Celem prezentacji jest przedstawienie sposobu tworzenia i zarządzania infrastrukturą sieciową w chmurze (AWS). Podczas prezentacji użytkownicy dowiedzą się z jakich komponentów składa się infrastruktura w chmurze, zapoznają się z tematyką VPC (Virtual Private Cloud), Security Group, Direct Connect, Avaibility Zone, Route53, Regions. Dodatkowo dowiedzą się jak należy projektować systemy aby były określane jako HA oraz w jaki sposób można tworzyć rozwiązania hybrydowe i połączyć chmurę z istniejącą infrastrukturą on-premise. Dodatkowo słuchacze zapoznają się ze sposobem zarządzania infrastrukturą sieciową jak kodem (tzw. IaC - Infrastructure as Code) – co pozwala w szybki sposób tworzyć i zarządzać całością infrastruktury sieciowej w chmurze.
Virtualization Forum 2015, Praha, 7.10.2015
sál Juniper Networks
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf.
Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS cloud where you can launch AWS resources in a virtual network that you define. In this talk, we discuss advanced tasks in Amazon VPC, including the implementation of VPC peering, the creation of multiple network zones, the establishment of private connections, and the use of multiple routing tables. We also provide information for current EC2-Classic network customers and help you prepare to adopt Amazon VPC.
Advanced Data Retrieval and Analytics with Apache Spark and Openstack SwiftDaniel Krook
Lightning talk from the OpenStack NYC meetup on October 8, 2014.
http://bit.ly/ibm-os-meetup
By Gil Vernik
The integration between Apache Spark and Swift, and the use of Storlets for smart retrieval via filtering and privacy-support.
The content of this talk is a statement from the IBM Research division, not IBM product divisions, and is not a statement from IBM regarding its plans, directions or product intents. Any activities described by this talk are subject to change.
Virtualization Forum 2015, Praha, 7.10.2015
sál Juniper Networks
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf.
Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS cloud where you can launch AWS resources in a virtual network that you define. In this talk, we discuss advanced tasks in Amazon VPC, including the implementation of VPC peering, the creation of multiple network zones, the establishment of private connections, and the use of multiple routing tables. We also provide information for current EC2-Classic network customers and help you prepare to adopt Amazon VPC.
Advanced Data Retrieval and Analytics with Apache Spark and Openstack SwiftDaniel Krook
Lightning talk from the OpenStack NYC meetup on October 8, 2014.
http://bit.ly/ibm-os-meetup
By Gil Vernik
The integration between Apache Spark and Swift, and the use of Storlets for smart retrieval via filtering and privacy-support.
The content of this talk is a statement from the IBM Research division, not IBM product divisions, and is not a statement from IBM regarding its plans, directions or product intents. Any activities described by this talk are subject to change.
Using vSAN technology for hosted private cloud storageOVHcloud
Storage represents an increasingly complex challenge for growing organisations. In this session, Daniel Pascua and Timo Sugliani demonstrate how vSAN technology can provide both minimal latency and high performance for specific workloads, including hands-on examples of configuring and operating clusters.
Implementing an IPv6 Enabled Environment for a Public Cloud TenantShixiong Shang
"Implementing an IPv6 Enabled Environment for a Public Cloud Tenant" case study I delivered in OpenStack Vancouver Summit (May, 2015) jointly with Anik and Sharmin from Cisco System.
Webinar - Minimise your security risk with Hybrid Cloud and OVH vRackOVHcloud
Discover how a hybrid cloud, with the OVH vRack can helps you to minimize your IT security risks.
