User Management and App Authentication with Amazon Cognito - SID343 - re:Inve...Amazon Web Services
This document contains a summary of a workshop on user management and app authentication with Amazon Cognito. The workshop covers setting up Cognito user pools for user sign-up, sign-in, and password management. It also covers getting temporary AWS credentials from Cognito identity pools to access AWS services like S3. The hands-on portion involves building a desktop app for user authentication with Cognito user pools and getting credentials to call AWS services.
Enterprise Governance: Build Your AWS Landing Zone (ENT351-R1) - AWS re:Inven...Amazon Web Services
The document describes an AWS workshop about building a landing zone on AWS. It provides an agenda that covers why a landing zone is needed, demonstrates how to deploy and use an AWS landing zone, and shows how to create new AWS accounts and extend the landing zone. It also includes slides on the architecture and components of the AWS landing zone solution.
Dokumen tersebut membahas tentang perlakuan akuntansi untuk properti investasi dan pengungkapan yang terkait. Mengatur pengakuan, pengukuran, dan klasifikasi properti investasi serta transfer properti antara kategori properti investasi, aset tetap, dan persediaan berdasarkan metode nilai wajar dan biaya.
O documento explica conceitos básicos de contabilidade como razonete, balancete e balanço patrimonial. Um razonete é uma versão simplificada do livro razão e controla o movimento de débito e crédito de cada conta. Um balancete é uma relação de contas extraídas do razonete com seus saldos devedores e credores. O balanço patrimonial demonstra a situação patrimonial de uma empresa, separando o ativo, passivo e patrimônio líquido.
Regardless of whether you do nothing, build kit, buy from AWS or another CSP, someone from finance will come back to you and ask what happened to their money. In this session we will cover Cloud ROI: the key economical drivers for moving to the cloud and the tips and tricks for cost optimization on AWS.
User Management and App Authentication with Amazon Cognito - SID343 - re:Inve...Amazon Web Services
This document contains a summary of a workshop on user management and app authentication with Amazon Cognito. The workshop covers setting up Cognito user pools for user sign-up, sign-in, and password management. It also covers getting temporary AWS credentials from Cognito identity pools to access AWS services like S3. The hands-on portion involves building a desktop app for user authentication with Cognito user pools and getting credentials to call AWS services.
Enterprise Governance: Build Your AWS Landing Zone (ENT351-R1) - AWS re:Inven...Amazon Web Services
The document describes an AWS workshop about building a landing zone on AWS. It provides an agenda that covers why a landing zone is needed, demonstrates how to deploy and use an AWS landing zone, and shows how to create new AWS accounts and extend the landing zone. It also includes slides on the architecture and components of the AWS landing zone solution.
Dokumen tersebut membahas tentang perlakuan akuntansi untuk properti investasi dan pengungkapan yang terkait. Mengatur pengakuan, pengukuran, dan klasifikasi properti investasi serta transfer properti antara kategori properti investasi, aset tetap, dan persediaan berdasarkan metode nilai wajar dan biaya.
O documento explica conceitos básicos de contabilidade como razonete, balancete e balanço patrimonial. Um razonete é uma versão simplificada do livro razão e controla o movimento de débito e crédito de cada conta. Um balancete é uma relação de contas extraídas do razonete com seus saldos devedores e credores. O balanço patrimonial demonstra a situação patrimonial de uma empresa, separando o ativo, passivo e patrimônio líquido.
Regardless of whether you do nothing, build kit, buy from AWS or another CSP, someone from finance will come back to you and ask what happened to their money. In this session we will cover Cloud ROI: the key economical drivers for moving to the cloud and the tips and tricks for cost optimization on AWS.
Managing and governing multi-account AWS environments using AWS Organizations...Amazon Web Services
As you continue to grow your footprint on AWS, centralized tools and features are required to help govern multiple AWS accounts for account management, security and access control, and resource sharing. This session discusses how you can use AWS Organizations to manage and govern multi-account environments on AWS with security and compliance in mind. This session covers AWS Organizations, IAM, AWS Config, AWS Firewall Manager, CloudTrail, CloudWatch Events, Directory Service, License Manager, Resource Access Manager, and Single Sign-On.
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatchAmazon Web Services
You may already know that you can use Amazon CloudWatch to view graphs of your AWS resources like Amazon Elastic Compute Cloud instances or Amazon Simple Storage Service. But, did you know that you can monitor your on-premises servers with Amazon CloudWatch Logs? Or, that you can integrate CloudWatch Logs with Elasticsearch for powerful visualization and analysis? This session will offer a tour of the latest monitoring and automation capabilities that we’ve added, how you can get even more done with Amazon CloudWatch.
This document discusses how AWS Control Tower can be used to govern multi-account AWS environments at scale. It provides an overview of AWS Control Tower's key capabilities including automated setup of a landing zone with best practice blueprints and guardrails, account factory for provisioning accounts, centralized identity and access management, and built-in monitoring and notifications. Examples are also given of how AWS Control Tower can be used to implement common multi-account architectures and operational models.
