(SEC404) Incident Response in the Cloud | AWS re:Invent 2014Amazon Web Services
You've employed the practices outlined for incident detection, but what do you do when you detect an incident in the cloud? This session walks you through a hypothetical incident response on AWS. Learn to leverage the unique capabilities of the AWS environment when you respond to an incident, which in many ways is similar to how you respond to incidents in your own infrastructure. This session also covers specific environment recovery steps available on AWS.
HashiCorp Nomad is an easy-to-use and flexible workload orchestrator that enables organizations to automate the deployment of any applications on any infrastructure at any scale across multiple clouds. While Kubernetes gets a lot of attention, Nomad is an attractive alternative that is easy to use, more flexible, and natively integrated with HashiCorp Vault and Consul. In addition to running Docker containers, Nomad can also run non-containerized, legacy applications on both Linux and Windows servers.
HIPAA / HITRUST Account Governance Strategies | | AWS Public Sector Summit 2017Amazon Web Services
Highly regulated workloads, like those that are HIPAA or HITRUST based, can be created using native tools on AWS, but how do we manage them after they've been made? This session will review governance and compliance designs for a regulated workload, like HIPAA or HITRUST, and demonstrate how you can better validate and document your compliance. You will learn how to quickly get started with the AWS compliance accelerators and ways to leverage AWS native features to monitor and control your accounts. We will answer common questions, such as: How do I know that I’m using the approved services from the BAA? How can I enforce policy on many accounts? How can I make sure data is being securely transmitted? And how can I automate compliance notifications and alerting? This session is designed for a technical audience to dive deep into the AWS service offerings, console, and API. Learn More: https://aws.amazon.com/government-education/
Iolaire Mckinnon, Senior Consultant, Security, Risk & Compliance, AWS
A Deep Dive into the best practice guidelines for securing your workloads in AWS cloud.
Incident Response: Preparing and Simulating Threat ResponseAmazon Web Services
Once you have built and deployed security infrastructure and automated key aspects of security operations you should validate your work through an Incident Response simulation. In this session we discuss the best way to protect your logs; how and why to develop automated IR capabilities via AWS tooling (e.g. Lambda); the importance of testing existing forensics tools to ensure efficacy in cloud environment; and ways to test your plan early and often.
(SEC404) Incident Response in the Cloud | AWS re:Invent 2014Amazon Web Services
You've employed the practices outlined for incident detection, but what do you do when you detect an incident in the cloud? This session walks you through a hypothetical incident response on AWS. Learn to leverage the unique capabilities of the AWS environment when you respond to an incident, which in many ways is similar to how you respond to incidents in your own infrastructure. This session also covers specific environment recovery steps available on AWS.
HashiCorp Nomad is an easy-to-use and flexible workload orchestrator that enables organizations to automate the deployment of any applications on any infrastructure at any scale across multiple clouds. While Kubernetes gets a lot of attention, Nomad is an attractive alternative that is easy to use, more flexible, and natively integrated with HashiCorp Vault and Consul. In addition to running Docker containers, Nomad can also run non-containerized, legacy applications on both Linux and Windows servers.
HIPAA / HITRUST Account Governance Strategies | | AWS Public Sector Summit 2017Amazon Web Services
Highly regulated workloads, like those that are HIPAA or HITRUST based, can be created using native tools on AWS, but how do we manage them after they've been made? This session will review governance and compliance designs for a regulated workload, like HIPAA or HITRUST, and demonstrate how you can better validate and document your compliance. You will learn how to quickly get started with the AWS compliance accelerators and ways to leverage AWS native features to monitor and control your accounts. We will answer common questions, such as: How do I know that I’m using the approved services from the BAA? How can I enforce policy on many accounts? How can I make sure data is being securely transmitted? And how can I automate compliance notifications and alerting? This session is designed for a technical audience to dive deep into the AWS service offerings, console, and API. Learn More: https://aws.amazon.com/government-education/
Iolaire Mckinnon, Senior Consultant, Security, Risk & Compliance, AWS
A Deep Dive into the best practice guidelines for securing your workloads in AWS cloud.
