The Australian Cyber Security Centre (ACSC) awarded PROTECTED certification to AWS for 42 cloud services in the AWS Asia-Pacific (Sydney) Region. This is the highest data security certification available in Australia for cloud, and AWS has the most PROTECTED services of any public cloud service provider. This session will cover the services that were certified, a reference architecture that allows you to build applications which handle highly sensitive government data, and the benefits this provides to public sector and commercial organisations in Australia.
In this workshop you'll explore approaches for processing data using serverless architectures. You'll build processing infrastructure to enable operations personnel in Wild Rydes headquarters to monitor the health of the unicorn fleet. Each unicorn is equipped with a sensor that reports its location and vitals and you'll explore approaches for processing this data in batches and real-time.
To build this infrastructure, you will use AWS Lambda, Amazon S3, Amazon Kinesis, Amazon DynamoDB, and Amazon Athena. You'll create functions in Lambda to process files and streams, use DynamoDB to persist unicorn vitals, create a serverless application to aggregate these data points using Kinesis Analytics, archive the raw data using Kinesis Firehose and Amazon S3, and you'll use Amazon Athena to run ad-hoc queries against the raw data.
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...Amazon Web Services
Visibility is a must for detecting threats and compromises in the cloud, containers, and on-premises networks. In this session, we will explore how Stealthwatch Cloud uses VPC Flow logs and network telemetry combined with advanced analytics such as entity modeling and threat intelligence feeds like Cisco Talos to detect attacks, data exfiltration, unusual remote access, and traffic that is not compliant with your policies.
ENT304 - Building a Hybrid Cloud Architecture Utilizing AWS Landing ZonesTom Laszewski
Application modernization projects with AWS start with creating an AWS Landing Zone. Based upon AWS best practices, AWS Landing Zones help ensure a secure, performant, highly available, and cost-efficient AWS environment. Common hybrid cloud use cases, such as cloud migration, data center extension, disaster recovery, cloud bursting, and edge computing require data integration, operations management and monitoring, security, and networking as the foundational components of a hybrid cloud architecture. In this session, we dive deep on the networking, security, account management structure, operating management and monitoring best practices to build your own AWS Landing Zone that can be extended into your data center. AWS partner, GreenPages, will demonstrate a repeatable hybrid cloud architecture to secure, manage, and integrate your network across on-premises and multiple AWS regions utilizing an AWS Landing Zone. AWS customer, Finch Therapeutics, will then discuss how they utilized the GreenPages hybrid cloud reference implementation to deploy, secure, and manage their hybrid cloud environment.
Migrare applicazioni e dati, estendere la capacità del data center, utilizzare nuove funzionalità native del cloud, creare soluzioni di backup e disaster recovery.
Atlassian's Data Lake, Socrates, is used by over 1500 internal users every month to gain insights and drive decisions. In this session we will give an overview of how Socrates uses Amazon S3, Amazon Kinesis, Amazon Athena, Amazon EMR, and AWS Glue to build the four pillars of any data lake: Ingest, Prepare, Store, and Query. We will focus on the goals of self-service and scalability, discuss the various challenges encountered, and the solutions found.
Amazon Web Services (AWS) provides on-demand computing solutions and services in the cloud with pay-as-you-go pricing. This session unlocks a foundational understanding of the cloud and dive deep into how AWS capacity matches your organizational demand, charges only for what you use, offers lower costs due to economies of scale, and provides service from a vendor versed in running large-scale networks.
In this workshop you'll explore approaches for processing data using serverless architectures. You'll build processing infrastructure to enable operations personnel in Wild Rydes headquarters to monitor the health of the unicorn fleet. Each unicorn is equipped with a sensor that reports its location and vitals and you'll explore approaches for processing this data in batches and real-time.
To build this infrastructure, you will use AWS Lambda, Amazon S3, Amazon Kinesis, Amazon DynamoDB, and Amazon Athena. You'll create functions in Lambda to process files and streams, use DynamoDB to persist unicorn vitals, create a serverless application to aggregate these data points using Kinesis Analytics, archive the raw data using Kinesis Firehose and Amazon S3, and you'll use Amazon Athena to run ad-hoc queries against the raw data.
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...Amazon Web Services
Visibility is a must for detecting threats and compromises in the cloud, containers, and on-premises networks. In this session, we will explore how Stealthwatch Cloud uses VPC Flow logs and network telemetry combined with advanced analytics such as entity modeling and threat intelligence feeds like Cisco Talos to detect attacks, data exfiltration, unusual remote access, and traffic that is not compliant with your policies.