The associated Webinar took place on February 25th, 2016
Discover our next Webinar and events : http://www.ovh.co.uk/events/
1. The OVH vRack: how to minimise your security risk with Hybrid Cloud
2. Thank you for joining this Webinar
3. Some information about the Webinar
4. Today’s speaker : Danny Lang - Infrastructure and Network specialist
5. Webinar Agenda
6. Facts and figures, 61% of businesses affected by incidents in 2015
7. Impacts of these incidents
8. The solutions
9. Use cases
10. Typical Startup using an in-house Dedicated Server
11. Outsourcing the Dedicated Server
12. Typical Startup (outsourced)
13. Typical Startup infrastructure evolution
14. N-tier architecture - Stage 1
15. N-tier architecture - Stage 2 : Optimized availability
16. N-tier architecture - Stage 2 : High availability
17. N-tier architecture with Dedicated Cloud : High availability, vRack
18. N-tier architecture with Dedicated Cloud : High availability, vRack, hybrid
19. N-tier architecture with Dedicated Cloud : High availability, vRack, hybrid, multi-continent
20. Products used
21. Questions and Answers session
22. Q&A part 1
23. Q&A part 2
24. Q&A part 3
25. Q&A part 4
26. Q&A part 5
27. Keep in touch
28. Thank you
A lot of Internet of things devices use linux as its core. More so with the advent of DIY projects and Internet of things projects. A lot of Raspberry PI's, Beaglebone, Tessel boards are out there with default settings, and all connected to the internet, ready to be taken over. With the recent dyn DNS attack its of prime importance to know how we can keep these end point devices secure and out of the hands of botnet hoarders, attackers. In this presentation Rabimba Karanjai will show how to harden the security on these endpint devices taking a RaspBerry PI as an example. He will explain different techniques with code examples along with a toolkit made specifically for this demo which will make devices considerable harder to compromise. And even when they are, will allow to locate and detect the breach. After all, proetcting the device fially protects us all (prevents another DDOS)
Watch this presentation and learn all about Microservices.
*Flannel, Weave, IPVLAN, MacVLAN and how they fit together with Docker, Swarm or Kubernetes
*How containers communicate with each other
*How the choice of Networking Interface impacts router and switch deployment in the Data Center
Understanding and deploying Network VirtualizationSDN Hub
Analogous to server virtualization, Network Virtualization decouples and isolates virtual networks (i.e. tenant) from the underlying network hardware. One of the key value propositions of Software-Defined Networking (SDN) is to enable the provisioning and operation of virtual networks. This tutorial motivates the need for network virtualization, describes the high-level requirements, provides an overview of all architectural approaches, and gives you a clear picture of the vendor landscape.
Previously presented at ONUG Fall 2013 and Spring 2014.
If you're new to openstack and you want get some hands on it then you have to install the Devstack. a bundled version for all openstack services and components in one software.
The attached is a summary of terms, description of constructs, integration alternatives and more in the networking world of Kubernetes, Openshift and AWS
Do you want to modernize your data center? NSX has introduced amazing new technology and is the perfect ally for network and security administrators. But what if you want more agility? Could you imagine drinking coffee and watching the network configuring itself? Consuming NSX through configuration frameworks like Ansible or scripting languages such as Python or PowerShell goes a step beyond the simple usage of the GUI and allow for introducing custom advanced logic and workflows. Automating your infrastructure allows you to increase productivity, reduce errors due to manual configuration mistakes and simplify processes.
More on http://cloudmaniac.net
Presentation at OpenStack Summit Boston. This talk covers various lessons on IPv6 Neutron deployments like address allocation, address configuration, router consideration and so on.
Shrinking the Distance between Customers and Great Open Networking Platforms
In the data center, open networking is delivering CapEx reductions, improving operational efficiency and OpEx, and enabling use of standard Linux tools. Join us to learn how recent advancements in open networking are shrinking the time and distance between great new switching platforms and the customers who benefit from modern technology, modern economics, and platforms that just work.
Sergei Gotchev, Juniper Networks
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
PLNOG 17 - Robert Ślaski - Jak nie zostać bezrobotnym sieciowcem?PROIDEA
To co było w branży sieciowej aksjomatami ugruntowanymi przez lata a nawet dekady dość gwałtownie przestaje obowiązywać. Współczesne sieci zmieniają swój kształt, dostosowując się do wymagań współczesnego świata. Ty, jako pan i władca routerów musisz wreszcie uznać że świat powyżej warstwy czwartej już dawno zaczął żyć swoim życiem i odpływa w nieznanych Tobie kierunkach, a jeśli go nie dogonisz, zostaniesz bezrobotnym sieciowcem. W krótkiej prezentacji postaram się obalić kilka aksjomatów pokutujących jeszcze wśród sieciowców oraz przedstawić kilka technologii i rozwiązań, którymi warto się zainteresować aby za pięć lat nie zostać telemarketerem w call center.
W trakcie sesji przedstawione zostaną różne sposoby budowania rozproszonych punktów wymiany ruchu internetowego. Zaprezentowane zostanie również jak w praktyce wykorzystano protokół TRILL w Slovak Internet Exchange.