Incident Response: Preparing and Simulating Threat ResponseAmazon Web Services
Once you have built and deployed security infrastructure and automated key aspects of security operations you should validate your work through an Incident Response simulation. In this session we discuss the best way to protect your logs; how and why to develop automated IR capabilities via AWS tooling (e.g. Lambda); the importance of testing existing forensics tools to ensure efficacy in cloud environment; and ways to test your plan early and often.
Best Practices for Implementing Your Encryption Strategy Using AWS Key Manage...Amazon Web Services
AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and manage the encryption keys used to encrypt your data. In this session, we will dive deep into best practices learned by implementing AWS KMS at AWS’ largest enterprise clients. We will review the different capabilities described in the AWS Cloud Adoption Framework (CAF) Security Perspective and how to implement these recommendations using AWS KMS. In addition to sharing recommendations, we will also provide examples that will help you protect sensitive information on the AWS Cloud.
Security must be the number one priority for any cloud provider and that's no different for AWS. Stephen Schmidt, vice president and chief information officer for AWS, will share his insights into cloud security and how AWS meets the needs of today's IT security challenges. Stephen, with his background with the FBI and his work with AWS customers in the government and space exploration, research, and financial services organizations, shares an industry perspective that's unique and invaluable for today's IT decision makers. At the conclusion of this session, Stephen also provides a brief summary of the other sessions available to you in the security track.
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...Amazon Web Services
Learning Objectives:
- Learn how to secure your web applications
- Learn how to configure AWS Shield and AWS WAF
- Learn how to defend the most common Layer 7 attacks
Distributed denial of service (DDoS) and other web attacks can affect your application’s availability, compromise its security, and consume excessive resources. AWS Shield and AWS Web Application Firewall (WAF) help secure your applications from these types of attacks. AWS Shield is a managed DDoS protection service that offers always-on detection and automatic inline mitigation to minimize application downtime and latency. AWS WAF is a web application firewall that helps protect your applications from common web exploits such as SQLi, XSS, and botnets. This introductory tech talk will provide you an overview and demonstration of these services.
AWS Partner Webcast - Use Your AWS CloudTrail Data and Splunk Software To Imp...Amazon Web Services
With AWS CloudTrail, you can get log files of AWS API calls for your account. CloudTrail enables you to perform security analysis, track resource changes, and aid in compliance reporting.
In this webinar you will learn how CloudTrail collects and stores your AWS log files so that software from AWS Technology Partner Splunk can be used as a Big Data Security Information and Event Management (SIEM) system. You will hear how AWS log files are made available for many security use cases, including incident investigations, security and compliance reporting, and threat detection/alerting. You will also hear from a joint Splunk/AWS customer, FINRA, who will explain how they leverage Splunk in AWS to support their cloud efforts.
What you'll learn:
• Why the machine data from AWS CloudTrail is relevant to security and compliance
• How to visualize data from AWS CloudTrail to monitor and audit security-related activity
• How AWS CloudTrail data can be combined with machine data from other sources in your IT infrastructure, including the OS and apps in your AWS images, for a wide range of operational and security use cases
• How the combination of AWS CloudTrail and Splunk Software improve your uptime, accelerate security and operational investigations, and simplify compliance.
by Cameron Worrell, Sr. Solutions Architect, AWS
In this talk, we will introduce several methods of threat detection and remediation on AWS, including GuardDuty, Macie, WAF, Shield, Lambda, AWS Config, Systems Manager and Inspector. We will do a brief overview of each of these services, and then talk about how to put them all together, to have a comprehensive thread detection and remediation solution. We will also discuss how to use these services across multiple AWS accounts and regions, to cover the governance needs of enterprise AWS deployments.
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...Amazon Web Services
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security Services
In this session you will learn how to build a self-defending border to protect your Internet-facing applications. We will show you how you can automatically respond to the dynamic threats facing online assets by using our managed threat detection services combined with information from applications.