ENT304 - Building a Hybrid Cloud Architecture Utilizing AWS Landing ZonesTom Laszewski
Application modernization projects with AWS start with creating an AWS Landing Zone. Based upon AWS best practices, AWS Landing Zones help ensure a secure, performant, highly available, and cost-efficient AWS environment. Common hybrid cloud use cases, such as cloud migration, data center extension, disaster recovery, cloud bursting, and edge computing require data integration, operations management and monitoring, security, and networking as the foundational components of a hybrid cloud architecture. In this session, we dive deep on the networking, security, account management structure, operating management and monitoring best practices to build your own AWS Landing Zone that can be extended into your data center. AWS partner, GreenPages, will demonstrate a repeatable hybrid cloud architecture to secure, manage, and integrate your network across on-premises and multiple AWS regions utilizing an AWS Landing Zone. AWS customer, Finch Therapeutics, will then discuss how they utilized the GreenPages hybrid cloud reference implementation to deploy, secure, and manage their hybrid cloud environment.
Migrare applicazioni e dati, estendere la capacità del data center, utilizzare nuove funzionalità native del cloud, creare soluzioni di backup e disaster recovery.
Atlassian's Data Lake, Socrates, is used by over 1500 internal users every month to gain insights and drive decisions. In this session we will give an overview of how Socrates uses Amazon S3, Amazon Kinesis, Amazon Athena, Amazon EMR, and AWS Glue to build the four pillars of any data lake: Ingest, Prepare, Store, and Query. We will focus on the goals of self-service and scalability, discuss the various challenges encountered, and the solutions found.
Amazon Web Services (AWS) provides on-demand computing solutions and services in the cloud with pay-as-you-go pricing. This session unlocks a foundational understanding of the cloud and dive deep into how AWS capacity matches your organizational demand, charges only for what you use, offers lower costs due to economies of scale, and provides service from a vendor versed in running large-scale networks.
Performance monitoring is a crucial part when running serverless applications. Serverless applications are highly distributed with business workflows and data spread across multiple managed services and APIs. As a result, in order to make sure that everything is running correctly in production you’d need full observability into the application that will help you find the root cause, and troubleshoot quickly. In this workshop, you will learn the critical observability considerations when operating a serverless application, what is distributed tracing and why it's important, and what tools can be used to gain full observability to your applications.
Amazon Web Services (AWS) provides on-demand computing solutions and services in the cloud with pay-as-you-go pricing. This session unlocks a foundational understanding of the cloud. What is cloud computing and its advantages? Learn more about types of cloud computing and the differences between On Premises services versus Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Dive into how AWS capacity matches your organizational demand, charges only for what you use, offers lower costs due to economies of scale, and provides service from a vendor versed in running large-scale networks. Learn about AWS services and infrastructure – including AWS regions and Availability Zones – and trace the evolution of AWS since its early beginnings. Uncover how constant innovation at AWS empowers customers to transform their own organizations.
AWS Foundations
Well Architected Framework and AWS Trusted Advisor
Global Infrastructure
Demo - Designing the network (VPC) for HA and FT
VPC Network security
Performing real-time ETL into data lakes - ADB202 - Santa Clara AWS Summit.pdfAmazon Web Services
In this session, we discuss several options for performing real-time extract, transform, and load (ETL) using Amazon Kinesis, AWS Lambda, AWS Glue, and Amazon S3. We provide an overview of the different options that have distinct advantages in building real-time ETL applications before loading a data lake or warehouse.
AWS Greengrass & Amazon FreeRTOS: Connectivity & Security at the Edge (IOT356...Amazon Web Services
In this session, we discuss how customers can use Amazon FreeRTOS on microcontrollers with AWS Greengrass at the edge. We walk through connecting your devices running Amazon FreeRTOS and connecting devices to AWS Greengrass. We also show you how these two services can work together to solve customer use cases. In addition, we cover security best practices for key management and TLS implementation across Amazon FreeRTOS and AWS Greengrass.
Transforming your Business Ops Team for Cloud - AWS Summit Sydney 2018Amazon Web Services
Transforming Your Business Operations Team for Cloud
As you migrate to the cloud your operations structure and practices evolve. Putting aside the technology, as a business owner how does this impact you? This session will highlight how automation and cloud operations models affect the way your business operates. You will learn from our shared customer stories, get a quick change management 101 for cloud operations and understand how Amazon Managed Services could allow you to focus more on delighting your customers.
