This document provides an overview of hybrid cloud scenarios using Microsoft Azure. It discusses using Azure to extend infrastructure to the cloud, processing data in the cloud, and accessing data and applications across cloud and on-premises. It provides examples of hybrid scenarios for infrastructure as a service, platform as a service, development/test, backup/recovery, and enterprise mobility. It also discusses networking options and enhancements for hybrid configurations including virtual networks, gateways, and security groups.
Gentle introduction to Azure ARM templates and other deployment options, both imperative and declarative, such as Terraform, Ansible, or even azcli or PowerShell.
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
Presentation from AWS Worldwide Public Sector team's conference Building and Securing Applications in the Cloud (http://aws.amazon.com/campaigns/building-securing-applications-cloud/).
Slides from my presentation at Azure Saturday on 26.5.2018 in Munich.
In this session, I will cover the Secure DevOps Toolkit for Azure, a set of security-related tools, Powershell modules, extensions and automations for Azure. The session is a collection of lessons learned using the Toolkit from real-life projects.
After this sessions you will be able to improve the security of your Azure usage from IDE to Operations, regardless of your current state of security and level of cloud adoption.
Up-front design of your AWS account can be done in a way that creates a reliably secure and controlled environment no matter how the AWS resources are used. This session will focus on "Secure by Design" principles and show how an AWS environment can be configured to provide a reliable operational security control capability to meet the compliance needs across multiple industry verticals (e.g. HIPAA, FISMA, PCI, etc.). This will include operational reporting through the use of AWS services (e.g. Config/Config Rules, CloudTrail, Inspector, etc.) as well as partner integration capabilities with partner solutions such as Splunk and Allgress for real-time governance, risk, and compliance reporting. Key takeaways from this session include: learning AWS Security best practices and automation capabilities for securing your environment, Automation accelerators for configuration, compliance, and audit reporting using CloudFormation, Config/Config Rules, CloudTrail, Inspector, etc., and ISV integration for real-time notification and reporting for security, compliance, and auditing in the cloud.
Gentle introduction to Azure ARM templates and other deployment options, both imperative and declarative, such as Terraform, Ansible, or even azcli or PowerShell.
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
Presentation from AWS Worldwide Public Sector team's conference Building and Securing Applications in the Cloud (http://aws.amazon.com/campaigns/building-securing-applications-cloud/).
Slides from my presentation at Azure Saturday on 26.5.2018 in Munich.
In this session, I will cover the Secure DevOps Toolkit for Azure, a set of security-related tools, Powershell modules, extensions and automations for Azure. The session is a collection of lessons learned using the Toolkit from real-life projects.
After this sessions you will be able to improve the security of your Azure usage from IDE to Operations, regardless of your current state of security and level of cloud adoption.
Up-front design of your AWS account can be done in a way that creates a reliably secure and controlled environment no matter how the AWS resources are used. This session will focus on "Secure by Design" principles and show how an AWS environment can be configured to provide a reliable operational security control capability to meet the compliance needs across multiple industry verticals (e.g. HIPAA, FISMA, PCI, etc.). This will include operational reporting through the use of AWS services (e.g. Config/Config Rules, CloudTrail, Inspector, etc.) as well as partner integration capabilities with partner solutions such as Splunk and Allgress for real-time governance, risk, and compliance reporting. Key takeaways from this session include: learning AWS Security best practices and automation capabilities for securing your environment, Automation accelerators for configuration, compliance, and audit reporting using CloudFormation, Config/Config Rules, CloudTrail, Inspector, etc., and ISV integration for real-time notification and reporting for security, compliance, and auditing in the cloud.
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Amazon Web Services
The Department of Defense's Secure Cloud Computing Architecture (SCCA) guidance provides DoD mission owners the security requirements for building a DoD compliant and secure application environment in the cloud. This session will review the DoD Cloud Security Requirements Guide and the DoD SCCA pillars and how they apply to AWS services. We will demonstrate how to build a DoD SCCA environment through automation and configuration management tools as well as discuss how to document security controls implementations. We will answer common questions, such as: how do we connect to a DoD Cloud Access Point? How do we implement a least privilege access control model? And how do we automate security event notifications and remediate issues? This session is designed for both technical and information assurance professionals that want to understand the process to move DoD systems into AWS, secure them, and get them accredited. Learn More: https://aws.amazon.com/government-education/
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Learn how to gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.
