by Ric Harvey, AWS Technical Evangelist, UK & Ireland
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, cost optimization and operational excellence. In this session, you'll learn how to architect your applications based on Amazon Web Services' Well-Architected Framework principles.
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, and cost optimisation when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud. In this session, you'll learn about the Well-Architected Framework, and the steps you can take to help ensure your solution is Well Architected.
Speaker: Brian Farnhill, Solutions Architect, AWS
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, and cost optimisation when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud. In this session, you'll learn about the Well-Architected Framework, and the steps you can take to help ensure your solution is Well Architected.
By Ballu Singh, Solutions Architect AWS
The AWS Well-Architected framework was developed to help cloud architects build the most secure, high-performing, resilient, and efficient infrastructure possible for their applications. Composed of 5 pillars – operational excellence, security, reliability, performance efficiency, and cost optimization – this framework provides a consistent approach to evaluate architectures, and provides guidance to help implement designs that will scale with your application needs over time.
This workshop teaches you how to put that framework into practice. You’ll learn strategies for building stable and efficient systems. Then you’ll apply that knowledge through a series of team exercises, comparing a sample architecture against our best practices, and assessing how Well-Architected it is against each pillar.
Join us to learn how the APN can accelerate and support your cloud business strategy. The session will highlight the various routes to market, programs and resources available to AWS Customers and Partners looking to grow and develop their business on AWS.
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, and cost optimisation when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud. In this session, you'll learn about the Well-Architected Framework, and the steps you can take to help ensure your solution is Well Architected.
Speaker: Brian Farnhill, Solutions Architect, AWS
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, and cost optimisation when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud. In this session, you'll learn about the Well-Architected Framework, and the steps you can take to help ensure your solution is Well Architected.
By Ballu Singh, Solutions Architect AWS
The AWS Well-Architected framework was developed to help cloud architects build the most secure, high-performing, resilient, and efficient infrastructure possible for their applications. Composed of 5 pillars – operational excellence, security, reliability, performance efficiency, and cost optimization – this framework provides a consistent approach to evaluate architectures, and provides guidance to help implement designs that will scale with your application needs over time.
This workshop teaches you how to put that framework into practice. You’ll learn strategies for building stable and efficient systems. Then you’ll apply that knowledge through a series of team exercises, comparing a sample architecture against our best practices, and assessing how Well-Architected it is against each pillar.
Join us to learn how the APN can accelerate and support your cloud business strategy. The session will highlight the various routes to market, programs and resources available to AWS Customers and Partners looking to grow and develop their business on AWS.
How to get well-architected?
You are heading towards production and don’t know whether you have thought of everything around operations, security, reliability etc.? This talk gives you an introduction to the AWS well-architected framework and the method & value of well-architected reviews.
Successful Cloud Adoption for the Enterprise. Not If. When.Amazon Web Services
Enterprises are turning to AWS to enable innovation and retire technical debt. Cloudreach are delighted to share their extensive experience and knowledge of the Enterprise’s adoption to achieve these principal aims. The aim of the session is to set out how Cloudreach ensures successful Cloud Adoption, covering technical, change management and organizational aspects to create the path towards enabling innovation. Session sponsored by Cloudreach.
AWS User Group presentation on AWS Well-Architected Framework. Includes items from framework and additional best practices I have implemented (identified by slides with (Me) in the title).
We describe how to use the Well-Architected Framework to evaluate the technology solutions built by your teams. The AWS Well-Architected Framework describes best practices across five pillars (Security, Reliability, Performance, Operational Excellence, and Cost), and provides a consistent approach to review architectures against those best practices. This review process shows where your architectures can be improved, and helps you address weakness that may put your business at risk
AWS Shared Responsibility Model & Compliance Program OverviewAmazon Web Services
AWS is hosting the first FSI Cloud Symposium in Hong Kong, which will take place on Thursday, March 23, 2017 at Grand Hyatt Hotel. The event will bring together FSI customers, industry professional and AWS experts, to explore how to turn the dream of transformation, innovation and acceleration into reality by exploiting Cloud, Voice to Text and IoT technologies. The packed agenda includes expert sessions on a host of pressing issues, such as security and compliance, as well as customer experience sharing on how cloud computing is benefiting the industry.
