Best Practices for AWS PrivateLink (NET301) - AWS re:Invent 2018Amazon Web Services
AWS PrivateLink is a networking service that allows you to increase the security, scale, and resiliency of your services. In this session, we review the way AWS PrivateLink works, best practices, and how to increase availability and security. We review how to set up both the consumer and provider sides of PrivateLink, use cases, and interoperability with other AWS services. Whether you want to consume services in a more scalable and private way or you have services you want to share with others, we help you understand best practices for AWS PrivateLink.
日本マイクロソフト株式会社
カスタマーサクセス事業本部 エンタープライズアーキテクト統括本部 クラウドアーキテクト技術本部 クラウドソリューションアーキテクト
牛上 貴司
AVD の導入を検討している方、または、構築に携わる方に向けて、導入する際に肝となるポイントをまとめてみました。
これらのポイントをおさえておくだけで、多くの時間を費やす事や余計なトラブルを回避できると思います。
Windows 365 の登場により、ますます活性化するクラウド VDI 市場に乗り遅れることなかれ!
【Microsoft Japan Digital Daysについて】
Microsoft Japan Digital Days は、お客様が競争力を高め、市場の変化に迅速に対応し、より多くのことを達成することを目的とした、日本マイクロソフトがお届けする最大級のデジタル イベントです。4 日間にわたる本イベントでは、一人一人の生産性や想像力を高め、クラウド時代の組織をデザインするモダンワークの最新事例や、変化の波をうまく乗り切り、企業の持続的な発展に必要なビジネスレジリエンス経営を支えるテクノロジの最新機能および、企業の競争優位性に欠かせないクラウド戦略のビジョンなどデジタル時代に必要な情報をお届けいたしました。(2021年10月11日~14日開催)
一歩先行く Azure Computing シリーズ(全3回) 第2回 Azure VM どれを選ぶの? Azure VM 集中講座Minoru Naito
近年 Azure VM のラインナップが急速に拡大し、どれを選ぶのかわからなくなっている方もおられるのではないでしょうか。
こちらでは、Azure VM のラインナップ一つ一つを解説し、どのような用途でどのような VM を選べばよいかを解説します。
本資料は、以下のウェビナーの資料となります。こちらのウェビナーで動画も閲覧できますので、よろしければこちらもぜひどうぞ!
https://info.microsoft.com/JA-AzureINFRA-WBNR-FY19-11Nov-20-AzureVMIntensiveCourse-MCW0009132_02OnDemandRegistration-ForminBody.html
Best Practices for AWS PrivateLink (NET301) - AWS re:Invent 2018Amazon Web Services
AWS PrivateLink is a networking service that allows you to increase the security, scale, and resiliency of your services. In this session, we review the way AWS PrivateLink works, best practices, and how to increase availability and security. We review how to set up both the consumer and provider sides of PrivateLink, use cases, and interoperability with other AWS services. Whether you want to consume services in a more scalable and private way or you have services you want to share with others, we help you understand best practices for AWS PrivateLink.
日本マイクロソフト株式会社
カスタマーサクセス事業本部 エンタープライズアーキテクト統括本部 クラウドアーキテクト技術本部 クラウドソリューションアーキテクト
牛上 貴司
AVD の導入を検討している方、または、構築に携わる方に向けて、導入する際に肝となるポイントをまとめてみました。
これらのポイントをおさえておくだけで、多くの時間を費やす事や余計なトラブルを回避できると思います。
Windows 365 の登場により、ますます活性化するクラウド VDI 市場に乗り遅れることなかれ!