Using vSAN technology for hosted private cloud storageOVHcloud
Storage represents an increasingly complex challenge for growing organisations. In this session, Daniel Pascua and Timo Sugliani demonstrate how vSAN technology can provide both minimal latency and high performance for specific workloads, including hands-on examples of configuring and operating clusters.
Implementing an IPv6 Enabled Environment for a Public Cloud TenantShixiong Shang
"Implementing an IPv6 Enabled Environment for a Public Cloud Tenant" case study I delivered in OpenStack Vancouver Summit (May, 2015) jointly with Anik and Sharmin from Cisco System.
Webinar - Minimise your security risk with Hybrid Cloud and OVH vRackOVHcloud
Discover how a hybrid cloud, with the OVH vRack can helps you to minimize your IT security risks.
The associated Webinar took place on February 25th, 2016
Discover our next Webinar and events : http://www.ovh.co.uk/events/
1. The OVH vRack: how to minimise your security risk with Hybrid Cloud
2. Thank you for joining this Webinar
3. Some information about the Webinar
4. Today’s speaker : Danny Lang - Infrastructure and Network specialist
5. Webinar Agenda
6. Facts and figures, 61% of businesses affected by incidents in 2015
7. Impacts of these incidents
8. The solutions
9. Use cases
10. Typical Startup using an in-house Dedicated Server
11. Outsourcing the Dedicated Server
12. Typical Startup (outsourced)
13. Typical Startup infrastructure evolution
14. N-tier architecture - Stage 1
15. N-tier architecture - Stage 2 : Optimized availability
16. N-tier architecture - Stage 2 : High availability
17. N-tier architecture with Dedicated Cloud : High availability, vRack
18. N-tier architecture with Dedicated Cloud : High availability, vRack, hybrid
19. N-tier architecture with Dedicated Cloud : High availability, vRack, hybrid, multi-continent
20. Products used
21. Questions and Answers session
22. Q&A part 1
23. Q&A part 2
24. Q&A part 3
25. Q&A part 4
26. Q&A part 5
27. Keep in touch
28. Thank you
A lot of Internet of things devices use linux as its core. More so with the advent of DIY projects and Internet of things projects. A lot of Raspberry PI's, Beaglebone, Tessel boards are out there with default settings, and all connected to the internet, ready to be taken over. With the recent dyn DNS attack its of prime importance to know how we can keep these end point devices secure and out of the hands of botnet hoarders, attackers. In this presentation Rabimba Karanjai will show how to harden the security on these endpint devices taking a RaspBerry PI as an example. He will explain different techniques with code examples along with a toolkit made specifically for this demo which will make devices considerable harder to compromise. And even when they are, will allow to locate and detect the breach. After all, proetcting the device fially protects us all (prevents another DDOS)
Watch this presentation and learn all about Microservices.
*Flannel, Weave, IPVLAN, MacVLAN and how they fit together with Docker, Swarm or Kubernetes
*How containers communicate with each other
*How the choice of Networking Interface impacts router and switch deployment in the Data Center
Understanding and deploying Network VirtualizationSDN Hub
Analogous to server virtualization, Network Virtualization decouples and isolates virtual networks (i.e. tenant) from the underlying network hardware. One of the key value propositions of Software-Defined Networking (SDN) is to enable the provisioning and operation of virtual networks. This tutorial motivates the need for network virtualization, describes the high-level requirements, provides an overview of all architectural approaches, and gives you a clear picture of the vendor landscape.
Previously presented at ONUG Fall 2013 and Spring 2014.
If you're new to openstack and you want get some hands on it then you have to install the Devstack. a bundled version for all openstack services and components in one software.
The attached is a summary of terms, description of constructs, integration alternatives and more in the networking world of Kubernetes, Openshift and AWS
Do you want to modernize your data center? NSX has introduced amazing new technology and is the perfect ally for network and security administrators. But what if you want more agility? Could you imagine drinking coffee and watching the network configuring itself? Consuming NSX through configuration frameworks like Ansible or scripting languages such as Python or PowerShell goes a step beyond the simple usage of the GUI and allow for introducing custom advanced logic and workflows. Automating your infrastructure allows you to increase productivity, reduce errors due to manual configuration mistakes and simplify processes.
