This video will explain about different scenarios for SSL/TLS Termination in Application Load Balancer (ALB) / Network Load Balancer (NLB)
Youtube link : https://youtu.be/CS8OsLFsQJ0
How to Setup Language Model Locally without Code — LM Studio.pptxujjwalsoni23
Welcome to a groundbreaking tutorial on effortlessly setting up language models locally without a single line of code!
In this step-by-step guide, we'll dive into the world of LM Studio, unlocking the secrets to seamless language model deployment on your own machine. Whether you're a seasoned developer or a complete beginner, this tutorial is designed to empower you with the skills to master local setup without the complexities of coding.
Join us as we demystify the process, making AI accessible to everyone. Get ready to unleash the power of language models with LM Studio – your ticket to simplified, code-free AI magic!
Video URL : https://youtu.be/_8LaGrbNr0chttps://youtu.be/_8LaGrbNr0c
Unlock the Power of Conversations - Building a Chatbot with Gemini Pro Free A...ujjwalsoni23
Welcome to a journey into the realm of AI conversations! 🚀 In this tutorial, we delve into the art of crafting a sophisticated chatbot for Conversational Q&A using the incredible Gemini Pro Free API. Join us as we unlock the potential of natural language processing and build a chatbot that engages, informs, and elevates user experiences.
🌐 Key Features:
Step-by-step guide to setting up and integrating the Gemini Pro Free API.
Harness the capabilities of advanced natural language processing for dynamic conversational interactions.
Learn how to tailor your chatbot to answer user queries effectively, enhancing user engagement.
🤖 Why Watch This Tutorial:
Whether you're a seasoned developer or exploring the world of chatbots for the first time, this tutorial offers a comprehensive overview. Gain insights into the intricacies of building a conversational AI application and witness the transformative potential of Gemini Pro Free API.
📚 Resources Mentioned:
Gemini Pro Free API Documentation
Code Repository
👩💻 Who Can Benefit:
Developers, AI enthusiasts, and anyone intrigued by the future of conversational interfaces will find value in this tutorial. No prior chatbot development experience required—just a passion for innovation!
🔗 Explore Further:
Ready to embark on your journey into conversational AI? Dive into the tutorial now and unlock the door to limitless possibilities with the Gemini Pro Free API. Subscribe, like, and share to stay updated on the latest in AI and chatbot development!
#ChatbotDevelopment #GeminiProAPI #ConversationalAI #AIProgramming #TechTutorial
How to Access and Use Gemini API for Free.pptxujjwalsoni23
Embark on a journey into the world of advanced AI with our latest tutorial! In this hands-on session, we'll guide you through the steps to access and utilize the powerful Gemini API for free. Uncover the potential of AI-driven capabilities as we demonstrate how to integrate Gemini seamlessly into your projects using a simple and cost-free approach.
What to Expect:
Introduction to Gemini API: Learn about the innovative Gemini model developed by Google and discover its multifaceted capabilities in transforming your projects.
Free Access Tutorial: Follow along as we provide step-by-step guidance on accessing the Gemini API without any cost. Unlock the door to advanced AI functionalities for your projects.
Integration Walkthrough: Dive into a practical demonstration of how to integrate Gemini into your applications using a user-friendly approach. Whether you're a seasoned developer or a beginner, this tutorial caters to all skill levels.
Real-world Examples: Explore real-world use cases where Gemini's capabilities shine. From text generation to image understanding, witness the AI magic in action.
Q&A and Troubleshooting: We've got you covered! Engage in a live Q&A session where we address your queries and troubleshoot any challenges you may encounter during the tutorial.
Join us in this exciting hands-on session and empower your projects with the transformative capabilities of Gemini API – all for free! Don't miss out on this opportunity to elevate your AI game. Subscribe now and be part of the AI revolution! 🚀🤖 #GeminiAPI #FreeAccess #AIRevolution #HandsOnTutorial
Building Better AWS Lambdas: Unlocking the Power of Layersujjwalsoni23
Welcome to a comprehensive hands-on demonstration of AWS Lambda layers! In this tutorial, we'll delve into the powerful world of Lambda layers, unlocking their potential to streamline your serverless applications on Amazon Web Services.