【Microsoft Japan Digital Daysについて】
Microsoft Japan Digital Days は、お客様が競争力を高め、市場の変化に迅速に対応し、より多くのことを達成することを目的とした、日本マイクロソフトがお届けする最大級のデジタル イベントです。4 日間にわたる本イベントでは、一人一人の生産性や想像力を高め、クラウド時代の組織をデザインするモダンワークの最新事例や、変化の波をうまく乗り切り、企業の持続的な発展に必要なビジネスレジリエンス経営を支えるテクノロジの最新機能および、企業の競争優位性に欠かせないクラウド戦略のビジョンなどデジタル時代に必要な情報をお届けいたしました。(2021年10月11日~14日開催)
一歩先行く Azure Computing シリーズ(全3回) 第2回 Azure VM どれを選ぶの? Azure VM 集中講座Minoru Naito
近年 Azure VM のラインナップが急速に拡大し、どれを選ぶのかわからなくなっている方もおられるのではないでしょうか。
こちらでは、Azure VM のラインナップ一つ一つを解説し、どのような用途でどのような VM を選べばよいかを解説します。
本資料は、以下のウェビナーの資料となります。こちらのウェビナーで動画も閲覧できますので、よろしければこちらもぜひどうぞ!
https://info.microsoft.com/JA-AzureINFRA-WBNR-FY19-11Nov-20-AzureVMIntensiveCourse-MCW0009132_02OnDemandRegistration-ForminBody.html
The document discusses various disaster recovery scenarios for a BI solution involving Azure Synapse, Data Lake, and Data Share. Scenario 2 involves provisioning these services in a paired secondary region, then synchronizing the Data Lake, restoring the SQL Pool, activating Synapse pipelines, and data share triggers to enable a standby environment. A step-by-step guide is provided for implementing scenario 2 with phases for provisioning, synchronization, restore, activation of pipelines and triggers, and notification of consumers. References are also included.
Amazon GuardDuty - Let's Attack My Account! - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- How to safely generate a number of Amazon GuardDuty findings
- How to analyze Amazon GuardDuty findings
- How to think about remediation of threats
Securing sensitive data with Azure Key VaultTom Kerkhove
As a developer you often have to use & store a lot of sensitive data going from service credentials to connection strings or even encryption keys. But how do I store these in a secure way? How do I know who has access to them and how do I prevent people from copying them and abusing them? On the other hand, SaaS customers have no clue how you store their sensitive data and how they use it. How can they monitor that? How can they revoke your access easily?
Watch the recording here - http://azug.be/2015-05-05---securing-sensitive-data-with-azure-key-vault
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
This document provides an overview of Microsoft Azure security features, including:
- Shared responsibility model where Microsoft secures the platform and customers secure their data and applications
- Identity and access management, encryption of data at rest and in transit, network security controls, and logging/monitoring capabilities
- Security Center provides visibility into threats and advanced analytics to detect attacks
- Operations Management Suite allows collecting logs from Azure, on-premises, and other clouds to analyze security events
- Microsoft works with partners to provide additional virtual network appliances and security solutions to customers
Amazon Elastic File System (EFS): New Elastic File Storage Service That Makes...Amazon Web Services
Amazon EFS is a new fully-managed service that makes it easy to set up and scale shared file storage in the AWS Cloud. Amazon EFS supports NFSv4, and is designed to be highly available and durable. Amazon EFS can support thousands of concurrent EC2 client connections with consistent performance, making it ideal for a wide range of uses cases, including content repositories, development environments, and home directories, as well as big data applications that require on-demand scaling of file system capacity and performance. In this session, we’ll provide an overview of EFS, walk through the creation of a file system, discuss EFS’ availability and durability properties, and review security features.
Azure Sentinel is a cloud-native security information and event management (SIEM) and security orchestration, automation and response (SOAR) solution that uses built-in machine learning to detect threats and allows security teams to automate responses. It collects security data from across an organization, including Microsoft 365 data for free. Azure Sentinel is scalable and has no infrastructure costs, with customers only paying for resources used. It integrates with existing security tools and data sources.
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018Amazon Web Services
Most workloads on AWS resemble a finely crafted cake, with delight at every layer. In this session, we help you master identity at each layer of deliciousness: from platform, to infrastructure, to applications, using services like AWS Identity and Access Management (IAM), AWS Directory Service, Amazon Cognito, and many more. Leave with a firm mental model for how identity works both harmoniously and independently throughout these layers, and with ready-to-use reference architectures and sample code. We keep things fun and lively along the way with lots of demos, which will hopefully make up for our decided lack of anything resembling the sweet confections we'll be talking so much about!
