The struggle to safeguard valuable online assets is an ongoing and critical one. But to protect those assets, first we must detect the threats and then effectively respond. In this hands-on workshop, we walk through some real-world threat scenarios and show you the AWS services involved with threat detection and remediation. You learn about the threat detection capabilities of Amazon GuardDuty, Amazon Macie, and AWS Config and the available remediation options. For each hands-on scenario, we review methods to remediate the threat using GuardDuty, Macie, and AWS Config, as well as AWS CloudFormation, Amazon S3, AWS CloudTrail, Amazon VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, DNS logs, AWS Lambda, and Amazon Inspector.
Continuous security monitoring and threat detection with AWS services - SEC20...Amazon Web Services
This document discusses continuous security monitoring and threat detection using AWS services. It describes how AWS services like GuardDuty, Macie, and Security Hub use machine learning to detect threats in customer environments by analyzing log data and security findings. It also discusses how to build threat detection solutions using these services and how to automate threat response using services like Lambda, CloudWatch Events, and Systems Manager.
In this interactive chalk talk, learn how to publish self-service remediation actions with AWS Systems Manager and AWS Service Catalog. Also, understand how you can use AWS Config to manage configuration drift and governance on AWS. Finally, learn how Moody’s uses AWS Systems Manager to automate patching across multiple cloud providers. Bring your questions, and join us for this discussion.
Delivering applications securely with AWS - SVC303 - Chicago AWS SummitAmazon Web Services
Networking is the foundation that supports many applications on AWS. The way you architect your network helps to determine how reliable, secure, and performant your applications are. In this session, we discuss the easy and secure delivery of applications to your users over the AWS global network. We answer your questions and cover multiple delivery methods that use Amazon CloudFront, AWS Global Accelerator, and AWS PrivateLink.
Scaling a database with Amazon RDS for Oracle - ADB208 - Chicago AWS SummitAmazon Web Services
With changing business goals, new traffic patterns, and demands for cost optimization, businesses need to scale their databases up or down and in or out on the cloud. In this chalk talk, learn how to scale compute resources up or down, and understand how to scale up the storage size of your Amazon RDS for Oracle instances. Also learn how to scale out or scale in your Oracle Read Replicas to sustain changing read traffic. Come to this chalk talk to learn, ask questions, and share your experiences.
Exploring the fundamentals of AWS networking - SVC210 - Chicago AWS SummitAmazon Web Services
The document is a presentation on AWS networking fundamentals that covers topics like VPCs, subnets, routing, security, internet connectivity, connecting VPCs, and connecting to on-premises networks. It provides examples and explanations of how to configure networking components in AWS like NAT gateways, VPC peering, Transit Gateways, and more. The presentation aims to explain core AWS networking concepts and help attendees explore networking options in AWS.
Do you need a ledger database or a blockchain? - SVC310 - Chicago AWS SummitAmazon Web Services
This session introduces two new AWS services for blockchain and ledger technology: Amazon Quantum Ledger Database (Amazon QLDB) and Amazon Managed Blockchain. We discuss what these services do, the problems they solve, and when each should be used. We also dive deep into details about service features and how the services work; explain key concepts such as immutability and centralized vs. decentralized trust; and review use cases.
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Amazon Web Services
The move to AWS enables new application and architectural patterns that are in a continual state of change. The only way that your infrastructure, security, and operations can keep pace with these changes is with automation. In this session, we discuss the various automation tools you can use to first deploy the AWS infrastructure (as code), add the VM-Series to protect against threats (security as code), and then automatically update the policy based on Amazon GuardDuty or AWS Security Hub finding (operations as code). A brief demonstration concludes the session. This presentation is brought to you by AWS partner, Palo Alto Networks.
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...Amazon Web Services
In this session, we provide an overview of AWS identity services within the context of a typical cloud journey. We learn about each service, the high-level capabilities each provides, and how they all fit and work together to provide you with a robust identity foundation. We also learn how to better advance your own identity-services cloud journey with confidence and speed. Finally, we look more closely at several identity-based use cases where the power and programmability of the cloud is radically simplifying implementation and strengthening security.
Continuous security monitoring and threat detection with AWS services - SEC20...Amazon Web Services
This document discusses continuous security monitoring and threat detection using AWS services. It describes how AWS services like GuardDuty, Macie, and Security Hub use machine learning to detect threats in customer environments by analyzing log data and security findings. It also discusses how to build threat detection solutions using these services and how to automate threat response using services like Lambda, CloudWatch Events, and Systems Manager.
In this interactive chalk talk, learn how to publish self-service remediation actions with AWS Systems Manager and AWS Service Catalog. Also, understand how you can use AWS Config to manage configuration drift and governance on AWS. Finally, learn how Moody’s uses AWS Systems Manager to automate patching across multiple cloud providers. Bring your questions, and join us for this discussion.