본 온라인 세미나는 지금 막 AWS 계정을 생성하신 기초 사용자 분들을 위한 강연 입니다. AWS 사용의 첫 걸음으로서 IAM 서비스 기본 설정, MFA 활성화 등 AWS 계정을 안전하게 관리할 수 있는 방법을 핸즈온과 함께 배워보고, AWS의 프리티어 서비스에 대한 안내와 함께 결제 알람 설정 방법을 알아보실 수 있습니다. 추가로 AWS 사용 시 알아두시면 좋은 Support Center(고객 지원 센터) 이용 방법 등 초보자 분들을 위한 팁을 전달 드릴 예정입니다.
AWS Webinar Series - Cost Optimisation Levers, Tools, and StrategiesAmazon Web Services
The document discusses strategies for optimizing costs when using AWS. It covers establishing cost visibility using tools like AWS Cost Explorer. It also discusses technical optimization levers like right-sizing resources, using reserved instances, increasing infrastructure elasticity, matching storage classes to needs, and designing architectures for lower costs. The presentation provides examples and recommendations for how to apply these optimization strategies on AWS.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
본 강연에서는 금융권 사례 중심으로 AWS 인프라 도입을 최적의 Design pattern 및 Behavior에 대하여 소개해 드립니다. AWS가 제공하는 서비스 중 특정 사용 사례와 워크로드에 적합한 서비스를 고르기 위해 고려해야 할 사항들에 대해 알아봅니다. 또한 AWS Direct Connect 파트너사인 KINX에서 Direct connect의 특징 및 PoC 프로그램에 대해 소개해 드립니다.
연사: 김봉환 솔루션 아키텍트, 아마존 웹서비스 / 남시우 차장, KINX 담당자
Identity and access management (IAM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. IAM enables you to securely control access to your application or product services and resources for your users.
AWS Control Tower is a new AWS service for cloud administrators to set up and govern their secure, compliant, multi-account environments on AWS.
In this session, University of York will discuss their implementation of AWS Landing Zone. We’ll also explain how AWS Control Tower automates AWS Landing Zone creation with best-practice blueprints.
AWS CloudFormation: Infrastructure as Code | AWS Public Sector Summit 2016Amazon Web Services
This session provides the attendee with an overview of our AWS CloudFormation service and helps the customer to realize the benefits of "infrastructure as code." A demo is part of this session.
Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...Amazon Web Services
Learn about best practices on how to secure your AWS environment with AWS Identity and Access Management (IAM). We will discuss how you best create access policies; manage security credentials (i.e., access keys, password, multi factor authentication (MFA) devices etc); how to set up least privilege; minimizing the use of your root account etc.
Hosting .NET Applications on AWS - AWS Federal Pop-Up LoftAmazon Web Services
Introduction to the AWS SDK for .Net and AWS Tools for Windows PowerShell. Overview of the tools to help you develop applications including AWS Toolkit for Visual Studio and AWS Toolkit for Visual Studio Code. We will also discuss multiple AWS services for hosting .Net applications including Elastic Compute Cloud (EC2), AWS Elastic Beanstalk, Elastic Container Service (ECS), and Lambda. Finally, we will introduce AWS Services for Continuous Integration and Continuous Delivery (CI/CD) including CodeCommit, CodeBuild, CodePipeline, and CodeDeploy.
본 세션에서는 Amazon의 관리형 데이터베이스 서비스(RDS) 중 기존 상용데이터베이스의 5배 성능 및 1/10 가격으로도 확장성을 보장하는 Aurora에 대한 소개 및 사용법 그리고 기존의 DB에서의 마이그레이션 방법에 대해 소개해드립니다. 10월 리인벤트를 통해 동경 리전에 Aurora를 사용가능하게 되었습니다.
Implementing your landing zone - FND210 - AWS re:Inforce 2019 Amazon Web Services
This document discusses implementing an AWS landing zone using a multi-account strategy. It describes setting up initial core accounts for AWS Organizations, log archive, security, and shared services. It provides details on account structures and roles. The next steps outlined are to define tagging and automation strategies before creating the core accounts and implementing security best practices and cross-account access controls.
Software defined storage provisioning using ibm smart cloudxKinAnx
This document provides an overview of software-defined storage provisioning using IBM SmartCloud Virtual Storage Center (VSC). It discusses the typical challenges with manual storage provisioning, and how VSC addresses those challenges through automation. VSC's storage provisioning involves three phases - setup, planning, and execution. The setup phase involves adding storage devices, servers, and defining service classes. In the planning phase, VSC creates a provisioning plan based on the request. In the execution phase, the plan is run to automatically complete all configuration steps. The document highlights how VSC optimizes placement and streamlines the provisioning process.
Presentation power vm virtualization without limitssolarisyougood
This document discusses IBM PowerVM virtualization capabilities for IBM Power Systems. PowerVM allows for virtualization of workloads through logical partitions (LPARs) and virtual machines (VMs). It provides capabilities like rapid provisioning, scalability, recoverability, and workload consolidation to improve efficiency and reduce costs. PowerVM editions differ in features available like the number of concurrent VMs, types of virtual I/O supported, and advanced functions. The document also discusses the Virtual I/O Server (VIOS) appliance, virtual storage and networking options in PowerVM like virtual SCSI, NPIV, and shared Ethernet adapters.
