TechNet Events Presents – for the IT Professional
In this session, we will discuss:
Azure architecture from the IT professional’s point of view
Why an IT operations team would want to pursue Azure as an extension to the data center
Configuration, deployment and scaling Azure-based applications
The Azure roles (web, web service and worker)
Azure storage options
Azure security and identity options
How Azure-based applications can be integrated with on-premises applications
How operations teams can manage and monitor Azure-based applications
Why Scale Matters and How the Cloud is Really Different (at scale)Amazon Web Services
Cloud computing gives you a number of advantages, such as being able to scale your application on demand. As a new business looking to use the cloud, you inevitably ask yourself, "Where do I start?" Join us in this session to understand best practices for scaling your resources from zero to millions of users. We will show you how to best combine different AWS services, make smarter decisions for architecting your application, and best practices for scaling your infrastructure in the cloud.
Presenter:
Santanu Dutt, Solution Architect, Amazon Internet Services
Vinayak Hegde, Vice President – Engineering, Helpshift
Sunny Saxena, Product Lead, Sprinklr
Amazon WorkSpaces is a secure, managed, virtual desktop service running on the AWS cloud. The service helps organizations support a modern mobile workforce, improve information security, and save money with a pay-as-you-go model. In this session, we'll cover how cloud desktops can benefit your organization, what's new with Amazon WorkSpaces, and some of the top technical considerations like user identity and access management, VPC design, network traffic flow, and application delivery. This session is for IT professionals and business decision makers interested in learning how to simplify desktop management and productivity for their organizations.
Why Scale Matters and How the Cloud is Really Different (at scale)Amazon Web Services
Cloud computing gives you a number of advantages, such as being able to scale your application on demand. As a new business looking to use the cloud, you inevitably ask yourself, "Where do I start?" Join us in this session to understand best practices for scaling your resources from zero to millions of users. We will show you how to best combine different AWS services, make smarter decisions for architecting your application, and best practices for scaling your infrastructure in the cloud.
Presenter:
Santanu Dutt, Solution Architect, Amazon Internet Services
Vinayak Hegde, Vice President – Engineering, Helpshift
Sunny Saxena, Product Lead, Sprinklr
Amazon WorkSpaces is a secure, managed, virtual desktop service running on the AWS cloud. The service helps organizations support a modern mobile workforce, improve information security, and save money with a pay-as-you-go model. In this session, we'll cover how cloud desktops can benefit your organization, what's new with Amazon WorkSpaces, and some of the top technical considerations like user identity and access management, VPC design, network traffic flow, and application delivery. This session is for IT professionals and business decision makers interested in learning how to simplify desktop management and productivity for their organizations.
Introduction to Microsoft Azure. Covers the change to a cloud development paradigm. Motivations for the change, Pricing structures, and an exercise in IT portfolio evaluation.
FaaS or not to FaaS. It's not a silver bullet. AWS User Group Cologne October...Vadym Kazulkin
Serverless isn’t a silver bullet. I’ll provide decision checklist to figure out whether serverless it the right approach for your application or not which consists of understanding of your:
- Application lifecycle
- Workloads
- Platform limitations
- Cost at scale
- Organizational knowledge
I will also discuss current challenges adopting serverless:
- Lack of High Latency Ephemeral Storage
- Poor Network performance
- Missing Security Improvements
FaaS or not to FaaS. Visible and invsible benefits of the Serverless paradigm...Vadym Kazulkin
When we talk about prices, we often only talk about Lambda costs. In our applications, however, we rarely use only Lambda. Usually we have other building blocks like API Gateway, data sources like SNS, SQS or Kinesis. We also store our data either in S3 or in serverless databases like DynamoDB or recently in Aurora Serverless. All of these AWS services have their own pricing models to look out for. In this talk, we will draw a complete picture of the total cost of ownership in serverless applications and present a decision-making list for determining if and whether to rely on serverless paradigm in your project. In doing so, we look at the cost aspects as well as other aspects such as understanding application lifecycle, software architecture, platform limitations, organizational knowledge and plattform and tooling maturity. We will also discuss current challenges adopting serverless such as lack of high latency ephemeral storage, unsufficient network performance and missing security features.
Since AWS launched Lambda in 2014, the term “serverless” has been used (and misused) to describe compute models, technologies, architectural patterns, operational constructs, and even rebranded cgi-bins. The term is now used so broadly that it’s turning into a buzzword with no discernible meaning.
In this talk, we’ll cut through all the marketing hype, and discuss why the underlying concept of “serverless”, and the superpowers that come with it, are much more important than the name itself.
Just about all of my current technical content in one 364 slide mega-deck. Source files at https://github.com/adrianco/slides
Sections on:
Scene Setting
State of the Cloud
What Changes?
Product Processes
Microservices
State of the Art
Segmentation
What’s Missing?
Monitoring
Challenges
Migration
Response Times
Serverless
Lock-In
Teraservices
Wrap-Up
Java is an open language. Every developer or organization can contribute to its open source components (libraries & frameworks) and even to the language specifications itself. This way, the community helps to improve the language continuously. While this gives developers a lot of freedom, it makes it hard to standardize. The software architecture of a Java application starts with its runtime (that is the combination of frameworks, specifications and application server). For years, monolitic JEE applications were hosted on heavy application servers. But is this platform the best option for fast, flexible and controlled delivery of business value embedded in cloud native-applications running on both IAAS-platforms and CAAS-containers? In this session Java-champion Bert Ertman will give his view.
FaaS or not to FaaS. Visible and invisible benefits of the Serverless paradig...Vadym Kazulkin
When we talk about prices, we often only talk about Lambda costs. In our applications, however, we rarely use only Lambda. Usually we have other building blocks like API Gateway, data sources like SNS, SQS or Kinesis. We also store our data either in S3 or in serverless databases like DynamoDB or recently in Aurora Serverless. All of these AWS services have their own pricing models to look out for. In this talk, we will draw a complete picture of the total cost of ownership in serverless applications and present a decision-making list for determining if and whether to rely on serverless paradigm in your project. In doing so, we look at the cost aspects as well as other aspects such as understanding application lifecycle, software architecture, platform limitations, organizational knowledge and plattform and tooling maturity. We will also discuss current challenges adopting serverless such as lack of high latency ephemeral storage, unsufficient network performance and missing security features.
Amazon Web Services: Building a 'Web-Scale Computing' Architecturegoodfriday
Building a reliable, flexible architecture that can manage the unpredictable nature of today's internet business is challenging. Jeff Barr, Evangelist for Amazon Web Services, will provide the blueprint for 'Web-Scale Computing' - enabling you to utilize Amazon Web Services to build an elastic architecture that can quickly respond to demand.
Matt Wood is the Technology Evangelist for Amazon Web Services. In his role Matt educates customers on the technical and business aspects of cloud computing, mentor start-ups and coaches developers throughout Europe. Matt will introduce the Cloud platform offered by Amazon, and discuss how organizations can make use of Amazon's massive scale and operational experience to achieve efficiency and business agility in the cloud, elastic, utility computing models and security at every level.
Cloud-powered Continuous Integration and Deployment architectures - Jinesh VariaAmazon Web Services
The presentation will discuss some architectural patterns in continuous integration, deployment and optimization and I will share some of the lessons learned from Amazon.com.
