This document discusses how to think like the cloud and prepare for cloud business. It explains that the cloud is not magic and cannot solve complexity, but can provide elasticity. It advises analyzing applications to see which parts are best for the cloud. Using examples of Homer's shopping mall growing and needing expansion, it shows how to distribute applications across cloud services like EC2, RDS, and S3 for scalability. It also provides examples of using hybrid cloud and cloud services for tasks like DDoS protection, HPC, and streaming. The conclusion emphasizes thinking distributed and elastic and finding the best cloud solutions.
Automating Security for the Cloud - Make it Easy, Make it SafeCloudPassage
The document discusses automating security in the cloud. It introduces Rand Wacker from CloudPassage and notes they are hiring. It then covers some of Rand's background and experience in security and cloud computing. Several slides are shown discussing challenges around securing servers in the cloud and how traditional firewall approaches need to evolve to address the dynamic nature of cloud infrastructure.
This document discusses Amazon Neptune, a fully managed graph database service. It provides an overview of graphs and graph databases, introduces Amazon Neptune's key features like high performance, availability and security. Gremlin and property graph models are explained. The webinar will cover what graphs are, graph databases, an introduction to Amazon Neptune, getting started with Neptune and a conclusion.
Cloud computing allows accessing computing resources on demand. It provides an architecture that offers flexibility and scalability. A typical cloud architecture has clients, controllers, and workers. An example application uses a master web service to distribute jobs to workers running on local and Amazon EC2 computers. The application demonstrates how existing technologies can be combined in the cloud. Benefits include varying resources, easy configuration, and pay-as-you-grow pricing. Latency must be considered, as queues and multiple servers can improve average response time.
This document discusses cloud computing and the role of networks in enabling cloud services. It defines cloud computing as abstracted infrastructure that can host end-customer applications and is billed by consumption. Key benefits of cloud services include easy deployment, paying only for what is used, and lower costs. However, security, performance, availability are challenges. A hybrid model is emerging where enterprises use both public cloud services and private clouds. The network is critical to delivering the dynamic, transactional, and on-demand attributes required for cloud services.
This document discusses Microsoft's cloud services architecture, including compute services, storage services, management services, and development tools that provide on-demand computing and storage capabilities. It also describes services like SQL Data Services, Service Bus, Access Control, Workflow, and Live Framework that provide capabilities for databases, messaging, authorization, workflows, and social applications. Examples are given of how these services could support scenarios like the NBC Olympics broadcast and next-generation business-to-business collaboration across organizations.
This document discusses Amazon SageMaker, an AWS service that allows users to build, train, and deploy machine learning models. It provides an overview of SageMaker's key capabilities like the SageMaker SDK, hosted Jupyter notebooks, built-in algorithms, and integration with other AWS services. Examples of using SageMaker with frameworks like Chainer and TensorFlow are also presented.
Delivering Secure OpenStack IaaS for SaaS Products - OpenStack 2012.pptxOpenStack Foundation
The document discusses how CloudPassage provides security automation for public, private, and hybrid cloud servers through features like dynamic cloud firewall automation, two-factor authentication, server vulnerability scanning, and server security event alerting. It also covers some of the challenges of securing OpenStack images and infrastructure given the multitenant and dynamic nature of cloud deployments which limits the effectiveness of traditional network-based security approaches alone. Securing the images themselves is important to fully protect cloud servers and endpoints.
Delivering Secure OpenStack IaaS for SaaS ProductsCloudPassage
This document is a presentation by Andrew Hay, Chief Evangelist at CloudPassage, about delivering secure OpenStack IaaS for SaaS products. The presentation discusses OpenStack security concepts like Quantum, Keystone, and Nova. It emphasizes the importance of securing OpenStack images by disabling unnecessary services, removing unneeded packages, and restricting access. The presentation recommends using tools designed for cloud environments to provide continuous security monitoring and compliance for public, private, and hybrid clouds.
Automating Security for the Cloud - Make it Easy, Make it SafeCloudPassage
The document discusses automating security in the cloud. It introduces Rand Wacker from CloudPassage and notes they are hiring. It then covers some of Rand's background and experience in security and cloud computing. Several slides are shown discussing challenges around securing servers in the cloud and how traditional firewall approaches need to evolve to address the dynamic nature of cloud infrastructure.
This document discusses Amazon Neptune, a fully managed graph database service. It provides an overview of graphs and graph databases, introduces Amazon Neptune's key features like high performance, availability and security. Gremlin and property graph models are explained. The webinar will cover what graphs are, graph databases, an introduction to Amazon Neptune, getting started with Neptune and a conclusion.