Join us as we guide you through a step-by-step walkthrough, illustrating how Lambda layers can optimize code reuse, enhance development efficiency, and simplify your AWS Lambda functions. From understanding the fundamentals to implementing practical examples, this tutorial is designed for both beginners and seasoned developers looking to leverage the full capabilities of Lambda layers.
Discover how to organize dependencies, manage shared libraries, and elevate your serverless architecture with this in-depth exploration. Whether you're a developer, cloud enthusiast, or AWS professional, this hands-on session will equip you with the knowledge and skills to elevate your AWS Lambda game.
Don't miss out on this opportunity to master AWS Lambda layers and revolutionize your serverless applications. Hit play and embark on a transformative journey into the world of Lambda layers today!
Exploring Private Hosted Zones in Route 53 A Hands-On Workshop.pptxujjwalsoni23
A private hosted zone in Amazon Route 53 is a DNS (Domain Name System) configuration that allows you to create and manage custom domain names within your Virtual Private Cloud (VPC) for use with internal resources. It enables you to resolve domain names to private IP addresses within your VPC, providing a way to access resources such as instances, load balancers, and other services using user-friendly domain names, while keeping the DNS resolution isolated to your VPC network.
Private hosted zones are particularly useful for scenarios where you want to maintain separation between your internal network resources and external resources, ensuring that your private domain names do not get resolved outside of your VPC. This can enhance security and simplify access to resources within your VPC by using familiar domain names.
In summary, a private hosted zone in Route 53 offers a controlled and secure method for managing DNS records for your internal resources within your Amazon Web Services (AWS) Virtual Private Cloud environment.
Thanks for watching this video.
Do like and subscribe my channel.
Copying and Sharing Amazon Machine Image (AMI) and Snapshots - Hands-on Sessionujjwalsoni23
Welcome to this exciting hands-on session, where we will dive into the world of Amazon Machine Images (AMIs) and Snapshots. In this interactive workshop, you will gain practical experience and insights into copying and sharing these essential components in Amazon Web Services (AWS).
Session Overview:
During this session, we will cover the following key topics:
Copying AMIs:
Step-by-step guide on duplicating AMIs across regions.
Best practices for efficient AMI copying.
Sharing AMIs:
How to securely share AMIs with other AWS accounts.
Granting permissions and setting up sharing options.
Hands-On Experience:
This session is designed to provide you with hands-on experience. You will have access to AWS Management Console to follow along with our instructors as we demonstrate each concept. Please make sure you have an active AWS account and access to the AWS Management Console.
Prerequisites:
To make the most out of this session, it is recommended to have basic knowledge of AWS services and a fundamental understanding of cloud computing concepts.
Join us for this immersive workshop to learn invaluable skills in managing AMIs and snapshots efficiently, enabling you to optimize your AWS infrastructure and streamline your cloud operations.
Don't miss this opportunity to enhance your AWS expertise and elevate your cloud capabilities. Let's dive into the world of AMIs and snapshots together!
Please note that this session is limited to a specific duration. However, AWS offers a vast range of services and possibilities that go beyond this hands-on workshop. We encourage you to continue exploring the AWS ecosystem and take advantage of the multitude of resources available to support your cloud journey.
Get ready to empower your cloud expertise with practical insights in copying and sharing AMIs and snapshots. Let's begin this exciting session!
Hands-On Lab for Locating client IP address from EC2 when using Network Load ...ujjwalsoni23
Hands-on session for Locating Source IP Address in EC2 with Network Load Balancer while adding Instance or IP as Targets.
Youtube link : https://youtu.be/lG4Z1vSJaqk
AWS Global Infrastructure - Regional Edge Cacheujjwalsoni23
In November 2016, AWS announced a new type of Edge Location, called a Regional Edge Cache. These sit between your CloudFront Origin servers and the Edge Locations. A Regional Edge Cache has a larger cache-width than each of the individual Edge Locations, and because data expires from the cache at the Edge Locations, the data is retained at the Regional Edge Caches.
Therefore, when data is requested at the Edge Location that is no longer available, the Edge Location can retrieve the cached data from the Regional Edge Cache instead of the Origin servers, which would have a higher latency.