Delivering applications securely with AWS - SVC303 - Chicago AWS SummitAmazon Web Services
Networking is the foundation that supports many applications on AWS. The way you architect your network helps to determine how reliable, secure, and performant your applications are. In this session, we discuss the easy and secure delivery of applications to your users over the AWS global network. We answer your questions and cover multiple delivery methods that use Amazon CloudFront, AWS Global Accelerator, and AWS PrivateLink.
Scaling a database with Amazon RDS for Oracle - ADB208 - Chicago AWS SummitAmazon Web Services
With changing business goals, new traffic patterns, and demands for cost optimization, businesses need to scale their databases up or down and in or out on the cloud. In this chalk talk, learn how to scale compute resources up or down, and understand how to scale up the storage size of your Amazon RDS for Oracle instances. Also learn how to scale out or scale in your Oracle Read Replicas to sustain changing read traffic. Come to this chalk talk to learn, ask questions, and share your experiences.
Exploring the fundamentals of AWS networking - SVC210 - Chicago AWS SummitAmazon Web Services
The document is a presentation on AWS networking fundamentals that covers topics like VPCs, subnets, routing, security, internet connectivity, connecting VPCs, and connecting to on-premises networks. It provides examples and explanations of how to configure networking components in AWS like NAT gateways, VPC peering, Transit Gateways, and more. The presentation aims to explain core AWS networking concepts and help attendees explore networking options in AWS.
Do you need a ledger database or a blockchain? - SVC310 - Chicago AWS SummitAmazon Web Services
This session introduces two new AWS services for blockchain and ledger technology: Amazon Quantum Ledger Database (Amazon QLDB) and Amazon Managed Blockchain. We discuss what these services do, the problems they solve, and when each should be used. We also dive deep into details about service features and how the services work; explain key concepts such as immutability and centralized vs. decentralized trust; and review use cases.
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Amazon Web Services
The move to AWS enables new application and architectural patterns that are in a continual state of change. The only way that your infrastructure, security, and operations can keep pace with these changes is with automation. In this session, we discuss the various automation tools you can use to first deploy the AWS infrastructure (as code), add the VM-Series to protect against threats (security as code), and then automatically update the policy based on Amazon GuardDuty or AWS Security Hub finding (operations as code). A brief demonstration concludes the session. This presentation is brought to you by AWS partner, Palo Alto Networks.
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...Amazon Web Services
In this session, we provide an overview of AWS identity services within the context of a typical cloud journey. We learn about each service, the high-level capabilities each provides, and how they all fit and work together to provide you with a robust identity foundation. We also learn how to better advance your own identity-services cloud journey with confidence and speed. Finally, we look more closely at several identity-based use cases where the power and programmability of the cloud is radically simplifying implementation and strengthening security.
Planning advanced AWS networking architectures - SVC304 - Chicago AWS SummitAmazon Web Services
The document discusses advanced AWS networking architectures including AWS Transit Gateway, AWS PrivateLink, and AWS Global Accelerator. It provides an overview of each service and how they can help interconnect VPCs at scale, provide private connectivity to services, and route traffic across regions with low latency. Examples of use cases are also presented, such as using Transit Gateway to interconnect multiple VPCs and VPNs through a single connection point.
Train once, deploy anywhere on the cloud and at the edge with Neo - AIM301 - ...Amazon Web Services
Developers spend much time and effort delivering machine learning (ML) models that can make fast and accurate predictions in real time. These models become even more critical for edge devices where memory and processing power are constrained. Amazon SageMaker Neo enables developers to run and develop models in the most optimized way. With Neo, developers can train ML models once and run them anywhere in the cloud and at the edge. In this chalk talk, we dive deep into Neo and show you how this capability of Amazon SageMaker automatically optimizes models built on TensorFlow, Apache MXNet, PYTorch, and ONNX.
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Amazon Web Services
For companies that employ DevOps practices to push applications faster into production through better collaboration and automated testing, security is often seen as an inhibitor to speed. The challenge for many organizations is getting applications delivered at a fast pace while embedding security at the speed of DevOps. In this session, you learn how AWS Marketplace products and customers help make DevSecOps a well-orchestrated methodology for ensuring the speed, stability, and security of your applications.
Best practices for queue processing in serverless applications - MAD313 - Chi...Amazon Web Services
In this session, we learn about best practices to help you integrate serverless applications using Amazon Simple Queue Service (Amazon SQS). We explore how to tune AWS Lambda and Amazon SQS to scale your existing applications without having to worry about provisioning capacity. We also discuss how to bridge high-scale serverless applications with limited server-full applications such as relational databases.
Detecting and responding to critical events with AWS IoT Events - SVC205 - Ch...Amazon Web Services
The vast majority of Internet of Things (IoT) customers are connecting many pieces of equipment with multiple independent sensors. For these customers, detecting a critical operational event, such as when equipment variability reduces the quality of its output, can be challenging. In this session, you learn how AWS IoT Events makes it possible to easily and cost effectively detect system-wide events and respond with appropriate actions to drive results such as optimizing manufacturing efficiency or improving production quality.