Cloud computing allows accessing computing resources on demand. It provides an architecture that offers flexibility and scalability. A typical cloud architecture has clients, controllers, and workers. An example application uses a master web service to distribute jobs to workers running on local and Amazon EC2 computers. The application demonstrates how existing technologies can be combined in the cloud. Benefits include varying resources, easy configuration, and pay-as-you-grow pricing. Latency must be considered, as queues and multiple servers can improve average response time.
This document discusses cloud computing and the role of networks in enabling cloud services. It defines cloud computing as abstracted infrastructure that can host end-customer applications and is billed by consumption. Key benefits of cloud services include easy deployment, paying only for what is used, and lower costs. However, security, performance, availability are challenges. A hybrid model is emerging where enterprises use both public cloud services and private clouds. The network is critical to delivering the dynamic, transactional, and on-demand attributes required for cloud services.
This document discusses Microsoft's cloud services architecture, including compute services, storage services, management services, and development tools that provide on-demand computing and storage capabilities. It also describes services like SQL Data Services, Service Bus, Access Control, Workflow, and Live Framework that provide capabilities for databases, messaging, authorization, workflows, and social applications. Examples are given of how these services could support scenarios like the NBC Olympics broadcast and next-generation business-to-business collaboration across organizations.
This document discusses Amazon SageMaker, an AWS service that allows users to build, train, and deploy machine learning models. It provides an overview of SageMaker's key capabilities like the SageMaker SDK, hosted Jupyter notebooks, built-in algorithms, and integration with other AWS services. Examples of using SageMaker with frameworks like Chainer and TensorFlow are also presented.
Delivering Secure OpenStack IaaS for SaaS Products - OpenStack 2012.pptxOpenStack Foundation
The document discusses how CloudPassage provides security automation for public, private, and hybrid cloud servers through features like dynamic cloud firewall automation, two-factor authentication, server vulnerability scanning, and server security event alerting. It also covers some of the challenges of securing OpenStack images and infrastructure given the multitenant and dynamic nature of cloud deployments which limits the effectiveness of traditional network-based security approaches alone. Securing the images themselves is important to fully protect cloud servers and endpoints.
Delivering Secure OpenStack IaaS for SaaS ProductsCloudPassage
This document is a presentation by Andrew Hay, Chief Evangelist at CloudPassage, about delivering secure OpenStack IaaS for SaaS products. The presentation discusses OpenStack security concepts like Quantum, Keystone, and Nova. It emphasizes the importance of securing OpenStack images by disabling unnecessary services, removing unneeded packages, and restricting access. The presentation recommends using tools designed for cloud environments to provide continuous security monitoring and compliance for public, private, and hybrid clouds.
The document provides an introduction to cloud computing. It defines cloud computing as enabling on-demand access to configurable computing resources that can be provisioned with minimal effort. It then discusses how the cloud allows users to treat computing resources like a utility and pay based on usage, avoiding the need to build their own infrastructure. Finally, it outlines the benefits of cloud computing such as reducing costs, increasing agility, focusing on core competencies, and the types of cloud services including IaaS, PaaS, and SaaS.
This document provides an overview of cloud computing presented by Ganesh Neelakanta Iyer. It begins with introductions to cloud computing characteristics, types of cloud services including SaaS, PaaS and IaaS. Applications of cloud computing are discussed along with challenges and how to get started. Future trends showing cloud computing continuing to grow are presented. In conclusion, cloud computing is projected to be a sustained and growing market reaching $160 billion by 2011.
AWS의 블록체인 서비스 활용 방법 - 박혜영 솔루션즈 아키텍트, AWS / 박선준 솔루션즈 아키텍트, AWS :: AWS Summit S...Amazon Web Services Korea
AWS의 블록체인 서비스 활용 방법
박혜영 솔루션즈 아키텍트, AWS
박선준 솔루션즈 아키텍트, AWS
AWS에서 제공하는 Managed Blockchain으로 빠르고 간단하게 블록체인 네트워크를 생성하고 Ledger 데이터베이스인 Quantum DB를 AWS 빅데이터 분석 서비스와 연계하여 다양한 블록체인 데이터를 클라우드 상에서 분석 및 활용하는 방법을 소개합니다.
TechNet Events Presents – for the IT Professional
In this session, we will discuss:
Azure architecture from the IT professional’s point of view
Why an IT operations team would want to pursue Azure as an extension to the data center
Configuration, deployment and scaling Azure-based applications
The Azure roles (web, web service and worker)
Azure storage options
Azure security and identity options
How Azure-based applications can be integrated with on-premises applications
How operations teams can manage and monitor Azure-based applications
This document summarizes an AWS webinar on Amazon ECS Deep Dive. It includes slides on key concepts of ECS such as running containers on EC2 instances or Fargate, task definitions, clusters, services, load balancing with ALB, and service discovery. It also covers questions and answers about using AWS Secrets Manager and ECS, load balancing with ALB, task dependencies, and scheduling tasks on Fargate using Step Functions and CloudWatch Events.
