SlideShare a Scribd company logo
1 of 13
Download to read offline
10/May/2013
Cloud Computing and the SysOp
Professional: How to get ready?
Eduardo Coelho - Congresso UNIFACEX
Friday, May 10, 13
hold on
✤ before we get started, let me show you some interesting facts
involving information security and privacy in our world
Friday, May 10, 13
Cryptogram newsletter published
the following on 15/Apr/2013
✤ One: Some of the Chinese military hackers who were implicated in a broad set of
attacks against the U.S. government and corporations were identified because they
accessed Facebook from the same network infrastructure they used to carry out
their attacks.
✤ Two: Hector Monsegur, one of the leaders of the LulzSec hacker movement, was
identified and arrested last year by the FBI. Although he practiced good computer
security and used an anonymous relay service to protect his identity, he slipped
up.
✤ And three: Paula Broadwell, who had an affair with CIA director David Petraeus,
similarly took extensive precautions to hide her identity. She never logged in to
her anonymous e-mail service from her home network. Instead, she used hotel
and other public networks when she e-mailed him. The FBI correlated hotel
registration data from several different hotels -- and hers was the common name.
Friday, May 10, 13
(continuing)
✤ There are simply too many ways to be tracked. The Internet, e-mail, cell phones, web browsers,
social networking sites, search engines: these have become necessities, and it's fanciful to expect
people to simply refuse to use them just because they don't like the spying, especially since the
full extent of such spying is deliberately hidden from us and there are few alternatives being
marketed by companies that don't spy.
✤ This isn't something the free market can fix. We consumers have no choice in the matter. All the
major companies that provide us with Internet services are interested in tracking us. Visit a
website and it will almost certainly know who you are; there are lots of ways to be tracked
without cookies. Cell phone companies routinely undo the web's privacy protection. One
experiment at Carnegie Mellon took real-time videos of students on campus and was able to
identify one-third of them by comparing their photos with publicly available tagged Facebook
photos.
✤ Maintaining privacy on the Internet is nearly impossible. If you forget even once to enable your
protections, or click on the wrong link, or type the wrong thing, you've permanently attached
your name to whatever anonymous service you're using. Monsegur slipped up once, and the FBI
got him. If the director of the CIA can't maintain his privacy on the Internet, we've got no hope.
Friday, May 10, 13
(continuing)
✤ So, we're done. Welcome to a world where Google knows exactly what
sort of porn you all like, and more about your interests than your
spouse does. Welcome to a world where your cell phone company
knows exactly where you are all the time. Welcome to the end of private
conversations, because increasingly your conversations are conducted
by e-mail, text, or social networking sites.
✤ And welcome to a world where all of this, and everything else that you
do or is done on a computer, is saved, correlated, studied, passed
around from company to company without your knowledge or consent;
and where the government accesses it at will without a warrant.
✤ Welcome to an Internet without privacy, and we've ended up here with
hardly a fight.
Friday, May 10, 13
Thoughts
✤ How many people actually understand how all of this impacts our
life?
✤ How good is it to be an IT professional which are probably in the best
position to fully antecipate bad outcomes and prevent bad things?
Friday, May 10, 13
Now let’s focus on the IT PRO
✤ Which is the set of abilities that will (is) be asked of System Operators
and Network Admins?
Friday, May 10, 13
By the way, what SysOp stands
for? (or will stand for)
✤ Windows Server Professionals
✤ Unix/Linux Server Professionals
✤ Network Appliance Professionals
✤ Security Officers
✤ DBAs
✤ Any above, but Management-focused
Friday, May 10, 13
The best SysOp in a nutshell
✤ basic dev knowledge
✤ basic ITIL best practices knowledge
✤ basic PMP knowledge
✤ basic COBIT knowledge
✤ good to awesome security knowledge
✤ advanced cloud platforms knowledge
✤ and of course:
✤ great communication skills
✤ good presentation
✤ self-managed
✤ self-motivated
Friday, May 10, 13
Difficulties a professional have to
deal with
✤ how to always keep up-to-date with technologies as a whole
✤ choosing the right technologies to be good at
✤ focusing too much on enhancing tech knowledge and forgeting about
behavioral skill set
✤ how to continuously position IT as strategic to the company
Friday, May 10, 13
Insights
✤ Cloud is not the problem, scaling IT is
✤ Spending less is possible, be creative
✤ Decide how YOU will enhance your career
By the way, that’s your job, not HR’s
✤ Infrastructure exists to support software, never forget that
Friday, May 10, 13
Conclusions
✤ Cloud demand a good understanding and creative solutions for load
balancing, clustering, fail-overs
✤ Cloud demand good knowledge of virtualization concepts
✤ Cloud demand a better understanding of security
✤ Cloud will force SysOps to have a more holistic view of IT
Friday, May 10, 13
thank you for your time =)
✤ facebook.com/eduardocoelholima
✤ slideshare.net/eduardocoelholima
✤ youtube.com/eduardocoelholima
Friday, May 10, 13