Managing and governing multi-account AWS environments using AWS Organizations...Amazon Web Services
As you continue to grow your footprint on AWS, centralized tools and features are required to help govern multiple AWS accounts for account management, security and access control, and resource sharing. This session discusses how you can use AWS Organizations to manage and govern multi-account environments on AWS with security and compliance in mind. This session covers AWS Organizations, IAM, AWS Config, AWS Firewall Manager, CloudTrail, CloudWatch Events, Directory Service, License Manager, Resource Access Manager, and Single Sign-On.
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatchAmazon Web Services
You may already know that you can use Amazon CloudWatch to view graphs of your AWS resources like Amazon Elastic Compute Cloud instances or Amazon Simple Storage Service. But, did you know that you can monitor your on-premises servers with Amazon CloudWatch Logs? Or, that you can integrate CloudWatch Logs with Elasticsearch for powerful visualization and analysis? This session will offer a tour of the latest monitoring and automation capabilities that we’ve added, how you can get even more done with Amazon CloudWatch.
This document discusses how AWS Control Tower can be used to govern multi-account AWS environments at scale. It provides an overview of AWS Control Tower's key capabilities including automated setup of a landing zone with best practice blueprints and guardrails, account factory for provisioning accounts, centralized identity and access management, and built-in monitoring and notifications. Examples are also given of how AWS Control Tower can be used to implement common multi-account architectures and operational models.
본 온라인 세미나는 지금 막 AWS 계정을 생성하신 기초 사용자 분들을 위한 강연 입니다. AWS 사용의 첫 걸음으로서 IAM 서비스 기본 설정, MFA 활성화 등 AWS 계정을 안전하게 관리할 수 있는 방법을 핸즈온과 함께 배워보고, AWS의 프리티어 서비스에 대한 안내와 함께 결제 알람 설정 방법을 알아보실 수 있습니다. 추가로 AWS 사용 시 알아두시면 좋은 Support Center(고객 지원 센터) 이용 방법 등 초보자 분들을 위한 팁을 전달 드릴 예정입니다.
AWS Webinar Series - Cost Optimisation Levers, Tools, and StrategiesAmazon Web Services
The document discusses strategies for optimizing costs when using AWS. It covers establishing cost visibility using tools like AWS Cost Explorer. It also discusses technical optimization levers like right-sizing resources, using reserved instances, increasing infrastructure elasticity, matching storage classes to needs, and designing architectures for lower costs. The presentation provides examples and recommendations for how to apply these optimization strategies on AWS.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
본 강연에서는 금융권 사례 중심으로 AWS 인프라 도입을 최적의 Design pattern 및 Behavior에 대하여 소개해 드립니다. AWS가 제공하는 서비스 중 특정 사용 사례와 워크로드에 적합한 서비스를 고르기 위해 고려해야 할 사항들에 대해 알아봅니다. 또한 AWS Direct Connect 파트너사인 KINX에서 Direct connect의 특징 및 PoC 프로그램에 대해 소개해 드립니다.
연사: 김봉환 솔루션 아키텍트, 아마존 웹서비스 / 남시우 차장, KINX 담당자
Identity and access management (IAM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. IAM enables you to securely control access to your application or product services and resources for your users.
AWS Control Tower is a new AWS service for cloud administrators to set up and govern their secure, compliant, multi-account environments on AWS.
In this session, University of York will discuss their implementation of AWS Landing Zone. We’ll also explain how AWS Control Tower automates AWS Landing Zone creation with best-practice blueprints.
AWS CloudFormation: Infrastructure as Code | AWS Public Sector Summit 2016Amazon Web Services
This session provides the attendee with an overview of our AWS CloudFormation service and helps the customer to realize the benefits of "infrastructure as code." A demo is part of this session.
Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...Amazon Web Services
Learn about best practices on how to secure your AWS environment with AWS Identity and Access Management (IAM). We will discuss how you best create access policies; manage security credentials (i.e., access keys, password, multi factor authentication (MFA) devices etc); how to set up least privilege; minimizing the use of your root account etc.
Hosting .NET Applications on AWS - AWS Federal Pop-Up LoftAmazon Web Services
Introduction to the AWS SDK for .Net and AWS Tools for Windows PowerShell. Overview of the tools to help you develop applications including AWS Toolkit for Visual Studio and AWS Toolkit for Visual Studio Code. We will also discuss multiple AWS services for hosting .Net applications including Elastic Compute Cloud (EC2), AWS Elastic Beanstalk, Elastic Container Service (ECS), and Lambda. Finally, we will introduce AWS Services for Continuous Integration and Continuous Delivery (CI/CD) including CodeCommit, CodeBuild, CodePipeline, and CodeDeploy.