Speaker: Iolaire Mckinnon, Senior Consultant - Security, Risk & Compliance, Professional Services, AWS
Streamline Your Desktop Operations and Improve Security with Amazon WorkSpace...Amazon Web Services
With workplace mobility on the rise, employees, contractors, and business partners require access from any device at any time and any place. This presents IT with a number of challenges, including securing information on end-user devices, managing access to corporate information, and quickly adapting to changes in the workforce. In this webinar, Mark Bowker, Senior Analyst with the Enterprise Strategy Group, will explain how Desktops-as-a-Service (DaaS) can help address these challenges, and what the options are for your organization. We'll follow with an overview of Amazon WorkSpaces, a DaaS service from AWS, and close with how you can start using the service in your organization.
Learning Objectives:
• Understand how Amazon WorkSpaces can help you support an agile workforce and secure sensitive information on end user devices.
This session showcases best practices for operating securely at scale on AWS. We’ll introduce the AWS Security Best Practices whitepaper that covers a range of security recommendations for identity and access management, logging and monitoring, infrastructure security, and data protection. We’ll also examine practical examples found in the Center for Internet Security’s CIS AWS Foundations and CIS AWS Three-Tier Web Architecture benchmarks. Information and eGovernance Authority (IGA) also steps in to debunk common security myths of cloud adoption and speak on why they entrust the cloud with data.
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...Amazon Web Services
Security and compliance automation have become the most important drivers for IT Transformation to the cloud. Foundational cloud security services provide an unprecedented capability to ensure your cloud platform is secure, programmatically monitored, and adaptive. This session will demonstrate how Federal and Enterprise customers are embracing adaptive techniques in managing their most critical application workloads.
Learn how to increase the effectiveness of your security operations as you move to the cloud. We will discuss how your current incident response, forensic investigations, monitoring, and audit response tactics have to change in the cloud. Pulling from experiences helping clients move to the cloud, industry research, and the school of hard knocks, this talk will help provide practical advice you can apply today.
The Well-Architected workshop is a free, advanced-level workshop that describes the benefits of the AWS Well-Architected Framework. This enables customers to review and improve their cloud architectures and better understand the business impact of their design decisions. It addresses general design principles, best practices, and guidance in five pillars of the Well-Architected Framework. We recommend that attendees of this course have the following pre-requisites: Strong working knowledge of AWS core services and features, as well as previous architectural experience.
What happens when your application goes viral? Lightsail provides built-in features to scale out your application for high availability and variations in traffic, including load balancing and attached block storage. Lightsail instances can also connect to many of the 100+ services available in the AWS console, giving your application added power to grow. In this session, we will walk you through how to use Lightsail to scale your application as needed for redundancy, traffic spikes, or intergalactic attack.
Mission Critical Applications Workloads on Amazon Web ServicesAmazon Web Services
In this session we will walk through practical examples of how Amazon Web Services customers operate heavily regulated workloads and mission critical applications in the cloud. Through real world customer examples we will apply security and governance controls which will provide you with increased visibility and control of your application and infrastructure for these workloads. You will learn how Enterprise secure and enable audit controls on their heavily regulated workloads in an Amazon Web Services Account. At the same time, extend your datacenter and control mechanisms to Amazon Web Services.
Cloud Based Business Intelligence with Amazon QuickSight - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Connect QuickSight to your data (Redshift, Athena, S3, RDS, Private VPCs, On-Premise databases)
- Create interactive dashboards
- Publish reports and dashboards at scale (Row Level Security, AD integration, Groups, User Management)
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...Amazon Web Services
by Daniele Stroppa, Technical Account Manager, AWS
As organizations move their workloads to the cloud, companies must take steps to protect and audit their private and confidential information. This session will focus on Amazon S3 best practices and using AWS Config rules and AWS CloudTrail Data Events to help better protect data residing within S3. The session will include a demonstration of how AWS Config and CloudTrail, in combination with other AWS services, can help with S3 governance and compliance requirements.