More Related Content

What's hot

Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevarajessica97
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Gloria flores
Gloria floresGloria flores
Gloria floresyaya700
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 

What's hot (20)

Powerpoint
PowerpointPowerpoint
Powerpoint
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
10things
10things10things
10things
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevara
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Gloria flores
Gloria floresGloria flores
Gloria flores
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 

Similar to Speaking - cloud computing and the sysop professional - how to get ready

Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Notes 21st century child navigating the digital world with your child 2015 -...
Notes 21st century child  navigating the digital world with your child 2015 -...Notes 21st century child  navigating the digital world with your child 2015 -...
Notes 21st century child navigating the digital world with your child 2015 -...Samuel Landete Benavente
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120jram2113
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social NetworksClint Hamada
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are EverywhereChristos Beretas
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2opiedog1
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 

Similar to Speaking - cloud computing and the sysop professional - how to get ready (17)

Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Notes 21st century child navigating the digital world with your child 2015 -...
Notes 21st century child  navigating the digital world with your child 2015 -...Notes 21st century child  navigating the digital world with your child 2015 -...
Notes 21st century child navigating the digital world with your child 2015 -...
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
The use of ict
The use of ictThe use of ict
The use of ict
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are Everywhere
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 

More from Eduardo Coelho

Dual stack IPv4 / IPv6 Security Issues - A simple proof of concept
Dual stack IPv4 / IPv6 Security Issues - A simple proof of conceptDual stack IPv4 / IPv6 Security Issues - A simple proof of concept
Dual stack IPv4 / IPv6 Security Issues - A simple proof of conceptEduardo Coelho
 
2013 09-21 e-learning, moodle and opensource - what do i have to do with it
2013 09-21 e-learning, moodle and opensource - what do i have to do with it 2013 09-21 e-learning, moodle and opensource - what do i have to do with it
2013 09-21 e-learning, moodle and opensource - what do i have to do with it Eduardo Coelho
 
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogosEduardo Coelho
 
2012 06-27 imersão academia de redes itcursos
2012 06-27 imersão academia de redes itcursos2012 06-27 imersão academia de redes itcursos
2012 06-27 imersão academia de redes itcursosEduardo Coelho
 
2012 06-05 porque voce precisa ser fera em linux.pdf
2012 06-05 porque voce precisa ser fera em linux.pdf2012 06-05 porque voce precisa ser fera em linux.pdf
2012 06-05 porque voce precisa ser fera em linux.pdfEduardo Coelho
 
2011 11-05 csi - valores pessoais
2011 11-05 csi - valores pessoais2011 11-05 csi - valores pessoais
2011 11-05 csi - valores pessoaisEduardo Coelho
 
2011 09-22 responsabilidade social, o profissional e a empresa.pdf
2011 09-22 responsabilidade social, o profissional e a empresa.pdf2011 09-22 responsabilidade social, o profissional e a empresa.pdf
2011 09-22 responsabilidade social, o profissional e a empresa.pdfEduardo Coelho
 