The document discusses various disaster recovery scenarios for a BI solution involving Azure Synapse, Data Lake, and Data Share. Scenario 2 involves provisioning these services in a paired secondary region, then synchronizing the Data Lake, restoring the SQL Pool, activating Synapse pipelines, and data share triggers to enable a standby environment. A step-by-step guide is provided for implementing scenario 2 with phases for provisioning, synchronization, restore, activation of pipelines and triggers, and notification of consumers. References are also included.
Amazon GuardDuty - Let's Attack My Account! - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- How to safely generate a number of Amazon GuardDuty findings
- How to analyze Amazon GuardDuty findings
- How to think about remediation of threats
Securing sensitive data with Azure Key VaultTom Kerkhove
As a developer you often have to use & store a lot of sensitive data going from service credentials to connection strings or even encryption keys. But how do I store these in a secure way? How do I know who has access to them and how do I prevent people from copying them and abusing them? On the other hand, SaaS customers have no clue how you store their sensitive data and how they use it. How can they monitor that? How can they revoke your access easily?
Watch the recording here - http://azug.be/2015-05-05---securing-sensitive-data-with-azure-key-vault
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
This document provides an overview of Microsoft Azure security features, including:
- Shared responsibility model where Microsoft secures the platform and customers secure their data and applications
- Identity and access management, encryption of data at rest and in transit, network security controls, and logging/monitoring capabilities
- Security Center provides visibility into threats and advanced analytics to detect attacks
- Operations Management Suite allows collecting logs from Azure, on-premises, and other clouds to analyze security events
- Microsoft works with partners to provide additional virtual network appliances and security solutions to customers
Amazon Elastic File System (EFS): New Elastic File Storage Service That Makes...Amazon Web Services
Amazon EFS is a new fully-managed service that makes it easy to set up and scale shared file storage in the AWS Cloud. Amazon EFS supports NFSv4, and is designed to be highly available and durable. Amazon EFS can support thousands of concurrent EC2 client connections with consistent performance, making it ideal for a wide range of uses cases, including content repositories, development environments, and home directories, as well as big data applications that require on-demand scaling of file system capacity and performance. In this session, we’ll provide an overview of EFS, walk through the creation of a file system, discuss EFS’ availability and durability properties, and review security features.
Azure Sentinel is a cloud-native security information and event management (SIEM) and security orchestration, automation and response (SOAR) solution that uses built-in machine learning to detect threats and allows security teams to automate responses. It collects security data from across an organization, including Microsoft 365 data for free. Azure Sentinel is scalable and has no infrastructure costs, with customers only paying for resources used. It integrates with existing security tools and data sources.
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018Amazon Web Services
Most workloads on AWS resemble a finely crafted cake, with delight at every layer. In this session, we help you master identity at each layer of deliciousness: from platform, to infrastructure, to applications, using services like AWS Identity and Access Management (IAM), AWS Directory Service, Amazon Cognito, and many more. Leave with a firm mental model for how identity works both harmoniously and independently throughout these layers, and with ready-to-use reference architectures and sample code. We keep things fun and lively along the way with lots of demos, which will hopefully make up for our decided lack of anything resembling the sweet confections we'll be talking so much about!
Jd edwards upgrade roundtable at innovate15 empire merchants case studyNERUG
- Empire Merchants upgraded their JD Edwards system from version Xe to 9.1 over a 13 month period between 2012-2014. They crammed 6 months of implementation work into the project timeline.
- Thorough testing, training, executive support, and involvement of business users were key to the success of the upgrade. Over 1600 test scripts were developed and multiple "mock go-lives" were conducted.
- The go-live occurred in July 2014 during Empire's regular monthly shutdown period. While some performance issues occurred, the upgraded system has provided Empire with new capabilities and extended support.
Planning on Upgrading to JDE E1 v9 from World or another JDE Release in a multi-company, multi currency environment including using BI Publisher?
Learn what worked - what didn't and what we would do next time!