The goal of the presentation is to convince you that if you invest your time where you get the maximum learning from your customers, automate everything else in the cloud (CI + CD + CO), you get fast feedback and will be able to release early, release often and recover quickly from your mistakes. Dynamism of the cloud allows you to increase the speed of your iteration and reduce the cost of mistakes so you can continuously innovate while keeping your cost down.
FaaS or not to FaaS. Visible and invisible benefits of the Serverless paradig...Vadym Kazulkin
When we talk about prices, we often only talk about Lambda costs. In our applications, however, we rarely use only Lambda. Usually we have other building blocks like API Gateway, data sources like SNS, SQS or Kinesis. We also store our data either in S3 or in serverless databases like DynamoDB or recently in Aurora Serverless. All of these AWS services have their own pricing models to look out for. In this talk, we will draw a complete picture of the total cost of ownership in serverless applications and present a decision-making list for determining if and whether to rely on serverless paradigm in your project. In doing so, we look at the cost aspects as well as other aspects such as understanding application lifecycle, software architecture, platform limitations, organizational knowledge and plattform and tooling maturity. We will also discuss current challenges adopting serverless such as lack of high latency ephemeral storage, unsufficient network performance and missing security features.
Microsoft Azure And The Competitive Cloud Industry - SharePoint FestRichard Harbridge
Public Cloud platforms are important for the future. Many organizations have made big bets and are continuing to evaluate their options in the Public & Hybrid Cloud arena. Microsoft has become a major player in the Public Cloud space, but it has plenty of competitors: Amazon, Google, OpenStack, Salesforce/Force.com and more. How do these providers compare to Azure? And what’s likely to happen in the industry as we move into the future?
Join Richard Harbridge as he provides guidance and advice for how Azure measures up based on customer experience and industry insights.
Introduction to Microsoft Azure. Covers the change to a cloud development paradigm. Motivations for the change, Pricing structures, and an exercise in IT portfolio evaluation.
FaaS or not to FaaS. It's not a silver bullet. AWS User Group Cologne October...Vadym Kazulkin
Serverless isn’t a silver bullet. I’ll provide decision checklist to figure out whether serverless it the right approach for your application or not which consists of understanding of your:
- Application lifecycle
- Workloads
- Platform limitations
- Cost at scale
- Organizational knowledge
I will also discuss current challenges adopting serverless:
- Lack of High Latency Ephemeral Storage
- Poor Network performance
- Missing Security Improvements
FaaS or not to FaaS. Visible and invsible benefits of the Serverless paradigm...Vadym Kazulkin
When we talk about prices, we often only talk about Lambda costs. In our applications, however, we rarely use only Lambda. Usually we have other building blocks like API Gateway, data sources like SNS, SQS or Kinesis. We also store our data either in S3 or in serverless databases like DynamoDB or recently in Aurora Serverless. All of these AWS services have their own pricing models to look out for. In this talk, we will draw a complete picture of the total cost of ownership in serverless applications and present a decision-making list for determining if and whether to rely on serverless paradigm in your project. In doing so, we look at the cost aspects as well as other aspects such as understanding application lifecycle, software architecture, platform limitations, organizational knowledge and plattform and tooling maturity. We will also discuss current challenges adopting serverless such as lack of high latency ephemeral storage, unsufficient network performance and missing security features.
Since AWS launched Lambda in 2014, the term “serverless” has been used (and misused) to describe compute models, technologies, architectural patterns, operational constructs, and even rebranded cgi-bins. The term is now used so broadly that it’s turning into a buzzword with no discernible meaning.
In this talk, we’ll cut through all the marketing hype, and discuss why the underlying concept of “serverless”, and the superpowers that come with it, are much more important than the name itself.
Just about all of my current technical content in one 364 slide mega-deck. Source files at https://github.com/adrianco/slides
Sections on:
Scene Setting
State of the Cloud
What Changes?
Product Processes
Microservices
State of the Art
Segmentation
What’s Missing?
Monitoring
Challenges
Migration
Response Times
Serverless
Lock-In
Teraservices
Wrap-Up
Java is an open language. Every developer or organization can contribute to its open source components (libraries & frameworks) and even to the language specifications itself. This way, the community helps to improve the language continuously. While this gives developers a lot of freedom, it makes it hard to standardize. The software architecture of a Java application starts with its runtime (that is the combination of frameworks, specifications and application server). For years, monolitic JEE applications were hosted on heavy application servers. But is this platform the best option for fast, flexible and controlled delivery of business value embedded in cloud native-applications running on both IAAS-platforms and CAAS-containers? In this session Java-champion Bert Ertman will give his view.
FaaS or not to FaaS. Visible and invisible benefits of the Serverless paradig...Vadym Kazulkin
When we talk about prices, we often only talk about Lambda costs. In our applications, however, we rarely use only Lambda. Usually we have other building blocks like API Gateway, data sources like SNS, SQS or Kinesis. We also store our data either in S3 or in serverless databases like DynamoDB or recently in Aurora Serverless. All of these AWS services have their own pricing models to look out for. In this talk, we will draw a complete picture of the total cost of ownership in serverless applications and present a decision-making list for determining if and whether to rely on serverless paradigm in your project. In doing so, we look at the cost aspects as well as other aspects such as understanding application lifecycle, software architecture, platform limitations, organizational knowledge and plattform and tooling maturity. We will also discuss current challenges adopting serverless such as lack of high latency ephemeral storage, unsufficient network performance and missing security features.
Amazon Web Services: Building a 'Web-Scale Computing' Architecturegoodfriday
Building a reliable, flexible architecture that can manage the unpredictable nature of today's internet business is challenging. Jeff Barr, Evangelist for Amazon Web Services, will provide the blueprint for 'Web-Scale Computing' - enabling you to utilize Amazon Web Services to build an elastic architecture that can quickly respond to demand.
Matt Wood is the Technology Evangelist for Amazon Web Services. In his role Matt educates customers on the technical and business aspects of cloud computing, mentor start-ups and coaches developers throughout Europe. Matt will introduce the Cloud platform offered by Amazon, and discuss how organizations can make use of Amazon's massive scale and operational experience to achieve efficiency and business agility in the cloud, elastic, utility computing models and security at every level.
Cloud-powered Continuous Integration and Deployment architectures - Jinesh VariaAmazon Web Services
The presentation will discuss some architectural patterns in continuous integration, deployment and optimization and I will share some of the lessons learned from Amazon.com.
The goal of the presentation is to convince you that if you invest your time where you get the maximum learning from your customers, automate everything else in the cloud (CI + CD + CO), you get fast feedback and will be able to release early, release often and recover quickly from your mistakes. Dynamism of the cloud allows you to increase the speed of your iteration and reduce the cost of mistakes so you can continuously innovate while keeping your cost down.
FaaS or not to FaaS. Visible and invisible benefits of the Serverless paradig...Vadym Kazulkin
When we talk about prices, we often only talk about Lambda costs. In our applications, however, we rarely use only Lambda. Usually we have other building blocks like API Gateway, data sources like SNS, SQS or Kinesis. We also store our data either in S3 or in serverless databases like DynamoDB or recently in Aurora Serverless. All of these AWS services have their own pricing models to look out for. In this talk, we will draw a complete picture of the total cost of ownership in serverless applications and present a decision-making list for determining if and whether to rely on serverless paradigm in your project. In doing so, we look at the cost aspects as well as other aspects such as understanding application lifecycle, software architecture, platform limitations, organizational knowledge and plattform and tooling maturity. We will also discuss current challenges adopting serverless such as lack of high latency ephemeral storage, unsufficient network performance and missing security features.