How to Setup Language Model Locally without Code — LM Studio.pptxujjwalsoni23
Welcome to a groundbreaking tutorial on effortlessly setting up language models locally without a single line of code!
In this step-by-step guide, we'll dive into the world of LM Studio, unlocking the secrets to seamless language model deployment on your own machine. Whether you're a seasoned developer or a complete beginner, this tutorial is designed to empower you with the skills to master local setup without the complexities of coding.
Join us as we demystify the process, making AI accessible to everyone. Get ready to unleash the power of language models with LM Studio – your ticket to simplified, code-free AI magic!
Video URL : https://youtu.be/_8LaGrbNr0chttps://youtu.be/_8LaGrbNr0c
Unlock the Power of Conversations - Building a Chatbot with Gemini Pro Free A...ujjwalsoni23
Welcome to a journey into the realm of AI conversations! 🚀 In this tutorial, we delve into the art of crafting a sophisticated chatbot for Conversational Q&A using the incredible Gemini Pro Free API. Join us as we unlock the potential of natural language processing and build a chatbot that engages, informs, and elevates user experiences.
🌐 Key Features:
Step-by-step guide to setting up and integrating the Gemini Pro Free API.
Harness the capabilities of advanced natural language processing for dynamic conversational interactions.
Learn how to tailor your chatbot to answer user queries effectively, enhancing user engagement.
🤖 Why Watch This Tutorial:
Whether you're a seasoned developer or exploring the world of chatbots for the first time, this tutorial offers a comprehensive overview. Gain insights into the intricacies of building a conversational AI application and witness the transformative potential of Gemini Pro Free API.
📚 Resources Mentioned:
Gemini Pro Free API Documentation
Code Repository
👩💻 Who Can Benefit:
Developers, AI enthusiasts, and anyone intrigued by the future of conversational interfaces will find value in this tutorial. No prior chatbot development experience required—just a passion for innovation!
🔗 Explore Further:
Ready to embark on your journey into conversational AI? Dive into the tutorial now and unlock the door to limitless possibilities with the Gemini Pro Free API. Subscribe, like, and share to stay updated on the latest in AI and chatbot development!
#ChatbotDevelopment #GeminiProAPI #ConversationalAI #AIProgramming #TechTutorial
How to Access and Use Gemini API for Free.pptxujjwalsoni23
Embark on a journey into the world of advanced AI with our latest tutorial! In this hands-on session, we'll guide you through the steps to access and utilize the powerful Gemini API for free. Uncover the potential of AI-driven capabilities as we demonstrate how to integrate Gemini seamlessly into your projects using a simple and cost-free approach.
What to Expect:
Introduction to Gemini API: Learn about the innovative Gemini model developed by Google and discover its multifaceted capabilities in transforming your projects.
Free Access Tutorial: Follow along as we provide step-by-step guidance on accessing the Gemini API without any cost. Unlock the door to advanced AI functionalities for your projects.
Integration Walkthrough: Dive into a practical demonstration of how to integrate Gemini into your applications using a user-friendly approach. Whether you're a seasoned developer or a beginner, this tutorial caters to all skill levels.
Real-world Examples: Explore real-world use cases where Gemini's capabilities shine. From text generation to image understanding, witness the AI magic in action.
Q&A and Troubleshooting: We've got you covered! Engage in a live Q&A session where we address your queries and troubleshoot any challenges you may encounter during the tutorial.
Join us in this exciting hands-on session and empower your projects with the transformative capabilities of Gemini API – all for free! Don't miss out on this opportunity to elevate your AI game. Subscribe now and be part of the AI revolution! 🚀🤖 #GeminiAPI #FreeAccess #AIRevolution #HandsOnTutorial
Building Better AWS Lambdas: Unlocking the Power of Layersujjwalsoni23
Welcome to a comprehensive hands-on demonstration of AWS Lambda layers! In this tutorial, we'll delve into the powerful world of Lambda layers, unlocking their potential to streamline your serverless applications on Amazon Web Services.