Using automation to drive continuous-compliance best practices - SVC309 - Chi...Amazon Web Services
Northwestern Mutual’s technology teams maintain a complex compliance environment for a diverse set of developers working within more than 100 AWS accounts. To drive best practices and ensure continuous compliance, they designed an AWS-based architecture using services such as AWS Lambda, Amazon DynamoDB, Amazon Simple Queue Service (Amazon SQS), and Amazon CloudWatch to auto-remediate misconfigurations. In this session, we discuss how these services help Northwestern Mutual swiftly correct configurations and integrate with tools like Slack and Pagerduty to create logs, notify developers and account owners of changes, and track trends in remediation.
Architecting SAP on Amazon Web Services - SVC216 - Chicago AWS SummitAmazon Web Services
In this session, meet SAP-on-AWS experts to discuss what it takes to implement an SAP landscape on AWS. Starting with a typical customer requirement and sizing, we talk through the process involved in choosing the right organization and procedures to deploy SAP on AWS, from compute configurations and storage to security, management, and monitoring.
Unified monitoring of the container environment, containers, and applications...Amazon Web Services
With Amazon EKS, AWS Fargate, and Amazon ECS, AWS makes it easy to run containerized applications. However, a perfectly running containerized environment does not ensure a perfect user experience for your customers. In this session, we explore the interdependencies between container environment and the health of containers and applications. We examine how container health can jeopardize application health and how to identify noisy neighbors that might slow down your application’s response time and impact the user’s experience. We show you how to get full insight into your container environment, containers, and applications without touching a single line of application code. This presentation is brought to you by AWS partner, Dynatrace.
Increasing the value of video with machine learning & AWS Media Services - SV...Amazon Web Services
The document discusses using machine learning and AWS Media Services to increase the value of video. It provides an overview of machine learning use cases for media like automated metadata tagging and closed captioning. It also describes AWS media services like Amazon Rekognition, Amazon Transcribe, and solutions for media analysis and live subtitling. The live subtitling solution allows customers to create live streaming subtitling workflows on AWS using Amazon Transcribe and Amazon Translate.
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...Amazon Web Services
The NIST Cybersecurity Framework (CSF) is endorsed by government and industry as a recommended baseline for use by any organization, regardless of sector or size, to implement risk-management best practices and achieve desired security outcomes. In this session, we discuss how organizations can use AWS to align to the CSF by providing a detailed breakout of AWS services and associated customer responsibilities (security in the cloud) and AWS responsibilities (security of the cloud).
Exploring the fundamentals of AWS networking - SVC211 - New York AWS SummitAmazon Web Services
Although the basic concepts underpinning traditional networks and networks for the cloud are similar, there are many issues that are specific to each. In this session, we explore the fundamentals of networking in AWS. First we look at the basics of designing and building VPCs, including selecting your IP space, subnetting, routing, security, and more. We then discuss different approaches and scenarios for connecting your VPC to your data center with AWS VPN or AWS Direct Connect. This mid-level architecture discussion is for architects, network administrators, and technology decision-makers interested in understanding the building blocks that are available with Amazon VPC.
Developing Intelligent Robots with AWS RoboMaker - SVC205 - Anaheim AWS SummitAmazon Web Services
Robots are now becoming prevalent in our lives, helping us perform tedious housework, distribute warehouse inventory, automate manufacturing, and research lunar landscapes. These applications demand a high level of intelligence and autonomy, and until now, developing, testing, and deploying intelligent robotics applications was difficult and time consuming. AWS RoboMaker is a new cloud robotics service that makes it easy for developers to develop, test, and deploy robotics applications and build intelligent robotics functions using cloud services. In this session, we dive into how customers are using AWS RoboMaker to accelerate development timelines and build innovative robotics solutions.
Developing serverless applications with .NET using AWS SDK and tools - MAD308...Amazon Web Services
Developers are increasingly looking to modernize their .NET applications on AWS, using the AWS development tools for .NET to quickly get started and manage their applications. In this session, we do a deep dive and demonstrate the latest updates to .NET for serverless development and the AWS SDK and tools for .NET to make development easier, more powerful, and productive.
What's new in Amazon Aurora - ADB203 - Atlanta AWS SummitAmazon Web Services
Amazon Aurora is a fully managed MySQL and PostgreSQL-compatible relational database with the speed, reliability, and availability of commercial databases at one-tenth the cost. It is up to five times faster than standard MySQL databases and three times faster than standard PostgreSQL databases. This session provides an overview of Aurora, explores recently announced features, such as serverless, multi-master, and performance insights, and helps you get started.
Developing your Cloud Center of Excellence using CloudHealth - DEM03 - Atlant...Amazon Web Services
As enterprises transform their business and the way they consume infrastructure, there is a need for a new organizational unit, a Cloud Center of Excellence (CCoE), to ensure a successful transformation. As the acting center of knowledge, the CCoE is a bridge connecting all departments involved, guiding and accelerating your cloud journey. In this session, we discuss how your CCoE can develop a holistic cloud strategy designed to efficiently scale with your business. We share proven optimization and governance best practices from CloudHealth across RI management, identifying underutilized resources and auto-governing rule sets.