Join us to Learn:
How to protect and automate your AWS deployments while maintaining data segregation
Best practices for creating consistent security for data moving to and from the cloud
How to securely extend your application development testing environment to AWS
Speakers:
AWS Speaker: David Wright, Solution Architect
Palo Alto Networks Speaker: Bisham Kishnani, Senior Consulting Engineer
Secure Cloud Networking – Beyond Cloud Boundaries. When you are learning cloud, networking examples are just complicated enough to get you exposed to the networking fundamentals of that cloud. Real-life is quite a bit different. Matt Kazmar, Rod Stuhlmuller, Corbin Louks and Mark Cunningham from Aviatrix walks us through the complications of cloud networking, especially those encountered beyond one cloud.
Azure Networking - The First Technical ChallengeAidan Finn
The first "technical" obstacle for many organisations in Azure adoption is often the design of a secure and accessible network or landing zone for workloads and data.
Organizations need to apply security analytics to obtain seamless visibility and monitoring across both their on-premises and cloud environments. These challenges can be solved with comprehensive detection rules and behavioral analytics to ensure you detect potential threats.
Join FireEye and AWS to learn how Threat Analytics Platform (TAP) helped unify a major U.S. financial company’s on-premises and cloud-based Security Operations Centers (SOCs) by providing a single, cloud-based solution for monitoring their hybrid IT environment. FireEye’s TAP provides seamless visibility, detection and investigation across your on-premises and AWS Cloud environments ensuring actionable insight into threats targeting your company.
Join us to learn:
• How TAP ingests and analyzes AWS CloudTrail log files, providing visibility into both your AWS environment and the applications running on it
• TAP's best practices workflow to guide and inform your threat investigation
• How a major U.S. financial company unified their on-premises and cloud-based SOCs in to a single, cloud-based security operation
Who should attend: Directors and Managers of Security, IT Administrators, IT Architects, and IT Security Engineers
Synnefo @ LinuxCon/CloudOpen North America 2014Vangelis Koukis
Synnefo is an open source cloud platform written from scratch in Python. It provides Compute, Network, Image, Volume, Object Storage, Identity, and Quota services, exposing the corresponding OpenStack APIs. To do so, Synnefo manages multiple Ganeti clusters in the backend, and uses Archipelago to unify cloud storage.
Synnefo has been used to power GRNET's large-scale "~okeanos" public cloud service, currently hosting over 10,000 VMs, with over 350,000 VMs launched in the last three years.
In this presentation, Vangelis Koukis focuses on why Synnefo chose to go the Google way, and why targeting enterprise-like, persistent VMs in a cloud stack matters. After presenting the general Synnefo architecture and components used (Python, Django, Ganeti, KVM, Archipelago, Ceph/RADOS), the talk reviews how Synnefo provides a unified view of cloud storage resources over Archipelago.
RightScale Webinar: Security and Compliance in the CloudRightScale
In this webinar we talk about how the cloud security landscape continues to evolve, then show you a demo of how enterprises are using RightScale to help them securely manage all their cloud infrastructure.
Key Topics:
1. Understanding the security requirements of cloud
2. Security certifications among cloud providers
3. Managing secure & compliant cloud-enabled organizations
4. Live demo of the RightScale approach
Architecting io t solutions with microisoft azure ignite tour versionAlon Fliess
As a cloud architect one must be familiar with the pets vs cattle metaphor (Randy Bias & Bill Baker) – in the cloud, a VM is just another expandable resource! However, an IoT system may have to manage a huge number of devices, each one of them has a unique identity and a unique role. This is where the Pets vs Cattle metaphor fails – we need to handle pets in a cloud scale.