Louise Stigwood, Enterprise Sales Manager, Amazon Web Services
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Amazon Web Services
The move to AWS enables new application and architectural patterns that are in a continual state of change. The only way that your infrastructure, security, and operations can keep pace with these changes is with automation. In this session, we discuss the various automation tools that can be used to deploy AWS infrastructure (as code), add the VM-Series to help protect against threats (security as code), and then automatically update the policy based on Amazon GuardDuty or AWS Security Hub findings (operations as code). A brief demonstration concludes this session.
Building IoT Applications for a Smart Home, ft. Vestel (IOT306-R1) - AWS re:I...Amazon Web Services
The IoT transformation begins at home. Today, device manufacturers and network providers are building groundbreaking connected devices and applications to make your home smarter. In this session, we dive into the best practices and common patterns for building connected devices and applications for a Smart Home. This session focuses on securely onboarding your devices to a consumer's account, leveraging IoT, using ML at the edge, and video streaming for home security. By the end of the session, you'll have a set of best practices for how to build IoT products in the Smart Home. Also hear from Vestel about their smart home application.
Governance for the Cloud Age - DEM12-R - AWS re:Inforce 2019 Amazon Web Services
In this session, we define cloud governance and explain its role in achieving security, compliance, and architecture best practices. Using real-world case studies from Fortune 100 enterprises, we demonstrate how governance automation is being used to accelerate the migration and ongoing operations of hundreds of enterprise applications, all while increasing visibility and control for the enterprise.
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019 Amazon Web Services
Edge computing is one of the most important enablers of the future. It saves lives, democratizes resources, and reduces costs in scenarios where near real-time action is required. This session covers how to keep edge computing secure. We dive deep into how AWS IoT Greengrass authenticates and encrypts device data for local and cloud communications so that data is never exchanged without proven identity. You can leverage hardware-secured, end-to-end encryption for messages exchanged between devices, an AWS IoT Greengrass core, and the AWS Cloud, and for messages between an AWS IoT Greengrass core and other local devices using the AWS IoT device SDK.
Twelve-factor serverless applications - MAD302 - Santa Clara AWS SummitAmazon Web Services
The twelve-factor application model represents 12 best practices for building modern, cloud-native applications. With guidance on factors like configuration, deployment, runtime, and multiple-service communication, the twelve-factor model prescribes best practices that apply to everything from web applications to APIs to data processing applications. Although serverless computing and AWS Lambda have changed application development, the twelve-factor best practices remain relevant and applicable in a serverless world. In this talk, we apply the twelve-factor model to serverless application development with AWS Lambda and Amazon API Gateway, and we show you how these services enable you to build scalable, well-built, low-administration applications.
Which Internet of Things (IoT) network or platform will make the most of your data - now and in the long run? How do you keep your data secure in this connected world? Find out in our webinar, which tackles the infrastructure decisions that come with creating a smart place.
Giving credit where credit’s due - myFICO’s cloud transformation - SVC204 - S...Amazon Web Services
FICO, a leading predictive analytics software company, has migrated many mission-critical applications to AWS, including myFICO, a consumer credit-reporting and monitoring application. Moving myFICO was challenging, given its low-latency requirements, massive volumes of sensitive data, and spikey traffic bursts, but it yielded many benefits, including greatly improving data processing, 99.99% availability, and an exemplary compliance and security posture. In this session, learn which migration techniques worked best, the techniques and tools to achieve security on AWS, and how the application evolved, using services like AWS Lambda, Amazon ElastiCache, Amazon Pinpoint, Network Load Balancer, Amazon Kinesis, Amazon Redshift and AWS KMS.
Discover what the PROTECTED certification means for your organisation and how the status can help you build applications on Amazon Web Services (AWS) that meet the Australian government’s security requirements for highly sensitive workloads.
Performance monitoring is a crucial part when running serverless applications. Serverless applications are highly distributed with business workflows and data spread across multiple managed services and APIs. As a result, in order to make sure that everything is running correctly in production you’d need full observability into the application that will help you find the root cause, and troubleshoot quickly. In this workshop, you will learn the critical observability considerations when operating a serverless application, what is distributed tracing and why it's important, and what tools can be used to gain full observability to your applications.