Mythical Mysfits: Monolith to microservices using Docker and Fargate - MAD309...Amazon Web Services
Traditional monolithic architectures are difficult to scale and become too complex to update and maintain as an application's code base grows, which limits introducing new features, languages, frameworks, and technologies, thus stifling innovation and new ideas. By contrast, a microservices architecture comprises many individual application components, each running as its own single-function service, communicating with other services through a well-defined API, greatly enhancing scalability and ease of maintenance. In this workshop, we show you how to run a simple monolithic application in a Docker container, deploy the same application as microservices, and switch traffic to the microservices without downtime.
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...Amazon Web Services
At Cisco, we believe that the cloud doesn’t have to be complex, and that organizations should have the freedom to adopt the best public cloud services available, while also making the most out of their existing application and infrastructure investments. In this session, learn how you can use the Cisco Hybrid Solution for Kubernetes on AWS, the first offering of its kind, to deploy, connect, secure, and monitor Kubernetes-based applications and infrastructure consistently across your data center and AWS. Cisco’s Hybrid Solution employs common authentication and policies leveraging IAM, and it also supports the full lifecycle of noncontainerized applications. This presentation is brought to you by AWS partner, Cisco Systems Inc.
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Amazon Web Services
Most modern businesses depend on a portfolio of technology solutions to successfully operate every day. How do you know whether your team is following best practices or what the risks are in your architectures? In this session, we show how the AWS Well-Architected Framework provides prescriptive advice on best practices as well as how the AWS Well-Architected Tool enables you to measure and improve your technology portfolio. We explain how other customers are using AWS Well-Architected in their businesses, and we share what we learned from reviewing tens of thousands of architectures across operational excellence, security, reliability, performance efficiency, and cost optimization.
Most modern businesses depend on a portfolio of technology solutions to successfully operate every day. How do you know whether your team is following best practices or what the risks are in your architectures? In this session, we show how the AWS Well-Architected Framework provides prescriptive advice on best practices as well as how the AWS Well-Architected Tool enables you to measure and improve your technology portfolio. We explain how other customers are using AWS Well-Architected in their businesses, and we share what we learned from reviewing tens of thousands of architectures across operational excellence, security, reliability, performance efficiency, and cost optimization.
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Amazon Web Services
Rapid adoption of cloud services and application migration brings several challenges to network administrators and security professionals, making real-time visibility of the network even more of a priority. In this session, learn how Cisco Stealthwatch Cloud helps you leverage data that you inherently create with AWS within your network to prevent compute theft and orphaned compute, secure weak or incomplete access control lists (ACL), and enforce security policies beyond the traditional firewall while maintaining regulatory compliance by extending visibility across your entire network. This presentation is brought to you by AWS partner, Cisco Systems Inc.
Fundamentals of AWS networking - SVC303 - Atlanta AWS SummitAmazon Web Services
The document discusses Amazon Virtual Private Cloud (VPC) networking concepts such as IP addressing, subnets, routing, security groups, network access control lists, DNS, internet connectivity, connecting VPCs, and connecting to on-premises networks. It provides examples and explanations of how to configure these VPC networking features on AWS.
Find All the Threats: AWS Threat Detection and Remediation - SEC303 - Anaheim...Amazon Web Services
This document outlines an AWS security workshop on threat detection and response. The workshop is divided into four modules: 1) building detective controls in the AWS environment, 2) simulating an attack, 3) detecting and responding to the attack, and 4) reviewing what happened and cleaning up resources. The document provides an agenda, prerequisites, and step-by-step instructions to guide participants through setting up AWS services for threat monitoring, launching an attack, and using services like GuardDuty, Macie and CloudWatch Events to detect and respond to security threats.
Join us for this hands-on workshop where we walk through some real-world threat scenarios and show you the AWS services involved with threat detection and remediation. Learn about the threat detection capabilities of Amazon GuardDuty, Amazon Macie, AWS Config, and the available remediation options. For each hands-on scenario, we review methods to remediate the threat using the following services: AWS CloudFormation, Amazon S3, AWS CloudTrail, VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, Macie, DNS logs, AWS Lambda, AWS Config, Amazon Inspector, and of course, GuardDuty.
Planning advanced AWS networking architectures - SVC304 - Chicago AWS SummitAmazon Web Services
The document discusses advanced AWS networking architectures including AWS Transit Gateway, AWS PrivateLink, and AWS Global Accelerator. It provides an overview of each service and how they can help interconnect VPCs at scale, provide private connectivity to services, and route traffic across regions with low latency. Examples of use cases are also presented, such as using Transit Gateway to interconnect multiple VPCs and VPNs through a single connection point.