The document discusses predictions about the future of millicomputing, or computers that use less than 1 watt of power. It summarizes predictions made between 2007-2009 about developments in mobile devices, processors, memory, storage and networking. These include the rise of smartphones like the iPhone and Android devices, increasing processing power and capabilities of mobile devices, and faster cellular and wireless networking technologies that would allow new mobile applications.
- Amazon Macie allows users to visualize the usage of Amazon S3 buckets within an AWS account and detect sensitive data within specified buckets.
- It scans objects in S3 buckets defined in a job and detects sensitive data like personal information, credit cards, and protected intellectual property based on keywords and patterns.
- Detected sensitive data and policy changes are presented as findings that can be viewed and linked to other AWS services for response automation.
All change! How the new Economics of Cloud will make you think differently ab...JAXLondon_Conference
The document discusses how the economics of cloud computing will change how Java applications are developed and deployed. Cloud providers charge for computing resources on an hourly basis, incentivizing lighter, more efficient applications. Java applications will need to reduce their memory footprints and startup times to lower costs. Developers will also need to design applications to be resilient to failures and easier to debug remotely without access to instances. The rise of APIs and metering of resources will require Java and the JVM to become leaner and more flexible to run optimally in cloud environments.
Apache MXNet/Gluon을 이용한 입술 읽기(Lipreading) 모델 만들기 - 김형준, SK텔레콤 :: AWS Summit S...Amazon Web Services Korea
Apache MXNet/Gluon을 이용한 입술 읽기(Lipreading) 모델 만들기
김형준, SK텔레콤
입술 읽기(Lipreading)는 화자의 입의 움직임으로부터 텍스트를 디코딩하는 과제입니다. 대표적인 LipNet 모델을 Apache MXNet 기반 Gluon을 이용하여 구현한 과정과 이를 MXNet Model Example에 소스 공헌을 하면서 겪었던 과정들을 공유합니다.
20190402 AWS Black Belt Online Seminar Let's Dive Deep into AWS Lambda Part1 ...Amazon Web Services Japan
This document contains a presentation on AWS Lambda by Keisuke Nishitani, a Solutions Architect at Amazon Web Services Japan. The presentation introduces AWS Lambda as a serverless computing platform that allows users to run code without provisioning or managing servers. It discusses how Lambda allows developers to build applications that scale automatically in response to changes in usage. The presentation also provides an overview of Lambda's programming languages, triggers, execution environment, pricing model, and integration with other AWS services.
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...Web2Present
The document discusses considerations for cloud adoption and the cloud service models of infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It addresses barriers to cloud adoption such as security, vendor lock-in, and performance concerns. The document advocates applying an 80/20 approach to determine which workloads are suitable for different cloud deployment options and service providers. It concludes that cloud should be part of an IT strategy through a deliberate choice of delivery platforms to address specific needs.
This document discusses a AWS Black Belt Online Seminar on utilizing AWS in the public sector. It begins with introducing the purpose and format of AWS Black Belt Online Seminars in general. It then provides an agenda for the current seminar, which includes understanding the current state of AWS usage in public organizations, and 10 considerations for cloud procurement. The document concludes with contact information for the presenter.
What can the cloud do for me? - Interview with Eli AlmogAppFirst
AppFirst recently sat down with Eli Almog, a thought leader in the application performance management space. Eli formerly served in the office of the CTO at BMC. In our discussion, he goes over how to prepare to migrate to the cloud, and what to do once you’re there.
Cloud 101 - Workshop from Gov2.0 in DC, May 2010Alistair Croll
The document provides an overview of cloud computing by discussing key topics across six parts:
Part one discusses how cloud computing has disrupted IT by democratizing access. Part two covers the history of virtualization. Part three explains how cloud stacks separate concerns between physical infrastructure, virtual platforms, and applications. Part four frames clouds as an on-demand business model compared to traditional IT. Part five outlines the major types of cloud services including IaaS, PaaS and differences between them. Finally, part six notes that in reality, most cloud offerings blend aspects of infrastructure, platforms and software as a service.
This presentation is meant to guide you and get you started asking the right questions regarding your IT Infrastructure - keeping all your options in mind.
The presentation discussed moving applications to the cloud for scalability, flexibility and pay-as-you-go pricing, noting key differences between RSAWEBCloud and AWS; challenges for developers include optimizing applications for production environments and handling scaling which requires separating concerns like data types and using caching, load balancing, and autoscaling tools.
