discuss different approaches and scenarios for connecting your VPC to your data center with AWS VPN or AWS Direct Connect. This mid-level architecture discussion is for architects, network administrators, and technology decision-makers interested in understanding the building blocks that are available with Amazon VPC.
In this interactive chalk talk, learn how to publish self-service remediation actions with AWS Systems Manager and AWS Service Catalog. Also, understand how you can use AWS Config to manage configuration drift and governance on AWS. Finally, learn how Moody’s uses AWS Systems Manager to automate patching across multiple cloud providers. Bring your questions, and join us for this discussion.
Finding all the threats: AWS threat detection and remediation - SEC303 - Chic...Amazon Web Services
The struggle to safeguard valuable online assets is an ongoing and critical one. But to protect those assets, first we must detect the threats and then effectively respond. In this hands-on workshop, we walk through some real-world threat scenarios and show you the AWS services involved with threat detection and remediation. You learn about the threat detection capabilities of Amazon GuardDuty, Amazon Macie, and AWS Config and the available remediation options. For each hands-on scenario, we review methods to remediate the threat using GuardDuty, Macie, and AWS Config, as well as AWS CloudFormation, Amazon S3, AWS CloudTrail, Amazon VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, DNS logs, AWS Lambda, and Amazon Inspector.
This document provides an overview of Amazon Virtual Private Clouds (VPC) and networking fundamentals on AWS. It discusses key VPC concepts like IP addressing, subnets, routing, security groups, network access control lists and internet connectivity. It also covers options for connecting VPCs like VPC peering and the AWS Transit Gateway which allows connections between multiple VPCs and on-premises networks.
Continuous security monitoring and threat detection with AWS services - SEC20...Amazon Web Services
This document discusses continuous security monitoring and threat detection using AWS services. It describes how AWS services like GuardDuty, Macie, and Security Hub use machine learning to detect threats in customer environments by analyzing log data and security findings. It also discusses how to build threat detection solutions using these services and how to automate threat response using services like Lambda, CloudWatch Events, and Systems Manager.
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Amazon Web Services
The move to AWS enables new application and architectural patterns that are in a continual state of change. The only way that your infrastructure, security, and operations can keep pace with these changes is with automation. In this session, we discuss the various automation tools you can use to first deploy the AWS infrastructure (as code), add the VM-Series to protect against threats (security as code), and then automatically update the policy based on Amazon GuardDuty or AWS Security Hub finding (operations as code). A brief demonstration concludes the session. This presentation is brought to you by AWS partner, Palo Alto Networks.
Delivering applications securely with AWS - SVC303 - Chicago AWS SummitAmazon Web Services
Networking is the foundation that supports many applications on AWS. The way you architect your network helps to determine how reliable, secure, and performant your applications are. In this session, we discuss the easy and secure delivery of applications to your users over the AWS global network. We answer your questions and cover multiple delivery methods that use Amazon CloudFront, AWS Global Accelerator, and AWS PrivateLink.
Getting started with AWS IoT Core - SVC306 - New York AWS SummitAmazon Web Services
Get hands-on with the main components of AWS IoT Core. In this session, you learn how to connect and manage your devices, secure device connections and data, process and act upon device data, and read and set device state at any time. Work with the device gateway and high-throughput message broker to securely transmit messages among all your IoT devices and applications. Set up the registry to track device attributes and metadata and create a persistent, virtual version of each device. Finally, explore the rules engine to author rules within the management console or using a SQL-like syntax. Please bring a laptop, and make sure to sign up for an AWS account.
Detecting and responding to critical events with AWS IoT Events - SVC205 - Ch...Amazon Web Services
The vast majority of Internet of Things (IoT) customers are connecting many pieces of equipment with multiple independent sensors. For these customers, detecting a critical operational event, such as when equipment variability reduces the quality of its output, can be challenging. In this session, you learn how AWS IoT Events makes it possible to easily and cost effectively detect system-wide events and respond with appropriate actions to drive results such as optimizing manufacturing efficiency or improving production quality.