More on http://cloudmaniac.net
Presentation at OpenStack Summit Boston. This talk covers various lessons on IPv6 Neutron deployments like address allocation, address configuration, router consideration and so on.
Shrinking the Distance between Customers and Great Open Networking Platforms
In the data center, open networking is delivering CapEx reductions, improving operational efficiency and OpEx, and enabling use of standard Linux tools. Join us to learn how recent advancements in open networking are shrinking the time and distance between great new switching platforms and the customers who benefit from modern technology, modern economics, and platforms that just work.
Sergei Gotchev, Juniper Networks
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
PLNOG 17 - Robert Ślaski - Jak nie zostać bezrobotnym sieciowcem?PROIDEA
To co było w branży sieciowej aksjomatami ugruntowanymi przez lata a nawet dekady dość gwałtownie przestaje obowiązywać. Współczesne sieci zmieniają swój kształt, dostosowując się do wymagań współczesnego świata. Ty, jako pan i władca routerów musisz wreszcie uznać że świat powyżej warstwy czwartej już dawno zaczął żyć swoim życiem i odpływa w nieznanych Tobie kierunkach, a jeśli go nie dogonisz, zostaniesz bezrobotnym sieciowcem. W krótkiej prezentacji postaram się obalić kilka aksjomatów pokutujących jeszcze wśród sieciowców oraz przedstawić kilka technologii i rozwiązań, którymi warto się zainteresować aby za pięć lat nie zostać telemarketerem w call center.
W trakcie sesji przedstawione zostaną różne sposoby budowania rozproszonych punktów wymiany ruchu internetowego. Zaprezentowane zostanie również jak w praktyce wykorzystano protokół TRILL w Slovak Internet Exchange.
PLNOG 17 - Rafał Wiosna - Euro 2016 -- case study (prawdopodobnie) największy...PROIDEA
Podczas prezentacji opowiem o tym, jak Telewizja Polska SA przygotowywała się do przeprowadzenia transmisji internetowej z 11 meczów Euro 2016, jakie porażki i sukcesy zostały odniesione oraz przybliżę technologię wykorzystywaną do masowych transmisji internetowych dla setek tysięcy widzów. Postawię też odważną tezę, że TVP, pod względem dystrybucji sygnału wideo w internecie, biorąc pod uwagę liczbę na terytorium RP, jest "większe" niż Akamai -- i postaram się to udowodnić z wykorzystaniem przeźroczy, plansz i materiałów źródłowych.
Podczas prezentacji postaram się przybliżyć infrastrukture sieciową obecnie największego na świecie dostawcy treści czyli Akamai. Opowiem jak można budować sieć CDN (Content Delivery Network), i jak robimy to w Akamai. Przedstawie w jaki sposób użytkownicy korzystają z sieci Akamai. Pokaże trochę statystyk z ruchu internetowego na świecie jak i w Polsce, prezentując jak szybko "rośnie" Internet. W dużym stopniu skupie się na protokole BGP, opowiem jak używamy go w naszej sieci, przedstawie kilka case-studies związanych z inżynierią ruchu BGP w Akamai.
PLNOG 17 - Łukasz Dorosz - Architektura Hybrydowa, jak połączyć własne data c...PROIDEA
Architektura hybrydowa, to najczęściej przyjmowany model w dużych firmach. Bez względu na charakter rozwiązania opartego o chmurę publiczną oraz własne data center, bardzo ważną kwestią pozostaje spięcie ze sobą tych dwóch środowisk. Podczas mojej prezentacji pokaże Wam różne modele architektury hybrydowej. Na przykładzie AWS, przyjrzymy się dokładniej jak wygląda konfiguracja oraz czym charakteryzują się usługi VPN i Direct Connect.