Join us as we guide you through a step-by-step walkthrough, illustrating how Lambda layers can optimize code reuse, enhance development efficiency, and simplify your AWS Lambda functions. From understanding the fundamentals to implementing practical examples, this tutorial is designed for both beginners and seasoned developers looking to leverage the full capabilities of Lambda layers.
Discover how to organize dependencies, manage shared libraries, and elevate your serverless architecture with this in-depth exploration. Whether you're a developer, cloud enthusiast, or AWS professional, this hands-on session will equip you with the knowledge and skills to elevate your AWS Lambda game.
Don't miss out on this opportunity to master AWS Lambda layers and revolutionize your serverless applications. Hit play and embark on a transformative journey into the world of Lambda layers today!
Exploring Private Hosted Zones in Route 53 A Hands-On Workshop.pptxujjwalsoni23
A private hosted zone in Amazon Route 53 is a DNS (Domain Name System) configuration that allows you to create and manage custom domain names within your Virtual Private Cloud (VPC) for use with internal resources. It enables you to resolve domain names to private IP addresses within your VPC, providing a way to access resources such as instances, load balancers, and other services using user-friendly domain names, while keeping the DNS resolution isolated to your VPC network.
Private hosted zones are particularly useful for scenarios where you want to maintain separation between your internal network resources and external resources, ensuring that your private domain names do not get resolved outside of your VPC. This can enhance security and simplify access to resources within your VPC by using familiar domain names.
In summary, a private hosted zone in Route 53 offers a controlled and secure method for managing DNS records for your internal resources within your Amazon Web Services (AWS) Virtual Private Cloud environment.
Thanks for watching this video.
Do like and subscribe my channel.
Copying and Sharing Amazon Machine Image (AMI) and Snapshots - Hands-on Sessionujjwalsoni23
Welcome to this exciting hands-on session, where we will dive into the world of Amazon Machine Images (AMIs) and Snapshots. In this interactive workshop, you will gain practical experience and insights into copying and sharing these essential components in Amazon Web Services (AWS).
Session Overview:
During this session, we will cover the following key topics:
Copying AMIs:
Step-by-step guide on duplicating AMIs across regions.
Best practices for efficient AMI copying.
Sharing AMIs:
How to securely share AMIs with other AWS accounts.
Granting permissions and setting up sharing options.
Hands-On Experience:
This session is designed to provide you with hands-on experience. You will have access to AWS Management Console to follow along with our instructors as we demonstrate each concept. Please make sure you have an active AWS account and access to the AWS Management Console.
Prerequisites:
To make the most out of this session, it is recommended to have basic knowledge of AWS services and a fundamental understanding of cloud computing concepts.
Join us for this immersive workshop to learn invaluable skills in managing AMIs and snapshots efficiently, enabling you to optimize your AWS infrastructure and streamline your cloud operations.
Don't miss this opportunity to enhance your AWS expertise and elevate your cloud capabilities. Let's dive into the world of AMIs and snapshots together!
Please note that this session is limited to a specific duration. However, AWS offers a vast range of services and possibilities that go beyond this hands-on workshop. We encourage you to continue exploring the AWS ecosystem and take advantage of the multitude of resources available to support your cloud journey.
Get ready to empower your cloud expertise with practical insights in copying and sharing AMIs and snapshots. Let's begin this exciting session!
Hands-On Lab for Locating client IP address from EC2 when using Network Load ...ujjwalsoni23
Hands-on session for Locating Source IP Address in EC2 with Network Load Balancer while adding Instance or IP as Targets.
Youtube link : https://youtu.be/lG4Z1vSJaqk
AWS Global Infrastructure - Regional Edge Cacheujjwalsoni23
In November 2016, AWS announced a new type of Edge Location, called a Regional Edge Cache. These sit between your CloudFront Origin servers and the Edge Locations. A Regional Edge Cache has a larger cache-width than each of the individual Edge Locations, and because data expires from the cache at the Edge Locations, the data is retained at the Regional Edge Caches.
Therefore, when data is requested at the Edge Location that is no longer available, the Edge Location can retrieve the cached data from the Regional Edge Cache instead of the Origin servers, which would have a higher latency.
AWS Global Infrastructure - Regions.pptxujjwalsoni23
An AWS Region is a cluster of data centers in a specific geographic area, such as the Northeastern United States or Western Europe. It is a best practice to choose a region that is geographically close to users; this reduces latency because data reaches the users more quickly.