Shane Baldacchino, Solutions Architect, Amazon Web Services
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Educate customers in the types of problems CloudHSM solves for them
- Build customer trust in the ability of CloudHSM to secure their workloads and data
- Energize customers to try out the service and use it to transfer and/or modernize workloads in AWS
Data protection is the highest priority for any organisation, so we answer common questions about GDPR, data residency, freedom of information, and privacy. We also address security-related compliance, risk management strategies, and best practices for securing data on AWS.
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...Amazon Web Services
This session tells the story of how security-minded enterprises provide end-to-end protection of their sensitive data in AWS. Learn about the enterprise security architecture decisions made by Fortune 500 organizations during actual sensitive workload deployments as told by the AWS professional service security, risk, and compliance team members who lived them. In this technical walkthrough, we share lessons learned from the development of enterprise security strategy, security use-case development, end-to-end security architecture & service composition, security configuration decisions, and the creation of AWS security operations playbooks to support the architecture.
(SEC301) Strategies for Protecting Data Using Encryption in AWSAmazon Web Services
Protecting sensitive data in the cloud typically requires encryption. Managing the keys used for encryption can be challenging as your sensitive data passes between services and applications. AWS offers several options for using encryption and managing keys to help simplify the protection of your data at rest. This session will help you understand which features are available and how to use them, with emphasis on AWS Key Management Service and AWS CloudHSM. Adobe Systems Incorporated will present their experience using AWS encryption services to solve data security needs.
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Amazon Web Services
Module 3: Security, Identity and Access Management
This module will cover:
- Data Center Security
- AWS Identity and Access Management (IAM) concepts including users, groups, roles and policies
The session covers how Cisco SD-WAN can be used to extend the WAN connectivity to AWS. We show how the Viptela-based SD-WAN solution accelerates the path to cloud migration while maintaining the application SLA using the policy-based app fabric model. We cover Viptela's cloud-first network management, orchestration, and overlay technologies with industry-leading routing platforms, services, and SD-WAN capabilities from Cisco. We also cover how a customer deployed Cisco SD-WAN and the benefits they achieved, how a customer extended Cisco SD-WAN fabric to AWS, and the benefits of consistent security and segmentation, policy, network visibility, and connectivity options across branch, campus, data center, and cloud. This session is brought to you by AWS Partner, Cisco.
Leveraging serverless in fullstack developmentEric Johnson
This session was from DeveloperWeek 2020 SFO.
Using serverless reduces time spent managing infrastructure and provides developers more time to focus on code. In this session I will cover tooling, frameworks, and architectural patterns focused on building a web application from front to back. Along the way we will discuss pitfalls and best practices to help you get a jump start on developing without servers.
Best Practices for Implementing Your Encryption Strategy Using AWS Key Manage...Amazon Web Services
AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and manage the encryption keys used to encrypt your data. In this session, we will dive deep into best practices learned by implementing AWS KMS at AWS’ largest enterprise clients. We will review the different capabilities described in the AWS Cloud Adoption Framework (CAF) Security Perspective and how to implement these recommendations using AWS KMS. In addition to sharing recommendations, we will also provide examples that will help you protect sensitive information on the AWS Cloud.
Security must be the number one priority for any cloud provider and that's no different for AWS. Stephen Schmidt, vice president and chief information officer for AWS, will share his insights into cloud security and how AWS meets the needs of today's IT security challenges. Stephen, with his background with the FBI and his work with AWS customers in the government and space exploration, research, and financial services organizations, shares an industry perspective that's unique and invaluable for today's IT decision makers. At the conclusion of this session, Stephen also provides a brief summary of the other sessions available to you in the security track.
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...Amazon Web Services
Learning Objectives:
- Learn how to secure your web applications
- Learn how to configure AWS Shield and AWS WAF
- Learn how to defend the most common Layer 7 attacks
Distributed denial of service (DDoS) and other web attacks can affect your application’s availability, compromise its security, and consume excessive resources. AWS Shield and AWS Web Application Firewall (WAF) help secure your applications from these types of attacks. AWS Shield is a managed DDoS protection service that offers always-on detection and automatic inline mitigation to minimize application downtime and latency. AWS WAF is a web application firewall that helps protect your applications from common web exploits such as SQLi, XSS, and botnets. This introductory tech talk will provide you an overview and demonstration of these services.