This lecture explains the complexity of the IoT problem domain and shows Azure SaaS and PaaS solution approaches: The Azure IoT Central and Azure IoT solution accelerators. We will be introduced to the Azure Device Provisioning Service (DPS) and see how it provides a scale approach to secure provisioning new IoT devices. We will explore the Azure IoT Hub and see its functional features and non-functional quality attributes such as security, scale, high-availability and health monitoring.
We will conclude the lecture with the future of IoT: "Smart Cloud and Intelligent edge" by presenting the Azure IoT Edge and Azure IoT Digital Twin.
We are all, now more than ever, spending more time online in our day-to-day lives. More and more startups are using the power of cloud to set up their next disruptive product. The concept of managing information on the cloud and protecting it, thankfully, is not something new and every cloud vendor has an abundance of security tooling available for us to leverage when setting up our next big cloud project. So with that in mind the following presentation aims to provide you with a general overview of AWS Security Tooling and the roles that each of the tools play in the Security & Compliance lifecycle. We will also deep dive a bit into two tools, namely Guard duty and Security Hub.
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Amazon Web Services
The Department of Defense's Secure Cloud Computing Architecture (SCCA) guidance provides DoD mission owners the security requirements for building a DoD compliant and secure application environment in the cloud. This session will review the DoD Cloud Security Requirements Guide and the DoD SCCA pillars and how they apply to AWS services. We will demonstrate how to build a DoD SCCA environment through automation and configuration management tools as well as discuss how to document security controls implementations. We will answer common questions, such as: how do we connect to a DoD Cloud Access Point? How do we implement a least privilege access control model? And how do we automate security event notifications and remediate issues? This session is designed for both technical and information assurance professionals that want to understand the process to move DoD systems into AWS, secure them, and get them accredited. Learn More: https://aws.amazon.com/government-education/
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Learn how to gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.
Join us to Learn:
How to protect and automate your AWS deployments while maintaining data segregation
Best practices for creating consistent security for data moving to and from the cloud
How to securely extend your application development testing environment to AWS
Speakers:
AWS Speaker: David Wright, Solution Architect
Palo Alto Networks Speaker: Bisham Kishnani, Senior Consulting Engineer
Secure Cloud Networking – Beyond Cloud Boundaries. When you are learning cloud, networking examples are just complicated enough to get you exposed to the networking fundamentals of that cloud. Real-life is quite a bit different. Matt Kazmar, Rod Stuhlmuller, Corbin Louks and Mark Cunningham from Aviatrix walks us through the complications of cloud networking, especially those encountered beyond one cloud.
Azure Networking - The First Technical ChallengeAidan Finn
The first "technical" obstacle for many organisations in Azure adoption is often the design of a secure and accessible network or landing zone for workloads and data.
Organizations need to apply security analytics to obtain seamless visibility and monitoring across both their on-premises and cloud environments. These challenges can be solved with comprehensive detection rules and behavioral analytics to ensure you detect potential threats.
Join FireEye and AWS to learn how Threat Analytics Platform (TAP) helped unify a major U.S. financial company’s on-premises and cloud-based Security Operations Centers (SOCs) by providing a single, cloud-based solution for monitoring their hybrid IT environment. FireEye’s TAP provides seamless visibility, detection and investigation across your on-premises and AWS Cloud environments ensuring actionable insight into threats targeting your company.
Join us to learn:
• How TAP ingests and analyzes AWS CloudTrail log files, providing visibility into both your AWS environment and the applications running on it
• TAP's best practices workflow to guide and inform your threat investigation
• How a major U.S. financial company unified their on-premises and cloud-based SOCs in to a single, cloud-based security operation
Who should attend: Directors and Managers of Security, IT Administrators, IT Architects, and IT Security Engineers
Synnefo @ LinuxCon/CloudOpen North America 2014Vangelis Koukis
Synnefo is an open source cloud platform written from scratch in Python. It provides Compute, Network, Image, Volume, Object Storage, Identity, and Quota services, exposing the corresponding OpenStack APIs. To do so, Synnefo manages multiple Ganeti clusters in the backend, and uses Archipelago to unify cloud storage.
