From AT&T Bootstrap Week: This session focuses on architecture and design concepts to ensure scalability and maximize reliability for server-based applications running in the cloud environment. The session will discuss techniques to consider for achieving scalability and reliability and tradeoffs to consider such as time vs. cost based on the needs for different types of applications.
Infrastructure as a Service ( IaaS) is one of the three fundamental services in cloud computing. IaaS provides access to basic computing resources such as hardware- processor, storage , network cards and more
Infrastructure as a Service ( IaaS) is one of the three fundamental services in cloud computing. IaaS provides access to basic computing resources such as hardware- processor, storage , network cards and more
A quick look at how the term Cloud originated, What is Cloud Computing? Cloud Infrastaructure, Cloud: Platforms, Benefits, Challenges and Opptrunities of Cloud
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
This PPT contains Following Topics-
1.what is virtualization?
2.Examples of virtualization.
3.Techniques of virtualization.
4.Types of virtualization.
5.What is Hipervisor.
6.Types of Hypervisor with Diagrams.
Some set of examples are there like Virtual Box with demo image.
In the presentations definition of SLA, its types and life cycle of SLA is discussed or explained in the session. For Live video you can listen to me on https://www.youtube.com/user/neeleshcmc
Cloud Computing Technology
Cloud Architecture
Cloud Modeling and Design
Foundation Grid
Cloud and Virtualization
Virtualization and Cloud Computing.
Cloud Lifecycle model
Cloud computing system models for distributed and cloud computinghrmalik20
System Models for Distributed and Cloud
Computing,Peer-to-peer (P2P) Networks,Computational and Data Grids,Clouds,Advantage of Clouds over Traditional
Distributed Systems,Performance Metrics and Scalability Analysis,System Efficiency,Performance Challenges in Cloud Computing,WHY CLOUD COMPUTING,What is cloud computing and why is it distinctive,CLOUD SERVICE DELIVERY MODELS AND THEIR
PERFORMANCE CHALLENGES,Cloud computing security,What does Cloud Computing Security mean,Cloud Security Landscape,Energy Efficiency of Cloud Computing,How energy-efficient is cloud computing?
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
A quick look at how the term Cloud originated, What is Cloud Computing? Cloud Infrastaructure, Cloud: Platforms, Benefits, Challenges and Opptrunities of Cloud
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
This PPT contains Following Topics-
1.what is virtualization?
2.Examples of virtualization.
3.Techniques of virtualization.
4.Types of virtualization.
5.What is Hipervisor.
6.Types of Hypervisor with Diagrams.
Some set of examples are there like Virtual Box with demo image.
In the presentations definition of SLA, its types and life cycle of SLA is discussed or explained in the session. For Live video you can listen to me on https://www.youtube.com/user/neeleshcmc
Cloud Computing Technology
Cloud Architecture
Cloud Modeling and Design
Foundation Grid
Cloud and Virtualization
Virtualization and Cloud Computing.
Cloud Lifecycle model
Cloud computing system models for distributed and cloud computinghrmalik20
System Models for Distributed and Cloud
Computing,Peer-to-peer (P2P) Networks,Computational and Data Grids,Clouds,Advantage of Clouds over Traditional
Distributed Systems,Performance Metrics and Scalability Analysis,System Efficiency,Performance Challenges in Cloud Computing,WHY CLOUD COMPUTING,What is cloud computing and why is it distinctive,CLOUD SERVICE DELIVERY MODELS AND THEIR
PERFORMANCE CHALLENGES,Cloud computing security,What does Cloud Computing Security mean,Cloud Security Landscape,Energy Efficiency of Cloud Computing,How energy-efficient is cloud computing?
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
The Analysis of green university resource planning on cloud computing.Prachyanun Nilsook
Nookhong, J. and Nilsook, P. (2015) The Analysis of green university resource planning on cloud computing.
The sixth International e-Learning Conference 2015 (IEC2015), July 20-21, 2015,BITEC Bangna, Bangkok, Thailand.
Creating a separate mobile website is a great idea until someone changes a data source on you. Your users don’t care if your LDAP is down or why they can’t pull up next the class schedule for next semester. In this session you will learn how to plan for the worst; network outages, slow response times and unorganized data. The mobile Web isn’t very useful without content and often that content is gathered from many sources that are out of the developers control. Gathering, protecting and organizing that data is the job of a smart developer and a successful mobile Web presence. This is accomplished by adding an API layer to everything you do. This session will walk you through the ins and outs of creating and maintaining a Web API that can extend far beyond your mobile presence.