Each AWS Region includes multiple AZs. However, each AZ is restricted to a specific AWS Region. You can use multiple AZs within one Region, but you can't use the same AZ across multiple Regions.
AWS Global Infrastructure - Availability Zone.pptxujjwalsoni23
AZs are essentially the physical data centers of AWS. This is where the actual compute, storage, network, and database resources are hosted that we as consumers provision within our Virtual Private Clouds (VPCs). A common misconception is that a single availability zone is equal to a single data center. This is not the case. In fact, it’s likely that multiple data centers located close together form a single availability zone.
Each AZ will always have at least one other AZ that is geographically located within the same area, usually a city, linked by highly resilient and very low latency private fiber optic connections. However, each AZ will be isolated from the others using separate power and network connectivity that minimizes impact to other AZs should a single AZ fail.
Link : https://aws.amazon.com/about-aws/global-infrastructure/
In this video I'm going to show you how too speed up the cold start time of AWS Lambda functions by up to 10x at no extra cost, using the new AWS Lambda SnapStart feature.
Youtube video link https://www.youtube.com/watch?v=iwi_2DIMEz8
#AWS #AWSinFiveMinutesOrLess #Serverless
Storage Gateway is a service in AWS that connects an on-premises software appliance with the cloud-based storage to provide secure integration between an organization's on-premises IT environment and AWS storage infrastructure.
1) Storage Gateway service allows you to securely store the data in AWS cloud for the scalable and cost-effective storage.
2) Storage Gateway is a virtual appliance which is installed in a hypervisor running in a Data center used to replicate the information to the AWS particularly S3.
3) Amazon Storage Gateway's virtual appliance is available for download as a virtual machine (VM) image which you can install on a host in your data center.
4) Storage Gateway supports either Vmware EXI or Microsoft Hyper-V.
Once you have installed the storage gateway, link it with your AWS account through the activation process, and then you can use the AWS Management Console to create the storage gateway option.
There are three types of Storage Gateways:
1) File Gateway (NFS)
2) Volume Gateway (iSCSI)
3) Tape Gateway (VTL)
AWS NAT Gateway in a Nutshell
NAT gateway enables instance in Private Subnet to connect to the internet or other AWS services but prevent the internet from initiating a connection with those instances.
How NAT works
NAT device has an Elastic IP address and is connected to the Internet through an internet gateway.
When we connect an instance in a private subnet through the NAT device, which routes traffic from the instance to the internet gateway and routes any response to the instance
NAT maps multiple private IPv4 addresses to a single public IPv4 address.
This is the same as for SSE, that is, the KMS in the IAM service is used to manage shared keys. The client can use the key ID (the ARN) to refer to a key, which is then accessed by the client for encryption and decryption purposes. Note that each object is encrypted using a dedicated key, and the KMS key is used to secure the per-object keys.
Amazon S3 Server-Side Encryption with S3-Managed Keys – SSE-S3.pptxujjwalsoni23
Server-Side Encryption with S3-Managed Keys – SSE-S3
Each object is encrypted with a unique data key employing strong multi-factor encryption.
SSE-S3 encrypts the data key with a master key that is regularly rotated.
S3 server-side encryption uses one of the strongest block ciphers available, 256-bit Advanced Encryption Standard (AES-256), to encrypt the data.
Whether or not objects are encrypted with SSE-S3 can’t be enforced when they are uploaded using pre-signed URLs, because the only way server-side encryption can be specified is through the AWS Management Console or through an HTTP request header Must set header x-amz-server-side-encryption to AES-256
For enforcing server-side encryption for all of the objects that are stored in a bucket, use a bucket policy that denies permissions to upload an object unless the request includes x-amz-server-side-encryption header to request server-side encryption
Azure Resource Manager is the deployment and management service for Azure. It provides a management layer that enables you to create, update, and delete resources in your Azure account. You use management features, like access control, locks, and tags, to secure and organize your resources after deployment.
Hybrid Cloud File Sharing Using Azure File Sync | Azure File Sync with AWS
What is Azure File Sync?