Train once, deploy anywhere on the cloud and at the edge with Neo - AIM301 - ...Amazon Web Services
Developers spend much time and effort delivering machine learning (ML) models that can make fast and accurate predictions in real time. These models become even more critical for edge devices where memory and processing power are constrained. Amazon SageMaker Neo enables developers to run and develop models in the most optimized way. With Neo, developers can train ML models once and run them anywhere in the cloud and at the edge. In this chalk talk, we dive deep into Neo and show you how this capability of Amazon SageMaker automatically optimizes models built on TensorFlow, Apache MXNet, PYTorch, and ONNX.
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Amazon Web Services
For companies that employ DevOps practices to push applications faster into production through better collaboration and automated testing, security is often seen as an inhibitor to speed. The challenge for many organizations is getting applications delivered at a fast pace while embedding security at the speed of DevOps. In this session, you learn how AWS Marketplace products and customers help make DevSecOps a well-orchestrated methodology for ensuring the speed, stability, and security of your applications.
Best practices for queue processing in serverless applications - MAD313 - Chi...Amazon Web Services
In this session, we learn about best practices to help you integrate serverless applications using Amazon Simple Queue Service (Amazon SQS). We explore how to tune AWS Lambda and Amazon SQS to scale your existing applications without having to worry about provisioning capacity. We also discuss how to bridge high-scale serverless applications with limited server-full applications such as relational databases.
Detecting and responding to critical events with AWS IoT Events - SVC205 - Ch...Amazon Web Services
The vast majority of Internet of Things (IoT) customers are connecting many pieces of equipment with multiple independent sensors. For these customers, detecting a critical operational event, such as when equipment variability reduces the quality of its output, can be challenging. In this session, you learn how AWS IoT Events makes it possible to easily and cost effectively detect system-wide events and respond with appropriate actions to drive results such as optimizing manufacturing efficiency or improving production quality.
Using automation to drive continuous-compliance best practices - SVC309 - Chi...Amazon Web Services
Northwestern Mutual’s technology teams maintain a complex compliance environment for a diverse set of developers working within more than 100 AWS accounts. To drive best practices and ensure continuous compliance, they designed an AWS-based architecture using services such as AWS Lambda, Amazon DynamoDB, Amazon Simple Queue Service (Amazon SQS), and Amazon CloudWatch to auto-remediate misconfigurations. In this session, we discuss how these services help Northwestern Mutual swiftly correct configurations and integrate with tools like Slack and Pagerduty to create logs, notify developers and account owners of changes, and track trends in remediation.
Architecting SAP on Amazon Web Services - SVC216 - Chicago AWS SummitAmazon Web Services
In this session, meet SAP-on-AWS experts to discuss what it takes to implement an SAP landscape on AWS. Starting with a typical customer requirement and sizing, we talk through the process involved in choosing the right organization and procedures to deploy SAP on AWS, from compute configurations and storage to security, management, and monitoring.
Unified monitoring of the container environment, containers, and applications...Amazon Web Services
With Amazon EKS, AWS Fargate, and Amazon ECS, AWS makes it easy to run containerized applications. However, a perfectly running containerized environment does not ensure a perfect user experience for your customers. In this session, we explore the interdependencies between container environment and the health of containers and applications. We examine how container health can jeopardize application health and how to identify noisy neighbors that might slow down your application’s response time and impact the user’s experience. We show you how to get full insight into your container environment, containers, and applications without touching a single line of application code. This presentation is brought to you by AWS partner, Dynatrace.
Increasing the value of video with machine learning & AWS Media Services - SV...Amazon Web Services
The document discusses using machine learning and AWS Media Services to increase the value of video. It provides an overview of machine learning use cases for media like automated metadata tagging and closed captioning. It also describes AWS media services like Amazon Rekognition, Amazon Transcribe, and solutions for media analysis and live subtitling. The live subtitling solution allows customers to create live streaming subtitling workflows on AWS using Amazon Transcribe and Amazon Translate.
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...Amazon Web Services
The NIST Cybersecurity Framework (CSF) is endorsed by government and industry as a recommended baseline for use by any organization, regardless of sector or size, to implement risk-management best practices and achieve desired security outcomes. In this session, we discuss how organizations can use AWS to align to the CSF by providing a detailed breakout of AWS services and associated customer responsibilities (security in the cloud) and AWS responsibilities (security of the cloud).
Exploring the fundamentals of AWS networking - SVC211 - New York AWS SummitAmazon Web Services
Although the basic concepts underpinning traditional networks and networks for the cloud are similar, there are many issues that are specific to each. In this session, we explore the fundamentals of networking in AWS. First we look at the basics of designing and building VPCs, including selecting your IP space, subnetting, routing, security, and more. We then discuss different approaches and scenarios for connecting your VPC to your data center with AWS VPN or AWS Direct Connect. This mid-level architecture discussion is for architects, network administrators, and technology decision-makers interested in understanding the building blocks that are available with Amazon VPC.