The AWS Well-Architected Framework enables customers to make informed decisions about their architecture in a cloud-native way and understand the impact of design decisions that are made. The Framework is composed of 5 pillars (Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization), design principles and questions. It provides strategies & best practices for architecting in the cloud.
The AWS Well-Architected Bootcamp allows you to put the Framework into practice. We will provide an introduction to the Well-Architected Framework, walk through a sample architectural example, and give you a chance to apply the Framework to the sample architecture while using the AWS knowledge of you and your team.
Security must be at the forefront for any online business. At AWS, security is priority number one. Stephen Schmidt, Vice President and Chief Information Security Officer, shares his insights into cloud security and how AWS meets customers' demanding security and compliance requirements—and in many cases helps them improve their security posture. Stephen, with his background with the FBI and his work with AWS customers in the government, space exploration, research, and financial services organizations, shares an industry perspective that's unique and invaluable for today's IT decision makers.
How to get well-architected?
You are heading towards production and don’t know whether you have thought of everything around operations, security, reliability etc.? This talk gives you an introduction to the AWS well-architected framework and the method & value of well-architected reviews.
Successful Cloud Adoption for the Enterprise. Not If. When.Amazon Web Services
Enterprises are turning to AWS to enable innovation and retire technical debt. Cloudreach are delighted to share their extensive experience and knowledge of the Enterprise’s adoption to achieve these principal aims. The aim of the session is to set out how Cloudreach ensures successful Cloud Adoption, covering technical, change management and organizational aspects to create the path towards enabling innovation. Session sponsored by Cloudreach.
AWS User Group presentation on AWS Well-Architected Framework. Includes items from framework and additional best practices I have implemented (identified by slides with (Me) in the title).
We describe how to use the Well-Architected Framework to evaluate the technology solutions built by your teams. The AWS Well-Architected Framework describes best practices across five pillars (Security, Reliability, Performance, Operational Excellence, and Cost), and provides a consistent approach to review architectures against those best practices. This review process shows where your architectures can be improved, and helps you address weakness that may put your business at risk
AWS Shared Responsibility Model & Compliance Program OverviewAmazon Web Services
AWS is hosting the first FSI Cloud Symposium in Hong Kong, which will take place on Thursday, March 23, 2017 at Grand Hyatt Hotel. The event will bring together FSI customers, industry professional and AWS experts, to explore how to turn the dream of transformation, innovation and acceleration into reality by exploiting Cloud, Voice to Text and IoT technologies. The packed agenda includes expert sessions on a host of pressing issues, such as security and compliance, as well as customer experience sharing on how cloud computing is benefiting the industry.
Speaker: Iolaire Mckinnon, Senior Consultant - Security, Risk & Compliance, Professional Services, AWS
Streamline Your Desktop Operations and Improve Security with Amazon WorkSpace...Amazon Web Services
With workplace mobility on the rise, employees, contractors, and business partners require access from any device at any time and any place. This presents IT with a number of challenges, including securing information on end-user devices, managing access to corporate information, and quickly adapting to changes in the workforce. In this webinar, Mark Bowker, Senior Analyst with the Enterprise Strategy Group, will explain how Desktops-as-a-Service (DaaS) can help address these challenges, and what the options are for your organization. We'll follow with an overview of Amazon WorkSpaces, a DaaS service from AWS, and close with how you can start using the service in your organization.
Learning Objectives:
• Understand how Amazon WorkSpaces can help you support an agile workforce and secure sensitive information on end user devices.
This session showcases best practices for operating securely at scale on AWS. We’ll introduce the AWS Security Best Practices whitepaper that covers a range of security recommendations for identity and access management, logging and monitoring, infrastructure security, and data protection. We’ll also examine practical examples found in the Center for Internet Security’s CIS AWS Foundations and CIS AWS Three-Tier Web Architecture benchmarks. Information and eGovernance Authority (IGA) also steps in to debunk common security myths of cloud adoption and speak on why they entrust the cloud with data.