Do you need a ledger database or a blockchain? - SVC310 - Chicago AWS SummitAmazon Web Services
This session introduces two new AWS services for blockchain and ledger technology: Amazon Quantum Ledger Database (Amazon QLDB) and Amazon Managed Blockchain. We discuss what these services do, the problems they solve, and when each should be used. We also dive deep into details about service features and how the services work; explain key concepts such as immutability and centralized vs. decentralized trust; and review use cases.
Using automation to drive continuous-compliance best practices - SVC309 - Chi...Amazon Web Services
Northwestern Mutual’s technology teams maintain a complex compliance environment for a diverse set of developers working within more than 100 AWS accounts. To drive best practices and ensure continuous compliance, they designed an AWS-based architecture using services such as AWS Lambda, Amazon DynamoDB, Amazon Simple Queue Service (Amazon SQS), and Amazon CloudWatch to auto-remediate misconfigurations. In this session, we discuss how these services help Northwestern Mutual swiftly correct configurations and integrate with tools like Slack and Pagerduty to create logs, notify developers and account owners of changes, and track trends in remediation.
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Amazon Web Services
For companies that employ DevOps practices to push applications faster into production through better collaboration and automated testing, security is often seen as an inhibitor to speed. The challenge for many organizations is getting applications delivered at a fast pace while embedding security at the speed of DevOps. In this session, you learn how AWS Marketplace products and customers help make DevSecOps a well-orchestrated methodology for ensuring the speed, stability, and security of your applications.
Accelerating your cloud migration with VMware Cloud on AWS - CMP205 - Chicago...Amazon Web Services
Customers are using VMware Cloud on AWS to accelerate cloud migrations, deploy hybrid architectures, and replace their disaster recovery environments. VMware Cloud on AWS brings a new dimension of hybrid cloud and mixed architecture to many customers, offering the opportunity to augment and evolve existing and legacy applications. In this session, learn how VMware Cloud on AWS helps build a lower-risk and iterative transformation approach to your traditional applications and data in a hybrid environment. Also learn best practices to protect and scale your workload by natively integrating AWS services, such as AWS Direct Connect, Amazon S3, Amazon RDS, and Elastic Load Balancing.
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...Amazon Web Services
The NIST Cybersecurity Framework (CSF) is endorsed by government and industry as a recommended baseline for use by any organization, regardless of sector or size, to implement risk-management best practices and achieve desired security outcomes. In this session, we discuss how organizations can use AWS to align to the CSF by providing a detailed breakout of AWS services and associated customer responsibilities (security in the cloud) and AWS responsibilities (security of the cloud).
AWS networking fundamentals - SVC303 - Santa Clara AWS SummitAmazon Web Services
In this session, we first cover build-out and design fundamentals for VPCs, including selecting your IP space, subnetting, routing, security, and more. We then discuss different approaches and scenarios for connecting your VPC to your data center with AWS VPN or AWS Direct Connect. Throughout this presentation, we discuss our latest networking services and updates, including AWS Transit Gateway and AWS PrivateLink. This mid-level architecture discussion is for architects, network administrators, and technology decision makers interested in understanding the building blocks that AWS makes available with Amazon VPC. Learn how to connect VPCs with your offices and data center footprint.
Technical deep dive: Cloud data management with Veeam and AWS - SVC202-S - Ch...Amazon Web Services
There are many things to consider when you move backups to AWS and manage data protection across on-premises and cloud environments. Veeam and N2WS (a Veeam company) enable data protection and portability to the AWS Cloud with enterprise-class backup and disaster recovery for Amazon EC2, Amazon RDS, Amazon DynamoDB, and Amazon EBS. In this technical session, learn how to scale for growth on the AWS Cloud and manage data protection for thousands of Amazon EC2 instances. We cover how to back up, restore, and protect databases and workloads with N2WS Backup & Recovery and the new Veeam Backup & Replication for AWS. This session is brought to you by AWS partner, Veeam.
Introduction to AWS OutIntroduction to AWS Outposts - CMP203 - Chicago AWS Su...Amazon Web Services
AWS Outposts allows customers to run compute and storage on-premises while connecting to AWS's full range of services in the cloud. It provides three main benefits:
1) It allows customers to build applications once and deploy them on-premises or in the cloud using the same AWS APIs, services, and tools.