One of my first attempts to present my research in a popular way and explain to casual taxpayers why resource management in cloud computing is important.
This presentation shows how Nuxeo Platform takes benefit from the "Cloud Technologies" to answers scalability and performances challenges for cloud deployment as well as on-premises deployment.
Developing High Performance and Scalable ColdFusion Applications Using Terrac...Shailendra Prasad
1. How to scale – options (pros and cons)
2. Caching basics (various options available)
3. Recent updates of Open source Ehcache project.
4. Scaling your existing application with Ehcache, Terracotta OSS
5. Advance caching techniques for scaling using Terracotta BigMemory
6. Customer use cases where caching was mission critical
Research and technology explosion in scale-out storageJeff Spencer
A view of the directions storage is taking in science & technology from Ryan Sayre, technical strategist in the office of the CTO for EMC Isilon, using examples from recent work in life science genomics and other industries taking advantage of the combination of extreme computing (HPC) and big data. As presented at the Bull sponsored Science & Innovation 2013 conference Westminster.
The cloud computing paradigm is still evolving, but has recently gained tremendous momentum. However, security and privacy issues pose as the key roadblock to its fast adoption. In this paper we present security and privacy challenges that are exacerbated by the unique aspects of clouds and show how they're related to various delivery and deployment models. We discuss various approaches to address these challenges, existing solutions, and future work needed to provide a trustworthy cloud computing environment.
Orleans: Cloud Computing for Everyone - SOCC 2011Jorgen Thelin
Orleans is a software framework for building reliable, scalable, and elastic cloud applications. Its programming model encourages the use of simple concurrency patterns that are easy to understand and employ correctly. It is based on distributed actor-like components called grains, which are isolated units of state and computation that communicate through asynchronous messages. Within a grain, promises are the mechanism for managing both asynchronous messages and local task-based concurrency. Isolated state and a constrained execution model allow Orleans to persist, migrate, replicate, and reconcile grain state. In addition, Orleans provides lightweight transactions that support a consistent view of state and provide a foundation for automatic error handling and failure recovery.
We implemented several applications in Orleans, varying from a messaging-intensive social networking application to a data- and compute-intensive linear algebra computation. The programming model is a general one, as Orleans allows the communications to evolve dynamically at runtime. Orleans enables a developer to concentrate on application logic, while the Orleans runtime provides scalability, availability, and reliability.
Migration to cloud is no easy task. Start small and learn the core technologies before leveraging the advanced features of the cloud. The cultural change will affect the whole organization from development to business management and sales.
Cloud native applications are the future of software. Modern software is stateless, provided from cloud to heterogeneous clients on demand and designed to be scalable and resilient.
What does performance mean in the cloudMichael Kopp
Performance problems are one of the most cited concerns about to the cloud. But is it really the cloud or the application? What does performance mean anyway when you can scale to thousands of servers? This session will discuss why traditional means of performance management and troubleshooting no longer work and how this affects everything. Most importantly we will look at how to identify the root cause of performance problems in such dynamic environments. Finally we will explain how to assess and manage performance when capacity is no longer the issue.
Reactive programming is an asynchronous programming paradigm, concerned with streams of information and the propagation of changes. This differs from imperative programming, where that paradigm uses statements to change a program’s state. Reactive Architecture is nothing more than the combination of reactive programming and software architectures. Also known as reactive systems, the goal is to make the system responsive, resilient, elastic, and message-driven.
High Availability of Services in Wide-Area Shared Computing NetworksMário Almeida
(Check my blog @ http://www.marioalmeida.eu/ )
Highly available distributed systems have been widely used and have proven to be resistant to a wide range of faults. Although these kind of services are easy to access, they require an investment that developers might not always be willing to make. We present an overview of Wide-Area shared computing networks as well as methods to provide high availability of services in such networks. We make some references to highly available systems that are being used and studied at the moment this paper was written (2012).
Atmosphere 2014: Switching from monolithic approach to modular cloud computin...PROIDEA
This presentation is to demonstrate, how the homogenous and centralized network architectures cease to operate efficiently and how limited are our abilities to respond to on-demand computing power in such cases. We will show you how to redesign monolithic storage architectures into modular systems, as well as how to migrate them to a scalable and flexible cloud environment.