PLNOG 17 - Sławomir Janukowicz - NFV – using Juniper vMX, vSRX and NFXPROIDEA
Zaprezentowany zostanie obecny status rozwiązań NFV. Ich historyczne znaczenie w przeszłości, zmiany na rynku, które doprowadziły do ponownego odkrycia tej technologii. Pokazane zostana możliwe scieżki rozwoju rozwiązań NFV i co w chwili obecnej stanowi blokadę do szerszego wdrożenia tych technologii. Zaprezentowane zostaną przykłady implementacji technolgoii NFV z wykorzystaniem rozwiązań Juniper vSRX vMX oraz produktów z rodziny NFX
PLNOG 17 - Sebastian Mikołajczyk - Wymiana silnika w aucie sportowym podczas ...PROIDEA
Na spotkaniu chcę powiedzieć o przygotowanej i wykonanej migracji trójwarstwowej sieci (DWDM, L2, IP/MPLS) zbudowanej początkowo na dedykowanym sprzęcie DWDM, przełącznikach i routerach dla każdej z warstw. Do postaci docelowego rozwiązania z wielousługowym sprzętem DWDM (z warstwą L2/MPLS) na dostępie oraz DWDM/L2/IP/MPLS w core, przy jednoczesnym znacznym uproszczeniu warstwy agregacji. Takie rozwiązanie daje spłaszczenie sieci, zmniejszenie ilości urządzeń w niej, możliwości realizacji nowych usług L1, uproszczeniu zarządzania usługami i siecią. Wszystko to obniża koszy inwestycyjne oraz operacyjne. Rozwiązania takie od kilku lat z powodzeniem stosują powszechnie w swojej sieci np. UPC czy Exatel.
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...PROIDEA
Na prezentacji zostanie omówiona technologia 802.1x, zostaną przedstawione praktyczne przykłady uwierzytelniania stacji oraz telefonów. Rozszerzeniem wykładu będzie omówienie rozwiązania bazującego na ID użytkownika/grupy, które ma za zadanie zunifikowanie polityk bezpieczeństwa w całej sieci kampusowej, ułatwienie implementacji oraz zwiększenie bezpieczeństwa.
PLNOG 17 - Maciej Flak - Cisco Cloud Networking - czyli kompletna infrastrukt...PROIDEA
W trakcie sesji zostanie omówiony nowy zyskujący coraz większe uznanie model zarządzania i provisioningu sieci LAN, WAN, WIFI z chmury. Pokazane zostanie w jaki sposób operatorzy telekomunikacyjni przy pomocy platformy Cisco Cloud Networking mogą budować i dostarczać własne usługi zarządzane Klientom (manager LAN, WAN i WIFI).
PLNOG 17 - Artur Kane - DDoS? You shall not pass!PROIDEA
From zero to hero. The story of technology startup from national academic network of the Czech Republic to world leader in Netflow/IPFIX. Flowmon is developing artificial inteligence that detects and responds to volumetric attacks. Flowmon DDoS Defender is an example how DDoS protection can be easy, efficient and flexible.
PLNOG 17 - Piotr Wojciechowski - 802.1s MST, czyli STP u operatora i w DC nie...PROIDEA
Protokół spanning-tree - wypierany przez inne technologie w nowoczesnych rozwiązaniach nadal stanowi podstawę działania sieci. Wśród wielu jego odmian trochę zapomniane i niedocenione wcielenie stanowi 802.1s czyli MST. Sesja ma na celu przypomnienie podstaw działania MST i wskazanie scenariuszy, w których protokół ten może ułatwić nam życie.
PLNOG 17 - Stefan Meinders - Slow is the new DownPROIDEA
In this presentation, we will review trends in Over-the-Top (OTT) traffic usage, user behavior and rapidly growing volumes of video streaming from services such as Netflix. The amount of video traffic carried by networks and its interconnections is significant. Delivery methods and encryption are challenges for today’s methods of network analysis—as are unexpected network changes that can drastically impact subscribers, transit costs, and network overload. Recent research unveiled that existing monitoring tools cannot cope with these variations in traffic delivery, caching strategies, and encryption. Finally, we describe how the use of “big data” techniques and multi-dimensional databases combined with global internet service mapping provides new insights into traffic delivery, consumption, and quality.
Kiedy myślimy o nowoczesnych sieciach w Centrum Przetwarzania Danych (CPD), musimy się zmierzyć z poważnym wyzwaniem: w jaki sposób używać - rosnące prawie z prawem Moore’a - prędkości transmisji, nie tracąc jednocześnie możliwości „widzenia” co się naprawdę w naszej sieci dzieje.
PLNOG 17 - Tomás Strašák - Latencja jest decydentemPROIDEA
Jak latencja wpływa na nasze decyzje przy budowie naszych połączeń. Czy latencja jest narzędziem do poprawy naszej konkurencyjności? Jakie są trendy na rynku jeśli chodzi o latencja?