2) It offers a fully managed service model so customers don't have to worry about procuring, operating, or maintaining their own infrastructure.
3) It provides the same security, performance, reliability, and operational experience of AWS regions while also addressing the needs of applications that require low latency access to on-premises systems or local data processing.
Moving desktops & applications to AWS with Amazon WorkSpaces & AppStream 2 - ...Amazon Web Services
IT organizations today need to support a mobile, flexible, global workforce and ensure that their users can be productive anywhere. Moving desktops and applications to AWS offers improved security, scale, and performance with cloud economics. In this session, we provide an overview of Amazon WorkSpaces and Amazon AppStream 2.0, and we discuss the use cases for each. Then, we dive deep into best practices for implementing Amazon WorkSpaces and AppStream 2.0, including how to integrate with your existing identity, security, networking, and storage solutions.
Best practices for queue processing in serverless applications - MAD313 - Chi...Amazon Web Services
In this session, we learn about best practices to help you integrate serverless applications using Amazon Simple Queue Service (Amazon SQS). We explore how to tune AWS Lambda and Amazon SQS to scale your existing applications without having to worry about provisioning capacity. We also discuss how to bridge high-scale serverless applications with limited server-full applications such as relational databases.
A few milliseconds in the life of an HTTP request - SVC303 - New York AWS SummitAmazon Web Services
In Amazon CloudFront, a lot happens in just a few milliseconds. Come dive deep into the infrastructure and architecture of AWS edge services, including CloudFront, Amazon Route 53, AWS Shield, and AWS WAF. We break down the life of an HTTP request (and any request in general) and walk you through how all AWS edge services work together in just a few milliseconds to consistently deliver your application’s content with high availability, security, and performance. Learn how edge services intelligently route requests to the most ideal edge location, secure your content behind the scenes, and leverage the AWS private network for improved performance.
This document provides an overview of AWS networking fundamentals including VPC concepts such as IP addressing, subnets, routing, security groups, and connecting VPCs. It discusses choosing IP address ranges and creating subnets across availability zones. It also covers routing and traffic flow, DNS options, network security using security groups and network ACLs, and VPC flow logs. Methods for connecting VPCs like VPC peering, Transit Gateway, VPN connections, and Direct Connect are also summarized.
AWS App Mesh (Service Mesh Magic)- AWS Container Day 2019 BarcelonaAmazon Web Services
In this session, learn about how AWS App Mesh can help give you end-to-end visibility and manage traffic routing to ensure high availability for your microservice. We will cover what the need for a service mesh, capabilities of App Mesh, and show you a demo.
How to speed up and scale your innovation efforts - MAD203 - Chicago AWS SummitAmazon Web Services
By applying microservices powered by serverless technology, you can innovate faster, at scale. In this session, we share insights into the Amazon Culture of Innovation and explain how the company went from four million to over 60 million deployments per year. We discuss how the company benefitted from its own key learnings through building modern apps at Amazon. We also discuss how Amazon transitioned from a monolithic application environment to an event-driven serverless microservices environment. Learn why more and more organizations are choosing the serverless operational model.
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ne...Amazon Web Services
In this session, we provide an overview of AWS identity services within the context of a typical cloud journey. Learn about each service, the high-level capabilities they provide, and how the services fit and work together to provide you a robust identity foundation. Learn how to better advance your own journey with confidence and speed. Finally, we take a deeper look at several identity-based use cases where the cloud’s power and programmability are radically simplifying implementation and strengthening security.
AWS identity services - Enabling & securing your cloud journey - SEC202 - San...Amazon Web Services
Throughout your journey to the AWS Cloud, you will encounter and rely on a number of AWS identity services. In this session, we provide an overview of AWS identity services within the context of a typical cloud journey. Learn about each service, the capabilities it provides, and how the services fit and work together to provide you with a robust foundation and enable you to advance your journey with confidence and speed. Finally, we take a deeper look at a number of identity-based use cases, where the power and programmability of the cloud is radically simplifying implementation and strengthening security.
This document provides an overview of Amazon Virtual Private Clouds (VPC) and networking fundamentals on AWS. It discusses key VPC concepts like IP addressing, subnets, routing, security groups, network access control lists and internet connectivity. It also covers options for connecting VPCs like VPC peering and the AWS Transit Gateway which allows connections between multiple VPCs and on-premises networks.