Microsoft Azure And The Competitive Cloud Industry - SharePoint FestRichard Harbridge
Public Cloud platforms are important for the future. Many organizations have made big bets and are continuing to evaluate their options in the Public & Hybrid Cloud arena. Microsoft has become a major player in the Public Cloud space, but it has plenty of competitors: Amazon, Google, OpenStack, Salesforce/Force.com and more. How do these providers compare to Azure? And what’s likely to happen in the industry as we move into the future?
Join Richard Harbridge as he provides guidance and advice for how Azure measures up based on customer experience and industry insights.
Matt Chung (Independent) - Serverless application with AWS Lambda Outlyer
The talk will focus on how we are utilizing AWS Lambda for certain applications and the advantages/disadvantages, and the challenges we discovered along the way. It would help those who are looking to reduce technical debt with the infrastructure and costs.
Previously a Director of technical operations at fox networks (21st Century Fox/News Corporation) responsible for infrastructure and building deployment pipelines. Currently a Python programmer / DevOps engineer with roots in systems/networks administration. Focus is on infrastructure and application automation. Worked as an engineer for Cisco Systems with emphasis on video conferencing. Built microwave networks at Bel Air Internet. Find me on github and twitter @itsmemattchung
Video: https://www.youtube.com/watch?v=BLcElBUhfrQ
Join DevOps Exchange London here: http://www.meetup.com/DevOps-Exchange-London
Follow DOXLON on twitter http://www.twitter.com/doxlon
Identity and Access Management from Microsoft and Razor TechnologyDavid J Rosenthal
63% of confirmed data breaches involve weak, default, or stolen passwords (Verizon 2016 Data Breach Report)
More than 80% of employees admit using non-approved SaaS apps for work purposes (Stratecast, December 2013)
0.6% global IT spend increase. http://www.gartner.com/newsroom/id/3186517
IT cannot afford to live in the past. Successful businesses of today (and tomorrow) realize the power of mobility to support employee productivity and collaboration. You need to prepare to mitigate the risks of providing freedom and space to your employees. You need to meet compliance and regulatory standards, maintain company security policies and requirements, and detect threats — all the while giving workers a better and more productive experience, so that they’re motivated to follow protocol. You need an enterprise mobility partner that can help you achieve all of this, so that everyone is a winner, and your business stays out of the headlines.
Microsoft’s vision includes management and protection across four key layers: users, device, app, and data – for both your employees, business partners, and customers.
Our strategy is to ensure management across these layers while ensuring your employees, business partners, and customers by providing access to everything they need from everything; protecting corporate data across email and collaboration apps all while integrating these new capabilities with what customers already have like Active Directory and System Center.
Amazon Web Service and Microsoft Azure are dominating the enterprise public cloud market, but how are they different? Here’s what you need to know.
There are plenty of differences between AWS and Azure, probably too many to mention in a single webinar. AWS and Azure take generally different approaches and offer some unique services. From our experience with enterprise customers, we found that the commoditized services are often the most important ones. Everybody has a solution for security, access and storage, but how are those solutions different? Will mastering one Cloud platform give me the knowledge I need to operate the other?
Join us in our upcoming webinar, all about the differences in some of the public cloud’s most basic (and vital) services. Watch this webinar to learn about:
The major players in today’s enterprise public cloud market
5 important differences between Azure and AWS
How a single pane of glass can compensate for these differences
www.scalr.com
http://www.scalr.com/lp/webinars/register/aws-vs-azure-5-differences-you-need-to-know-when-chosing-a-public-cloud-vendor
This webinar focuses on how to use graph databases for Identity & Access Management. This webinar is designed for people who work with entitlements, access management, and tracking origins and associations of assets.
Managing and monitoring multiple user authorizations and asset provenance across your enterprise organization is a challenging task. We’ll explore how an interconnected view of your data, gives you better real-time insights and controls than ever before. Neo4j connects your data along intuitive relationships so identity and access management happens quickly and effectively.
In this webinar we’ll start with an overview of Neo4j and Graph-thinking, and continue with exploring some of the use cases showing how Neo4j’s versatile property graph model makes it easier for organizations to evolve identity and access management models.
Identity and Access Management (IAM) is a crucial part of living in a connected world. It involves managing multiple identities of an individual or entity, distributed across disparate portals. In an enterprise, IAM solutions serve as a mean to secure access, control user activities and manage authentication for an App or a group of software (infrastructure).
This detailed PowerPoint brings you the most fundamental concepts and ideas related to identity and access management. Plus, we have debunked some popular IAM myths, so do checkout!
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
Whether you’re working exclusively on Azure or with multiple cloud environments, there are certain things you should consider when moving assets to the public cloud. As with any cloud deployment, security is a top priority, and moving your workloads to the Azure cloud doesn’t mean you’re not responsible for the security of your operating system, applications, and data.
Building on the security of the Azure infrastructure, this shared security responsibility starts with making sure your environment is secure. In this session, we will discuss step-by-step what you need to do to secure access at the administrative, application and network layers.
MSDN Events Presents – for the Developer & Architect from
In this session, we will discuss:
Cloud computing architectures in general and the Azure architecture in particular
Several aspects of Azure from the developer’s and architect’s perspective
Azure roles (web, web service and worker)
Azure storage options
Azure security and identity options
How Azure-based applications can be integrated with on-premise applications
Configuration, deployment and scaling Azure-based applications
How development teams can optimize their applications for better management and monitoring
Is Multi-Cloud good or bad? How about Serverless? The answer to all these questions is Yes, sometimes. Whether you're new to all this or a long-time industry veteran, you'll surely come away from this approachable talk with a new understanding of cutting edge technology and actionable insights on how to make smart trade offs.
Vancouver Cloud Summit 2024 (2024-04-22)
Even though Cloud Computing is not a new term, many educators remain confused about exactly what it is and how to apply it. This presentation will eliminate the confusion.
It focuses on the approaches of three companies to Cloud Computing: Microsoft, Amazon and Google
To learn more check out our Azure training course at
http://www.karrox.com/cloud_computing.html
ArcReady - Architecting Modern Distributed ApplicationsMicrosoft ArcReady
Nearly every application we build today has dependencies to other systems. How do we design them to work together to meet our goals? How do we decide what to build and what to buy? Do we host it ourselves or in the cloud? With a bewildering array of choices, the biggest challenge we face today is how to architect robust applications with the right technologies to meet our user’s needs and integrate nicely into our existing IT ecosystems.
Join our Central Region Architect Evangelists for a great discussion on architecting distributed applications using all the latest technologies and best practices.
Session 1: Blueprints for Success. In this session, we will survey the modern architecture landscape from the ground up, including infrastructure, application, and client solution choices. We’ll discuss how current industry trends are shaping our architectures and present an innovative architecture mapping technique for analyzing our customer’s needs and aligning them to today’s technologies and solution patterns.
Session 2: Making It Real. In this session, we’ll take a look at several case studies to learn how to apply the mapping technique from Session 1 to architect real world solutions that add true business value. We’ll examine applications we use every day and take a walk through a Microsoft reference architecture that explores many of the decisions we face when building modern distributed applications.