Synnefo has been used to power GRNET's large-scale "~okeanos" public cloud service, currently hosting over 10,000 VMs, with over 350,000 VMs launched in the last three years.
In this presentation, Vangelis Koukis focuses on why Synnefo chose to go the Google way, and why targeting enterprise-like, persistent VMs in a cloud stack matters. After presenting the general Synnefo architecture and components used (Python, Django, Ganeti, KVM, Archipelago, Ceph/RADOS), the talk reviews how Synnefo provides a unified view of cloud storage resources over Archipelago.
RightScale Webinar: Security and Compliance in the CloudRightScale
In this webinar we talk about how the cloud security landscape continues to evolve, then show you a demo of how enterprises are using RightScale to help them securely manage all their cloud infrastructure.
Key Topics:
1. Understanding the security requirements of cloud
2. Security certifications among cloud providers
3. Managing secure & compliant cloud-enabled organizations
4. Live demo of the RightScale approach
Architecting io t solutions with microisoft azure ignite tour versionAlon Fliess
As a cloud architect one must be familiar with the pets vs cattle metaphor (Randy Bias & Bill Baker) – in the cloud, a VM is just another expandable resource! However, an IoT system may have to manage a huge number of devices, each one of them has a unique identity and a unique role. This is where the Pets vs Cattle metaphor fails – we need to handle pets in a cloud scale.
This lecture explains the complexity of the IoT problem domain and shows Azure SaaS and PaaS solution approaches: The Azure IoT Central and Azure IoT solution accelerators. We will be introduced to the Azure Device Provisioning Service (DPS) and see how it provides a scale approach to secure provisioning new IoT devices. We will explore the Azure IoT Hub and see its functional features and non-functional quality attributes such as security, scale, high-availability and health monitoring.
We will conclude the lecture with the future of IoT: "Smart Cloud and Intelligent edge" by presenting the Azure IoT Edge and Azure IoT Digital Twin.
We are all, now more than ever, spending more time online in our day-to-day lives. More and more startups are using the power of cloud to set up their next disruptive product. The concept of managing information on the cloud and protecting it, thankfully, is not something new and every cloud vendor has an abundance of security tooling available for us to leverage when setting up our next big cloud project. So with that in mind the following presentation aims to provide you with a general overview of AWS Security Tooling and the roles that each of the tools play in the Security & Compliance lifecycle. We will also deep dive a bit into two tools, namely Guard duty and Security Hub.
Windows Azure enables you to quickly build, deploy and manage applications across a global network of Microsoft-managed datacenters. You can build applications using any operating system, language or tool. This session provides you with a roadmap to all the amazing services available to developers including web sites, virtual machines, big data, and more. You will learn how to start building great cloud apps right away!
Peering through the Clouds - Cloud Architectures You Need to MasterClint Edmonson
Heard of elastic computing? Cloud-bursting? Off-line rendering? Join us in this session where we walk through the key cloud scenarios every developer should be familiar with and when and where each should be used. We’ll discuss how the architecture of each of these scenarios is realized using the Windows Azure cloud platform
I presented this at a user group in Sweden, as a compilation discussion of practical customer experiences with WIndows Azure. The slides led the discussion. Enjoy.
This session will explain at various levels how security is quaranteed. What are the responsibilities of the Cloud Provider (in this case Microsoft) and what responsibilities remain with the customers themselves? How are we save from evesdropping for sensitive information and portscanners? How compliant are the Microsoft Windows Azure datacenters? What does the Patriot Act mean, what is Safe Harbour and how does this impact the privacy of your data?
Going to the cloud with Microsoft and ITAdviser_Windows Azure overview for IT...Olimpia Oancea
We really believe that cloud is the new normal. For anyone who is looking to develop software, using a public cloud like Azure is a no-brainer. In the last year, we have not come across even a single scenario where a customer is looking to build a new innovative product, and they are going to deploy that in their own datacenter…
Olimpia Oancea, Co-Founder and CEO, ITAdviser
Azure en Nutanix: your journey to the hybrid cloudICT-Partners
Op zoek naar oplossingen voor een flexibel, schaalbaar, kostenefficiënt en toekomstvast datacenter? Ontdek dan nu de kracht van Microsoft Azure & Nutanix: twee moderne platformen waarmee u de voordelen van uw on-premise infrastructuur kunt combineren met de voordelen van de public cloud.