Continuous security monitoring and threat detection with AWS services - SEC20...Amazon Web Services
This document discusses continuous security monitoring and threat detection using AWS services. It describes how AWS services like GuardDuty, Macie, and Security Hub use machine learning to detect threats in customer environments by analyzing log data and security findings. It also discusses how to build threat detection solutions using these services and how to automate threat response using services like Lambda, CloudWatch Events, and Systems Manager.
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Amazon Web Services
The move to AWS enables new application and architectural patterns that are in a continual state of change. The only way that your infrastructure, security, and operations can keep pace with these changes is with automation. In this session, we discuss the various automation tools you can use to first deploy the AWS infrastructure (as code), add the VM-Series to protect against threats (security as code), and then automatically update the policy based on Amazon GuardDuty or AWS Security Hub finding (operations as code). A brief demonstration concludes the session. This presentation is brought to you by AWS partner, Palo Alto Networks.
Delivering applications securely with AWS - SVC303 - Chicago AWS SummitAmazon Web Services
Networking is the foundation that supports many applications on AWS. The way you architect your network helps to determine how reliable, secure, and performant your applications are. In this session, we discuss the easy and secure delivery of applications to your users over the AWS global network. We answer your questions and cover multiple delivery methods that use Amazon CloudFront, AWS Global Accelerator, and AWS PrivateLink.
Getting started with AWS IoT Core - SVC306 - New York AWS SummitAmazon Web Services
Get hands-on with the main components of AWS IoT Core. In this session, you learn how to connect and manage your devices, secure device connections and data, process and act upon device data, and read and set device state at any time. Work with the device gateway and high-throughput message broker to securely transmit messages among all your IoT devices and applications. Set up the registry to track device attributes and metadata and create a persistent, virtual version of each device. Finally, explore the rules engine to author rules within the management console or using a SQL-like syntax. Please bring a laptop, and make sure to sign up for an AWS account.
Detecting and responding to critical events with AWS IoT Events - SVC205 - Ch...Amazon Web Services
The vast majority of Internet of Things (IoT) customers are connecting many pieces of equipment with multiple independent sensors. For these customers, detecting a critical operational event, such as when equipment variability reduces the quality of its output, can be challenging. In this session, you learn how AWS IoT Events makes it possible to easily and cost effectively detect system-wide events and respond with appropriate actions to drive results such as optimizing manufacturing efficiency or improving production quality.
Do you need a ledger database or a blockchain? - SVC310 - Chicago AWS SummitAmazon Web Services
This session introduces two new AWS services for blockchain and ledger technology: Amazon Quantum Ledger Database (Amazon QLDB) and Amazon Managed Blockchain. We discuss what these services do, the problems they solve, and when each should be used. We also dive deep into details about service features and how the services work; explain key concepts such as immutability and centralized vs. decentralized trust; and review use cases.
Using automation to drive continuous-compliance best practices - SVC309 - Chi...Amazon Web Services
Northwestern Mutual’s technology teams maintain a complex compliance environment for a diverse set of developers working within more than 100 AWS accounts. To drive best practices and ensure continuous compliance, they designed an AWS-based architecture using services such as AWS Lambda, Amazon DynamoDB, Amazon Simple Queue Service (Amazon SQS), and Amazon CloudWatch to auto-remediate misconfigurations. In this session, we discuss how these services help Northwestern Mutual swiftly correct configurations and integrate with tools like Slack and Pagerduty to create logs, notify developers and account owners of changes, and track trends in remediation.
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Amazon Web Services
For companies that employ DevOps practices to push applications faster into production through better collaboration and automated testing, security is often seen as an inhibitor to speed. The challenge for many organizations is getting applications delivered at a fast pace while embedding security at the speed of DevOps. In this session, you learn how AWS Marketplace products and customers help make DevSecOps a well-orchestrated methodology for ensuring the speed, stability, and security of your applications.