Impact Of The Cloud For It Managers (Isb204 Guest) - Presentation from TechEd 2009 that covers the impact of moving to cloud computing for IT Managers.
Introduction To Cloud Computing Winsows Azure101Mithun T. Dhar
The Windows Azure platform is a set of high-performance cloud computing services that can be used together or independently and enable developers to leverage existing skills and familiar tools to develop cloud applications. In this session, we’ll provide a developer-focused overview of this new online service computing platform. We’ll explore the components, key features and real day-to-day benefits of Windows Azure.
Highlights include:
· What is cloud computing?
· Running web and web service applications in the cloud
· Using the Windows Azure and local developer cloud fabric
· Getting started – tools, SDKs and accounts
· Writing applications for Windows Azure
There's never been a better time to create amazing technology solutions. In this hands on workshop, you will learn the fundamental skills and techniques necessary to transform a digital dream into a viable solution that your customers and users will love.
MICROSOFT BLAZOR - NEXT GENERATION WEB UI OR SILVERLIGHT ALL OVER AGAIN?Clint Edmonson
In this talk we'll take a look at Microsoft’s latest foray into web UI frameworks. We’ll look at how Blazor works, the unique features it brings to bear, what the code looks like and wrap up with a discussion of the pros, cons, and whether or not it can live up to its promises.
The world around us filled a myriad of high performing, large throughput systems that we can borrow ideas from to help our IT teams and organizations perform and higher levels. Join us for a thought experiment where we examine several examples from our everyday world that can help us achieve unprecedented levels of flow and scale within our organizations.
This presentation distills the best industry guidance into a hands-on approach to designing application architectures. Along the way, we'll examine the key decisions that must be made when choosing our architectural styles and designing our layers and show how those decisions turn into real shippable code on a project.
Code smells and Other Malodorous Software OdorsClint Edmonson
A code smell, also known as bad smell in computer programming code, refers to any symptom in the source code of a program that possibly indicates a deeper problem. Join us in this lively session where we will get a whiff of some aromas encountered in the field and how we can neutralize them.
This summer the Agile Alliance gathered together the world’s greatest Agile thinkers and practioners to further the advancement of Lean and Agile principles. Agile Developers and Teams, Executives and Managers, Coaches and Consultants came to Atlanta, Georgia to collaborate and learn from experts and thought leaders sharing their passion.
Please join us as we present our key takeaways and insights from this gathering of Agile tribes.
Key Topics:
The continuing evolution of Agile
Agile culture change
Scaling Agile in the enterprise
Advances in Agile architecture and DevOps
Lean & Agile DevOps with VSTS and TFS 2015Clint Edmonson
Take a guided tour of the latest features in Visual Studio Team Services & Team Foundation Server 2015 to help your team adopt Agile and DevOps practices. We will show you how the products and services will shape your process and enable your teams to build amazing applications on any platform.
Key Experiences:
Agile work item flow
Builds and continuous integration
Infrastructure as code
Self-hosted package management
Release management
And much more…
This presentation distills the best industry guidance into a hands-on approach to designing application architectures. Along the way, we'll examine the key decisions that must be made when choosing our architectural styles and designing our layers and show how those decisions turn into real shippable code on a project.
When it comes to development methods, lean and agile have clearly taken the lead. In the spirit of Kaizen, this session will take a look at the measures we can glean from agile teams, why the are relevant and interesting, and how we can use them to help our teams get even better.
Ever heard of the Law of Demeter? How about the Liskov Substitution Principle? This talk introduces key object-oriented laws and principles currently used in our field and provides guidance for their use when building applications on the .NET platform.
This presentation distills the best industry guidance into a hands-on approach to designing application architectures. Along the way, we'll examine the key decisions that must be made when choosing our architectural styles and designing our layers and show how those decisions turn into real shippable code on a project.
With the release of Windows 8, Microsoft has delivered a rich client application platform that is both powerful and approachable. Apps on this platform install easily and uninstall cleanly. They run in a single window that fills the entire screen by default. They automatically work with a variety of input sources, including touch, pen, mouse, and keyboard. Instead of static icons, they use live tiles that can display notifications. Best of all, these apps can be written using HTML5, CSS, and JavaScript.
Windows Azure enables you to quickly build, deploy and manage applications across a global network of Microsoft-managed datacenters. With this past summer’s new feature release, you can build applications using any operating system, language or tooling. In this session, we’ll bring you up to speed on all the amazing services available to developers in Windows Azure including web sites, cloud services, and virtual machines.
Introduction to Windows Azure Virtual MachinesClint Edmonson
With Windows Azure’s Infrastructure as a Service (IaaS) offerings you can easily run customized Windows Server or Linux images in the cloud. You retain full control of your images and maintain them as your business requires. In this session, you’ll get an overview of the offerings and see first-hand how to build, configure, and run your own VMs on Windows Azure.
Peering through the Clouds - Cloud Architectures You Need to MasterClint Edmonson
Heard of elastic computing? Cloud-bursting? Off-line rendering? Join us in this session where we walk through the key cloud scenarios every developer should be familiar with and when and where each should be used. We’ll discuss how the architecture of each of these scenarios is realized using the Windows Azure cloud platform
Architecting Scalable Applications in the CloudClint Edmonson
There is an increasing importance to architect applications for both growth and optimal user experience. Modern development tools allow you to develop fantastic applications, but there are pitfalls with architecting the applications in the wrong way. This talk will discuss industry proven best practices for building highly scalable web sites and applications and how they might be implemented on Windows Azure.