AWS Lambda 내부 동작 방식 및 활용 방법 자세히 살펴 보기 - 김일호 솔루션즈 아키텍트 매니저, AWS :: AWS Summit ...Amazon Web Services Korea
AWS Lambda 내부 동작 방식 및 활용 방법 자세히 살펴 보기
김일호 솔루션즈 아키텍트 매니저, AWS
AWS Lambda는 서버리스 아키텍처의 핵심 서비스입니다. 본 세션에서는 AWS Lambda에 내부 동작 방식을 소개하고, Lambda Layer, 맞춤형 런타임 등 신규로 소개된 기능 및 사용시 도움이 되는 성능 및 확장을 위한 다양한 팁들을 소개합니다.
Deep Learning 모델의 효과적인 분산 트레이닝과 모델 최적화 방법 - 김무현 데이터 사이언티스트, AWS :: AWS Summit...Amazon Web Services Korea
Deep Learning 모델의 효과적인 분산 트레이닝과 모델 최적화 방법
김무현 데이터 사이언티스트, AWS
갈수록 증가하는 데이터의 규모와 복잡도를 효율적으로 제어하면서 모델의 성능을 향상시키기 위해서, AWS Deep Learnign AMI, SageMaker, SageMaker Pipemode, Horovod, Tensor Core 등을 어떻게 활용할 수 있는지 알아봅니다. 또한, 다양한 디바이스에서 모델 inference 수행 속도와 이식성을 높여주는 머신러닝 모델 최적화 툴 Neo-AI도 소개합니다.
This presentation is meant to guide you and get you started asking the right questions regarding your IT Infrastructure - keeping all your options in mind.
- The document discusses AWS X-Ray, a service that allows users to analyze and debug distributed applications.
- It provides visibility into requests as they travel through various services, microservices, functions and resources. This helps identify performance bottlenecks and the root causes of errors.
- The key concepts discussed are segments, subsegments and traces. Segments represent units of work and are connected through parent/child relationships to reconstruct request flows.
Cloud computing allows applications and services to be delivered over the internet through virtualized infrastructure. It provides scalable resources, self-service access, and pay-as-you-go pricing. While cloud computing offers potential benefits, there is still confusion around its definition. Oracle's strategy is to provide enabling technologies for both private and public cloud deployments, giving customers choice while ensuring security and enterprise-grade capabilities. Architects should assess existing systems to identify good candidates for cloud and plan a gradual evolution that partitions workloads and shifts resources to shared services.
This document discusses building and deploying Ajax applications on the cloud. It begins with defining what a cloud is, noting that a cloud is a data center with an API that provides on-demand infrastructure and services. It then covers issues for Ajax developers working with clouds, such as planning for persistent data and failover. The document concludes with a live demo of using a cloud-based IDE to build an Ajax application on Amazon EC2 and deploy it to the cloud.
The document provides an introduction to cloud computing. It defines cloud computing as enabling on-demand access to configurable computing resources that can be provisioned with minimal effort. It then discusses how the cloud allows users to treat computing resources like a utility and pay based on usage, avoiding the need to build their own infrastructure. Finally, it outlines the benefits of cloud computing such as reducing costs, increasing agility, focusing on core competencies, and the types of cloud services including IaaS, PaaS, and SaaS.
This document provides an overview of cloud computing presented by Ganesh Neelakanta Iyer. It begins with introductions to cloud computing characteristics, types of cloud services including SaaS, PaaS and IaaS. Applications of cloud computing are discussed along with challenges and how to get started. Future trends showing cloud computing continuing to grow are presented. In conclusion, cloud computing is projected to be a sustained and growing market reaching $160 billion by 2011.
AWS의 블록체인 서비스 활용 방법 - 박혜영 솔루션즈 아키텍트, AWS / 박선준 솔루션즈 아키텍트, AWS :: AWS Summit S...Amazon Web Services Korea
AWS의 블록체인 서비스 활용 방법
박혜영 솔루션즈 아키텍트, AWS
박선준 솔루션즈 아키텍트, AWS
AWS에서 제공하는 Managed Blockchain으로 빠르고 간단하게 블록체인 네트워크를 생성하고 Ledger 데이터베이스인 Quantum DB를 AWS 빅데이터 분석 서비스와 연계하여 다양한 블록체인 데이터를 클라우드 상에서 분석 및 활용하는 방법을 소개합니다.
TechNet Events Presents – for the IT Professional
In this session, we will discuss:
Azure architecture from the IT professional’s point of view
Why an IT operations team would want to pursue Azure as an extension to the data center
Configuration, deployment and scaling Azure-based applications
The Azure roles (web, web service and worker)
Azure storage options
Azure security and identity options
How Azure-based applications can be integrated with on-premises applications
How operations teams can manage and monitor Azure-based applications
This document summarizes an AWS webinar on Amazon ECS Deep Dive. It includes slides on key concepts of ECS such as running containers on EC2 instances or Fargate, task definitions, clusters, services, load balancing with ALB, and service discovery. It also covers questions and answers about using AWS Secrets Manager and ECS, load balancing with ALB, task dependencies, and scheduling tasks on Fargate using Step Functions and CloudWatch Events.