AWS Partner Webcast - Use Your AWS CloudTrail Data and Splunk Software To Imp...Amazon Web Services
With AWS CloudTrail, you can get log files of AWS API calls for your account. CloudTrail enables you to perform security analysis, track resource changes, and aid in compliance reporting.
In this webinar you will learn how CloudTrail collects and stores your AWS log files so that software from AWS Technology Partner Splunk can be used as a Big Data Security Information and Event Management (SIEM) system. You will hear how AWS log files are made available for many security use cases, including incident investigations, security and compliance reporting, and threat detection/alerting. You will also hear from a joint Splunk/AWS customer, FINRA, who will explain how they leverage Splunk in AWS to support their cloud efforts.
What you'll learn:
• Why the machine data from AWS CloudTrail is relevant to security and compliance
• How to visualize data from AWS CloudTrail to monitor and audit security-related activity
• How AWS CloudTrail data can be combined with machine data from other sources in your IT infrastructure, including the OS and apps in your AWS images, for a wide range of operational and security use cases
• How the combination of AWS CloudTrail and Splunk Software improve your uptime, accelerate security and operational investigations, and simplify compliance.
by Cameron Worrell, Sr. Solutions Architect, AWS
In this talk, we will introduce several methods of threat detection and remediation on AWS, including GuardDuty, Macie, WAF, Shield, Lambda, AWS Config, Systems Manager and Inspector. We will do a brief overview of each of these services, and then talk about how to put them all together, to have a comprehensive thread detection and remediation solution. We will also discuss how to use these services across multiple AWS accounts and regions, to cover the governance needs of enterprise AWS deployments.
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...Amazon Web Services
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security Services
In this session you will learn how to build a self-defending border to protect your Internet-facing applications. We will show you how you can automatically respond to the dynamic threats facing online assets by using our managed threat detection services combined with information from applications.
Shane Baldacchino, Solutions Architect, Amazon Web Services
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Educate customers in the types of problems CloudHSM solves for them
- Build customer trust in the ability of CloudHSM to secure their workloads and data
- Energize customers to try out the service and use it to transfer and/or modernize workloads in AWS
Data protection is the highest priority for any organisation, so we answer common questions about GDPR, data residency, freedom of information, and privacy. We also address security-related compliance, risk management strategies, and best practices for securing data on AWS.
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...Amazon Web Services
This session tells the story of how security-minded enterprises provide end-to-end protection of their sensitive data in AWS. Learn about the enterprise security architecture decisions made by Fortune 500 organizations during actual sensitive workload deployments as told by the AWS professional service security, risk, and compliance team members who lived them. In this technical walkthrough, we share lessons learned from the development of enterprise security strategy, security use-case development, end-to-end security architecture & service composition, security configuration decisions, and the creation of AWS security operations playbooks to support the architecture.
(SEC301) Strategies for Protecting Data Using Encryption in AWSAmazon Web Services
Protecting sensitive data in the cloud typically requires encryption. Managing the keys used for encryption can be challenging as your sensitive data passes between services and applications. AWS offers several options for using encryption and managing keys to help simplify the protection of your data at rest. This session will help you understand which features are available and how to use them, with emphasis on AWS Key Management Service and AWS CloudHSM. Adobe Systems Incorporated will present their experience using AWS encryption services to solve data security needs.
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Amazon Web Services
Module 3: Security, Identity and Access Management
This module will cover:
- Data Center Security
- AWS Identity and Access Management (IAM) concepts including users, groups, roles and policies
The session covers how Cisco SD-WAN can be used to extend the WAN connectivity to AWS. We show how the Viptela-based SD-WAN solution accelerates the path to cloud migration while maintaining the application SLA using the policy-based app fabric model. We cover Viptela's cloud-first network management, orchestration, and overlay technologies with industry-leading routing platforms, services, and SD-WAN capabilities from Cisco. We also cover how a customer deployed Cisco SD-WAN and the benefits they achieved, how a customer extended Cisco SD-WAN fabric to AWS, and the benefits of consistent security and segmentation, policy, network visibility, and connectivity options across branch, campus, data center, and cloud. This session is brought to you by AWS Partner, Cisco.