본 세션에서는 Amazon의 관리형 데이터베이스 서비스(RDS) 중 기존 상용데이터베이스의 5배 성능 및 1/10 가격으로도 확장성을 보장하는 Aurora에 대한 소개 및 사용법 그리고 기존의 DB에서의 마이그레이션 방법에 대해 소개해드립니다. 10월 리인벤트를 통해 동경 리전에 Aurora를 사용가능하게 되었습니다.
Implementing your landing zone - FND210 - AWS re:Inforce 2019 Amazon Web Services
This document discusses implementing an AWS landing zone using a multi-account strategy. It describes setting up initial core accounts for AWS Organizations, log archive, security, and shared services. It provides details on account structures and roles. The next steps outlined are to define tagging and automation strategies before creating the core accounts and implementing security best practices and cross-account access controls.
Software defined storage provisioning using ibm smart cloudxKinAnx
This document provides an overview of software-defined storage provisioning using IBM SmartCloud Virtual Storage Center (VSC). It discusses the typical challenges with manual storage provisioning, and how VSC addresses those challenges through automation. VSC's storage provisioning involves three phases - setup, planning, and execution. The setup phase involves adding storage devices, servers, and defining service classes. In the planning phase, VSC creates a provisioning plan based on the request. In the execution phase, the plan is run to automatically complete all configuration steps. The document highlights how VSC optimizes placement and streamlines the provisioning process.
Presentation power vm virtualization without limitssolarisyougood
This document discusses IBM PowerVM virtualization capabilities for IBM Power Systems. PowerVM allows for virtualization of workloads through logical partitions (LPARs) and virtual machines (VMs). It provides capabilities like rapid provisioning, scalability, recoverability, and workload consolidation to improve efficiency and reduce costs. PowerVM editions differ in features available like the number of concurrent VMs, types of virtual I/O supported, and advanced functions. The document also discusses the Virtual I/O Server (VIOS) appliance, virtual storage and networking options in PowerVM like virtual SCSI, NPIV, and shared Ethernet adapters.
The document contains 30 interview questions and answers related to VMware administration. Some key points covered include:
- The VMkernel is VMware's proprietary kernel that is not based on any UNIX operating system. It requires a third-party operating system like Red Hat Linux to boot.
- Common services that can be restarted on an ESX server include vmware-webaccess, sshd, and mgmt-vmware.
- The three port groups in an ESX server are virtual machine, service console, and VMkernel port groups for different types of communication.
- Features like VMotion require enabling the license and option for a specific vSwitch before it will show as used.
The document discusses various topics related to VMWare including:
1. The VMWare kernel is proprietary and developed by VMWare, and requires a third party OS like RedHat Linux to boot, known as the service console.
2. Core services of vCenter include VM provisioning, task scheduling, and event logging.
3. Key files that make up a virtual machine include the .vmx configuration file, .vmdk disk file, .vmsn snapshot files, and log files.
The document discusses various topics related to VMware administration interview questions and answers. It covers topics such as the VMkernel, port groups, vMotion licensing, virtual switches, snapshots, converting physical machines to virtual machines, and VMware consolidated backup.
Huawei SAN Storage How To - Configuring the i-SCSI Communication ProtocolIPMAX s.r.l.
In this tutorial we will see how to configure a connection between our i-SCSI SAN (S2200T demo unit) and an application server running Windows 2012. Follow us!
This document discusses virtual Fibre Channel for Hyper-V, a new technology in Windows Server 2012 that allows direct access to Fibre Channel shared storage by multiple guest virtual machines. It simplifies connectivity between Fibre Channel SAN storage and Hyper-V applications, offering unprecedented levels of availability, scalability, and operational efficiency for virtualized workloads and cloud architectures when combined with Brocade's Fibre Channel SAN infrastructure. Key capabilities enabled include distributed workload clustering across shared storage, live migration of virtual machines without storage connectivity disruption using dual World Wide Names, and leveraging multipath I/O functionality for continuous storage connectivity.
The document summarizes new storage technologies in Windows Server 2012 for Hyper-V including support for virtual Fibre Channel, NPIV, live migration with Fibre Channel connectivity, MPIO, the new VHDX virtual hard disk format, and use of SMB file shares for virtual machine storage. It also discusses features like virtual Fibre Channel adapters, the benefits of MPIO, and support for virtual hard disks on 4KB native disks.
Virtual Private Cloud (VPC) allows users to define their own virtual network within AWS. It includes subnets, network gateways, route tables, and security controls. The document provides detailed explanations of key VPC components such as public/private subnets, NAT devices, internet/virtual private gateways, route tables, and access control lists. It also provides step-by-step instructions for creating a sample VPC configuration on AWS.
This document provides a step-by-step guide for setting up active-passive iSCSI failover between two Open-E DSS V7 nodes (node-a and node-b). The steps include: 1) configuring the hardware and network settings for each node; 2) creating volume groups and iSCSI volumes for data replication on each node; 3) configuring volume replication between the nodes; 4) creating iSCSI targets on each node; 5) configuring failover settings; and 6) testing the failover functionality. Key aspects involve replicating iSCSI volumes from the active node-a to the passive node-b, and configuring virtual IP addresses and targets on each node for seamless failover
1) The document discusses 30 important interview questions about virtualization and VMware. It covers topics like the VMware kernel, ESX server networking, vMotion, snapshots, port groups, cloning templates, and more.