PLNOG 17 - Shabbir Ahmad - Dell Open Networking i Big Monitoring Fabric: unik...PROIDEA
Unikalne rozwiązanie do efektywnego monitoring ruchu w sieci ! Każdy Kliency posiadający sieć zmaga się z wyzwaniami jakie niosą ze sobą próba efektywnego monitoring ruchu. W trakcie sesji zostanie zaprezentowane w praktyce (demo) niezwykle skalowane, łatwe w implementacji i obsłudze oraz bardzo efektywne kosztow rozwiązanie do monitoringu ruchu w sieci oparte o przełączniki Dell Open Networking oraz oprogramowanie sieciowe BigSwitch Big Monitoring Fabric. Jest to praktyczna implementacja sieci SDN (Software Defined Networking) !
PLNOG 17 - Dominik Bocheński, Łukasz Walicki - Zapomnij o VPS - nadeszła era ...PROIDEA
Wykład z elementami pokazu na żywo, którego celem jest pokazanie zalet jakie oferuje idea w pełni zwirtualizowanego centrum danych, umożliwiającego użytkownikowi decydowanie o ilości maszyn, które chce utworzyć w swoim środowisku oraz dowolną i samodzielną dystrybucję zasobów pomiędzy nimi. Elastyczność konfiguracji, łatwość zarządzania oraz przede wszystkim oszczędność czasu!
PLNOG 17 - Michał Rosiak - Świadomy Klient to bezpieczna firmaPROIDEA
W dzisiejszych czasach zapobieganie nie jest sexy. Zbyt często wolimy leczyć zamiast zapobiegać, usuwać efekty zamiast skutków. Poczucie oszczędności jest bardzo mylące - jednorazowo może wydamy mniej, ale na dłuższą metę pozbycie się skutków będzie znacznie bardziej kosztowne, niż przyjrzenie się temu, co je powoduje! Tymczasem przynajmniej 8 na 10 zwykłych internautów nie wie czym jest phishing, nie obchodzi ich co to jest ransomware, a na dźwięk informatycznego slangu dostają drgawek. Oni chcą korzystać z sieci, im się bardzo często spieszy, oni wciąż nie rozumieją - bądź nie chcą do siebie dopuścić - że zagrożenia w internecie są jak najbardziej realne! Jeśli wyjdziemy z "eksperckiej bańki" i dotrzemy do naszych klientów, pomożemy im, opowiemy w sposób prosty, zwięzły, zrozumiały, ich językiem, co im grozi w sieci, to relatywnie niskim kosztem wychowamy sobie ambasadorów bezpieczeństwa, a w efekcie zmniejszymy ryzyko tego, że w naszej sieci stanie się coś naprawdę złego.
For more training on AWS, visit: https://www.qa.com/amazon
AWS Loft | London - Amazon Virtual Private Cloud by Andrew Kane, Solution Architect
April 18, 2016
(ARC205) Creating Your Virtual Data Center: VPC Fundamentals and Connectivity...Amazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity OptionsAmazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
Presented by: Koen Biggelaar, Senior Manager Solutions Architecture, Amazon Web Services
Customer Guest: Jurjan Woltman, Architect, Wehkamp
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
Many enterprises on their hybrid cloud journey into the cloud require consistent and highly secure connectivity between their existing data center and AWS footprints. In this session, we walk through the different architecture options for establishing this connectivity using AWS Direct Connect and VPN. As we walk through these options, we try to answer some of the most common questions that typically arise from enterprises that tackle design and implementation. You'll learn how to make connectivity decisions that are suitable for your workloads, and how to best prepare against business impact in the event of failure.
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
AWS re:Invent 2016: NextGen Networking: New Capabilities for Amazon’s Virtual...Amazon Web Services
Amazon’s Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the Amazon Web Services (AWS) cloud and gives you complete control over your virtual networking environment. Amazon VPC continues to evolve with new capabilities and enhancements. These features give you increasingly greater isolation, control, and visibility at the all-important networking layer. In this session, we review some of the latest changes, discuss their value, and describe their use cases.