Windows Azure enables you to quickly build, deploy and manage applications across a global network of Microsoft-managed datacenters. You can build applications using any operating system, language or tool. This session provides you with a roadmap to all the amazing services available to developers including web sites, virtual machines, big data, and more. You will learn how to start building great cloud apps right away!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
24. “Packaged” Application An application that I buy “off the shelf” and run myself Heads in the Cloud, Feet on the Ground Hosted “Packaged” An application that I buy “off the shelf” and then run at a hoster “Packaged” using cloud An application that I buy “off the shelf”, that is hosted using cloud platform “Software as a Service” A hosted application that I buy from a vendor Buy Build vs. Buy “Home Built” Application An application that I develop and run myself Hosted “Home Built” An application that I develop myself, but run at a hoster “Home Built” using cloud An application that I develop myself, that is hosted using cloud platform “Platform as a Service” A vendor hosted development and runtime environment Build Hoster Vendor On Premise Cloud
25. “Packaged” Application Big Pharmaceutical Example Hosted “Packaged” “Packaged” using cloud “Software as a Service” Buy ERP “Too costly to run this myself, but I’ve made too many customizations” CRM Email Build vs. Buy “Home Built” Application Hosted “Home Built” “Home Built” using cloud “Platform as a Service” HR System Molecule Research Build Clinical Trial Hoster Vendor On Premise Cloud
26. “Packaged” Application Big Pharmaceutical Example Hosted “Packaged” “Packaged” using cloud “Software as a Service” Buy ERP CRM “CRM and Email are commodity services – They have no customizations, and it’s cheaper for someone else to run these” Email Build vs. Buy “Home Built” Application Hosted “Home Built” “Home Built” using cloud “Platform as a Service” HR System Molecule Research Build Clinical Trial Hoster Vendor On Premise Cloud
27. Big Pharmaceutical Example “Packaged” Application Hosted “Packaged” “Packaged” using cloud “Software as a Service” Buy ERP CRM Email Build vs. Buy “Home Built” Application Hosted “Home Built” “Home Built” using cloud “Platform as a Service” “I can’t afford to maintain this old HR application written in VB – it’s driving me mad!” HR System “…but due to regulatory issues, I cannot store my HR data off-premise” Molecule Research Build Clinical Trial Hoster Vendor On Premise Cloud
28. “Packaged” Application Big Pharmaceutical Example Hosted “Packaged” “Packaged” using cloud “Software as a Service” Buy ERP CRM Email HR System Build vs. Buy “Home Built” Application Hosted “Home Built” “Home Built” using cloud “Platform as a Service” “I wish I had access to cheaper compute and storage when I need it” Molecule Research Build Clinical Trial Hoster Vendor On Premise Cloud
29. “Packaged” Application Big Pharmaceutical Example Hosted “Packaged” “Packaged” using cloud “Software as a Service” Buy ERP CRM Email HR System Build vs. Buy “Home Built” Application Hosted “Home Built” “Home Built” using cloud “Platform as a Service” Molecule Research Build “THIS is where I want to spend my IT resources – I’m going to double down on this application!” Clinical Trial Hoster Vendor On Premise Cloud
32. “Packaged” Application Hosted “Packaged” “Packaged” using cloud “Software as a Service” Buy ERP CRM Email HR System Build vs. Buy “Home Built” Application Hosted “Home Built” “Home Built” using cloud “Platform as a Service” Molecule Research Build Clinical Trial Hoster Vendor On Premise Cloud Identity and AuthN
37. Warning – this session contains information about Microsoft Technologies that are in the CTP (pre-Beta) stages. Specifics of the technology may change before final release.
40. We are here to help. Send us your questions, doubts, concerns, challenges, adoration, regrets, denials, and alibis. We will start a discussion and help you out. azFeedbk@microsoft.com
41. RTC makes it easy to ship updates and new features.
42. Windows Azure Platform Roadmap ? Additional Geos Enhanced compliance Commercial launch Geo location Future CY 2010 Q4 2009 Inter-Role Communication Variable VM Sizes Enhanced compliance
44. Windows Azure Platform Compute:Virtualized compute environment based on Windows Server Storage: Durable, scalable, & available storage Management: Automated, model-driven management of the service Database:Relational processing for structured/unstructured data Service Bus: General purpose application bus Access Control: Rules-driven, claims-based access control
50. What does an Operating System do? App1 App2 App3 App4 Management / Security / etc. Task Scheduler Hardware Abstraction Layer DISK CPU GPU Memory
51. Azure does this for the cloud App1 App2 App3 App4 APIs / .NET ACS / etc. Azure Fabric Controller Azure Fabric Server 1 Server 2 Server 3 Server 3,500
67. Using the Cloud for Scale How would Jim do this today on premises? Browser Web Tier N L B Browser Database Web Tier Backend Tier Browser Browser Web Tier Browser
68. Using the Cloud for Scale How would Jim do this today on premises? Browser Backend Tier N L B Browser Database Web Tier Browser Backend Tier Browser Backend Tier Browser
69. Using the Cloud for Scale How would Jim do this today on premises? Browser Web Tier N L B Backend Tier N L B Browser Database Web Tier Browser Backend Tier Browser Web Tier Backend Tier Browser
70. Using the Cloud for Scale How would Jim do this today on premises? Browser p1 p2 p3 Web Tier N L B Backend Tier N L B Browser Database Web Tier Browser Backend Tier Browser Web Tier Backend Tier Browser
72. Using the Cloud for Scale How would Jim do this today on premises? Browser p1 p2 p3 Web Tier N L B Backend Tier N L B Browser Database Web Tier Browser Backend Tier Browser Web Tier Backend Tier Browser “That took a lot of work - and money!”
73. Using the Cloud for Scale How would Jim do this today on premises? p1 p2 p3 “Not so great now…” Web Tier N L B Backend Tier N L B Database Web Tier Browser Backend Tier Web Tier Backend Tier “That took a lot of work - and money!” “Hmmm... Most of this stuff is sitting idle...”
74. Using the Cloud for Scale Lost Business Datacenter peak load Idle time Usage Jan Apr Jul Oct
76. #1 - Using the Cloud for Scale “Wow! What a great site!” Azure Storage Request Web Role Worker Role Browser Response
77. Using the Cloud for Scale Browser Browser Azure Storage Web Role Worker Role Browser “Server Busy” Browser Browser
78.
79. Using the Cloud for Scale Browser Web Role N L B Browser AzureStorage Web Role Worker Role Browser Browser Web Role Browser You don’t see this bit
80. Using the Cloud for Scale Browser Web Role N L B Worker Role N L B Browser AzureStorage Web Role Browser Worker Role Browser Web Role Worker Role Browser
81. Using the Cloud for Scale Browser p1 p2 p3 Web Role N L B Worker Role N L B Browser AzureStorage Web Role Browser Worker Role Browser Web Role Worker Role Browser
90. Project Austin delivers a next-generation, micro-community based opportunity management and collaboration experience that brings a managed feel to the unmanaged space, allowing Microsoft to observe and participate in the sales process at scale through dynamic, customer-driven collaboration. Project Austin leverages Windows Azure, CRM Services, and SharePoint Services to provide a rich set of customer and partner capabilities in the cloud while integrating with existing on-premise solutions. Project Austin significantly enhances our understanding of our customers and partners by facilitating relationships with and between customers, partners, and Microsoft, while providing data that allows Microsoft to identify and promote world-class selling techniques and content. Project Austin Vision
91. Project Goals Gain first-hand experience on Azure Cloud Storage – Security – Integration – Web – SQL Azure Explore a business scenario that leverages the promises of the cloud Provide enterprise feedback to the Azure team Deliver a working prototype in FY09 Project Austin Overview
92. Web Role Multi-Tenant; Web App; Web Service Integration Worker Role; .NET Service Bus; Siebel Data Storage Tables; Blobs; Queues; SQL Azure Live ID Integration Web Auth; Access Control Service; WIF; RPS Technical Overview
93. Community Community Micro Community Factory Community Community Community Groups Community Group A Community Group B Personalization Membership Content Personalization Membership Content High Level Services Personalization Customization Content Security Integration … Navigation Search Membership Identity Groups … Foundation Services Identity Security Storage Eventing Config Content … Micro Community Compute 93
98. Developers build it Test locally Build package w/ Tools Upload your package to the web portal Push “deploy” Monitor, upgrade, scale… Deploying Your Service To The Cloud