Leveraging serverless in fullstack developmentEric Johnson
This session was from DeveloperWeek 2020 SFO.
Using serverless reduces time spent managing infrastructure and provides developers more time to focus on code. In this session I will cover tooling, frameworks, and architectural patterns focused on building a web application from front to back. Along the way we will discuss pitfalls and best practices to help you get a jump start on developing without servers.
AWS SSA Webinar 11 - Getting started on AWS: SecurityCobus Bernard
In this session, we will take a deeper look at the security services and features available on AWS. We will look at how Identity and Access Management (IAM) works by covering IAM users, policies, roles, groups. We will also look at AWS Security groups and how they are applied to the different infrastructure components, e.g. Amazon EC2 instances, Load Balancers, Databases (via Amazon RDS). Lastly, we will take a quick look at Amazon Certificate Manager for SSL certificates and mention additional services like Amazon Detective, GuardDuty, Macie, WAF.
Understand Hybrid Cloud architecture use cases.
Understand AWS portfolio of capabilities to support
Hybrid Cloud.
Understand AWS partnerships with VMWare, Microsoft and other key enterprise players.
Introduction to Hybrid Cloud on AWS - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Understand Hybrid Cloud architecture options
- Understand AWS portfolio of capabilities to support Hybrid Cloud
- Understand AWS partnerships with VMWare, Microsoft and other key enterprise players help you execute your Hybrid Cloud strategy
Expanding Your AWS and On-premise Footprint to AWS GovCloud (US)Amazon Web Services
As customers progress through their cloud journeys, sensitive and regulated IT workloads, and data migrations could necessitate the use of AWS GovCloud (US). But how do you get started? What do you need to know before expanding your footprint to the AWS GovCloud (US) region? Is extending the footprint from standard AWS regions different than extending from on-premise environments and datacenters? Join us to learn the technical and operational considerations, approaches, best practices and tools to successfully extend your IT environments and technology footprint and migrate assets to the AWS GovCloud (US) Region.
Want to learn about your options for running Microsoft Active Directory on AWS? When you move Microsoft workloads to AWS, it is important to consider how to deploy Microsoft Active Directory in support of group policy management, authentication, and authorization. In this session, we discuss options for deploying Microsoft Active Directory to AWS, including AWS Managed Microsoft AD and deploying Active Directory to Windows on Amazon EC2. We cover such topics as how to integrate your on-premises Microsoft Active Directory environment to the cloud and how to leverage SaaS applications, such as Office 365, with the AWS Single Sign-On service.
對於投資現場部署技術的大多數組織而言,在混合式架構中運作是採用雲端的必要部分。遷移IT系統需要好一段時間。因此,選擇一個雲端廠商,能夠幫助您實行經過深思熟慮的混合策略,並不需要在本地硬件和軟件上進行昂貴的新投資,這對簡化運營及輕鬆實現業務目標非常重要。
在這場線上研討會中,我們將介紹 AWS 如何在存儲、網絡、安全、應用程序部署和管理工具中構建業界最廣泛的混合功能,以便您輕鬆及安全地擴展您現有的投資。
For most organizations with on-premises technology investments, operating in a hybrid architecture is a necessary part of cloud adoption. Migrating legacy IT systems takes time. Therefore, selecting a cloud provider who can help you implement a thoughtful hybrid strategy, without requiring costly new investments in on-premises hardware and software, is important to simplify operations and more easily achieve your business goals.
In this webinar, we will describe how we at AWS have built the industry’s broadest set of hybrid capabilities across storage, networking, security, application deployment, and management tools to make it easy for you to integrate the cloud as a seamless and secure extension of your existing investments.
Migrare applicazioni e dati, estendere la capacità del data center, utilizzare nuove funzionalità native del cloud, creare soluzioni di backup e disaster recovery.