Amazon Web Services (AWS) provides on-demand computing solutions and services in the cloud with pay-as-you-go pricing. This session unlocks a foundational understanding of the cloud. What is cloud computing and its advantages? Learn more about types of cloud computing and the differences between On Premises services versus Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Dive into how AWS capacity matches your organizational demand, charges only for what you use, offers lower costs due to economies of scale, and provides service from a vendor versed in running large-scale networks. Learn about AWS services and infrastructure – including AWS regions and Availability Zones – and trace the evolution of AWS since its early beginnings. Uncover how constant innovation at AWS empowers customers to transform their own organizations.
AWS Foundations
Well Architected Framework and AWS Trusted Advisor
Global Infrastructure
Demo - Designing the network (VPC) for HA and FT
VPC Network security
Performing real-time ETL into data lakes - ADB202 - Santa Clara AWS Summit.pdfAmazon Web Services
In this session, we discuss several options for performing real-time extract, transform, and load (ETL) using Amazon Kinesis, AWS Lambda, AWS Glue, and Amazon S3. We provide an overview of the different options that have distinct advantages in building real-time ETL applications before loading a data lake or warehouse.
AWS Greengrass & Amazon FreeRTOS: Connectivity & Security at the Edge (IOT356...Amazon Web Services
In this session, we discuss how customers can use Amazon FreeRTOS on microcontrollers with AWS Greengrass at the edge. We walk through connecting your devices running Amazon FreeRTOS and connecting devices to AWS Greengrass. We also show you how these two services can work together to solve customer use cases. In addition, we cover security best practices for key management and TLS implementation across Amazon FreeRTOS and AWS Greengrass.
Transforming your Business Ops Team for Cloud - AWS Summit Sydney 2018Amazon Web Services
Transforming Your Business Operations Team for Cloud
As you migrate to the cloud your operations structure and practices evolve. Putting aside the technology, as a business owner how does this impact you? This session will highlight how automation and cloud operations models affect the way your business operates. You will learn from our shared customer stories, get a quick change management 101 for cloud operations and understand how Amazon Managed Services could allow you to focus more on delighting your customers.
Louise Stigwood, Enterprise Sales Manager, Amazon Web Services
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Amazon Web Services
The move to AWS enables new application and architectural patterns that are in a continual state of change. The only way that your infrastructure, security, and operations can keep pace with these changes is with automation. In this session, we discuss the various automation tools that can be used to deploy AWS infrastructure (as code), add the VM-Series to help protect against threats (security as code), and then automatically update the policy based on Amazon GuardDuty or AWS Security Hub findings (operations as code). A brief demonstration concludes this session.
Building IoT Applications for a Smart Home, ft. Vestel (IOT306-R1) - AWS re:I...Amazon Web Services
The IoT transformation begins at home. Today, device manufacturers and network providers are building groundbreaking connected devices and applications to make your home smarter. In this session, we dive into the best practices and common patterns for building connected devices and applications for a Smart Home. This session focuses on securely onboarding your devices to a consumer's account, leveraging IoT, using ML at the edge, and video streaming for home security. By the end of the session, you'll have a set of best practices for how to build IoT products in the Smart Home. Also hear from Vestel about their smart home application.
Governance for the Cloud Age - DEM12-R - AWS re:Inforce 2019 Amazon Web Services
In this session, we define cloud governance and explain its role in achieving security, compliance, and architecture best practices. Using real-world case studies from Fortune 100 enterprises, we demonstrate how governance automation is being used to accelerate the migration and ongoing operations of hundreds of enterprise applications, all while increasing visibility and control for the enterprise.
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019 Amazon Web Services
Edge computing is one of the most important enablers of the future. It saves lives, democratizes resources, and reduces costs in scenarios where near real-time action is required. This session covers how to keep edge computing secure. We dive deep into how AWS IoT Greengrass authenticates and encrypts device data for local and cloud communications so that data is never exchanged without proven identity. You can leverage hardware-secured, end-to-end encryption for messages exchanged between devices, an AWS IoT Greengrass core, and the AWS Cloud, and for messages between an AWS IoT Greengrass core and other local devices using the AWS IoT device SDK.
Twelve-factor serverless applications - MAD302 - Santa Clara AWS SummitAmazon Web Services
The twelve-factor application model represents 12 best practices for building modern, cloud-native applications. With guidance on factors like configuration, deployment, runtime, and multiple-service communication, the twelve-factor model prescribes best practices that apply to everything from web applications to APIs to data processing applications. Although serverless computing and AWS Lambda have changed application development, the twelve-factor best practices remain relevant and applicable in a serverless world. In this talk, we apply the twelve-factor model to serverless application development with AWS Lambda and Amazon API Gateway, and we show you how these services enable you to build scalable, well-built, low-administration applications.