Maciej Kuzniar - Founder and CEO of the project Oktawave. Passionate about technology related to the processing and data storage, having 10 years of experience working for enterprise customers (banks, telecoms, fmcg). Author of the concepts that support the development of tech startups and architectural solutions to ensure high HA and SLA for IT systems.
Crossing the river by feeling the stones from legacy to cloud native applica...OPNFV
Doug Smith, Red Hat, Inc, Gergely Csatari, Nokia
There is an anecdote about a tourist lost in the middle of the countryside in Ireland, who pulls over and asks a local, "How can I get to Galway from here?" To which the local, after thinking for some time, responds, "If I was going to Galway, I wouldn't start from here at all."
Cloud native application development can feel like that sometimes, especially in the telecom industry. I have an application, it's running fine on a bare metal server, and now I am expected to make it resilient, scale-out, cloud native, microservice architecture, buzzword compliant. But how do you get there from where you are?
This presentation will present the hero's quest, identifying the key constraint to cloud resiliency at each stage, and identifying measures for addressing them. By showing the evolution story from the perspective of two applications, including a real telecom application, this presentation addresses the practical problems. The approach is not "rewrite your app from scratch", it is refactoring for incremental improvements.
Doug and Gergely will address the automation of application deployment and configuration, separation of state from behaviour, clustering, handling storage for cloud native applications, monitoring and event management, and container orchestration, so that, at each step along the journey, you know what problem you are solving, and how to get to the next step from where you are.
This presentation is in addition to a series of workshops held at the summit sponsored by the Cloud Native Computing Foundation and organized by Dave Neary, and includes a short summary of the topics presented in those workshops in addition to the perspectives on how to complete the quest to cloud native applications.
Gomez Blazing Fast Cloud Best Practices Compuware APM
Are you planning to deploy Web applications in the cloud? Will their performance be acceptable? What will you do to make sure?
There are a lot of good reasons to deploy applications in a cloud environment — but they are all forgotten if your application is slow or has poor availability. Poor performance results in unhappy, lost customers. Traditional data center techniques for monitoring, measuring, and optimizing Web application performance won’t work in the cloud. There are a new set of best practices that you need to learn to optimize the performance of your cloud-based Web applications.
Move fast and make things with microservicesMithun Arunan
1. How to apply microservices patterns & anti-patterns to design the right architecture
2. Why & how to build a core framework to ensure consistency & manage complexity
3. What are the challenges in adopting gRPC for inter-service communication
4. How to orchestrate & manage microservices at scale with Kubernetes
5. How to leverage Cloud Native ecosystem to move fast & avoid vendor lock-in
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Knowledge engineering: from people to machines and back
Scalability and Reliability in the Cloud
1. HIGH SCALABILITY AND
RELIABILITY IN THE
CLOUD
GREG THOMPSON
HEAD OF ARCHITECTURE, APPS ENABLEMENT
ALCATEL-LUCENT
@gmthomp greg.thompson@alcatel-lucent.com
2. About This Session
Target audience is backend application
developers deploying infrastructure into a
cloud environment
Will cover concepts for scalability and
reliability with the goal of helping application
developers understand some key
considerations when designing and building
the backend.
3. Design Time Decisions
When first building your application backend,
consider a few important questions
How fast should the application be recovered if a
failure occurs?
What kind of down time is acceptable?
Is the application maintaining stateful data?
What kind of information needs to be shared across
multiple instances?
5. What is Scalability?
Scalability is a term
used to describe
how the application
will handle
increased loads of
traffic volume
6. Scalability – Factors to Consider
Horizontal vs. Vertical
Stateless vs. Stateful
Understanding Limitations
Connection Management
Segmentation of traffic
Segmentation of responsibility (distributed arch)