Spoločnosti na celom svete presúvajú svoje aplikácie do cloudu tak rýchlo, ako sa len dá, aby sa stali flexibilnejšími a znížili náklady. Niektoré aplikácie však musia ostať v lokálnych dátacentrách, či už z dôvodu nízkej latencie alebo požiadaviek na miestne spracovanie údajov. Riešenie AWS Outposts prináša plne spravované cloudové služby a infraštruktúru do akéhokoľvek dátového centra. Rovnaké API rozhranie cez grafickú konzolu, príkazový riadok či SDK bez ohľadu na to, či je aplikácia v cloude alebo v AWS Outpost umožňuje naplno využiť model hybridného cloudu bez kompromisov. V tomto webinári vám predstavíme fungovanie AWS Outposts, rovnako ako prípady použitia v reálnej zákazníckej prevádzke.
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...Amazon Web Services
Many enterprises use Active Directory for authentication, server and workstation management, group policy management, and more. It’s also one of the first applications to be deployed on AWS by those building or migrating Windows applications at scale. There are two primary models for running Active Directory on AWS: AWS Managed Microsoft AD and self-managed Active Directory on Amazon EC2. We discuss best practices for securing Active Directory deployment on AWS and the shared responsibility model for running AWS Managed Microsoft AD. We also examine a reference architecture that follows these best practices. Services include AWS Managed Microsoft AD, Amazon EC2, Amazon EBS, Amazon VPC, and AWS KMS.
AWS SSA Webinar 17 - Getting Started on AWS with Amazon RDSCobus Bernard
In this session, we will take a deeper look at how to use Amazon RDS to host your database. We will start by spinning up a single instance db and then work through setting up a production ready, multi-available zone cluster with read replicas, daily backups. Lastly, we show you how to use Amazon RDS Proxy to handle the database connection pool and credentials for you.
Design, Deploy, Optimize SQL Server Workloads on AWS - SRV209 - Anaheim AWS S...Amazon Web Services
In this session, dive deep into best practices and considerations for running Microsoft SQL Server on AWS. Learn how to choose between Amazon EC2 and Amazon RDS, and understand how to optimize the performance of your SQL Server deployment for different application types. We review in detail how to provision and monitor your SQL Server databases and how to manage scalability, performance, availability, security, and backup and recovery in both Amazon RDS and Amazon EC2.
Similar to HashiTalks Africa - Going multi-account on AWS with Terraform (20)
London Microservices Meetup: Lessons learnt adopting microservicesCobus Bernard
Talk about my experiences (and failures) helping companies move to AWS and adopt microservices architecture. Heavy focus on the people aspect with some tech to set the scene.
AWS SSA Webinar 34 - Getting started with databases on AWS - Managing DBs wit...Cobus Bernard
In this session, we will look at how you can enable development teams to create and manage their own databases using AWS CDK. We will look at how to create shareable, reusable code blocks to help speed up development as well as ensuring best practices are applied when creating the databases.
AWS SSA Webinar 33 - Getting started with databases on AWS Amazon DynamoDBCobus Bernard
In this session, we will take a look at Amazon DynamoDB and how you can get started building application with it. We will look at table design, common access patterns and compare it to a relational database.
AWS SSA Webinar 32 - Getting Started with databases on AWS: Choosing the righ...Cobus Bernard
In this session, we will take you through the different database services that you can choose from on AWS. We will take a look at the workings of each one, from Amazon RDS for relational databases, to Amazon QLDB for ledger databases.
AWS SSA Webinar 28 - Getting Started with AWS - Infrastructure as CodeCobus Bernard
One of the parts of doing things properly at scale is being able to describe your infrastructure as code and deploy it as such. If we already treat our infrastructure as code, why not apply all the best practices of software delivery to infrastructure delivery.
In this session we look into Infrastructure as Code solutions, best practices and patterns on AWS.
AWS Webinar 24 - Getting Started with AWS - Understanding DRCobus Bernard
In this session, we will look at how you can use AWS for your disaster recovery (DR) requirements to allow failing over to services hosted on AWS. We will also cover how to think about resiliency and auto-healing systems instead of manual fail-over to a full set of additional hardware. Lastly, we will touch on using DR as a strategy for migrating to the cloud.