106. Have a backup plan Know how to reload the data Practice your deployments Practice your deployments again Know how to rollback as needed Lessons LearnedOperations - Deployment
107. Store startup config data in the Azure config files Retire use of web.config Use Azure tables to store shared config across instances Log to Azure tables In addition to Azure logs Must be asynch Don’t forget to close connections Lessons LearnedOperations
116. Windows Azure Storage Service HTTP Blobs Queues Tables Application Storage Compute Fabric …
117. Blobs stored in Containers 1 or more Containers per account …/Container/blobpath Blobs Capacity 50GB in CTP Metadata, accessed independently name/value pairs (8kb total) Private or Public container access Use Blobs for file system Blobs
118. Windows Azure Storage Service . . . Table Table Table Entity . . . Entity Entity Property Property Property Storage Accounts Name Type Value
119. Entities and properties (rows & columns) Tables scoped by account Designed for billions+ Scale-out using partitions Partition key & row key Operations performed on partitions Efficient queries No limit on number of partitions Automatic load management for hot data Use ADO.NET Data Services Tables
120. No join No group by No order by Think: relational DB partitioned to the max Not a Relational Database
121. Key Example – Blog Posts Partition 1 Partition 2 Getting all of dunnry’s blog posts is fast Single partition Getting all posts after 2008-03-27 is slower Traverse all partitions
122. Partition Key – how data is partitioned Row Key – unique in partition, defines sort Goals Keep partitions small (increased scalability) Specify partition key in common queries Query/sort on row key Keys
123. Azure Queues RemoveMessage GetMessage (Timeout) Worker Role PutMessage Queue Msg 1 Msg 2 Msg 2 Msg 1 Web Role Worker Role Worker Role Msg 3 Msg 4 Msg 2
124. Simple asynchronous dispatch queue Create and delete queues Message: Retrieved at least once Max size 8kb Queues
145. What is a Claim? Web Application/Service Username: Brian Roles: Evangelist, Speaker Email: Brian.Prince@microsoft.com IsOfLegalVotingAge: True
146. The app is no longer concerned with Authentication Storing and securing usernames and passwords Connecting to directories Managing roles/rights/claims
148. Basic Scenario – Active Client Directory/ Credential Store Trusted Authority (Web Service) STS Business Rules 2. Get Claims (WS-Trust) Relying Party (Web Service) 1. Get Policy Smart Client 3. Send Claims
149. Basic Scenario – Passive Client Directory/ Credential Store Trusted Authority (Web App) STS Business Rules 2. Redirect (WS-Federation) Relying Party (Web App) 1. HTTP GET Browser 3. HTTP POST
150. Federated Scenario (.NET?) (Java?) Internet Trusted Authority (Web Service) Trusted Authority (Web Service) STS Business Rules STS Business Rules 1 Relying Party (Web Service) 2 Smart Client 3
151. Delegation and ActAs Directory/ Credential Store Trusted Authority STS Business Rules 3. Get Claims for svcInv ActAs Dieter 1. Get Claims for Dieter Dieter’s Browser Back End Web Service 4. svcInv ActAs Dieter Web Front End 2. Dieter ID: Dieter ID: Dieter ID: svcInv
155. Purchasing Models Consumption Volume Licensing Subscription “Pay as you go and grow” “Coordinated purchasing” “Value for a commitment“ Available at launch Available post launch Select offers at launch Plans for payment predictability Discounts for commitment Low barrier to entry and flexibility Optimized for cloud elasticity Unified purchasing through EA Introduction to volume discounts
156. Pricing Model Compute Per service hour $0.12 / Hour Storage $0.15 GB / Month $0.01/10K Transactions Business Edition 10 GB Database $99.99 / Month Web Edition 1 GB Database $9.99 / Month Messages Per message operation $0.15 / 100K Bandwidth $0.10/GB inbound & $0.15/GB outbound
157. Service Guarantee Storage availability Compute connectivity Role instance monitoring and restart Guarantee Your service is connected and reachable via web Internet facing roles will have external connectivity All running roles will be continuously monitored If role is unhealthy, we will detect and initiate corrective state Storage service will be available / reachable Your storage requests will be processed successfully Technologypromise Automated Systems Management <99.95% <99.9% SLA
RTC (release to cloud) makes it easy to release new features, and upgrades. This would include better management tools, logging/tracking, etc.
How many servers does your company have?What is the IT Pro to Server ratio?Usually an average of 1:10 or 1:30.The Global Datacenter Team for Azure is 1:30,000The Azure Fabric makes this possible.
Here’s the datacenter in the cloudA collection of commodity hardwareA collection of storage servers; triple replicationLoad BalancersFabric Controller: the “Brains” behind it all. Web Portal: where to deploy and manage applicationsService – any app you want to run is the service.It’s about running your service in the Microsoft datacenter. Windows Azure is not a SKU that you would install onsite.
= Service Deployment (So easy, even a CEO can do it) =Service, the application you want to runModel, service configuration; tells what the service looks like, how many you want to run, etc.Today, you must deploy your service through the portal. In the future, there will be an API available that will you to deploy your service through command-line, TFS build procedures, and other types of automation In this scenario, we are deploying our service through the portal. We upload the two files (the service package and model configuration). The Fabric Controller reads the model configuration which describes how to deploy our service. In this case, we are deploying our service to 3 machines. The Fabric Controller determines which 3 machines to deploy to, copies the service package to the 3 machines, and fires up the services. [Transition] The Fabric Controller then configures the DNS so you have an endpoint exposed for your services for the outside world to communicate with your services. From there, it configures the load balancers and routers. That’s it. It’s completed automated.
Managed partner pipeline review -opps in Seibel, partner, PAM; get together and collaborate on opps - more social collaboration, ability to comment, ability to bring people inDidn’t do much in SQL Azure as it wasn’t available at the timeAccomplished goals in 5 mos.
Web role - support for multi-tennancy (host multiple customers or segments on set of infrastructure) - web service for updating the opportunity information.NET Service Bus was used to integrate on the backend with SeibelMoved worker role inside firewall as it made more sense (on premise)Heavy use of Tables and BlobsMost Queue work is done with the .NET Service Bus under-the-covers; not a whole lot of work writing directly to QueuesDuring development, SDS did a reset and became SQL Azure; use Azure storage until SQL Azure becomes available (one of the best decisions they made)
Community wants to control Personalization, Content, Membership
TODO: Convert to Whiteboard template
TODO: Convert to Whiteboard template
http://austin.cloudapp.net/default.aspxLogin with alias. No password.Go to the roadshow page. Click through the headers. Show discussion threads.
Simply put, you basically do what you do today, as a general process goes. The biggest difference is you are pushing a package, instead of individual bits, with some bizzarre, poorly documented steps on how to deploy written at the last minute.
Native Code/FastCGI – Another reason to use Azure. If you aren’t used to managing different infrastructure, the you can host it on azure to not have to deal with the diversity.
Demo: Ask for logs. Show logs in storage that were already moved.This story will get better, especially with the management APIs as they come online.
Azure storage is interestingThe compute service is pretty standard - .net, by and largeThis is interesting in that it’s not quite as familiarAccessed by HTTP – restfulThree partsblob storage, for big chuncks of dataTables, which are not tablesQueues, which are what they sound like - queues
BlobsBlobs are stored in containers. There are 0 or more blobs per container and 0 or more containers per account. (since you can have 0 containers, but then you would not have any blobs either)Typically url in the cloud is http://accountname.blob.core.windows.net/container/blobpathBlob paths can contain the / character, so you can give the illusion of multiple folders, but there is only 1 level of containers.Blob capacity at CTP is 50gb.There is an 8k dictionary that can be associated with blobs for metadata.Blobs can be private or public:Private requires a key to read and writePublic requires a key to write, but NO KEY to read.Use blobs where you would use the file system in the past.