Presentatie van 30 april 2015
azure track -03- it pros meet azure - againITProceed
by Kristof Rennen, Mike Martin
IaaS in the public cloud, the final frontier. These are the voyages of the Enterprise IT team, it's mission: to be scalable and agile as possible. To achieve their mission goal they can use the new features of Microsoft Azure:
•Azure Files
•Azure RemoteApp
•the new VNET features and it's big brother ExpressRoute
•and much much more
don't forget: Azure goes to Infinity and … beyond!
Are you getting the most out of Azure? Learn 6 ways to get more from your Azure platform.
Join one of our top Infrastructure and Cloud consultants, Mike Balatzis to learn how to get more from your Azure platform. Mike is an information technology consultant with 18 years’ experience in Microsoft enterprise solutions, including Windows server and desktop operating systems, Exchange, and System Center Configuration Manager. In addition, Mike is an MSCE for the Private Cloud as well as a VTSP for Azure.
This webinar will cover the following important topics
•Microsoft Azure Infrastructure and Networking
•Securing Resources
•Application Storage & Data Access Strategy
•Applications in Azure
•Websites in Microsoft Azure
•Design a Management, Monitoring, and Business Continuity Strategy
This module provides the students a high level introduction to Azure.
Lessons
•Cloud Technology Overview
•Microsoft Azure
•Azure Portals
•Managing Azure with Windows PowerShell
Global Azure Bootcamp 2018 - Azure Network SecurityScott Hoag
In this session, attendees will learn about the network control plane in Azure and how to secure both Infrastructure-as-a-Service and Platform-as-a-Service components of Azure.
Azure VNET Peering | விநெட் பியரிங் என்றால் என்ன? Azure in TamilK.Mohamed Faizal
YouTube link https://youtu.be/dOPdRN12xKU
Azure VNET Peering | விநெட் பியரிங் என்றால் என்ன? Azure in Tamil
Azure VNet Peering enables seamless connectivity between virtual networks within the same Azure region. With VNet Peering, you can securely exchange traffic across VNets, facilitating resource sharing and collaboration. Simplify network architecture and enhance communication between Azure resources effortlessly.
Azure Networking VNET Peering Deep Dive
Implementing SharePoint on Azure, Lessons Learnt from a Real World ProjectK.Mohamed Faizal
Infrastructure as a Service (IaaS) and its features that can be leveraged for hosting a SharePoint 2013 farm. Learn how to setup, thinks to consider when you setup VPN, Storage, Cloud Services, setting up load balance endpoints. The speaker will share his real world experience and trips and tricks
Want to be part of the Internet of Things revolution then this session is for you, Microsoft Azure as a platform delivers the capabilities to enable your IoT solution from building blocks through to finished services. In this demonstration rich session you will learn about Microsoft’s position on IoT, and the technology and services being delivered from Microsoft to help you develop, connect, manage and unlock data insights
Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013K.Mohamed Faizal
Come and understand different type of SharePoint Topologies and learn how to design for SharePoint architecture that serve for Intranet, Websites, Office Web Apps Server, App management, wide-area networks, monitoring, newsfeeds, distributed cache, high availability, and disaster recovery.
SharePoint Migration What do I expect ? (The issues and solutions)K.Mohamed Faizal
There are tons of resources on the Internet today that tell you how to migrate your SharePoint 2007 environment to SharePoint 2010.
Sometimes, achieving something becomes difficult due to of lack of information, This presentation will help you in achieving your migration goal.
You may probably have seen these articles or links that talk about
◦Top 5 SharePoint Migration Pitfalls
◦Database attach or Backup-SPSite / Restore-SPSite
◦Understand the SharePoint Migration Schedule
◦Understand Your SharePoint Customizations Before Migrating
In this presentation, I am going to cover the issue that you may discover during your migration or after migration. ?