AWS Webinar 23 - Getting Started with AWS - Understanding total cost of owner...Cobus Bernard
In this session, we will go over cloud economics and understanding the total cost of ownership (TCO) when building in the cloud and how you are trading upfront capital expenditure (CapEx) for operational expenditure (OpEx). We will also look at how the TCO changes over time as you start modernising your applications to make full use of the cloud's capabilities. Lastly, we will cover the different purchasing options to help you understand how you can reduce costs even further by identifying consistent, base workloads.
AWS SSA Webinar 21 - Getting Started with Data lakes on AWSCobus Bernard
In this session, we will take you through getting started with a Data Lake by looking at how you can ingest data to Amazon S3, query it with Amazon Athena and perform ETL operations on it using AWS Glue. We will be using the Redshift cluster from the previous session to export data to S3 to query.
AWS SSA Webinar 20 - Getting Started with Data Warehouses on AWSCobus Bernard
In this session, we will take you through setting up an Amazon Redshift cluster and at the ways you can populate it with data. We will start by using AWS DMS to replicate the data as-is as well as doing some ETL on it. This will be followed by AWS Glue where you can do more advanced ETL operations. Lastly, we will look at how you can use Amazon Kinesis Firehose to stream event directly to the Redshift cluster.
AWS SSA Webinar 19 - Getting Started with Multi-Region Architecture: ServicesCobus Bernard
In this session, we will start with a service that is running in one region, and then go through the steps to set up the required infrastructure in a new region, deploy there and start service traffic from both. We will also
AWS SSA Webinar 18 - Getting Started with Multi-Region Architecture: DataCobus Bernard
In this session, we will start with an RDS instance in one region, and then look at the ways we can use an additional region, either by migrating the entire database, or making use of Amazon Aurora Global Database to have active writer nodes in more than 1 region.
AWS EMEA Online Summit - Live coding with containersCobus Bernard
In this session, we will go over how to launch containers using Amazon ECS with both Amazon EC2 worker nodes as well as AWS Fargate. We will take a look at using blended on-demand and spot instance for EC2, and Fargate spot to reduce costs when running containers on ECS.
AWS EMEA Online Summit - Blending Spot and On-Demand instances to optimizing ...Cobus Bernard
In this session, we take a look at how you can use new features in auto-scaling groups to blend spot an on-demand instance to reduce your overall costs.
AWS SSA Webinar 16 - Getting Started on AWS with Amazon EC2Cobus Bernard
In this session, we will take a deeper look at how to deploy, run and monitor applications deployed to Amazon EC2 using AWS CodeDeploy and AWS CodePipeline. We will start by building a golden AMI with our application requirements pre-installed, then using that AMI in an AWS Autoscaling Group where CodePipeline/CodeBuild will deploy our application. You will also learn how using CodeDeploy with Autoscaling groups provide additional resiliency by replacing any instance that has an issue.
AWS SSA Webinar 15 - Getting started on AWS with Containers: Amazon EKSCobus Bernard
In this sesison, we will take a deeper look at how to get started using Amazon EKS by setting up a new cluster using 'eksctl' and deploying a sample application to it. We will look at the components created and how to configure a custom domain and using Amazon Certificate Manager to run it over https. We will also look at using AWS AppMesh for service discovery in the cluster.
AWS SSA Webinar 13 - Getting started on AWS with Containers: Amazon ECSCobus Bernard
In this session, we will take a deeper look at how to deploy, run and monitor applications deployed in containers to Amazon ECS using AWS CodeDeploy, CodePipeline and Amazon ECR. We will start by deploying to ECS with Amazon EC2 instances, and then show how using AWS Fargate simplifies the process.
AWS SSA Webinar 12 - Getting started on AWS with ContainersCobus Bernard
In this session, we will look a the building blocks available on AWS for Compute, Storage and Networking. It will focus on providing and overview how what each service is used for to prepare the attendee for the 3 followup sessions where each of the 3 categories will be covered in more detail.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.