Accelerating your cloud migration with VMware Cloud on AWS - CMP205 - Chicago...Amazon Web Services
Customers are using VMware Cloud on AWS to accelerate cloud migrations, deploy hybrid architectures, and replace their disaster recovery environments. VMware Cloud on AWS brings a new dimension of hybrid cloud and mixed architecture to many customers, offering the opportunity to augment and evolve existing and legacy applications. In this session, learn how VMware Cloud on AWS helps build a lower-risk and iterative transformation approach to your traditional applications and data in a hybrid environment. Also learn best practices to protect and scale your workload by natively integrating AWS services, such as AWS Direct Connect, Amazon S3, Amazon RDS, and Elastic Load Balancing.
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...Amazon Web Services
The NIST Cybersecurity Framework (CSF) is endorsed by government and industry as a recommended baseline for use by any organization, regardless of sector or size, to implement risk-management best practices and achieve desired security outcomes. In this session, we discuss how organizations can use AWS to align to the CSF by providing a detailed breakout of AWS services and associated customer responsibilities (security in the cloud) and AWS responsibilities (security of the cloud).
AWS networking fundamentals - SVC303 - Santa Clara AWS SummitAmazon Web Services
In this session, we first cover build-out and design fundamentals for VPCs, including selecting your IP space, subnetting, routing, security, and more. We then discuss different approaches and scenarios for connecting your VPC to your data center with AWS VPN or AWS Direct Connect. Throughout this presentation, we discuss our latest networking services and updates, including AWS Transit Gateway and AWS PrivateLink. This mid-level architecture discussion is for architects, network administrators, and technology decision makers interested in understanding the building blocks that AWS makes available with Amazon VPC. Learn how to connect VPCs with your offices and data center footprint.
Technical deep dive: Cloud data management with Veeam and AWS - SVC202-S - Ch...Amazon Web Services
There are many things to consider when you move backups to AWS and manage data protection across on-premises and cloud environments. Veeam and N2WS (a Veeam company) enable data protection and portability to the AWS Cloud with enterprise-class backup and disaster recovery for Amazon EC2, Amazon RDS, Amazon DynamoDB, and Amazon EBS. In this technical session, learn how to scale for growth on the AWS Cloud and manage data protection for thousands of Amazon EC2 instances. We cover how to back up, restore, and protect databases and workloads with N2WS Backup & Recovery and the new Veeam Backup & Replication for AWS. This session is brought to you by AWS partner, Veeam.
Introduction to AWS OutIntroduction to AWS Outposts - CMP203 - Chicago AWS Su...Amazon Web Services
AWS Outposts allows customers to run compute and storage on-premises while connecting to AWS's full range of services in the cloud. It provides three main benefits:
1) It allows customers to build applications once and deploy them on-premises or in the cloud using the same AWS APIs, services, and tools.
2) It offers a fully managed service model so customers don't have to worry about procuring, operating, or maintaining their own infrastructure.
3) It provides the same security, performance, reliability, and operational experience of AWS regions while also addressing the needs of applications that require low latency access to on-premises systems or local data processing.
Moving desktops & applications to AWS with Amazon WorkSpaces & AppStream 2 - ...Amazon Web Services
IT organizations today need to support a mobile, flexible, global workforce and ensure that their users can be productive anywhere. Moving desktops and applications to AWS offers improved security, scale, and performance with cloud economics. In this session, we provide an overview of Amazon WorkSpaces and Amazon AppStream 2.0, and we discuss the use cases for each. Then, we dive deep into best practices for implementing Amazon WorkSpaces and AppStream 2.0, including how to integrate with your existing identity, security, networking, and storage solutions.
Best practices for queue processing in serverless applications - MAD313 - Chi...Amazon Web Services
In this session, we learn about best practices to help you integrate serverless applications using Amazon Simple Queue Service (Amazon SQS). We explore how to tune AWS Lambda and Amazon SQS to scale your existing applications without having to worry about provisioning capacity. We also discuss how to bridge high-scale serverless applications with limited server-full applications such as relational databases.