Clustering
Messaging
7. What Type of Scalability?
Vertical vs. Horizontal
Vertical Horizontal
Scaling up a single Scaling out across
node multiple nodes
Physical limitations – Ability to distribute
instances are very
powerful but still have traffic over a number
finite limits of nodes
Resources such as Allows for more
number of sockets flexibility over time
can only go so high
8. Will the App Maintain State?
Stateless Applications
Application does not
persist information
about transactions Request Respons
e
Each transaction is
independent and Application
atomic
9. Will the App Maintain State?
Stateful Applications
Application needs to
maintain data about
transactions in
First Subseque
progress Request nt
Request
Requires storage D
Application B
Persistence may also
be required
depending the
10. Understanding Limitations
Thorough testing is
key to understanding
bottlenecks
Test real-world
scenarios included
latency
Push the system to
the max to
understand how it
11. Connection Management
Mobile Device Connections
Mobile devices don’t always
behave like you expect
Connectivity is often very
dynamic
Devices move from 4G/3G/2G/no
G/Wifi
Not all TCP events will get
reported and sockets can remain
open
If not handled correctly, these
factors can be time bomb no
matter how vertically you scale a
component
12. Segmenting Traffic
Once the application is
able to be scaled out,
traffic can be
segmented in different
ways
Location (i.e. east coast
vs. west coast)
Pre-assigned criteria -
User ID, IP, or other
dynamic criteria
Load Balanced
13. Segmenting Responsibility
Segmenting
responsibility allows for
a distributed
architecture
Each component can be
scaled independently
Allows for more flexibility
in scaling
Adds more complexity
and potential messaging
overhead
14. Clustering
Clustering is the
concept of having a
group of nodes working App App App App
Nod Nod Nod Nod
together to provide the e e e e
same capability
Nodes typically co- Share
located d
Common data shared Data
as needed across the
cluster
Communication may be
needed between nodes
15. Messaging
Once a clustered Types of Messaging
and/or distributed JMS
architecture is used Open Source MQ
messaging will be packages
needed between Custom Designed
various components Use of APIs
and/or nodes
16. Example of Scaled Architecture
Load Load
Load Load
Balancer Balancer
Balancer Balancer
Web Compone Compone Web Compone Compone
Web
Server Compone
nt 1 Compone
nt 2 Web
Server Compone
nt 1 Compone
nt 2
Server nt 1 nt 2 Server nt 1 nt 2
Database Database
Site 1 Site 2
18. What is Reliability/Availability?
Availability is typically
measured by the amount of
downtime your application
has in a given year
Unplanned downtime and
planned downtime are both
considered
Reliability is described by the
likelihood of failure based on
actual measurements
We’ll focus more on
Availability
19. Reliability/Availability
Factors to Consider
Cost vs. Need
Problem detection
Automation for recovery
Active/standby, active/active, hot standby vs. cold
standby
Local and Geo-redundancy
Multi-zone, multi-cloud
Test Until You Break the System
20. Reliability Requirements
Cost Considerations Need
Number of instances User Experience
Bandwidth Customer
requirements requirements
between sites
Negative Publicity
Complexity of
software
Monitoring
21. Problem Detection
Effective monitoring of
the application is key to
minimizing downtime
Event reporting in the
software
External monitoring –
test for successful
behavior
Auto detection and
alerting to minimize cost
of operations personnel
22. Automation for Recovery
How quickly a failed
component recovers
increases reliability
Automatic detection
and automatic
recovery
Automated installation
key for minimizing
setup time during
recovery
23. Availability Models
N = number of nodes
required for normal N N
processing
N+1 = one additional
node to provide N N +1
redundancy in case of
failure
N+K = K nodes provide N N K K
additional redundancy
24. Redundancy Models
Active/Cold Standby Cold
backup site is booted Active Standb
up when needed y
Active/Hot Standby
Active
Backup site is running Active Standb
and ready to takeover y
Active/Active
Both sites active and Active Active
processing traffic
25. Local and Geo-Redundancy
Local Geo-Graphic
Backup instances Backup instances
are available within are available in
the same location another geo-graphic
location
Use of availability
Typically in a
zones within a separate region to
region very similar account for events
such as natural
disasters
26. Availability to the Max
Multi-Zone/Multi- Multi-Cloud
Region
Ifyour application
Multi-zone typically
requires the
provide instances
running in different maximum possible
physical locations, but availability
in same region Run in different
Multi-region provides cloud providers in
different geographic
regions of availability
different regions
27. Test Until You Break the System
Push the system to
the max and observe
the breaking points
Fix the problem,
repeat
The best way to find
problems to prevent
unplanned downtime
is to thoroughly test
with a mindset to
break