2) Each question is accompanied by an answer that provides details about the topic. For example, it explains that the VMware kernel is proprietary and works with the service console, while port groups separate network traffic types.
3) Common virtualization challenges and their solutions are also addressed, such as issues taking snapshots of VMs configured with physical LUN mappings that need to be changed to virtual first.
FEATRURE BRIEF▶ NetBackup 7.6 - Direct virtual machine creation from backup w...Symantec
Feature Description
The last few years have seen a significant growth in the adoption of virtualized servers in data centers with many organizations converting to purely virtual environments. Even organizations that use physical servers in their production environments are starting to see the benefits of using virtualization in their disaster recovery and test and development environments. NetBackup’s Bare Metal Restore (BMR) feature has always provided an effective mechanism for migrating between physical and virtual environments by recovering backups of physical servers to virtual servers. In NetBackup 7.6 this “physical to virtual” recovery model has been greatly simplified allowing customers to achieve rapid physical to virtual migration and disaster recovery to virtual environments for Windows servers in both local and remote (disaster recovery) sites.
Business Value
The Bare Metal Restore “physical to virtual” recovery capability allows customers to recover backups of physical Windows servers to VMware virtual machines. Using VMware virtualization in a disaster recovery data center can significantly reduce both the capital and operational costs associated with maintaining a disaster recovery position by allowing a “lights out” facility to be rapidly spun up in the event of a site loss.
Bare Metal Restore “physical to virtual” can be combined the NetBackup Auto Image Replication feature, allowing backup of physical servers to be replicated to a remote data center. VMware ESX servers at this disaster recovery facility can be left powered off until required and then powered up. Once the ESX servers are available the replicated backups of the physical servers at the product site can be quickly restored to virtual machines running on the ESX servers rather than needing to deploy physical servers. For disaster recovery testing purposes the virtual machines created during the recovery process can simply be deleted once the testing activities are complete. A similar approach can be used in test and development environments with backups from physical production servers being used to create virtual test servers.
Backup workflow for SMHV on windows 2008R2 HYPER-VAshwin Pawar
SnapManager for Hyper-V (SMHV) leverages NetApp's Snapshot technology to create backups of virtual machines hosted on Windows 2008 R2 Hyper-V servers. These backups capture point-in-time images of the VMs stored locally on the NetApp storage. The document describes the backup workflow in three levels - high level, low level, and raw, detailing the sequence of actions taken by SMHV, Hyper-V, and the NetApp storage system to back up the VMs using Snapshot technology in a consistent manner.
This document discusses virtualization and cloud computing. It defines virtualization as using software to run multiple virtual machines on a single physical machine. This allows for better hardware utilization and separation of software from hardware. Cloud computing builds upon virtualization by providing on-demand access to computing resources over the internet. Major cloud service models include Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Virtualization is the foundation that enables cloud computing.
Learn about SAP with IBM Tivoli FlashCopy Manager
for VMware and IBM XIV and IBM Storwize V7000 storage systems to create an effective VMware backup / restore solution for the SAP landscape.
This document discusses virtualization and cloud computing. It defines virtualization as using software to run multiple virtual machines on a single physical machine. This allows for more efficient use of hardware resources. Cloud computing separates applications from hardware and provides services over the internet. There are different types of cloud deployments including public, private, hybrid, and community clouds. Virtualization is the foundation that enables cloud computing.
Cisco Configuration Professional allows for the configuration of site-to-site IPsec VPN tunnels between two Cisco IOS routers. The document provides an example configuration using static routes that establishes an IPsec tunnel between Router A and Router B. The configuration is performed using Cisco Configuration Professional on each router and specifies the IKE and IPsec proposals, transform sets, and traffic to be protected between the 10.10.10.0 and 10.20.10.0 networks. Show commands are included to verify the tunnel is successfully established and traffic is being encrypted and decrypted.
This document provides an overview of Cloud Studio, a live streaming production system installed on the cloud that allows for remote program production. It describes the AWS configuration, including instances for a video pool server and operation server on the same VPC. Real-time video can be sent to the video pool server from anywhere via SRT/RTMP as long as there is an internet connection. The operation server selects video from the pool to produce programs, which are then sent to live streaming services. The system allows uploading other files and remote control of switching, mixing, and transmission settings.
This document provides an overview of OpenStack Compute (Nova), which is an open source software that provides infrastructure as a service cloud computing capabilities. It discusses how Nova controls virtual machine instances, networks, and access through users and projects similar to Amazon EC2. Nova exposes these capabilities through APIs for developers and interfaces for administrators. Key components of Nova like nova-compute, nova-scheduler, nova-api and message queue are described along with their functions and communication processes. Several Nova API examples are listed with their use cases, expected return codes and outcomes. Process flow diagrams are included for creating a server, attaching a volume, and detaching a volume to illustrate the component interactions.