The document discusses predictions about the future of millicomputing, or computers that use less than 1 watt of power. It summarizes predictions made between 2007-2009 about developments in mobile devices, processors, memory, storage and networking. These include the rise of smartphones like the iPhone and Android devices, increasing processing power and capabilities of mobile devices, and faster cellular and wireless networking technologies that would allow new mobile applications.
- Amazon Macie allows users to visualize the usage of Amazon S3 buckets within an AWS account and detect sensitive data within specified buckets.
- It scans objects in S3 buckets defined in a job and detects sensitive data like personal information, credit cards, and protected intellectual property based on keywords and patterns.
- Detected sensitive data and policy changes are presented as findings that can be viewed and linked to other AWS services for response automation.
All change! How the new Economics of Cloud will make you think differently ab...JAXLondon_Conference
The document discusses how the economics of cloud computing will change how Java applications are developed and deployed. Cloud providers charge for computing resources on an hourly basis, incentivizing lighter, more efficient applications. Java applications will need to reduce their memory footprints and startup times to lower costs. Developers will also need to design applications to be resilient to failures and easier to debug remotely without access to instances. The rise of APIs and metering of resources will require Java and the JVM to become leaner and more flexible to run optimally in cloud environments.
Apache MXNet/Gluon을 이용한 입술 읽기(Lipreading) 모델 만들기 - 김형준, SK텔레콤 :: AWS Summit S...Amazon Web Services Korea
Apache MXNet/Gluon을 이용한 입술 읽기(Lipreading) 모델 만들기
김형준, SK텔레콤
입술 읽기(Lipreading)는 화자의 입의 움직임으로부터 텍스트를 디코딩하는 과제입니다. 대표적인 LipNet 모델을 Apache MXNet 기반 Gluon을 이용하여 구현한 과정과 이를 MXNet Model Example에 소스 공헌을 하면서 겪었던 과정들을 공유합니다.
20190402 AWS Black Belt Online Seminar Let's Dive Deep into AWS Lambda Part1 ...Amazon Web Services Japan
This document contains a presentation on AWS Lambda by Keisuke Nishitani, a Solutions Architect at Amazon Web Services Japan. The presentation introduces AWS Lambda as a serverless computing platform that allows users to run code without provisioning or managing servers. It discusses how Lambda allows developers to build applications that scale automatically in response to changes in usage. The presentation also provides an overview of Lambda's programming languages, triggers, execution environment, pricing model, and integration with other AWS services.
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...Web2Present
The document discusses considerations for cloud adoption and the cloud service models of infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It addresses barriers to cloud adoption such as security, vendor lock-in, and performance concerns. The document advocates applying an 80/20 approach to determine which workloads are suitable for different cloud deployment options and service providers. It concludes that cloud should be part of an IT strategy through a deliberate choice of delivery platforms to address specific needs.
This document discusses a AWS Black Belt Online Seminar on utilizing AWS in the public sector. It begins with introducing the purpose and format of AWS Black Belt Online Seminars in general. It then provides an agenda for the current seminar, which includes understanding the current state of AWS usage in public organizations, and 10 considerations for cloud procurement. The document concludes with contact information for the presenter.
What can the cloud do for me? - Interview with Eli AlmogAppFirst
AppFirst recently sat down with Eli Almog, a thought leader in the application performance management space. Eli formerly served in the office of the CTO at BMC. In our discussion, he goes over how to prepare to migrate to the cloud, and what to do once you’re there.
Cloud 101 - Workshop from Gov2.0 in DC, May 2010Alistair Croll
The document provides an overview of cloud computing by discussing key topics across six parts:
Part one discusses how cloud computing has disrupted IT by democratizing access. Part two covers the history of virtualization. Part three explains how cloud stacks separate concerns between physical infrastructure, virtual platforms, and applications. Part four frames clouds as an on-demand business model compared to traditional IT. Part five outlines the major types of cloud services including IaaS, PaaS and differences between them. Finally, part six notes that in reality, most cloud offerings blend aspects of infrastructure, platforms and software as a service.
This presentation is meant to guide you and get you started asking the right questions regarding your IT Infrastructure - keeping all your options in mind.
The presentation discussed moving applications to the cloud for scalability, flexibility and pay-as-you-go pricing, noting key differences between RSAWEBCloud and AWS; challenges for developers include optimizing applications for production environments and handling scaling which requires separating concerns like data types and using caching, load balancing, and autoscaling tools.