2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti
2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti
2011 04-26 estacio fcc - palestra cloud computing para o profissional de tiEduardo Coelho
 
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...Eduardo Coelho
 
2010 09-22 infra rn security meeting - palestra firewalls opensource
2010 09-22 infra rn security meeting - palestra firewalls opensource2010 09-22 infra rn security meeting - palestra firewalls opensource
2010 09-22 infra rn security meeting - palestra firewalls opensourceEduardo Coelho
 
2012 11-09 facex - i pv6 transition planning-
2012 11-09 facex - i pv6 transition planning-2012 11-09 facex - i pv6 transition planning-
2012 11-09 facex - i pv6 transition planning-Eduardo Coelho
 
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerceEduardo Coelho
 

More from Eduardo Coelho (13)

Dual stack IPv4 / IPv6 Security Issues - A simple proof of concept
Dual stack IPv4 / IPv6 Security Issues - A simple proof of conceptDual stack IPv4 / IPv6 Security Issues - A simple proof of concept
Dual stack IPv4 / IPv6 Security Issues - A simple proof of concept
 
2013 09-21 e-learning, moodle and opensource - what do i have to do with it
2013 09-21 e-learning, moodle and opensource - what do i have to do with it 2013 09-21 e-learning, moodle and opensource - what do i have to do with it
2013 09-21 e-learning, moodle and opensource - what do i have to do with it
 
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos
 
2012 06-27 imersão academia de redes itcursos
2012 06-27 imersão academia de redes itcursos2012 06-27 imersão academia de redes itcursos
2012 06-27 imersão academia de redes itcursos
 
2012 06-05 porque voce precisa ser fera em linux.pdf
2012 06-05 porque voce precisa ser fera em linux.pdf2012 06-05 porque voce precisa ser fera em linux.pdf
2012 06-05 porque voce precisa ser fera em linux.pdf
 
2011 11-05 csi - valores pessoais
2011 11-05 csi - valores pessoais2011 11-05 csi - valores pessoais
2011 11-05 csi - valores pessoais
 
2011 09-22 responsabilidade social, o profissional e a empresa.pdf
2011 09-22 responsabilidade social, o profissional e a empresa.pdf2011 09-22 responsabilidade social, o profissional e a empresa.pdf
2011 09-22 responsabilidade social, o profissional e a empresa.pdf
 
2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti
2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti
2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti
 
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...
 
2010 09-22 infra rn security meeting - palestra firewalls opensource
2010 09-22 infra rn security meeting - palestra firewalls opensource2010 09-22 infra rn security meeting - palestra firewalls opensource
2010 09-22 infra rn security meeting - palestra firewalls opensource
 
2012 11-09 facex - i pv6 transition planning-
2012 11-09 facex - i pv6 transition planning-2012 11-09 facex - i pv6 transition planning-
2012 11-09 facex - i pv6 transition planning-
 
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce
 
Firewalls Opensource
Firewalls OpensourceFirewalls Opensource
Firewalls Opensource
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Speaking - cloud computing and the sysop professional - how to get ready