Which Internet of Things (IoT) network or platform will make the most of your data - now and in the long run? How do you keep your data secure in this connected world? Find out in our webinar, which tackles the infrastructure decisions that come with creating a smart place.
Giving credit where credit’s due - myFICO’s cloud transformation - SVC204 - S...Amazon Web Services
FICO, a leading predictive analytics software company, has migrated many mission-critical applications to AWS, including myFICO, a consumer credit-reporting and monitoring application. Moving myFICO was challenging, given its low-latency requirements, massive volumes of sensitive data, and spikey traffic bursts, but it yielded many benefits, including greatly improving data processing, 99.99% availability, and an exemplary compliance and security posture. In this session, learn which migration techniques worked best, the techniques and tools to achieve security on AWS, and how the application evolved, using services like AWS Lambda, Amazon ElastiCache, Amazon Pinpoint, Network Load Balancer, Amazon Kinesis, Amazon Redshift and AWS KMS.
Discover what the PROTECTED certification means for your organisation and how the status can help you build applications on Amazon Web Services (AWS) that meet the Australian government’s security requirements for highly sensitive workloads.
Detecting and mitigating threats with AWS - SEC301 - Chicago AWS SummitAmazon Web Services
Rarely does a day go by that we’re not reminded about the importance of the security of our online assets. Bad actors are continuously probing and looking for ways to compromise organizations’ defenses to gain access to valuable data or cause disruptions. In this session, learn how to address threat detection and remediation with AWS. We summarize the challenges of traditional threat detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of the key AWS services that detect and remediate threats, such as Amazon GuardDuty.
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...Amazon Web Services
Capital One innovates by leveraging AWS managed services such as AWS Directory Service for Microsoft Active Directory (AWS Managed Microsoft AD), Amazon RDS for SQL Server and EC2 to deploy critical Windows workloads securely in an automated fashion. In this session, attendees will learn how Capital One uses AWS Managed Microsoft AD with their on-premises domain to provide secure and highly available authentication and authorization services for its Windows workloads, such as Amazon RDS for SQL Server. You also learn security best practices for setting up AWS Managed Microsoft AD including implementing MFA, AD Trust options, AWS account isolation, security log collection, and more. In addition, we detail how Capital One uses AWS Managed Microsoft AD and Lambda Functions to simplify and automate Windows workload deployments across multiple AWS accounts and Amazon VPCs.
In this session, learn how to address threat detection and remediation at AWS. We summarize the challenges of traditional threat-detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of key AWS services that detect and remediate threats, such as Amazon GuardDuty. Be sure to also check out the corresponding Threat Detection chalk talk.
Humans and Data Don't Mix- Best Practices to Secure Your CloudAmazon Web Services
When it comes to security, human error far outpaces other causes of failures. The risk of humans touching sensitive data is clear, so how do you get them away from your data while also speeding up time to detection and remediation? Stephen Schmidt, AWS CISO, will share hard-earned lessons around potential opportunities in your security program, along with practical steps to improve the agility of your organization.
When it comes to security, human error far outpaces other causes of failures. The risk of humans touching sensitive data is clear, so how do you get them away from your data while also speeding up time to detection and remediation? In this talk, we’ll cover security in the CI/CD pipeline, and share hard-earned lessons around potential opportunities in your security program, along with practical steps to improve the agility of your organization.
Speaker: Bill Reid - Sr Mgr, Solutions Architecture AWS
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your CloudAmazon Web Services
AWS Security Week at the San Francisco Loft: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
Presenter: William Reid, CISM, FIP
Head of Security and Compliance Solution Architecture, AWS
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitAmazon Web Services
In this session, learn how to address threat detection and remediation at AWS. We summarize the challenges of traditional threat-detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of key AWS services that detect and remediate threats, such as Amazon GuardDuty. Be sure to also check out the corresponding Threat Detection chalk talk.
This free, one-day training will provide a step-by-step introduction to the core AWS services for compute, storage, database, and networking.
AWS technical experts will explain key features and use cases, share best practices, walk through technical demos, and be available to answer your questions one-on-one.
AWSome Day is ideal for IT managers, system engineers, system administrators, and architects who are eager to learn more about cloud computing and how to get started on the AWS Cloud.
Cloud security at AWS is the highest priority. As an AWS customer, you will benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations. In this session you'll learn how to keep your data safe and meet compliance requirements, being able to scale quickly and save money.
Similar to AWS PROTECTED: Why This Matters for Australia - AWS Summit Sydney (20)
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.