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity OptionsAmazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
(NET201) Creating Your Virtual Data Center: VPC FundamentalsAmazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity OptionsAmazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
Introduction to AWS VPC, Guidelines, and Best PracticesGary Silverman
I crafted this presentation for the AWS Chicago Meetup. This deck covers the rationale, building blocks, guidelines, and several best practices for Amazon Web Services Virtual Private Cloud. I classify it as a somewhere between a 101 and 201 level presentation.
If you like the presentation, I would appreciate you clicking the Like button.
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity OptionsAmazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
(Diapositivas de presentación son en inglés.)
En esta sesión, veremos los fundamentos de Amazon Virtual Private Cloud (VPC). Primero, cubriremos los principios de diseño y construcción de VPC, incluyendo la elección de los rangos de IP, subredes, routing, seguridad, NAT, y más. Luego explicaremos las diferentes maneras de conectar su VPC con su infraestructura física utilizando VPN o Direct Connect. El material está destinado a arquitectos, administradores de redes y ejecutivos en tecnología interesados en conocer los elementos básicos que componen el servicio VPC.
Creando una estrategia en el Cloud y acelerar los resultadosAmazon Web Services
(Diapositivas de presentación son en inglés.)
En esta sesión abordaremos en profundidad la adopción de AWS en el ámbito empresarial: creación paso a paso de una estrategia de transformación utilizando el Cloud Adoption Framework (CAF) de AWS. Construiremos una hoja de ruta prescriptiva para una transformación cloud usando las mejores prácticas, las técnicas y las herramientas utilizadas con éxito por numerosos clientes empresariales de AWS.
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
In this session from the London AWS Summit 2015 Tech Track Replay, AWS Solutions Architect Steve Seymour dives deep into the Amazon Virtual Private Cloud service, covering features as well as best practices.
Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the Amazon Web Services (AWS) Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including selection of your own IP address range, creation of subnets, and configuration of route tables and network gateways.
Advanced Approaches to Amazon VPC and Amazon Route 53 | AWS Public Sector Sum...Amazon Web Services
This session provides attendees with approaches to their VPC, including creating and protecting subnets, routing, performing VPC peering, and leveraging the latest features in Amazon VPC. Additionally, we'll discuss Amazon Route 53 for delivering traffic.
Similar to PLNOG 17 - Tomasz Stachlewski - Infrastruktura sieciowa w chmurze AWS (20)
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
2. What
to
Expect
from
the
Session?
Server
10.33.32.1
Server
10.120.2.3
Server
10.15.32.1
Server
10.43.2.1
Server
10.60.50.40
54.240.197.226
54.120.43.21
3. What
to
Expect
from
the
Session?
• Learn more about main core elements of the AWS global
infrastructure (Regions, AZs) – to be able to select proper location
where new systems could be deployed.
• Get familiar with basic of creating network topology in the Cloud
(creating subnets, routing tables, IP possibilities)
• Best practices of building HA systems in the Cloud
• Possibilities of connecting Cloud with On-Premise infrastructure
4. Today’s
discussion
on
AWS…
2
1
a.
b.
Global
Infrastructure
–
Where
to
host
my
Systems?
How
to
design
network
topology
in
the
Cloud?
c.
d.
Subnets,
IPs,
RouCng
Tables
etc.
High
Availability
Cloud
–
On-‐Premise
integraCon
Best
PracCces
6. • The geographical region
where Amazon EC2 will
launch the instances that
you create
• Choose a region to optimize
latency, minimize costs, or
address regulatory
requirement
• 12 regions around the world
Regions
7. Availability Zone - AZ
• Distinct locations that are engineered to
be insulated from failures in other
Availability Zones
• Provide inexpensive, low latency network
connectivity to other Availability Zones in
the same Region
• Regions contain between 2 & 5 EC2
availability zones
10. 10.0.0.0/16
Step: Choose IP range for the Cloud
• Consider future AWS region expansion
• Consider future connectivity to corporate networks
• Consider subnet design
• VPC can be /16 between and /28
• CIDR cannot be modified once created
• Overlapping IP spaces = future headache
12. Region: Frankfurt
VPC – Virtual Private Cloud
Availability Zone 1
Availability Zone 2
VPC (10.0.0.0/16)
VPC:
• Virtual
network
topology
that
you
define
• Your
own
logically
isolated
secCon
of
AWS
• Complete
control
of
your
networking
environment
(IP
ranges,
subnets,
rouCng
tables,
gateways
etc.)