AWS Lambda 내부 동작 방식 및 활용 방법 자세히 살펴 보기 - 김일호 솔루션즈 아키텍트 매니저, AWS :: AWS Summit ...Amazon Web Services Korea
AWS Lambda 내부 동작 방식 및 활용 방법 자세히 살펴 보기
김일호 솔루션즈 아키텍트 매니저, AWS
AWS Lambda는 서버리스 아키텍처의 핵심 서비스입니다. 본 세션에서는 AWS Lambda에 내부 동작 방식을 소개하고, Lambda Layer, 맞춤형 런타임 등 신규로 소개된 기능 및 사용시 도움이 되는 성능 및 확장을 위한 다양한 팁들을 소개합니다.
Deep Learning 모델의 효과적인 분산 트레이닝과 모델 최적화 방법 - 김무현 데이터 사이언티스트, AWS :: AWS Summit...Amazon Web Services Korea
Deep Learning 모델의 효과적인 분산 트레이닝과 모델 최적화 방법
김무현 데이터 사이언티스트, AWS
갈수록 증가하는 데이터의 규모와 복잡도를 효율적으로 제어하면서 모델의 성능을 향상시키기 위해서, AWS Deep Learnign AMI, SageMaker, SageMaker Pipemode, Horovod, Tensor Core 등을 어떻게 활용할 수 있는지 알아봅니다. 또한, 다양한 디바이스에서 모델 inference 수행 속도와 이식성을 높여주는 머신러닝 모델 최적화 툴 Neo-AI도 소개합니다.
This presentation is meant to guide you and get you started asking the right questions regarding your IT Infrastructure - keeping all your options in mind.
- The document discusses AWS X-Ray, a service that allows users to analyze and debug distributed applications.
- It provides visibility into requests as they travel through various services, microservices, functions and resources. This helps identify performance bottlenecks and the root causes of errors.
- The key concepts discussed are segments, subsegments and traces. Segments represent units of work and are connected through parent/child relationships to reconstruct request flows.
Cloud computing allows applications and services to be delivered over the internet through virtualized infrastructure. It provides scalable resources, self-service access, and pay-as-you-go pricing. While cloud computing offers potential benefits, there is still confusion around its definition. Oracle's strategy is to provide enabling technologies for both private and public cloud deployments, giving customers choice while ensuring security and enterprise-grade capabilities. Architects should assess existing systems to identify good candidates for cloud and plan a gradual evolution that partitions workloads and shifts resources to shared services.
This document discusses building and deploying Ajax applications on the cloud. It begins with defining what a cloud is, noting that a cloud is a data center with an API that provides on-demand infrastructure and services. It then covers issues for Ajax developers working with clouds, such as planning for persistent data and failover. The document concludes with a live demo of using a cloud-based IDE to build an Ajax application on Amazon EC2 and deploy it to the cloud.
This chapter introduces cloud computing and explains that while it may seem like a buzzword, it actually describes the evolution of technologies that have altered how organizations build IT infrastructure. Like the early internet, the technologies that make up the cloud have been around for decades but it took companies like Amazon to make them widely accessible. The book aims to help developers leverage cloud infrastructure for deploying transactional web applications.
The document discusses why cloud management makes sense. It argues that managing cloud deployments manually is complex due to the many tasks involved like configuration management, workload management, and automation. A good cloud management platform provides [1] the ability to focus on core competencies instead of infrastructure complexity, [2] agility for IT and business, and [3] quick ROI. Specifically, it enables cloud-ready solutions through server templates, automation for improved operational efficiency, and governance and control over deployments.
1) Cloud computing originally promised easy provisioning, commodity pricing, and elastic scalability. While significant progress has been made in these areas, challenges remain, especially with scalability.
2) Hardware costs like RAM have declined significantly following Moore's Law, lowering some cloud computing prices. However, software development productivity gains have not kept pace, making writing cloud applications still difficult.
3) New platforms aim to further improve ease of use and scalability by abstracting away the complexity of virtual machines and infrastructure. The future of cloud computing relies on a portable Platform as a Service layer that can span multiple cloud providers.
Software Defined IT @ Evento SOIEL Roma 6 Aprile 2017Riccardo Romani
Oracle espone il concetto del "virtuous circle" del nostro integrated cloud : noi per primi mettiamo in pratica la value proposition dei sistemi ingegnerizzati per costruire i nostri cloud datacenters, oltre che i datacenter dei nostri clienti. Da questa contaminazione, nasce innovazione a valore che si puo' concretizzare con il lancio di nuovi rivoluzionari sistemi come Oracle Clodu Machine o con una ulteriore evoluzione di nostri sistemi flagship come Exadata o la Private Cloud Appliance, che di fatto costituiscono l'offerta Application Software Defined IT.