Similar to Ibm i series_lpar_migration_from_vscsi_to_npiv_within_or_different_frames (20)
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
2. Purpose
This technical document shows an example for migrating an IBM i client partition of the IBM
PowerVM Virtual I/O Server from a virtual SCSI to an NPIV attachment.
This is intended to help Unix Team to successfully plan and perform an IBM i partition migration from
virtual SCSI to NPIV in Power systems.
This technical document is considered that SAN is supported, enabled NPIV capable in SAN switch,
disk are NPIV capable, required license is available for iOS, supported tape library is used to configure
for IBM iSeries Client partition of the IBM Power systems.
In case of confirmation for SAN related contact SAN team, for iOS contact iSeries team. Herewith, I've
given the steps only from Power system side.
3.
4. 1. Considerations for using N_Port ID Virtualization
1.1 Virtual SCSI vs. N_Port ID Virtualization
While for virtual SCSI (VSCSI) the Virtual I/O Server performs generic SCSI device emulation,
with NPIV the Virtual I/O Server simply acts as a Fibre Channel pass-through. Compared to VSCSI an
N_Port ID Virtualization (NPIV) storage environment typically requires less efforts to be configured
and maintained as there is no multi-path device driver, no virtual target device creation and no
administration of corresponding volume device mappings to be required on the Virtual I/O Server.
NPIV allows the IBM i client partition to see its storage devices with its machine type / model
and all device characteristics via virtual Fibre Channel adapters as if it would be natively attached
to the storage devices. Some licensed programs on the IBM i client partition don’t support virtual
SCSI attached devices as they require knowledge about the hardware device characteristics.
1.2 Migration Planning Considerations
• Consider the following for migrating an IBM i client partition of the IBM PowerVM Virtual I/O
Server from VSCSI to NPIV:
• Existing volumes on the SAN created for IBM i VSCSI attachment can be re-used for NPIV
attachment.
• Each virtual Fibre Channel client adapter for IBM i supports up to 64 LUNs vs. up to 16 VSCSI
LUNs supported for each VSCSI client adapter.
• The remapping of the volumes from a VSCSI to an NPIV configuration has to be performed
while the IBM i partition is powered off, i.e. heterogeneous multipathing with simultaneously
using VSCSI and NPIV is not supported in IBM I partition.
5. 2. Overview of Migration Steps
This section contains an overview for the migration steps we used to migrate our IBM i partition
from VSCSI to NPIV attachment of the IBM Storage. This migration procedure is certainly not the
only way in which this migration can be performed. However we think it well serves its purpose with
minimizing required IBM i partition downtime and minimizing risks for a possibly failed migration by
retaining the original VSCSI configuration as far as possible to allow an easy step-back if required until
the targeted NPIV configuration has been verified to work successfully.
1. Verifying all prerequisites for IBM i NPIV storage attachment are fulfilled.
2. Changing the IBM i partition profile to remove the VSCSI client adapters and add virtual Fibre
Channel client adapters.
3. Changing the Virtual I/O Server's partition configuration (current configuration and profile) by
dynamically adding the virtual Fibre Channel server adapters required for NPIV.
4. Enabling NPIV on the SAN switch ports.
5. Mapping the virtual Fibre Channel server adapters to physical Fibre Channel adapters.
6. Adding new switch zones for the new virtual Fibre Channel adapters from the IBM i client partition.
7. Creating a new host object for the IBM i partition on the storage system.
8. Powering down the IBM i partition.
9. Mapping existing volumes to the new host object used for IBM i NPIV attachment.
10. Powering on the IBM i partition and verifying if everything works as expected with NPIV
After NPIV has been verified to work successfully:
11. Removing the VSCSI disk resources from the Virtual I/O Servers.
12. Removing the VSCSI server adapters from the Virtual I/O Servers.
13. Deleting the IBM i partition’s old profile.
14. Request SAN team to unshare the old VSCSI disk resources.
6. 3. Performing the Migration
In this section we describe the detailed steps required to perform the migration of our IBM i
client partition of two Virtual I/O Servers from a VSCSI to an NPIV attachment.
3.1. Verifying all prerequisites for IBM i NPIV storage attachment are fulfilled
a. Supported 8 Gb Fibre Channel (see reference 2)
b. NPIV capable SAN switch.
c. Check iOS level (IBM i 7.1 TR6 or later)
d. Virtual I/O Server 2.2.2.1 (fix pack 26) or later.
e. HMC V7R3.5.0 or later.
f. Recommended latest Power Systems firmware.
g. On the Virtual I/O Server run the chkdev command for each hdisk used for IBM i to be
migrated to NPIV attachment:
$ chkdev -dev <diskname>
Example:
$ chkdev -dev hdisk15
NAME:
hdisk15
IDENTIFIER:
3321360050768028086EDD00000000000002104214503IBMfcp
PHYS2VIRT_CAPABLE:
NA
VIRT2NPIV_CAPABLE:
YES
VIRT2PHYS_CAPABLE:
YES
Ensure VIRT2NPIV_CAPABLE is YES. If it is not, e.g. because of a PVID having been
assigned like when using logical volumes, a migration is not possible without a complete
SAVE and RESTORE of the IBM i partition.