Azure File Sync centralizes your company's file shares in Azure Files. Azure File Sync transforms Windows Servers running on-premises or in the cloud into a quick cache of your Azure file share. When you choose Azure File Sync, you do not need to sacrifice the flexibility, performance, or compatibility of an on-premises file server. Any protocol supported by Windows Server, including SMB, NFS, and FTPS, can be used to access the data locally.
Lab Steps:
1) Logging in to AWS Portal and Launch Windows Server 2019 VM
2) Logging in to the Microsoft Azure Portal
3) Creating a Storage Sync Service
4) Creating a File Share in Azure Files
5) Creating a Sync Group
6) Connecting to AWS Virtual Machine (RDP)
7) Installing the File Sync Agent and Registering the Windows VM
8) Creating a Server Endpoint in the Sync Group
9) Testing the Sync Group with One Server Endpoint
Video Link : https://www.youtube.com/watch?v=pT3eRMps9so
Hack proof your aws account in 8 easy stepsujjwalsoni23
Hack proof your aws account in 8 easy steps
Steps for Safeguarding your AWS Account
1. Enable MFA for your root account and keep a strong password.
2. Avoid using your root account for Daily Activities on AWS.
3. Create an IAM user and assign least Privilege to that user.
4. Restrict Security groups.
5. Check all Public S3 Buckets and make sure no user data gets compromised.
6. Make sure EC2 volumes, S3 Buckets are Encrypted.
7. Make sure Keys are rotated on regular basis.
8. Follow Trusted Advisor Recommendations
Setup cross account access between twi accounts in AWS as read onlyujjwalsoni23
1. Have two accounts i.e. Account A and Account B where Account B needs to be granted Read-Only Access to Account A
2. Create Role in Account A which has policy for ReadOnlyAccess for Account B (Another AWS Account option under create Role)
3. Create an IAM user in Account B and create inline role which assumes role created in Account A – Put ARN of Role you created in Account A
4. Click on Switch Roles in Account B and enter Role Name, Account ID of Account A.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
AWS Global Infrastructure - Regions.pptxujjwalsoni23
An AWS Region is a cluster of data centers in a specific geographic area, such as the Northeastern United States or Western Europe. It is a best practice to choose a region that is geographically close to users; this reduces latency because data reaches the users more quickly.
Each AWS Region includes multiple AZs. However, each AZ is restricted to a specific AWS Region. You can use multiple AZs within one Region, but you can't use the same AZ across multiple Regions.
AWS Global Infrastructure - Availability Zone.pptxujjwalsoni23
AZs are essentially the physical data centers of AWS. This is where the actual compute, storage, network, and database resources are hosted that we as consumers provision within our Virtual Private Clouds (VPCs). A common misconception is that a single availability zone is equal to a single data center. This is not the case. In fact, it’s likely that multiple data centers located close together form a single availability zone.
Each AZ will always have at least one other AZ that is geographically located within the same area, usually a city, linked by highly resilient and very low latency private fiber optic connections. However, each AZ will be isolated from the others using separate power and network connectivity that minimizes impact to other AZs should a single AZ fail.
Link : https://aws.amazon.com/about-aws/global-infrastructure/
In this video I'm going to show you how too speed up the cold start time of AWS Lambda functions by up to 10x at no extra cost, using the new AWS Lambda SnapStart feature.
Youtube video link https://www.youtube.com/watch?v=iwi_2DIMEz8
#AWS #AWSinFiveMinutesOrLess #Serverless
Storage Gateway is a service in AWS that connects an on-premises software appliance with the cloud-based storage to provide secure integration between an organization's on-premises IT environment and AWS storage infrastructure.
1) Storage Gateway service allows you to securely store the data in AWS cloud for the scalable and cost-effective storage.
2) Storage Gateway is a virtual appliance which is installed in a hypervisor running in a Data center used to replicate the information to the AWS particularly S3.
3) Amazon Storage Gateway's virtual appliance is available for download as a virtual machine (VM) image which you can install on a host in your data center.
4) Storage Gateway supports either Vmware EXI or Microsoft Hyper-V.
Once you have installed the storage gateway, link it with your AWS account through the activation process, and then you can use the AWS Management Console to create the storage gateway option.