Clever Cloud is a platform as a service that aims to simplify hosting and running applications in the cloud. It handles the infrastructure complexity so developers can focus on their applications. Clever Cloud automatically scales infrastructure resources up and down as needed, charges based on actual usage like an energy provider, and supports various programming languages including PHP, Java, Ruby, and more. The company aims to reduce server waste and CO2 emissions through its efficient cloud platform.
The document proposes a secure cloud mining architecture that allows companies to securely mine cloud storage for patterns and relationships in large databases. The architecture uses encryption to securely generate predictive reports from distributed data mining on cloud storage. This allows companies to develop new marketing strategies from the predictions while keeping the results private from potential attackers on public clouds.
Cloud computing is a buzzword used to describe concepts like utility computing and grid computing that have existed for decades, allowing users to access computing resources like servers, storage, and databases over the internet. While there is no clear definition, cloud computing typically involves delivering hosted services over the internet, including software, platforms, and infrastructure. The document discusses the history and types of cloud computing, as well as considerations around building versus buying applications and whether to use on-premise or cloud-based systems.
Introduction to Microsoft Azure. Covers the change to a cloud development paradigm. Motivations for the change, Pricing structures, and an exercise in IT portfolio evaluation.
The document discusses key concepts in cloud computing including infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS). It provides examples of IaaS through Amazon Web Services and PaaS through Microsoft Azure and Google App Engine. The document also covers challenges, adoption scenarios, and characteristics of cloud computing.
5 Cloud Commandments - Why Cloud Management Makes SenseRightScale
RightScale Conference Santa Clara 2011: What is the cloud and how do you manage it? Uri Budnik will discuss the cloud technology landscape and where RightScale fits in to drive agility, cost, and time savings above cloud infrastructure. RightScale has been investing heavily for the past four years to make cloud infrastructure easy to leverage. This session will clarify elements that are straightforward, what continues to be difficult, and the impact on your schedule and budget.
This document discusses Ne0lix's cloud architecture and use of AWS. Ne0lix built its own scalable Java-oriented PaaS to run on AWS due to limited PaaS options when they started. They moved most applications to SaaS and the cloud for improved business agility and faster scaling. Ne0lix chose AWS for its scale, features, automation and global availability despite AWS also being a competitor in some areas. Their cloud architecture focuses on speed, scalability, and meeting goals around latency and capacity.
This document proposes a model for the personal robot (PR) industry where PRs have basic local capabilities but rely on remote "cloud brains" to perform complex tasks. The cloud brains would reside on powerful server systems and provide algorithms to multiple PRs simultaneously via wireless connections. This could make PRs more affordable by reducing on-board hardware requirements. It could also allow PRs to access more advanced capabilities and be easily updated by connecting to different cloud services. However, issues like safety, bandwidth limitations, and developing an supporting industrial ecosystem would need to be addressed for this vision to become reality.
The document discusses cloud computing and SKALICLOUD's cloud hosting services. It highlights that SKALICLOUD allows users to create virtual servers on demand and pay only for the resources used. A case study is presented on Malaysia's largest Islamic fund institution moving their servers to SKALICLOUD's cloud which enabled them to scale infrastructure flexibly according to seasonal demand and reduce costs.
Global Netflix - HPTS Workshop - Scaling Cassandra benchmark to over 1M write...Adrian Cockcroft
The document discusses Netflix replacing its Oracle database with Apache Cassandra on AWS to support its transition to becoming a global cloud-based service. Key points include migrating data from Oracle to Cassandra for improved scalability and availability across regions; using AWS services like S3, EC2 and SimpleDB during the transition; and addressing challenges around backups, disaster recovery and analytics with the new architecture.
The document provides details about a CloudCamp event taking place in Edinburgh in March 2013. The schedule includes lightning talks from 8 speakers on various cloud computing topics, an unpanel discussion, and a networking session. One lightning talk focuses on challenges enterprises face in cloud adoption. Another talk discusses how JP Morgan Chase uses different cloud platforms. A third talk argues that non-technical factors are also important for enterprises adopting cloud.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
4. What is the Cloud?
Cloud is not a Magic Carpet.
( before you understand what it is )
Spark & Associates 4
5. What is the Cloud?
Misunderstands
• Cloud can support perfect redundancy.
• Current applications can be migrated into cloud easily.
• Oracle RAC can be migrated into cloud, what a perfect idea!
• Expect high performance with low price.
• Fully secured service will be provided.
Spark & Associates 5
6. What is the Cloud?
But the truth is…
• Without “distribution”, the cloud could be useless.
• If you really need to use Oracle, use it in your house, not on cloud.
• Build/migrate your application can be distributed.
• Without “automation” you’ll get suffered by operation nightmare.
• You have to deal with security without h/w based firewalls.