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...Amazon Web Services
Security and compliance automation have become the most important drivers for IT Transformation to the cloud. Foundational cloud security services provide an unprecedented capability to ensure your cloud platform is secure, programmatically monitored, and adaptive. This session will demonstrate how Federal and Enterprise customers are embracing adaptive techniques in managing their most critical application workloads.
Learn how to increase the effectiveness of your security operations as you move to the cloud. We will discuss how your current incident response, forensic investigations, monitoring, and audit response tactics have to change in the cloud. Pulling from experiences helping clients move to the cloud, industry research, and the school of hard knocks, this talk will help provide practical advice you can apply today.
The Well-Architected workshop is a free, advanced-level workshop that describes the benefits of the AWS Well-Architected Framework. This enables customers to review and improve their cloud architectures and better understand the business impact of their design decisions. It addresses general design principles, best practices, and guidance in five pillars of the Well-Architected Framework. We recommend that attendees of this course have the following pre-requisites: Strong working knowledge of AWS core services and features, as well as previous architectural experience.
What happens when your application goes viral? Lightsail provides built-in features to scale out your application for high availability and variations in traffic, including load balancing and attached block storage. Lightsail instances can also connect to many of the 100+ services available in the AWS console, giving your application added power to grow. In this session, we will walk you through how to use Lightsail to scale your application as needed for redundancy, traffic spikes, or intergalactic attack.
Mission Critical Applications Workloads on Amazon Web ServicesAmazon Web Services
In this session we will walk through practical examples of how Amazon Web Services customers operate heavily regulated workloads and mission critical applications in the cloud. Through real world customer examples we will apply security and governance controls which will provide you with increased visibility and control of your application and infrastructure for these workloads. You will learn how Enterprise secure and enable audit controls on their heavily regulated workloads in an Amazon Web Services Account. At the same time, extend your datacenter and control mechanisms to Amazon Web Services.
Cloud Based Business Intelligence with Amazon QuickSight - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Connect QuickSight to your data (Redshift, Athena, S3, RDS, Private VPCs, On-Premise databases)
- Create interactive dashboards
- Publish reports and dashboards at scale (Row Level Security, AD integration, Groups, User Management)
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...Amazon Web Services
by Daniele Stroppa, Technical Account Manager, AWS
As organizations move their workloads to the cloud, companies must take steps to protect and audit their private and confidential information. This session will focus on Amazon S3 best practices and using AWS Config rules and AWS CloudTrail Data Events to help better protect data residing within S3. The session will include a demonstration of how AWS Config and CloudTrail, in combination with other AWS services, can help with S3 governance and compliance requirements.
The AWS Well-Architected Framework enables customers to make informed decisions about their architecture in a cloud-native way and understand the impact of design decisions that are made. The Framework is composed of 5 pillars (Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization), design principles and questions. It provides strategies & best practices for architecting in the cloud.
The AWS Well-Architected Bootcamp allows you to put the Framework into practice. We will provide an introduction to the Well-Architected Framework, walk through a sample architectural example, and give you a chance to apply the Framework to the sample architecture while using the AWS knowledge of you and your team.
Security must be at the forefront for any online business. At AWS, security is priority number one. Stephen Schmidt, Vice President and Chief Information Security Officer, shares his insights into cloud security and how AWS meets customers' demanding security and compliance requirements—and in many cases helps them improve their security posture. Stephen, with his background with the FBI and his work with AWS customers in the government, space exploration, research, and financial services organizations, shares an industry perspective that's unique and invaluable for today's IT decision makers.
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
AWS re:Invent 2016: Achieving Agility by Following Well-Architected Framework...Amazon Web Services
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, and cost optimization when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud. In this session, you'll learn how National Instruments used the Well-Architected Framework to follow AWS guidelines and best practices. By developing a strategy based on the AWS Well-Architected Framework, National Instruments was able to triple the number of applications running in the cloud without additional head count, significantly increase the frequency of code deployments, and reduce deployment times from two weeks to a single day. As a result, National Instruments was able to deliver a more scalable, dynamic, and resilient LabVIEW platform with agility.