Take this opportunity to learn more about SP 2013 and find out about the plans other organizations have for SP 2013. Some of the common concerns now include:
Should I wait for SP 2013 or move on with SP 2010?
How do I justify for SP 2013's investment?
With great improvements in features and usability, the SP product team now says that the web/intranet team can focus more on engaging with users needs rather than vendors' implementation. So what role do we play in SP 2013, and what role do vendors play?
What does it mean for migration from earlier versions of SharePoint?
This session provides a “Sneak Peek” of SharePoint 2013 IT Pro / Developer perspective. The session is designed to help the audience to understand the changes architectural changes have occurred, storage considerations, browser support, social media supports, workflows and ect… This is a must attend session for leading edge SharePoint IT Pro/Developer looking to jump start their 2013 experience curve.
Build and Deploy LightSwitch Application on Windows AzureK.Mohamed Faizal
Visual Studio LightSwitch is the simplest way to build business applications for the desktop and cloud. LightSwitch simplifies the development process by letting you concentrate on the business logic, while LightSwitch handles the common tasks for you.
In this session you see the demo, Which shows you end-to-end, how to build and deploy a data-centric business application using LightSwitch and deploy to Windows Azure
Faizal discussing and demonstrates Windows Azure Traffic Manager which on CTP. Traffic Manager provides several ways to load balance traffic to multiple hosted services. You can choose from three load balancing methods: Performance, Failover, or Round Robin.
Must have tools for Windows Azure : During our AzureUG.SG meeting i cover variety of the third-party tools available in the Windows Azure ecosystem. Included are tools for both developers and IT professionals. We look at tools that will help manage storage and resources, migration, scaling, diagnostics and software components that will help you build cloud applications.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
6. HYBRID SCENARIOS
Extend
Infrastructure
to the cloud
Data
Processing in
the cloud
Access data &
apps in your
data center
Integrate
services from
On-Premises
Processing
across cloud
& On-Premise
7. WHY HYBRID CLOUD?
Your IT can benefit from public cloud
• Pay-per-use, scalability, elasticity
You cannot move all to a public cloud
• Existing investments, legal constraints etc.
Hybrid = best of both
• Run in public cloud and your own data center
8. A Unified Cloud Strategy
• flexible development
• unified management
Management PPoorrttaall//AAPPII
• common identity
• integrated virtualization
Compute/storage/network Compute/storage/network
• complete data platform
9. NETWORKING & AUTOMATION SERVICES
COMPUTE SERVICES DATA SERVICES
APP SERVICES
* Not meant to be a comprehensive list of all services, for a complete list please visit azure.microsoft.com
SO WHAT IS HYBRID …
NETWORKING, COMPUTE, STORAGE, APP SERVICES,
AUTOMATION, DISASTER RECOVERY, DEV, TEST, UAT, etc.