7. 3.2. Changing the IBM i partition profile to remove the VSCSI client adapters and add
virtual Fibre Channel client adapters
a. As a safety measure to be able to easily revert back to using VSCSI in case anything
would go wrong with our NPIV setup, we create a new partition profile for our NPIV configuration by
creating a copy of our IBM i partition’s existing profile used for VSCSI.
We select the partition on the HMC choosing from the context-menu Configuration →
Manage Profiles, selecting the currently used profile and choosing from the menu Actions → Copy
with specifying a new profile name like “default_NPIV” as shown in Figure 1.
Figure 1: Copying the existing IBM i partition profile
b. Within the Manage Profiles dialog we click on the newly created profile
“default_NPIV” to open it for editing with selecting the Virtual Adapters tab as shown in Figure 2.
Figure 2: IBM i partition profile with existing VSCSI adapters
Figure 2: IBM i partition profile with existing virtual SCSI adapters
8. c. We delete our VSCSI client adapters in slots 11 and 12 we used for VSCSI attachment
by selecting them and choosing from the menu Actions → Delete – we are going to keep the VSCSI
adapter in slot 10 which is used for a virtual DVD drive which independent from the SAN storage
attachment migration to NPIV we like to retain.
d. For the NPIV attachment we create two corresponding virtual Fibre Channel (VFC)
client adapters in slots 13 and 14 each by selecting Actions → Create Virtual Adapter → Fibre Channel
Adapter – we use different slot numbers for VFC than for VSCSI to be able to easily revert back to the
VSCSI adapter configuration until we are fully assured that the desired NPIV configuration works
successfully.
The adapter with the odd slot ID 13 we associate with our 2nd Virtual I/O Server server
adapter ID 13, and the one with the even slot ID 14 with our 1st Virtual I/O Server server adapter ID
14. The resulting virtual adapter configuration for our IBM i partition is shown in Figure 3. It provides
us with the desired IBM i multi-pathing configuration for NPIV across two redundant Virtual I/O
Servers.
Figure 3: IBM i partition profile with removed VSCSI and added VFC adapters
e. We click OK on the Virtual Adapters tab to save the changes to the partition profile.
After getting back to the dialog window with the list of managed profiles we select the partition profile
again and select the Tagged I/O tab which now allows us to select the previously created virtual Fibre
Channel adapter for the load source as shown in Figure 4. Also this configuration change needs to be
saved again by clicking OK.
9. Figure 4: IBM i I/O tagging for the load source using virtual Fibre Channel
3.3. Changing the Virtual I/O Servers’ partition configuration (current configuration and
profile) by dynamically adding the virtual Fibre Channel server adapters required for NPIV
a. For both of our Virtual I/O Server partitions we dynamically add a virtual Fibre
Channel server adapter by selecting the Virtual I/O Server partition and choosing from the context-
menu Dynamic Logical Partitioning → Virtual Adapters selecting the menu Actions → Create Virtual
Adapter → Fibre Channel Adapter like shown in Figure 5.
Figure 5: Dynamically adding a VFC adapter to a Virtual I/O Server partition
10. b. The resulting virtual adapter configuration for our two Virtual I/O Server partitions is shown
in Figure 6.
Figure 6: Virtual I/O Server virtual adapter configuration with added VFC adapters
c. To make sure our changes of dynamically adding the virtual Fibre Channel adapters are
retained also after a Virtual I/O Server shutdown, for each Virtual I/O Server we save the current
configuration in its partition profile by selecting the Virtual I/O Server and choosing from the context-
menu Configuration → Save Current Configuration as shown in Figure 7.
Figure 7: Saving the Virtual I/O Server current configuration to its profile
4. Enabling NPIV on the SAN switch
We need to contact SAN team to enable the NPIV capable on the SAN switch. We can use lsnports
command. It displays information for all the ports capable of NPIV.
11. 5. Mapping the virtual Fibre Channel server adapters to physical Fibre Channel adapters
a. The virtual Fibre Channel adapters can easily be mapped to the physical Fibre Channel adapters
owned by the Virtual I/O Servers using the Virtual Storage Management function of the HMC GUI by
selecting the physical server and choosing Configuration → Virtual Resources → Virtual Storage
Management from the Tasks panel.
In the Virtual Storage Management dialog we select the corresponding Virtual I/O Server from the
drop-down list and click Query to retrieve its configuration information like shown in Figure 8.
Figure 8: Retrieving Virtual I/O Server configuration information
b. To modify the virtual Fibre Channel port connections we select the Virtual Fibre Channel tab,
select the physical FC adapter port fcs0 we like to map the virtual Fibre Channel adapter for our IBM i
client partition to, and click Modify partition connections like shown in Figure 9.
Figure 9: Virtual Storage Management virtual Fibre Channel adapter connections
c. In the Modify Virtual Fibre Channel Partition Assignment dialog we select our IBM i client
partition i7PFE2 and click OK like shown in Figure 10.