• If you wrote wrong application on cloud, you may get paid more.
Spark & Associates 6
7. What is the Cloud?
Traditional service networks
Medium CDN
Secured Network
Network
Web Web Web Img/File Img/File
Server Server Server Server Server
Fully
Secured
Network Web Web
App. App. File
Server Server Storage
Fully
Secured
Network Oracle Oracle Oracle
#1 #2 #3
Spark & Associates 7
8. What is the Cloud?
Compute Cloud Architecture
External
Network
G/W
Functional
VM
Internal
Network
Your Your
Virtual Virtual
Machine #1 Machine #2
Spark & Associates 8
9. What is the Cloud?
Don’t try this at your service
Big
JAVA
CLOUD
MIGRATION?
Big
ORACLE
Spark & Associates 9
10. What is the Cloud?
“WRONG MIGRATION”
Spark & Associates 10
11. What is the Cloud?
OMG!
What I have to do to get in cloud?
Spark & Associates 11
12. What is the Cloud?
• Analysis your system architecture and service needs, and find
out which is best part to migrate.
– Does our DB architecture really need relations?
• Migrate from small/easy components like,
– Light weight web service first. ( file send )
– Session sharing
– Simple DB, not SAN based one. ( CouchDB, MySQL, etc )
– PHP based web applications.
– Most expandable part of your system.
• Think about Distributed application architecture
Spark & Associates 12
13. What is the Cloud?
Non-elastic vs. Elastic
Spark & Associates 13
14. Table of contents
• What do you think about Cloud?
• How to think like Cloud
• What we have to prepare for Cloud?
Spark & Associates 14
15. How to think like Cloud
Someday,
Simpson thinks about
Web shopping mall.
Spark & Associates 15
16. How to think like Cloud
But he’s got in trouble
with ….
• Buying Service components
- Which spec? How many?
- Switches?
- 2 year contract?
• Licenses
- Databases?
- Web servers?
• And more.
Spark & Associates 16
17. How to think like Cloud
So, he googled about it, and realizes
Amazon EC2 service!
He decides to launch his shopping
mall application with EC2.
EC2 Means
Elastic Compute Cloud
Spark & Associates 17
18. How to think like Cloud
Only
Opens at
7PM –
10PM
Homer’s Shopping Needs.
- Site opens at 07PM
- Site closes at 10PM
- Apache
- PHP
- MySQL
- Expandable as business
grows
- Get paid as much as I used.
Spark & Associates 18
19. How to think like Cloud
CREATE A VM in EC2!
Apache
PHP Create php codes and Image, DB.
MySQL Keep the source tarballs in PC.
Backup DB before VM shutdown.
Installed VM
Spark & Associates 19
20. How to think like Cloud
Because of Homer’s famous, the
shopping mall grows dramatically.
So he thinks about “Expansion”
Load Balancer CDN
Apache Apache
PHP PHP
Installed Installed Storage
Amazon EC2 VM VM
Amazon S3
MySQL MySQL
Amazon RDS (Master) (Slave) Amazon
Cloud Front
Spark & Associates 20
22. Table of contents
• What is the Cloud?
• Happy Business with Cloud
• What we have to prepare for Cloud?
Spark & Associates 22
23. What we have to prepare for cloud business?
Understand Cloud Architecture
• What kind of service solution fit into Cloud?
• Guide cloud limits and application architecture to
customers.
• Suggest hybrid Cloud model if they already have
infrastructure.
• Lean technologies like NoSQL, BigTable, and how to
distribute systems & applications.
• Lean automation skills
Spark & Associates 23
24. What we have to prepare for cloud business?
HYBRID
EXAMPLES
Spark & Associates 24
25. What we have to prepare for cloud business?
Use Cloud as DDoS Proxy Farm
DNS /
URL Routing
Main
Page
Service Existing
Web Service
File/Im Systems
g (DB, Web
Service
App)
Spark & Associates 25
26. What we have to prepare for cloud business?
Use Cloud as HPC Farm
Render
ing Job Queue
nodes
Programmers,
3D Modelers,
Calcul
ating
Animators,
nodes Chemists
Spark & Associates 26
27. What we have to prepare for cloud business?
Use Cloud as Firewall Farm
F/W
nodes
Unsecured traffic
Existing
Secured traffic Service
Spark & Associates 27
28. What we have to prepare for cloud business?
Use Cloud as Stream SVC Farm
Stream
nodes
Live Encoder
Spark & Associates 28
29. Conclusion
• It’s very important to think like cloud.
• Cloud cannot solve complexity.
• Enterprise needs simplify, elasticity.
• There will be many of applications for cloud. We have
to find what is best solution for where.
• Web Front-end ( HTML5, Javascript ) skills are
getting greater day by day.
Spark & Associates 29