As with everything in life, there is an easy way and a hard way when it comes to adopting security framework recommendations. Featuring the AWS Well-Architected Framework and the Cloud Adoption Framework (AWS CAF), we will walk you through a complete security journey. We'll start with identification of requirements, then move through a series of how-tos from classifying your data and automating controls to running fun incident response game days.
An Evolving Security Landscape – Security Patterns in the CloudAmazon Web Services
Availability of cloud computing is helping Financial Services organizations realize accelerated go-to-market speeds, global scalability, and cost efficiencies. This new world forces considerations for security programs – what is different in the cloud and what do I do differently? AWS Security Architects will share protocols that need to be considered in the cloud, on premises, or in a hybrid model. They will also share best practices, lessons learned, efficiencies, and design patterns and architectures unique to cloud.
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
So You Want to be Well-Architected - AWS Summit Sydney 2018Amazon Web Services
So You Want to be Well-Architected?
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, and cost optimisation when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud. In this session, you'll learn about the Well-Architected Framework, and the steps you can take to help ensure your solution is Well Architected.
Ben Hunter, Solutions Architect, Amazon Web Services
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...Amazon Web Services
This session tells the story of how security-minded enterprises provide end-to-end protection of their sensitive data in AWS. Learn about the enterprise security architecture design decisions made by Fortune 500 organizations during actual sensitive workload deployments, as told by the AWS security solution architects and professional service security, risk, and compliance team members who lived them. In this technical walkthrough, we share lessons learned from the development of enterprise security strategy, security use-case development, end-to-end security architecture and service composition, security configuration decisions, and the creation of AWS security operations playbooks to support the architecture.
Following Well Architected Frameworks - Lunch and Learn.pdfAmazon Web Services
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, cost optimization and operational excellence when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud. In this session, you'll learn how to use the Well-Architected Framework to follow AWS guidelines and best practices to your architecture on AWS.
Because the entire AWS cloud platform is programmable, it turns out that you can program security and compliance in advance of actually instantiating any actual workloads. In this session, we show how you can design a secure and compliant workload and even have it audited by a third-party auditor before creating it for the first time! Once it's created, other facilities provide mechanisms for detecting and alerting a drift from your baseline, and even automatically remediating the drift. Learn how the comprehensive automation available in AWS provides security and compliance professionals an entire new, more efficient, and more effective way to work.
Speaker: John Hildebrand, Solutions Architect, Amazon Web Services
AWS provides tools to improve your security posture, by providing ways of implementing detective and reactive controls that will detect and remediate security threats. We’ll look at the various services and the features that you can employee, such as AWS Inspector, AWS Trusted Advisor, AWS Config and Config Rules and CloudTrail. We’ll explore how they work and how they should be deployed as part of an overall security strategy.
Similar to Being Well-Architected in the Cloud (20)
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.
2. What is the AWS Well-Architected Framework?
Pillars Design Principles Questions
3. Why would I want to apply the AWS Well-Architected Framework?
Build and
deploy faster
Lower or
mitigate risks
Make informed
decisions
Learn AWS
best practices
7. General Design Principles
Stop guessing your capacity needs
Test systems at production scale
Automate to make architectural experimentation easier
Allow for evolutionary architectures
Drive architectures using data
Improve through game days
8. Design Principles for Operational Excellence
Perform operations as code
Annotate documentation
Make frequent, small, reversible changes
Refine operations procedures frequently
Anticipate failure
Learn from all operational failures
9. Design Principles for Security
Implement a strong identity foundation
Enable traceability
Apply security at all layers
Automate security best practices
Protect data in transit and at rest
Prepare for security events
10. Design Principles for Reliability
Test recovery procedures
Automatically recover from failure
Scale horizontally to increase aggregate system availability
Stop guessing capacity
Manage change in automation
11. Design Principles for Performance Efficiency
Democratize advanced technologies
Go global in minutes
Use serverless architectures
Experiment more often
Mechanical sympathy
12. Design Principles for Cost Optimization
Adopt a consumption model
Measure overall efficiency
Stop spending money on data center operations
Analyze and attribute expenditure
Use managed services to reduce cost of ownership
The AWS Well-Architected Framework provides you with prescriptive advice on how to build and operate cloud native architectures.