  • 1. 10/May/2013 Cloud Computing and the SysOp Professional: How to get ready? Eduardo Coelho - Congresso UNIFACEX Friday, May 10, 13
  • 2. hold on ✤ before we get started, let me show you some interesting facts involving information security and privacy in our world Friday, May 10, 13
  • 3. Cryptogram newsletter published the following on 15/Apr/2013 ✤ One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. government and corporations were identified because they accessed Facebook from the same network infrastructure they used to carry out their attacks. ✤ Two: Hector Monsegur, one of the leaders of the LulzSec hacker movement, was identified and arrested last year by the FBI. Although he practiced good computer security and used an anonymous relay service to protect his identity, he slipped up. ✤ And three: Paula Broadwell, who had an affair with CIA director David Petraeus, similarly took extensive precautions to hide her identity. She never logged in to her anonymous e-mail service from her home network. Instead, she used hotel and other public networks when she e-mailed him. The FBI correlated hotel registration data from several different hotels -- and hers was the common name. Friday, May 10, 13
  • 4. (continuing) ✤ There are simply too many ways to be tracked. The Internet, e-mail, cell phones, web browsers, social networking sites, search engines: these have become necessities, and it's fanciful to expect people to simply refuse to use them just because they don't like the spying, especially since the full extent of such spying is deliberately hidden from us and there are few alternatives being marketed by companies that don't spy. ✤ This isn't something the free market can fix. We consumers have no choice in the matter. All the major companies that provide us with Internet services are interested in tracking us. Visit a website and it will almost certainly know who you are; there are lots of ways to be tracked without cookies. Cell phone companies routinely undo the web's privacy protection. One experiment at Carnegie Mellon took real-time videos of students on campus and was able to identify one-third of them by comparing their photos with publicly available tagged Facebook photos. ✤ Maintaining privacy on the Internet is nearly impossible. If you forget even once to enable your protections, or click on the wrong link, or type the wrong thing, you've permanently attached your name to whatever anonymous service you're using. Monsegur slipped up once, and the FBI got him. If the director of the CIA can't maintain his privacy on the Internet, we've got no hope. Friday, May 10, 13
  • 5. (continuing) ✤ So, we're done. Welcome to a world where Google knows exactly what sort of porn you all like, and more about your interests than your spouse does. Welcome to a world where your cell phone company knows exactly where you are all the time. Welcome to the end of private conversations, because increasingly your conversations are conducted by e-mail, text, or social networking sites. ✤ And welcome to a world where all of this, and everything else that you do or is done on a computer, is saved, correlated, studied, passed around from company to company without your knowledge or consent; and where the government accesses it at will without a warrant. ✤ Welcome to an Internet without privacy, and we've ended up here with hardly a fight. Friday, May 10, 13
  • 6. Thoughts ✤ How many people actually understand how all of this impacts our life? ✤ How good is it to be an IT professional which are probably in the best position to fully antecipate bad outcomes and prevent bad things? Friday, May 10, 13
  • 7. Now let’s focus on the IT PRO ✤ Which is the set of abilities that will (is) be asked of System Operators and Network Admins? Friday, May 10, 13
  • 8. By the way, what SysOp stands for? (or will stand for) ✤ Windows Server Professionals ✤ Unix/Linux Server Professionals ✤ Network Appliance Professionals ✤ Security Officers ✤ DBAs ✤ Any above, but Management-focused Friday, May 10, 13
  • 9. The best SysOp in a nutshell ✤ basic dev knowledge ✤ basic ITIL best practices knowledge ✤ basic PMP knowledge ✤ basic COBIT knowledge ✤ good to awesome security knowledge ✤ advanced cloud platforms knowledge ✤ and of course: ✤ great communication skills ✤ good presentation ✤ self-managed ✤ self-motivated Friday, May 10, 13
  • 10. Difficulties a professional have to deal with ✤ how to always keep up-to-date with technologies as a whole ✤ choosing the right technologies to be good at ✤ focusing too much on enhancing tech knowledge and forgeting about behavioral skill set ✤ how to continuously position IT as strategic to the company Friday, May 10, 13
  • 11. Insights ✤ Cloud is not the problem, scaling IT is ✤ Spending less is possible, be creative ✤ Decide how YOU will enhance your career By the way, that’s your job, not HR’s ✤ Infrastructure exists to support software, never forget that Friday, May 10, 13
  • 12. Conclusions ✤ Cloud demand a good understanding and creative solutions for load balancing, clustering, fail-overs ✤ Cloud demand good knowledge of virtualization concepts ✤ Cloud demand a better understanding of security ✤ Cloud will force SysOps to have a more holistic view of IT Friday, May 10, 13
  • 13. thank you for your time =) ✤ facebook.com/eduardocoelholima ✤ slideshare.net/eduardocoelholima ✤ youtube.com/eduardocoelholima Friday, May 10, 13