Developing Intelligent Robots with AWS RoboMaker - SVC205 - Anaheim AWS SummitAmazon Web Services
Robots are now becoming prevalent in our lives, helping us perform tedious housework, distribute warehouse inventory, automate manufacturing, and research lunar landscapes. These applications demand a high level of intelligence and autonomy, and until now, developing, testing, and deploying intelligent robotics applications was difficult and time consuming. AWS RoboMaker is a new cloud robotics service that makes it easy for developers to develop, test, and deploy robotics applications and build intelligent robotics functions using cloud services. In this session, we dive into how customers are using AWS RoboMaker to accelerate development timelines and build innovative robotics solutions.
Developing serverless applications with .NET using AWS SDK and tools - MAD308...Amazon Web Services
Developers are increasingly looking to modernize their .NET applications on AWS, using the AWS development tools for .NET to quickly get started and manage their applications. In this session, we do a deep dive and demonstrate the latest updates to .NET for serverless development and the AWS SDK and tools for .NET to make development easier, more powerful, and productive.
What's new in Amazon Aurora - ADB203 - Atlanta AWS SummitAmazon Web Services
Amazon Aurora is a fully managed MySQL and PostgreSQL-compatible relational database with the speed, reliability, and availability of commercial databases at one-tenth the cost. It is up to five times faster than standard MySQL databases and three times faster than standard PostgreSQL databases. This session provides an overview of Aurora, explores recently announced features, such as serverless, multi-master, and performance insights, and helps you get started.
Developing your Cloud Center of Excellence using CloudHealth - DEM03 - Atlant...Amazon Web Services
As enterprises transform their business and the way they consume infrastructure, there is a need for a new organizational unit, a Cloud Center of Excellence (CCoE), to ensure a successful transformation. As the acting center of knowledge, the CCoE is a bridge connecting all departments involved, guiding and accelerating your cloud journey. In this session, we discuss how your CCoE can develop a holistic cloud strategy designed to efficiently scale with your business. We share proven optimization and governance best practices from CloudHealth across RI management, identifying underutilized resources and auto-governing rule sets.
Mythical Mysfits: Monolith to microservices using Docker and Fargate - MAD309...Amazon Web Services
Traditional monolithic architectures are difficult to scale and become too complex to update and maintain as an application's code base grows, which limits introducing new features, languages, frameworks, and technologies, thus stifling innovation and new ideas. By contrast, a microservices architecture comprises many individual application components, each running as its own single-function service, communicating with other services through a well-defined API, greatly enhancing scalability and ease of maintenance. In this workshop, we show you how to run a simple monolithic application in a Docker container, deploy the same application as microservices, and switch traffic to the microservices without downtime.
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...Amazon Web Services
At Cisco, we believe that the cloud doesn’t have to be complex, and that organizations should have the freedom to adopt the best public cloud services available, while also making the most out of their existing application and infrastructure investments. In this session, learn how you can use the Cisco Hybrid Solution for Kubernetes on AWS, the first offering of its kind, to deploy, connect, secure, and monitor Kubernetes-based applications and infrastructure consistently across your data center and AWS. Cisco’s Hybrid Solution employs common authentication and policies leveraging IAM, and it also supports the full lifecycle of noncontainerized applications. This presentation is brought to you by AWS partner, Cisco Systems Inc.
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Amazon Web Services
Most modern businesses depend on a portfolio of technology solutions to successfully operate every day. How do you know whether your team is following best practices or what the risks are in your architectures? In this session, we show how the AWS Well-Architected Framework provides prescriptive advice on best practices as well as how the AWS Well-Architected Tool enables you to measure and improve your technology portfolio. We explain how other customers are using AWS Well-Architected in their businesses, and we share what we learned from reviewing tens of thousands of architectures across operational excellence, security, reliability, performance efficiency, and cost optimization.
Most modern businesses depend on a portfolio of technology solutions to successfully operate every day. How do you know whether your team is following best practices or what the risks are in your architectures? In this session, we show how the AWS Well-Architected Framework provides prescriptive advice on best practices as well as how the AWS Well-Architected Tool enables you to measure and improve your technology portfolio. We explain how other customers are using AWS Well-Architected in their businesses, and we share what we learned from reviewing tens of thousands of architectures across operational excellence, security, reliability, performance efficiency, and cost optimization.
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Amazon Web Services
Rapid adoption of cloud services and application migration brings several challenges to network administrators and security professionals, making real-time visibility of the network even more of a priority. In this session, learn how Cisco Stealthwatch Cloud helps you leverage data that you inherently create with AWS within your network to prevent compute theft and orphaned compute, secure weak or incomplete access control lists (ACL), and enforce security policies beyond the traditional firewall while maintaining regulatory compliance by extending visibility across your entire network. This presentation is brought to you by AWS partner, Cisco Systems Inc.
Fundamentals of AWS networking - SVC303 - Atlanta AWS SummitAmazon Web Services
The document discusses Amazon Virtual Private Cloud (VPC) networking concepts such as IP addressing, subnets, routing, security groups, network access control lists, DNS, internet connectivity, connecting VPCs, and connecting to on-premises networks. It provides examples and explanations of how to configure these VPC networking features on AWS.