… as a SERVICE
On Premises Private Cloud
Health Monitoring Automation
Site-to-Site VPN
Point-to-Site VPN
Express Route
Azure
Web
Site
web
roles
worker
roles
Virtual
Machines
Azure
Mobile
Services
TFS or
VS Online +
GIT
Azure
AD
Multi-Factor
Auth
Azure
Cache
Access
Control
BizTalk
Services
Media
Services
Service
Bus
Notification
Hub
Scheduler
Commercial
Server Group #1 Server Group #2
SAN
Storage Spaces/SMB
VIRTUALIZATION
COMPUTE,
STORAGE &
NETWORKING
Physical Infrastructure
(Servers/Storage/Networking
DEVICES & FACILITIES
StorSimple
Cloud Integrated Storage
Azure Site
Recovery
StorSimple
Virtual
Appliance
Backup
Service
Gallery
OS images
VHD VHD data
disk
MySQL
database
SQL
Database
SQL
Data
Sync
HDInsight
(Hadoop)
storage
queue
storage
blob
storage
table
Virtual
network
Availability Automation CDN
Set
Azure load
balancer
Auto-scale
Traffic
Manager
Active Exchange File Server
Directory
LOB App My SQL Oracle
App
SQL
APPLICATIONS &
SERVICES
JEE App .NET App
System Center 2012 R2
Provisioning
Monitoring
Automation & Self Service
Application Insight
IT Service Management
11. HYBRID CLOUD SCENARIOS
Infrastructure as a Service (3-Tier highly available example)
Availability Set
Load
Balancing
Auto
Scaling
Tier 1
Tier 2
Availability Set
Auto
Scaling
SharePoint
Tier 3
Availability Set
Azure
Storage
SQL
Azure
Analytics
& Reporting
VPN
VPN
Web
Site
Mobile
Service
HDInsight
(Hadoop)
Virtual
Machines
VHD
Storage
BLOB
Storage
Table
Storage
Queue
Windows Azure
Cache
Windows Azure
CDN
Microsoft
Azure AD
Notification Hub
Microsoft
Azure SDK
Developers
Users
On Premises
Microsoft Azure
12. HYBRID CLOUD SCENARIOS
Platform as a Service (Connected Devices)
Connected Devices
Collect / Decode
Load
Balancing
Auto
Scaling
Worker
Roles
INGRESS NODES
ANALYTICS NODE
Filter / Analyze / Aggregate
Record Reporting / BI
Auto
Scaling
Worker
Roles
Azure
Storage
CONSUME
Azure
Storage
SQL
Azure
Analytics
& Reporting
Microsoft Azure
14. HYBRID CLOUD SCENARIOS
Azure Backup
SQL
File Server
Exchange
Encrypted Backup
VPN
Recovery
Windows Backup
SC Data Protection Manager
Microsoft Azure
Azure Site Recovery
Site A Replication
Site A Site B Hyper-V
System Center
Virtual Machine
Manager
Recovery
plan
Health Monitor
System Center
Virtual Machine
Manager
Replica
Orchestrated Recovery in case of outage
Manage
Site B
System Center
Virtual Machine
Manager
Recovery
Microsoft Azure
Microsoft Azure
15. HYBRID CLOUD SCENARIOS
Enterprise Mobility Suite
• Hybrid Identity Management
• Mobile Device Security& Management
• Mobile Application Management
• Strong Authentication & Access based Information
Protection
Microsoft Azure Active Directory
Consumer identity
providers
PCs and devices
Microsoft apps
Custom ISV/CSV apps
LOB apps
3rd party clouds/hosting
Encrypted Synchronization
Microsoft Azure AD
Microsoft Azure Multi-Factor Authentication
Multi-Factor ADFS / SAML
Authentication
Server
Cloud Apps
Multi-Factor
Authentication
Server
Corporate devices
On Premises
Applications
BYOD / Personal
devices
.NET, Java, PHP, …
• Built-in
• SDK for integration
• Strong multi Factor Authentication
• Real Time Fraud Alert
• Reporting, Logging & Auditing
• Enables compliance with NIST 800-63
Level 3, HIPAA,
PCI DSS, and other regulatory
requirements
Microsoft Azure AD
16. SQL SERVER HYBRID CLOUD SCENARIOS
SQL Development
Publish
Compare
Sync
Import / Export
Register / Unregister
Management Portal
VPN Dispersed Teams
Microsoft Azure
SQL Backup/Recovery
SQL Backup tool for legacy
Manual Console Backup
Managed Backups
Management Portal
VPN / Encrypted Data
Microsoft Azure
SQL Business Continuity
Primary Asynchronous Commit Secondary
VPN
Console 2014 / Scripts 2012
Backup
Availability Groups
Periodic Snapshots
Geo Replication
Disaster Recovery
Powering BI Apps
Microsoft Azure
17. SAP on Microsoft Azure
On-Premises
VPN Device
SAP (Dev / Test / UAT)
Windows
Server
& SAP (C:)
Shared
Pool (D:)
Windows
Server (C:)
Shared
Pool (D:)
SQL Server
(E:)
.vhd file
.vhd file
.vhd file
.vhd file
.vhd file
SQL Server
Virtual Network
Blob Storage
On-Premises
On-Premises
Servers
SAP certifications
Microsoft Azure is certified for the following SAP products, with full support
from Microsoft and SAP.