The Well-Architected Framework provides a set of questions and design principles across five pillars: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
Why would I want to apply the AWS Well-Architected Framework?
Because you want to:
Build and deploy faster: By reducing firefighting, capacity management and by using automation, you can experiment and release value more often.
Lower or mitigate risks: Understand where you have risks in your architecture, and address them before they impact your business and distract your team.
Make informed decisions: Ensure you have made active architectural decisions that highlight how they might impact your business outcomes.
Learn AWS Best Practices: Make sure your teams are aware of best practices that we have learned through reviewing thousands of customers’ architectures on AWS.
We have seen customers use the AWS Well-Architected Framework to successfully achieve all of these.
Well-Architected is a mechanism that helps you be successful in your cloud journey
[optionally good intention vs mechanism here – things go wrong, get everyone in the room ask them to do better next time, “good intentions”… but GD does not work, you need mechanisms]
Learn the Strategies & best practices for architecting in the cloud
Measure your architecture against best practices
Improve your architecture by addressing any issues
The pillars cover fundamental areas that are often overlooked: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
Creating technology solutions is a lot like constructing a physical building. If the foundation is not solid, it may cause structural problems that undermine the integrity and function of the building. If you neglect the five pillars of security, reliability, performance efficiency, cost optimization, and operational excellence when architecting technology solutions, it can become a challenge to build a system that delivers functional requirements and meets your expectations. When you incorporate these pillars, it will help you produce stable and efficient systems, allowing you to focus on functional requirements.
Design Principles help you adopt the appropriate mental model when building for the cloud, ensuring you take advantage of the capabilities of AWS and free yourself from the constraints of traditional approaches.
[Optional
Lets do a deep dive on the General Design Principles and Pillar Specific ones.
]
Cloud computing has opened up the technology space to a whole new world of thinking where constraints we used to have in the traditional environment no longer exist.
When thinking about general design principles, it’s interesting to contrast with how you would think about this in a traditional environment:
You had to guess how much infrastructure you needed, often based on very high-level business requirements and demand – often before a line of code is written.
You could not afford to test at scale (a complete duplicate of production costs is hard to justify, especially with low utilization), so when you went into production you normally found a whole new class of issues at high scale
Any proof of concepts or architectural experimentation was done by hand and was generally only done at the start of the project.
You generally had static architectures and it was difficult to even think about making a change.
You generally couldn’t generate data sets that would allow you to make informed decisions, so you probably used models and assumptions to size your architecture
Finally in a traditional environment, you would only exercise your runbook when something bad happened in production.
In the cloud constraints have been removed, so you can use these principles to take advantage of that.
Most changes were made by human beings following runbooks that were often out of date
It was easy to become very focused on the technology metrics rather than business outcomes
Because making change was difficult and risky, we tended not to want to do it often and therefore tended to batch changes into large releases
We rarely simulated failures or events as we were too busy fighting fires from real failures
We were so busy reacting to situations it was hard to take the time to extract learnings
It was hard to keep information current as we were making changes to everything to fight fires, every server was a snowflake.
In the cloud, constraints of a traditional environment are removed, and you can use the design principles of the Operational Excellence pillar to make all changes by code with business metrics that you can measure your success against. By automating change and using code, you can move to making incremental changes and reduce risk. You can build organizational muscle memory by running game-days that simulate failures to test your recovery processes, and learn from these and other operational events to improve your responses. Finally, because infrastructure is now code, you can detect when documentation is out of date and even generate documentation.
Let’s cast our minds back to how we would think about security in a on-premises environment
You often only had security at the surface of the architecture, an egg shell model where you harden the edges but once past these protections attackers can go anywhere
Logging and audits are sporadic, some devices would not even offer the ability to do it – and they all did it differently. It is very hard to get a holistic view of the whole environment
It was hard to have tight controls on who could do what, security was often seen as a blocker, overly permissive security was common
You had to have people or manage contracts around how you or your provider would physically secure the DC
For security there was a lot of manual processes, and therefore hard to be consistent or drive improvement over time
In the cloud these constraints have been removed, that allows us to adopt these design principles to build and operate cloud native architectures -
with security across layers, tracing across usage and changes, you can trigger code to respond to events or combinations of events. You can use fine grained access controls to say who can do what, and focus your time using the shared responsibility model
and you can turn all of this into code – so it can be automatic, error free, version controlled and scalable.