A few milliseconds in the life of an HTTP request - SVC303 - New York AWS SummitAmazon Web Services
In Amazon CloudFront, a lot happens in just a few milliseconds. Come dive deep into the infrastructure and architecture of AWS edge services, including CloudFront, Amazon Route 53, AWS Shield, and AWS WAF. We break down the life of an HTTP request (and any request in general) and walk you through how all AWS edge services work together in just a few milliseconds to consistently deliver your application’s content with high availability, security, and performance. Learn how edge services intelligently route requests to the most ideal edge location, secure your content behind the scenes, and leverage the AWS private network for improved performance.
This document provides an overview of AWS networking fundamentals including VPC concepts such as IP addressing, subnets, routing, security groups, and connecting VPCs. It discusses choosing IP address ranges and creating subnets across availability zones. It also covers routing and traffic flow, DNS options, network security using security groups and network ACLs, and VPC flow logs. Methods for connecting VPCs like VPC peering, Transit Gateway, VPN connections, and Direct Connect are also summarized.
AWS App Mesh (Service Mesh Magic)- AWS Container Day 2019 BarcelonaAmazon Web Services
In this session, learn about how AWS App Mesh can help give you end-to-end visibility and manage traffic routing to ensure high availability for your microservice. We will cover what the need for a service mesh, capabilities of App Mesh, and show you a demo.
How to speed up and scale your innovation efforts - MAD203 - Chicago AWS SummitAmazon Web Services
By applying microservices powered by serverless technology, you can innovate faster, at scale. In this session, we share insights into the Amazon Culture of Innovation and explain how the company went from four million to over 60 million deployments per year. We discuss how the company benefitted from its own key learnings through building modern apps at Amazon. We also discuss how Amazon transitioned from a monolithic application environment to an event-driven serverless microservices environment. Learn why more and more organizations are choosing the serverless operational model.
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ne...Amazon Web Services
In this session, we provide an overview of AWS identity services within the context of a typical cloud journey. Learn about each service, the high-level capabilities they provide, and how the services fit and work together to provide you a robust identity foundation. Learn how to better advance your own journey with confidence and speed. Finally, we take a deeper look at several identity-based use cases where the cloud’s power and programmability are radically simplifying implementation and strengthening security.
AWS identity services - Enabling & securing your cloud journey - SEC202 - San...Amazon Web Services
Throughout your journey to the AWS Cloud, you will encounter and rely on a number of AWS identity services. In this session, we provide an overview of AWS identity services within the context of a typical cloud journey. Learn about each service, the capabilities it provides, and how the services fit and work together to provide you with a robust foundation and enable you to advance your journey with confidence and speed. Finally, we take a deeper look at a number of identity-based use cases, where the power and programmability of the cloud is radically simplifying implementation and strengthening security.
Best practices for choosing identity solutions for applications + workloads -...Amazon Web Services
Identity requirements for consumer-facing applications differ significantly from those for workforce applications and cloud resources. Learn the best practices for choosing the right identity platform on AWS for your consumer-facing applications and for centrally managing access to all your business applications and AWS resources. Come learn about the proper use cases for implementing single sign-on (SSO) and Amazon Cognito, security best practices, and configuration guidance.
Identity and access management helps customers protect their applications and resources. In this session, learn how AWS identity services are evolving to provide you with a secure, flexible, and easy solution for managing identities and access on the AWS Cloud.
This document discusses AWS Identity and Access Management (IAM) and provides an overview of how to securely manage user access and permissions in AWS. It describes IAM best practices like least privilege access and using roles for applications to access resources. Additionally, it covers authentication methods, common use cases for IAM like controlling developer access and application access, and related services like AWS STS and AWS Organizations.
Most organizations are great at securing their network, operating system, databases, and applications. However, even for those organizations that have been in the cloud for a few years, many are still learning how to set up the proper mechanisms to identify, protect, detect, respond and recover at the AWS layer. We will explore services like AWS Identity and AWS Access and Identity Management (IAM), AWS Key Management Service (KMS), Amazon Simple Storage Service (S3), Amazon Virtual Private Cloud (VPC), Amazon CloudWatch Logs, and Amazon GuardDuty.