• Advanced
Security
Features
13. Step: Create subnets
• A place where servers will be hosted
• A part of VPC
• IP range from VPC range
• Belongs to single AZ
• Design for HA!
Server
Server
Server
Server
14. Choosing IP address ranges for your subnets
Availability Zone 1
Availability Zone 2
VPC (10.0.0.0/16)
10.0.1.0/24
10.0.2.0/24
Region: Frankfurt
20. Internet Gateway
Availability Zone 1
Region: Frankfurt
WEB
Server
APP
Server
Internet
Gateway
(IGW)
is
a
horizontally
scaled,
redundant,
and
highly
available
VPC
component
that
allows
communicaCon
between
instances
in
your
VPC
and
the
Internet.
21. Traffic
desCned
for
my
VPC
stays
in
my
VPC
RouLng
Tables:
• Route
tables
contain
rules
for
which
packets
go
where
• Your
VPC
has
a
default
route
table
• …
but
you
can
assign
different
route
tables
to
different
subnets
Routing Table
22. Everything
that
isn't
desCned
for
the
VPC:
Send
to
the
Internet
through
“Internet
Gateway”
Routing Table
25. IPs
Availability Zone 1
Region: Frankfurt
WEB
Server
10.0.1.23
54.34.12.4
Private
IP
address
(manual
or
automaCc
assigned)
Public
IP
address
–
assigned
from
Amazon
IP
pool.
27. IPs
Availability Zone 1
Region: Frankfurt
WEB
Server
WEB
Server
10.0.1.23
87.43.12.32
Private
IP
address
is
sCll
this
same.
Public
IP
address
has
changed.
28. IPs
Availability Zone 1
Region: Frankfurt
WEB
Server
WEB
Server
10.0.1.23
ElasLc
IP
(EIP)
Assigned
to
specific
user.
Can
be
moved
between
different
servers.
154.32.23.6
54.34.132.3
87.43.12.32
43.32.43.1
55.45.34.12
43.143.23.5
User
ElasCc
IP
Pool:
29. IPs
Availability Zone 1
Region: Frankfurt
WEB
Server
WEB
Server
10.0.1.23
ElasLc
IP
(EIP)
Assigned
to
specific
user.
Can
be
moved
between
different
servers.
154.32.23.6
54.34.132.3
87.43.12.32
43.32.43.1
55.45.34.12
43.143.23.5
User
ElasCc
IP
Pool:
31. Network ACLs = stateless firewall rules
• Network
ACLs
are
opConal
virtual
firewalls
that
control
traffic
in
and
out
of
a
subnet
• Network
ACLs
allow
all
incoming/outgoing
traffic
by
default
and
use
stateless
rules
to
allow
or
deny
traffic
33. Security Groups = stateful firewall rules
• Security
Groups
are
required
virtual
firewalls
that
control
traffic
for
one
or
more
instances
• You
define
only
ALLOW
rules
35. Security Groups
WEB
Server
WEB
Server
WEB
Server
APP
Server
APP
Server
APP
Server
Allow
traffic
on
port
80
from
Internet
Allow
traffic
on
port
2543
from
“WEB”
subnet
39. See all of the traffic at your instances
• Visibility into effects of
Security Group rules
• Troubleshooting
network connectivity
• Ability to analyze traffic
46. • Both allow secure connections
between your network and your VPC
• VPN is a pair of IPSec tunnels over
the Internet
• Direct Connect is a dedicated line with
lower per-GB data transfer rates
• For highest availability: Use both
VPN vs. Direct Connect
47. Remote connectivity best practices
Corporate Data Center
Availability Zone
Availability Zone
Each
VPN
connecCon
consists
of
2
IPSec
tunnels.
Use
Border
Gateway
Protocol
(BGP)
for
failure
recovery.
48. Remote connectivity best practices
Corporate Data Center
Availability Zone
Availability Zone
BGP
A
pair
of
VPN
connecCons
(4
IPSec
tunnels
total)
protects
against
failure
of
your
customer
gateway
BGP
49. Remote connectivity best practices
Corporate
Data
Center
Availability Zone
Availability Zone
BGP
Redundant
AWS
Direct
Connect
connecCons
with
VPN
backup