Find All the Threats: AWS Threat Detection and Remediation - SEC303 - Anaheim...Amazon Web Services
This document outlines an AWS security workshop on threat detection and response. The workshop is divided into four modules: 1) building detective controls in the AWS environment, 2) simulating an attack, 3) detecting and responding to the attack, and 4) reviewing what happened and cleaning up resources. The document provides an agenda, prerequisites, and step-by-step instructions to guide participants through setting up AWS services for threat monitoring, launching an attack, and using services like GuardDuty, Macie and CloudWatch Events to detect and respond to security threats.
Join us for this hands-on workshop where we walk through some real-world threat scenarios and show you the AWS services involved with threat detection and remediation. Learn about the threat detection capabilities of Amazon GuardDuty, Amazon Macie, AWS Config, and the available remediation options. For each hands-on scenario, we review methods to remediate the threat using the following services: AWS CloudFormation, Amazon S3, AWS CloudTrail, VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, Macie, DNS logs, AWS Lambda, AWS Config, Amazon Inspector, and of course, GuardDuty.
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019 Amazon Web Services
The document outlines an AWS security workshop on scaling threat detection and response. It provides an agenda for the workshop consisting of four modules: environment setup, attack simulation, detecting and responding to the attack, and a discussion/review at the end. It provides guidance on using the AWS event engine for the workshop and directions for completing each module, including building detective controls in Module 1, simulating an attack in Module 2, and detecting and responding to the attack in Module 3.
Join us for this hands-on workshop where you will learn about a number of AWS services you can use to identify and respond to threats in your AWS environments. Learn about the capabilities of Amazon GuardDuty, Amazon Macie, Amazon Inspector, and AWS Security Hub as you walk through real-world threat scenarios. For each scenario, we will review methods to detect and respond to threats both manually and automated using services like Amazon CloudWatch Events and AWS Lambda.
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...Amazon Web Services
In this chalk talk, we cover a number of AWS services involved with threat detection and mitigation, and we walk through some real-world threat scenarios. We discuss the threat detection capabilities of Amazon GuardDuty, Amazon Macie, AWS Config, and the available remediation options. For each scenario, we review methods to remediate the threat using the following services: AWS CloudFormation, Amazon S3, AWS CloudTrail, Amazon VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, Amazon Macie, DNS logs, AWS Lambda, AWS Config, Amazon Inspector and, of course, Amazon GuardDuty. Come with your questions on threat detection on AWS.
Take action on your security & compliance alerts with AWS Security Hub - SEC2...Amazon Web Services
In this session, learn about AWS Security Hub and how it gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts. See how Security Hub aggregates, prioritizes, and helps you take action on your alerts from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector, and Amazon Macie, as well as from AWS Partner solutions.
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Amazon Web Services
As you continually evolve your use of the AWS platform, it’s important to consider ways to improve your security posture and take advantage of new security services and features. In this advanced session, we share architectural patterns for meeting common challenges, service limits and tips, tricks, and ways to continually evaluate your architecture against best practices. Automation and tools are featured throughout, and there will be code giveaways! Be prepared for a technically deep session on AWS security.
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...Amazon Web Services
IT organizations often see governance control and innovation as competing priorities. Compliance-minded individuals may view rapid innovation as disruptive to the security, health, and stability of their organizations. Innovation-minded individuals may view governance control as inhibiting growth. With AWS, you don’t have to choose between governance control and growth—you can have both. In this session, we provide an overview of the common challenges in this area and share how to use AWS services to solve them. We explain how to establish guardrails to improve security and compliance while empowering builders to speed innovation.
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS SummitAmazon Web Services
In this session, learn how to address threat detection and remediation in the AWS Cloud. We summarize the challenges of traditional threat detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of key AWS services that detect and remediate threats, such as Amazon GuardDuty. Be sure to also check out the corresponding threat detection chalk talk.
Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...Amazon Web Services
This document discusses AWS services for threat detection and response. It begins with an introduction and overview of challenges around threat detection. It then describes AWS services that provide log and activity data for detection. These include GuardDuty and Macie which use machine learning for intelligent detection. Security Hub provides a centralized view of findings. Services like CloudWatch Events and Lambda can be used to automate response actions. The document outlines typical attacker lifecycles and example GuardDuty findings. It provides high-level and detailed playbooks for using AWS services in a threat detection and response workflow.
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...Amazon Web Services
Do you ever feel like your efforts with security are futile? Change can lead to new, never-before-recognized opportunities to innovate. Security is no exception. Using measurements to drive us, we have found innovations in security that have led to greater collaboration and carefully curated security outcomes. The cloud has made never-before-seen security capabilities possible. Have you ever imagined talking about the five nines of security? We are! Come join the debate about how to make cloud workloads safer by adopting securability and a bounded measurable means of increasing the safety of software.
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitAmazon Web Services
In this session, learn how to address threat detection and remediation at AWS. We summarize the challenges of traditional threat-detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of key AWS services that detect and remediate threats, such as Amazon GuardDuty. Be sure to also check out the corresponding Threat Detection chalk talk.