http://azure.microsoft.com/en-us/campaigns/sap/
SAP Product
Guest
Operating
System
RDBMS
Virtual
Machine
Types
SAP Business Suite Software Windows
SQL
Server
A5
SAP Business All-in-One Windows
SQL
Server
A5
SAP NetWeaver Application Server
ABAP 1 Windows
SQL
Server
A5
SAP HANA Developer Edition
(including the HANA Client software
comprised of SQLDBC, ODBO
(Windows only), ODBC, AND JDBC
drivers), HANA Studio, and HANA
Database) 2
SUSE, Linux N/A A7, A8
Azure VPN
Gateway
1 Only NetWeaver 7.00 and later SAP releases of NetWeaver are supported for
deployment in Azure.
2 Customers can try SAP HANA Developer Edition on Azure using the SAP Cloud
Appliance Library.
18. THE BIG (NETWORK) PICTURE
Internet Clients
Azure
Virtual Network
On premises
Datacenter
Frontend Connectivity
Load-balanced and direct IPs
ACLs & DDoS protection
Traffic Manager & Azure DNS
Virtual Networks
Flexible multi-tier topologies
Backend Connectivity
Secure Internet cross premises VPN
connectivity
ExpressRoute – direct connectivity
19. FORCED TUNNELING
“Force” or redirect customer
Internet-bound traffic to an
on-premises site
Auditing & inspecting
outbound traffic from Azure
Needed by many scenarios
for critical security and IT
policy requirements
Backend
10.3/16
Mid-tier
10.2/16
Virtual Network
Frontend
10.1/16
VPN
GW
Internet
On Premises
S2S
VPNs
Forced Tunneled
via S2S VPN Internet
20. GATEWAY ENHANCEMENTS
High Performance Gateway
• Better throughput
• More S2S tunnels
• Pricing
• $0.49 per gateway hour
• Data transfer & VNet traffic rates unchanged
No Encryption option
• Better throughput for Vnet-to-Vnet
within Azure
• Intra-/Inter-region Vnet-to-Vnet traffic
stays within Microsoft networks, not
Internet
PFS Support for IKE
• Compliance requirements & better
security
Operations Logs
• Visibility into critical gateway events
Gateway SKU ExpressRoute
Throughput*
S2S
Throughput*
Max
Tunnels
Default 500 Mbps 100 Mbps 10
Performance 1000 Mbps 200 Mbps 30
21. ENnaEbTlWesO nReKtw SoErCkU RITY GROUPS (NSG)
segmentation & DMZ
scenarios
Access Control List
• Filter conditions with allow/deny
• Individual addresses, address prefixes,
wildcards
Associate with VMs or
subnets
ACLs can be updated
independent of VMs
Backend
10.3/16
Mid-tier
10.2/16
Virtual Network
Frontend
10.1/16
VPN
GW
Internet
On Premises 10.0/16
S2S
VPNs
Internet
22. MULTIPLE NICS IN AZURE VMS
Multiple NICs enable virtual
appliances in Azure
MAC/IP addresses persist through
VM life cycle
Separate frontend-backend traffic,
and management-data planes
Up to 4 NICs per VM
Azure Virtual Machine
NIC2 NIC1 Default
Internet
10.2.3.33 10.2.2.22 10.2.1.11
VIP:
133.44.55.66
25. FOR MORE INFORMATION
• Introduction to Microsoft Azure Networking Technologies and
What's New
• Designing Hybrid Scenarios with Microsoft Azure
• Architecting Effective Cloud Adoption Strategies
• How to Develop a Successful Hybrid Cloud Strategy
26. EVALUATE THIS SESSION
Win…
There will be other prizes including Bluetooth devices,
Office 365 subscriptions, Xbox Live subscriptions and more!