It’s easier to describe what azure tables don’t do than it is to describe what they do do.Most everyone, when they hear tables, think of SQL Server or relational database tables and the functionality you get from these tables – but that’s not what we haveIn windows azure, you have storage accountsStorage accounts need to be signed by keys for access – greatIn your account you can have some number of tablesSome number of entitiesSome number of propertiesThen a name, type, and valueSo, I ask you, are these tables? Do you see rows, tables, columns? No, they’re not tablesHere’s the truth – windows azure tables have some issues
Tables are simply collections of Entities.Entites must have a PartitionKey and RowKey – can also contain up to 256 other properties.Entities within a table need not be the same shape! E.g.:Entity 1: PartitionKey, RowKey, firstnameEntity 2: PartitionKey, RowKey, firstname, lastnameEntity 3: PartitionKey, Rowkey, orderId, orderData, zipCodePartitions are used to spread data across multiple servers. This happens automatically based on the partition key you provide. Table “heat” is also monitored and data may be moved to different storage endpoints based upon usage.Queries should be targeted at a partition, since there are no indexes to speed up performance. Indexes may be added at a later date.Its important to convey that whilst you could copy tables in from a local data source (e.g. sql) it would not perform well in the cloud, data access needs to be re-thought at this level. Those wanting a more traditional SQL like experience should investigate SDS.
07:17It’s an “Entity Store”, you can store entities, can retrieve entities, do simple querying on these entitiesPartitioned SQL Server: - A-M on this server - N-Z on this serverTop 5 customers that ordered the most, you have to poll 26 servers and aggregate the dataThat’s sort of what we have with Azure Table storage. We went with a highly partitioned approach upfront to gain scale and gain availability. We’ve had to sacrifice some of the complex queries such as joins to support this. It’s just a different way of having to deal with your data.
11:53Getting the all of dunnry’s post it fast because we’re selecting the entities by a partition keyGetting all of the posts after a certain is slow because we may have to traverse across multiple servers because we’re selecting entities that span partition keysA query without the partition key is really a scan
14:58Keep partitions small, this increases scalability; this allows us to replicate data when its hot and spread data across multiple servers
Use queues as a way of communicating w/ the backend worker rolesWRs call getmessage and pass timeoutTimeout value is importantExpiration time is important; message is marked in the queue as invisible; for duration of timeout it’s invisibleWhen we’re done processing, we call a message to remove the message through a deleteTh reason we do this is imagine we have a second worker role; if something goes wrong, once the timeout expires, the message becomes visible, and the next person to do a get message will get the message
Queues are simple:Messages are placed in queues. Max size is 8k (and it’s a string)Message can be read from the queue, at which point it is hidden.Once whatever read the message from the queue is finished processing the message, it should then remove the message from the queue. If not the message is returned to the queue after a specific user defined time limit. This can be used to handle code failures etc.
So, I have a simple service that I call the thumbnail generatorThis is a picture of the conceptual architecture of the serviceThere are number of things called web roles, which is asp.net code sitting behind a load balancerAnd they are taking requests where they’re taking in pictures.They are putting these pictures as blobs into this cloud storage system.We then have a set of worker roles that are running asynchronously and just sitting there, and watching these queues that are in the cloud, and they are picking images off the requests in the queues and generating thumbnails based on some code written in the worker role.Finally, the images will get displayed again on the website.The white box you see is meant to designate the service itself, and all of this is actually running on my desktop in this simulation environment.Key points that I want to make with this picture:This architecture represents best practices for how you build cloud services at scale – you don’t build up, you build out; you have a bunch of stateless compute nodes and any of these nodes can fail at any time – it doesn’t matter, your service is still going to run because there’s no data that’s only stored in one placeSecond is that it’s useful to build loosely coupled architectures – this is an example right here; the front end and back end are talking to each other through the queue – very scalable.This is an open platform. You can access it from anywhere, you can reach out to anywhere else, and you can imagine many different scenarios in which you have some code running in our data centers, and somewhere else.So, let’s switch over there.
Duh!
Any silo inhibits agility, slowing down IT’s ability to support the business to respond to the market
This inhibits reuse, and the ability to easily migrate to new environments
Don’t be plumber. If you are focusing on this, you aren’t focusing on what your company does in the market. Focus on code that only you can write.
Many deployments of security endpoints, leads to a greater attack surface, and the multiplication of common flaws across all of your systems.
It is rare that any sizable company has 1 directory. It is usually many, either through acquisition, or on purpose (hub and spoke model in LDAP is common, see me for a walkthrough of that). Many don’t have a directory per se, so some have 0. Very small companies might no do this.That, and code to hid AD (or and LDAP) is not an easy skill, doesn’t work like it should (from a dev perspective), and is easiest outsourced somehow (to a component, form /n software, etc.)
Many regulations and IT policies are moving towards more secure authN mechanisms. SmartCards, Certificates, etc.
Of course the proliferation of accounts for users leads to a diminished security profile. Stickys stuck to monitors, identical, simple passwords everywhere….
What about when you have an extranet that a customer needs access to. Usually you:0- pollute your AD with their info, thereby increasing AD management costs1- create a second AD (which leads to n AD’s, 1 for each customer)2- island of data in your app. Leads to costs in provisioning and managing the accounts. What if an employee of your customer leaves, and still has access to your extranet?What if your customers could still use their own credentials from their own company, so they aren’t your problem?<<<< Visit the Bike Store story here >>>>
If you move an app into the cloud, you are forced into a separate AuthN/Z infrastructure in this model. What if your internal users could use their everyday creds to login to the app you just launched into the cloud?Most company applications might use creds in a local directory, but you can’t do this if the app is running in the cloud, so you must have separate credentials. This is the primary use of federation for everyday companies.
Three geeks walk into a bar in California. The bouncer asks for ID. You whip our your drivers license from the state of Ohio. They inspect it, flash a purple light thing at it, verify your age, and let you in. They didn’t force you to register with them to get a bar credential. You would end up with a ton of credentials you were forced to use (like those grocery store customer loyalty cards). The bar trusts the credentials from a trusted provider (and has ways to validate those credentials are valid (the light, and known emebedded security features)).
A Claim is a property of a user
Turns out, companies need this ability even when they are not in a federation scenario. This helps when moving apps to the cloud, allowing customers/partners into your app, or with many directories through mergers.