Let’s think about how we might think about reliability in a traditional environment:
We often test if things work normally – we check if it meets expectations. But, we rarely test what happens after things fail, so the first time we test our recover process is in the middle of a live reliability failure (not a great learning experience!). This is why you used to see lots of systemic failures – X failed and then Y failed (Y being the thing we never got to test)
When a failure occurs, we manually fix it – if it happens a lot we write down the procedures for fixing – a very manual process
And, we had to guess how much we needed, so we if we got that wrong we had long provisioning times, which could lead to outages.
And we made changes to our environments manually, which introduced the opportunity for human error and snowflake servers (perfectly individual)
In the cloud constraints have been removed, that allows us to adopt these design principles to build and operate cloud native architectures -
to test beyond destruction to make sure recovery procedures are automatic and successful,
we can have multiple resources answering requests – such that a failure in any single component always has siblings who can step in and absorb the load
we can use the horizontal scaling to meet demand
and when we make changes to our environment we can do that through code – and apply the same best practices we would apply to application code.
As we did before, let’s think about the kinds of constraints we had in a traditional environment when thinking about PE:
We tended to use the same tech for everything, when the only tool you had is a hammer – every problem looks like a nail. Generally, this is why you saw so many RDBMS
We stayed local, as global was too hard and too expensive – even the thought of negotiating a contract with a supplier in a different country, legal framework and language was enough to stop most conversations here
We used lots of servers, that did one thing – and we had to have people to manage all those servers.
It’s hard to get the resources to do experiment, it takes a lot of time to set up, and it’s not very common
We tended to force technologies to do what we need, and then hope we could get the performance we needed
In the cloud constraints have been removed, that allows us to adopt these design principles to build and operate cloud native architectures -
skills such as machine learning and media transcoding are not evenly distributed across technologists, so having AWS setup and configure those services for you, it makes adoption easier.
deploying to global locations is a click of a button and not a legal process,
we can create solutions that are fully managed so we can focus on the code that add values
and experimentation is something we can do continuously
and we have a bigger toolbox of techniques, and select the one that works best for what we are trying to do. For example, if you have relational information then you would use a relational database while if you needed internet scale lookups you would use a No SQL solution such as DynamoDB.
Again, let’s think about how we would approach CO in a traditional environment:
You had to invest CAPEX upfront for new infrastructure before you needed it
Most companies are not large enough to benefit from economies of scale
You spent time and money on the undifferentiated heavy lifting of building, maintaining and stacking and racking datacenters
Often there is only centralized costs that couldn’t be attributed back to others, so no one is incentivized to review costs and you had orphan systems
You purchased and ran servers to provide services, often with low utilization as they were hard to share
In the cloud constraints have been removed, that allows us to adopt these design principles to build and operate cloud native architectures -
you pay for computing resource as you consume them
AWS can use its economies of scale to drive down infrastructure costs, and pass them on to its customers
we do the heavy lifting of managing the physical bits for your, so you can focus on the value adding bytes
you can attribute costs back to business units and product owners, so they can drive these down
and use managed services that have a lower cost and eliminate the time and cost of managing servers.
As I said before the Framework consists of Questions across Five Pillars
Questions are intentionally phrased to be open-ended; to start a conversation about your approach:
In this example, we have a security question from the Incident Response area:
Contains the Question Text
Some Context to help you understand the question
And a set of best practices that we have seen customers be successful with
You can find all of the Well-Architected questions in the Well-Architected Framework whitepaper.
Most architectures contain risks. The Well-Architected review process allows you to understand these risks and improve your architecture by addressing any issues.
The AWS Well-Architected Framework whitepaper positions our perspectives on how to think about architecture in the cloud.
We also created a series of whitepapers that include prescriptive advice for each pillar
These whitepapers and free training can be found at the home for Well-Architected, where you can always find our most current thinking.