12. Figure 10: Selecting the virtual FC adapter to be mapped to the physical port
Above steps for mapping the virtual Fibre Channel adapter to a physical Fibre Channel adapter
port we repeat correspondingly for our 2 nd Virtual I/O Server.
Alternatively to using the Virtual Storage Management function of the HMC GUI the virtual to
physical FC adapter mappings could be created from the Virtual I/O Server command line using the
“vfcmap” command like described below:
On the Virtual I/O Servers the dynamically added virtual Fibre Channel server adapter should show
up as an available vfchostX resource like shown in the lsdev command outputs below for the virtual
Fibre Channel server adapter in slot 14:
$ lsdev | grep vfchost
vfchost0 Available Virtual FC Server Adapter
On each Virtual I/O Server we map each virtual Fibre Channel server adapter vfchostX to a
physical Fibre Channel port fcsX. The lsnports command can be used to list the NPIV capable physical
Fibre Channel ports with “aports” information showing the available virtual ports of the physical port,
while the actual mapping is done using the vfcmap command like shown below:
13. $ vfcmap -vadapter vfchost0 -fcp fcs0
Our newly created mapping of the virtual Fibre Channel server adapter “vfchost0” to the physical port
“fcs0” is shown in the “lsmap -all -npiv” command output below:
6. Adding new switch zones for the new virtual Fibre Channel adapters from the IBM i client
partition
a. To create the SAN switch zoning for the new virtual Fibre Channel adapters we first need to
retrieve the virtual WWPN from each virtual Fibre Channel client adapter of the IBM i client partition.
On the HMC we select the IBM i client partition choosing from the context-menu Configuration →
Manage Profiles. In the Manage Profiles dialog we click on the profile “default_NPIV” we created for
the NPIV configuration, in the Virtual Adapters tab click on each virtual Fibre Channel adapter we
created with noting down both virtual WWPNs together with its slot number like shown in Figure 11.
Figure 11: IBM i virtual Fibre Channel adapter WWPNs
Use the WWPNs from the above Figure 11, to request SAN team to do the zoning. We should request
SAN team to do the zoning to map from virtual to physical fibre channel adapter.
14. 7. Powering down the IBM i partition
Now, We've to engage the SAN team and share the LUN ID's that are needs to be shared from
VSCSI to NPIV.
Note: The remapping of the volumes from a VSCSI to an NPIV configuration has to be performed
while the IBM i partition is powered off, i.e. heterogeneous multipathing with simultaneously using
VSCSI and NPIV is not supported in IBM I partition.
8. Powering on the IBM i partition and verifying if everything works as expected with NPIV
a. From the HMC we activate our IBM i client partition again using the new partition profile
“default_NPIV” which we created for the NPIV configuration as shown in Figure 12.
Figure 12: Activating the IBM i partition with the new profile for NPIV
Once activate the profile with NPIV adapters, check with iSeries team that everything is working good.
After confirmation from the iSeries team follow the below step.
9. Removing the virtual SCSI disk resources from the Virtual I/O Servers
a. Since we successfully migrated the IBM i volumes from VSCSI attachment to NPIV attachment
we remove the virtual target devices and corresponding hdisk devices on each Virtual I/O Server used
for hosting our IBM i client partition using the rmdev command like follows:
15. 10. Removing the virtual SCSI server adapters from the Virtual I/O Servers
a. We dynamically remove the virtual SCSI server adapters from each Virtual I/O Server we used
before for serving the virtual SCSI LUNs to our IBM i client partition by selecting the Virtual I/O
Server partition on the HMC and choosing from the context-menu Dynamic Logical Partitioning →
Virtual Adapters. In the Virtual Adapters dialog we select the virtual SCSI server adapter(s) to be
deleted and choose from the menu Actions → Delete like shown in Figure 13 and click OK.
Figure 13: Dynamically removing the unused VSCSI adapters from the Virtual I/O Servers
b. To apply our change of virtual SCSI adapter deletion also to the partition profile we save the
current configuration for our Virtual I/O Servers by selecting each Virtual I/O Server partition hosting
our IBM i client partition on the HMC and choosing from the context-menu Configuration → Save
Current Configuration with selecting the appropriate (default) profile and clicking OK like shown in
Figure 14.
16. Figure 14: Saving the Virtual I/O Server’s current configuration into its profile
11. Deleting the IBM i partition’s old profile
12. Removing the Virtual I/O Servers’ host objects on the storage system – if not used anymore
for other purposes
13. Removing the non-reporting virtual SCSI resources from the IBM i partition
17. References
[1] IBM developerWorks for IBM I
https://www.ibm.com/developerworks/ibmi/
[2] IBM PowerVM Virtualization Introduction and Configuration
http://www.redbooks.ibm.com/redpieces/abstracts/sg247940.html?Open
[3] IBM System Storage SAN Volume Controller and IBM Storwize V7000 Command-Line
Interface User's Guide
http://www-01.ibm.com/support/docview.wss?uid=ssg1S7003983