shows a claims-aware web service (the relying party) and a smart client that wants to use that service. The relying party exposes policy that describes its addresses, bindings, and contracts. But the policy also includes a list of claims that the relying party needs, for example user name, email address, and role memberships. The policy also tells the smart client the address of the STS (another web service in the system) where it should retrieve these claims. After retrieving this policy (1), the client now knows where to go to authenticate: the STS. The smart client makes a web service request (2) to the STS, requesting the claims that the relying party asked for via its policy. The job of the STS is to authenticate the user and return a security token that gives the relying party all of the claims it needs. The smart client then makes its request to the relying party(3), sending the security token along in the security SOAP header. The relying party now receives claims with each request, and simply rejects any requests that don’t include a security token from the issuing authority that it trusts. DEMO: SamplesBasicSimple STS for Active Clients
The user points her browser at a claims-aware web application (relying party). The web application redirects the browser to the STS so the user can be authenticated. The STS in Figure 3 is wrapped by a simple web application that reads the incoming request, authenticates the user via standard HTTP mechanisms, and then creates a SAML token and emits a bit of javascript that causes the browser to initiate an HTTP POST that sends the SAML token back to the relying party. The body of this POST contains the claims that the relying party requested. At this point it is common for the relying party to package the claims into a cookie so that the user doesn’t have to be redirected for each request. The WS-Federation specification includes a section3 that describes how to do these things in an interoperable way. *** The Trusted Auth web app is a simple aspx page with code behind that does all the work. This can easily be converted into an ISAPI handler of HTTP pipeline component.DEMO: SamplesBasicSimple STS For Passive Clients
the client is in a different security realm over in Bob’s bike shop, while the relying party is still in Fabrikam’s data center. In this case, the client (Alice, say) authenticates with Bob’s STS (1) and gets a security token that she can send to Fabrikam. This token indicates that Alice has been authenticated by Bob’s security infrastructure, and includes claims that specify what roles she plays in Bob’s organization. The client sends this token to Fabrikam’s STS, where it evaluates the claims, decides whether Alice should be allowed to access the relying party in question, and issues a second security token that contains the claims the relying party expects. The client sends this second token to the relying party(3), which now discovers Alice as a new user, and allows her to access the application according to the claims issued by Fabrikam’s STS. Note that the relying party didn’t have to concern itself with validating a security token from Bob’s bike shop. Fabrikam’s authority did all of that heavy lifting: making certain to issue security tokens only to trusted partners that have previously established a relationship with Fabrikam. In this example, the relying party will always get tokens from its own STS. If it sees a token from anywhere else, it will reject it outright. This keeps your applications as simple as possible. LAST BUILD: a company that uses .NET Framework and Zermatt to build its applications. They have recently merged with another company whose IT platform is based on Java. Because the Microsoft .NET-connected applications are already claims-aware, the company was able to install an STS built on Java technology and suddenly the Microsoft .NET-connected applications became accessible to users in the Java-based directory, with no changes to application code or even application configuration.
ActAs scenario. Alice has pointed her browser at a web application that, as part of its implementation, makes use of a back end web service. Alice’s browser goes through the passive redirection handshake just like normal in order to present a security token to the web front end. This is where things get interesting: the web front end which, for the sake of this discussion, runs under an identity called Bob, takes Alice’s token and submits it as an “ActAs” parameter in his request to get a security token for the back end web service. The issuing authority notes that Bob wants to make requests to the back end using Alice’s credentials, and so crafts an IClaimsIdentity for Alice and an IClaimsIdentity for Bob, and links them together via the Delegate property, as shown in Figure 23. These identities are serialized into a security token for the back end, where Zermatt rehydrates this same structure so that the back end can see that this is Alice making the request (but technically, Bob is delegating her credentials). The back end can then perform appropriate access control, typically granting access based on Alice’s level of permission. The back end can also audit the request, typically noting the fact that Bob delegated Alice’s credentials to make the request. This is richer than the current model of delegation in Kerberos on the Windows platform today, where the back end has no programmatic way to discover that Alice’s credentials were delegated by some middle tier component. In the claims-based model, the back end can see that Alice went to the web front end (Bob) and that Bob delegated her credentials to get to the back end. If the back end were to receive a token for Alice without Bob as a delegate, it would know that Alice was accessing the back end directly, and could take appropriate action (deny the request, perhaps). Different business logic possibilities: Consider the information the authority gets in this scenario. The authority knows which target relying party is the target of the request (the back end web service). It knows who is making the request (Bob) and knows that Bob wants to act on Alice’s behalf. The authority may decide not to issue a security token in this case if Alice is a sensitive user such as an administrator with very high privilege. Or it may issue a token with a restricted set of claims to limit what Bob can do while using Alice’s credentials. Or it may issue an entirely different set of claims based on what the back end needs. The authority might decide to deny direct requests from Alice to talk to the back end, if that is desirable. The only limitation is the policy supported by the STS that you buy. Of course, if you implement your own STS, you’ll only be limited by your imagination. Kerberos Two hop limit: You might ask what the two hop limit is. A very simple explanation of this limit is that impersonation authentication can only be exchanged between two machines by default. This means that if Machine A requests work to be done on Machine B for an impersonated user; Machine B can perform the work, but cannot offload the work to Machine C because the authentication for the user will fail. The easiest way to fix this is by Implement Kerberos Delegation. Configuring this is challenging, and fraught with peril. You have to make changes in AD, all systems have to be in the same AD forest, the accounts must have the right delegation flags.DEMO: SamplesIntermediateIdentity Delegation Scenario
Demo: SamplesAdvancedAuthentication AssuranceSometimes different systems or operations in a system should be protected in stronger (which is usually more cumbersome) manner.The STS will add a property as to what the auth method was. And the RP can choose if that is sufficient for the operation. For example, normal ops can be done with Integration Auth, but for a high value wire transfer, you need a smartcard with PIN.Demo on page 31There are two issuers in this example: AuthPasssiveSTSWindows, and AuthPassiveSTSCert. The first uses Windows integrated authentication, and the second requires the client to present a certificate, which is a stronger but more cumbersome form of authentication. Each issuer adds an Authentication claim into the list of claims for the user, indicating the form of authentication used. You can see this in the GetOutputSubjects method found in the App_CodeSampleSTSService.cs file for each of these projects. The relying party in this example is a browser-based application (called AuthAssuranceRP) that exposes a low value page (LowValueResourcePage.aspxlow value page simply checks to see if the user is authenticated, and if not, redirects to default.aspx, on which is an instance of the FederatedPassiveSignIn control. This control presents the user with a link she can click in order to initiate the WS-Federation passive redirect to AuthPassiveSTSWindows, which uses Windows authentication to authenticate the user quickly and without much hassle. Regardless of whether the user is authenticated or not, when she visits HighValueResourcePage.aspx, the code checks not only whether the user is authenticated, but if she also has a claim that indicates the required strength of authentication, which is, “CertOrSmartCard”, and is only issued by AuthPassiveSTSCert STS, which requires the user to authenticate with a certificate (or smart card, if you have that infrastructure). So instead of redirecting the user to default.aspx, the high value page redirects to a separate sign-in page specifically for high-assurance logins. This is easy to implement; if you look at HighAssuranceSignInPage.aspx, you’ll see another instance of the FederatedPassiveSignIn control that redirects to the AuthPassiveSTSCert STS instead. ) and a high value page (HighValueResourcePage.aspx). The
Why are companies doing this? Ask the audience if they are, what are their reasons?Better use of resourcesQuicker provisioningDecouple solutions from physical environmentGives you agility to IT to respond to business needs
This makes you more agile, better able to meet their needs. Not only scale up and out as needed, but down and in as well. Reduce costs, reduce the amount grunt work. Focus on maintaining the systems in an efficient manner, not in growing the number of servers under your command.
http://blogs.zdnet.com/microsoft/?p=3344http://dynamicdatacentertoolkit.comhttp://download.microsoft.com/download/0/C/9/0C9EE51A-EFB7-47DE-A1BF-C9E0797F736C/datasheet_dynamicdatacentertoolkitforenterprises.docxhttp://www.microsoft.com/hosting/dynamicdatacenter/Home.htmlThe Dynamic Data Center Toolkit enables you to build an ongoing relationship with your customers while you scale your business with these resources:Step-by-step instructions and technical best practices to provision and manage a reliable, secure, and scalable data center Customizable marketing material you can use to help your customers take advantage of these new solutions Sample code and demos to use in your deployment