AWS Summit Singapore 2019 | Next Generation Audit & Compliance - Learn how RH...AWS Summits
Speaker: Alejandra Artiguez, FSI Compliance Program Manager, APAC, AWS Customer Speaker: Clara Lee Hui Theng, Head Technology & Operations, RHB Bank Berhad (Singapore)
Security and Compliance is a shared responsibility between AWS and the customer. In this session we will examine the AWS Shared responsibility model, and AWS compliance programs customers can use to gain assurance of security controls in the cloud. We will dive-deep into a number of cloud native security services that customers can use to protect their critical systems when migrating to AWS. Finally we will review a next-generation approach to audit and continuous compliance leveraging automation to identify mis-configurations and perform automatic remediatation to protect your AWS workloads.
AWS Security, IAM, Databases, Elasticity, Management Tools - AWSome Day Phila...Amazon Web Services
Part 3 of 3.
This free, one-day training will provide a step-by-step introduction to the core AWS services for compute, storage, database, and networking.
AWS technical experts will explain key features and use cases, share best practices, walk through technical demos, and be available to answer your questions one-on-one.
Who should attend?
AWSome Day is ideal for IT managers, system engineers, system administrators, and architects who are eager to learn more about cloud computing and how to get started on the AWS Cloud.
AWS Control Tower is a new AWS service for cloud administrators to set up and govern their secure, compliant, multi-account environments on AWS.
In this session, University of York will discuss their implementation of AWS Landing Zone. We’ll also explain how AWS Control Tower automates AWS Landing Zone creation with best-practice blueprints.
In this webinar, you'll learn about the foundational security blocks and how to start using them effectively to create robust and secure architectures. Discover how Identity and Access management is done and how it integrates with other AWS services. In addition, learn how to improve governance by using AWS Security Hub, AWS Config and CloudTrail to gain unprecedented visibility of activity in the account. Subsequently use AWS Config rules to rectify configuration issues quickly and effectively.
A Practitioner Guide to Securing Your Cloud (Like an Expert)Amazon Web Services
If you're new to AWS, you might think that cloud security is a lot of work. It's not! Across AWS, there are only a few simple patterns you need to know to be effective at security in the cloud.
In this session, we focused on the permissions controls offered by Identity and Access Management (IAM) and the network security controls offered by Virtual Private Cloud (VPC), walked away having seen concrete examples that illustrate the patterns that enable you to secure any workload in AWS.
Evolving perimeters with guardrails, not gates: Improving developer agility -...Amazon Web Services
In this session, Comcast discusses its AWS cloud governance strategy, focusing on self-service tooling and account management, and explaining how it improved the developer experience by leveraging federated identities, AWS Organizations, and AWS Identity and Access Management permissions boundaries.
Using AWS Control Tower to govern multi-account AWS environments at scale - G...Amazon Web Services
AWS Control Tower is a new AWS service that cloud administrators can use to set up and govern their secure, compliant, multi-account environments on AWS. In this session, we show you how Control Tower automates the creation of a secure and compliant landing zone with best-practice blueprints for a multi-account structure, identity and federated access management, a central log archive, cross-account security audits, and workflows for provisioning accounts with pre-approved configurations. We also discuss guardrails—pre-packaged governance rules created for security, operations, and compliance that you can apply enterprise-wide or to groups of accounts to enforce policies or detect violations. Finally, we show you how to easily manage and monitor all this through the Control Tower dashboard.
AWS Control Tower is a new AWS service that cloud administrators can use to set up and govern their secure, compliant, multi-account environments on AWS. In this session, we show you how Control Tower automates the creation of a secure and compliant landing zone with best-practice blueprints for a multi-account structure, identity and federated access management, a central log archive, cross-account security audits, and workflows for provisioning accounts with pre-approved configurations. We also discuss guardrails—pre-packaged governance rules created for security, operations, and compliance that you can apply enterprise-wide or to groups of accounts to enforce policies or detect violations. Finally, we show you how to easily manage and monitor all this through the Control Tower dashboard.
The document provides an overview of AWS cloud security concepts, including the shared responsibility model and identity and access management (IAM). It discusses how AWS is responsible for security of the cloud, including physical and network security of data centers, while customers are responsible for security in the cloud, such as operating systems and applications. The document also describes IAM principles for authentication, authorization, and auditing using tools like IAM users, policies, and CloudTrail.