There are three types of Storage Gateways:
1) File Gateway (NFS)
2) Volume Gateway (iSCSI)
3) Tape Gateway (VTL)
AWS NAT Gateway in a Nutshell
NAT gateway enables instance in Private Subnet to connect to the internet or other AWS services but prevent the internet from initiating a connection with those instances.
How NAT works
NAT device has an Elastic IP address and is connected to the Internet through an internet gateway.
When we connect an instance in a private subnet through the NAT device, which routes traffic from the instance to the internet gateway and routes any response to the instance
NAT maps multiple private IPv4 addresses to a single public IPv4 address.
This is the same as for SSE, that is, the KMS in the IAM service is used to manage shared keys. The client can use the key ID (the ARN) to refer to a key, which is then accessed by the client for encryption and decryption purposes. Note that each object is encrypted using a dedicated key, and the KMS key is used to secure the per-object keys.
Amazon S3 Server-Side Encryption with S3-Managed Keys – SSE-S3.pptxujjwalsoni23
Server-Side Encryption with S3-Managed Keys – SSE-S3
Each object is encrypted with a unique data key employing strong multi-factor encryption.
SSE-S3 encrypts the data key with a master key that is regularly rotated.
S3 server-side encryption uses one of the strongest block ciphers available, 256-bit Advanced Encryption Standard (AES-256), to encrypt the data.
Whether or not objects are encrypted with SSE-S3 can’t be enforced when they are uploaded using pre-signed URLs, because the only way server-side encryption can be specified is through the AWS Management Console or through an HTTP request header Must set header x-amz-server-side-encryption to AES-256
For enforcing server-side encryption for all of the objects that are stored in a bucket, use a bucket policy that denies permissions to upload an object unless the request includes x-amz-server-side-encryption header to request server-side encryption
Azure Resource Manager is the deployment and management service for Azure. It provides a management layer that enables you to create, update, and delete resources in your Azure account. You use management features, like access control, locks, and tags, to secure and organize your resources after deployment.
Hybrid Cloud File Sharing Using Azure File Sync | Azure File Sync with AWS
What is Azure File Sync?
Azure File Sync centralizes your company's file shares in Azure Files. Azure File Sync transforms Windows Servers running on-premises or in the cloud into a quick cache of your Azure file share. When you choose Azure File Sync, you do not need to sacrifice the flexibility, performance, or compatibility of an on-premises file server. Any protocol supported by Windows Server, including SMB, NFS, and FTPS, can be used to access the data locally.
Lab Steps:
1) Logging in to AWS Portal and Launch Windows Server 2019 VM
2) Logging in to the Microsoft Azure Portal
3) Creating a Storage Sync Service
4) Creating a File Share in Azure Files
5) Creating a Sync Group
6) Connecting to AWS Virtual Machine (RDP)
7) Installing the File Sync Agent and Registering the Windows VM
8) Creating a Server Endpoint in the Sync Group
9) Testing the Sync Group with One Server Endpoint
Video Link : https://www.youtube.com/watch?v=pT3eRMps9so
Hack proof your aws account in 8 easy stepsujjwalsoni23
Hack proof your aws account in 8 easy steps
Steps for Safeguarding your AWS Account
1. Enable MFA for your root account and keep a strong password.
2. Avoid using your root account for Daily Activities on AWS.
3. Create an IAM user and assign least Privilege to that user.
4. Restrict Security groups.
5. Check all Public S3 Buckets and make sure no user data gets compromised.
6. Make sure EC2 volumes, S3 Buckets are Encrypted.
7. Make sure Keys are rotated on regular basis.
8. Follow Trusted Advisor Recommendations
Setup cross account access between twi accounts in AWS as read onlyujjwalsoni23
1. Have two accounts i.e. Account A and Account B where Account B needs to be granted Read-Only Access to Account A
2. Create Role in Account A which has policy for ReadOnlyAccess for Account B (Another AWS Account option under create Role)
3. Create an IAM user in Account B and create inline role which assumes role created in Account A – Put ARN of Role you created in Account A
4. Click on Switch Roles in Account B and enter Role Name, Account ID of Account A.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.