How to act on security and compliance alerts with AWS Security Hub - SEC202 -...Amazon Web Services
The document discusses AWS Security Hub, which provides a centralized place to manage security and compliance across AWS accounts and third-party systems. It allows users to view alerts and findings from multiple sources, prioritize them, and automatically trigger responses or remediation actions using features like AWS Lambda and Step Functions. Examples are given of how Security Hub can help with use cases like gaining visibility, routing alerts to a SIEM, and providing dashboards for account owners.
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Amazon Web Services
In this session you will learn how to align your AWS environment to industry standard best practices for security. This session covers AWS' prescriptive recommendations for securing cloud workloads, including the the Well-Architected Framework for Security. In addition, see how AWS Security Hub simplifies the task of measuring the security of your workloads.
AWS Summit Singapore 2019 | The Serverless Lifecycle: Development and Operati...AWS Summits
Speaker: Arthi Jaganathan, Solutions Architect, ASEAN, AWS
AWS Lambda and Amazon API Gateway have changed how developers build and run their applications or services. While building simple, individual serverless functions is easy, what are the best practices when your entire application is serverless? How should we go about tasks such as deployment, monitoring, and debugging in a serverless world? In this session, we'll dive into best practices that serverless developers can use for application lifecycle management, CI/CD, monitoring, and diagnostics.
AWS Summit Milano 2019 - Sicurezza in AWS automazione e best practice - Antonio Duma, Solutions Architect, AWS | Carmela Gambardella, Solutions Architect AWS
How to act on your security and compliance alerts with AWS Security Hub - FND...Amazon Web Services
Learn about AWS Security Hub and how it gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts. See how Security Hub aggregates, prioritizes, and helps you act on your alerts from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector, and Amazon Macie, as well as from AWS Partner solutions.
Architecting security & governance across your AWS environmentAmazon Web Services
Many AWS customers use multiple accounts to meet their requirements for billing, infrastructure isolation, and separation of duties. In this session, we discuss the latest updates around establishing and building a multi-account security and governance strategy. We will also take a look at data protection strategies for ensuring data integrityand availability using the AWS native services.
In this session, learn how to address threat detection and remediation at AWS. We summarize the challenges of traditional threat-detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of key AWS services that detect and remediate threats, such as Amazon GuardDuty. Be sure to also check out the corresponding Threat Detection chalk talk.
This document outlines an agenda for a workshop on threat detection and remediation. It includes:
- Running a CloudFormation template to set up the initial environment.
- A presentation on threat detection and remediation that discusses why it is difficult, the importance of removing humans from data analysis and detection, and AWS security services that can help.
- A walkthrough of the workshop where participants will simulate attacks and threats in their environment and use AWS security tools like GuardDuty, Lambda, and CloudWatch Events for detection and remediation.
Similar to Finding all the threats: AWS threat detection and remediation - SEC303 - Chicago AWS Summit (20)
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
1) The document discusses building a minimum viable product (MVP) using Amazon Web Services (AWS).
2) It provides an example of an MVP for an omni-channel messenger platform that was built from 2017 to connect ecommerce stores to customers via web chat, Facebook Messenger, WhatsApp, and other channels.
3) The founder discusses how they started with an MVP in 2017 with 200 ecommerce stores in Hong Kong and Taiwan, and have since expanded to over 5000 clients across Southeast Asia using AWS for scaling.
This document discusses pitch decks and fundraising materials. It explains that venture capitalists will typically spend only 3 minutes and 44 seconds reviewing a pitch deck. Therefore, the deck needs to tell a compelling story to grab their attention. It also provides tips on tailoring different types of decks for different purposes, such as creating a concise 1-2 page teaser, a presentation deck for pitching in-person, and a more detailed read-only or fundraising deck. The document stresses the importance of including key information like the problem, solution, product, traction, market size, plans, team, and ask.
This document discusses building serverless web applications using AWS services like API Gateway, Lambda, DynamoDB, S3 and Amplify. It provides an overview of each service and how they can work together to create a scalable, secure and cost-effective serverless application stack without having to manage servers or infrastructure. Key services covered include API Gateway for hosting APIs, Lambda for backend logic, DynamoDB for database needs, S3 for static content, and Amplify for frontend hosting and continuous deployment.
This document provides tips for fundraising from startup founders Roland Yau and Sze Lok Chan. It discusses generating competition to create urgency for investors, fundraising in parallel rather than sequentially, having a clear fundraising narrative focused on what you do and why it's compelling, and prioritizing relationships with people over firms. It also notes how the pandemic has changed fundraising, with examples of deals done virtually during this time. The tips emphasize being fully prepared before fundraising and cultivating connections with investors in advance.
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
This document discusses Amazon's machine learning services for building conversational interfaces and extracting insights from unstructured text and audio. It describes Amazon Lex for creating chatbots, Amazon Comprehend for natural language processing tasks like entity extraction and sentiment analysis, and how they can be used together for applications like intelligent call centers and content analysis. Pre-trained APIs simplify adding machine learning to apps without requiring ML expertise.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.