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 Amazon Web Services
The services that make up AWS are many and varied, but the set of concepts you need to secure your data and infrastructure is simple and straightforward. By the end of this session, you will know the fundamental patterns that you can apply to secure any workload you run in AWS with confidence. We cover the basics of network security, the process of reading and writing access management policies, and data encryption.
This document provides an overview of AWS multi-account architecture best practices and strategies for implementing a "landing zone" on AWS. It discusses setting up accounts for master, core services, shared services, development sandboxes, and team/group environments. The document then outlines steps for implementing a landing zone using the AWS Landing Zone solution, including setting up accounts for shared services, log archives, security and establishing baselines across team accounts.
AWS Summit Milano 2019 - Sicurezza in AWS automazione e best practice - Antonio Duma, Solutions Architect, AWS | Carmela Gambardella, Solutions Architect AWS
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitAmazon Web Services
In this session, learn how to address threat detection and remediation at AWS. We summarize the challenges of traditional threat-detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of key AWS services that detect and remediate threats, such as Amazon GuardDuty. Be sure to also check out the corresponding Threat Detection chalk talk.
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS SummitAmazon Web Services
The document discusses threat detection and mitigation techniques at AWS. It describes how AWS services like GuardDuty, CloudTrail, and VPC Flow Logs can be used to detect threats. It also discusses how tools like AWS Lambda, Systems Manager, and Step Functions can help with automating response and remediation. The document provides examples of high-level workflows that leverage these services to quickly detect and respond to security incidents.
The document discusses tools for managing and governing cloud environments using AWS. It describes challenges with using traditional IT tools at cloud scale and how AWS services enable both governance and agility. These services include AWS CloudFormation for provisioning resources, AWS Service Catalog for standardized templates, AWS Organizations for account management, and AWS Config and CloudTrail for operations and compliance management. The document advocates taking a programmatic approach to defining, discovering, monitoring, managing and responding to cloud resources and changes.
Similar to AWS identity services: Enabling and securing your cloud journey - SEC203 - Chicago AWS Summit (20)
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
1) The document discusses building a minimum viable product (MVP) using Amazon Web Services (AWS).
2) It provides an example of an MVP for an omni-channel messenger platform that was built from 2017 to connect ecommerce stores to customers via web chat, Facebook Messenger, WhatsApp, and other channels.
3) The founder discusses how they started with an MVP in 2017 with 200 ecommerce stores in Hong Kong and Taiwan, and have since expanded to over 5000 clients across Southeast Asia using AWS for scaling.
This document discusses pitch decks and fundraising materials. It explains that venture capitalists will typically spend only 3 minutes and 44 seconds reviewing a pitch deck. Therefore, the deck needs to tell a compelling story to grab their attention. It also provides tips on tailoring different types of decks for different purposes, such as creating a concise 1-2 page teaser, a presentation deck for pitching in-person, and a more detailed read-only or fundraising deck. The document stresses the importance of including key information like the problem, solution, product, traction, market size, plans, team, and ask.
This document discusses building serverless web applications using AWS services like API Gateway, Lambda, DynamoDB, S3 and Amplify. It provides an overview of each service and how they can work together to create a scalable, secure and cost-effective serverless application stack without having to manage servers or infrastructure. Key services covered include API Gateway for hosting APIs, Lambda for backend logic, DynamoDB for database needs, S3 for static content, and Amplify for frontend hosting and continuous deployment.
This document provides tips for fundraising from startup founders Roland Yau and Sze Lok Chan. It discusses generating competition to create urgency for investors, fundraising in parallel rather than sequentially, having a clear fundraising narrative focused on what you do and why it's compelling, and prioritizing relationships with people over firms. It also notes how the pandemic has changed fundraising, with examples of deals done virtually during this time. The tips emphasize being fully prepared before fundraising and cultivating connections with investors in advance.
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
This document discusses Amazon's machine learning services for building conversational interfaces and extracting insights from unstructured text and audio. It describes Amazon Lex for creating chatbots, Amazon Comprehend for natural language processing tasks like entity extraction and sentiment analysis, and how they can be used together for applications like intelligent call centers and content analysis. Pre-trained APIs simplify adding machine learning to apps without requiring ML expertise.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.