Presentation from Toronto's 2016 Canadian Executive Cloud & DevOps Summit on Friday, November 4th.
Speaker: Dave Millier, Chief Executive Officer, Uzado, Inc.
Title: Rogue Development: Staying Secure When Moving to the Cloud
Presentation from Toronto's 2016 Canadian Executive Cloud & DevOps Summit on Friday, November 4th.
Speaker: Eric Gales, Director of AWS Canada
Title: Rogue Development: The New Normal
Eric Gales provides valuable insight about Amazon Web Services in Canada and discusses the importance of DevOps at the Canadian Executive Cloud & DevOps Summit in Toronto on June 9, 2017.
Virtual Desktops on AWS by Mike Burke, Farm Credit CanadaTriNimbus
Mike Burke, Velocity Enablement Manager at Farm Credit Canada presented at the Canadian Executive Cloud & DevOps Summit on June 9, 2017 in Toronto, ON hosted by TriNimbus Technologies.
Justin Fox from NuData Security, A Mastercard Company presents at the Canadian Executive Cloud & DevOps Summit in Toronto, June 9, 2017 on the topic "Security your DevOps Pipeline".
Dan Crawford - Canadian Executive Cloud & DevOps Summit PresentationTriNimbus
Dan Crawford of Klashwerks presents at the Canadian Executive Cloud & DevOps Summit on June 9, 2017 in Toronto, ON on the topic of "Transforming Ideas Into Reality Using Serverless Technologies"
Darin Briskman, Amazon Web Services delivers a keynote at the Canadian Executive Cloud & DevOps Summit in Toronto on June 9, 2017 on the topic of Artificial Intelligence.
Agility and Control from AWS [FutureStack16]New Relic
The document discusses how DevOps practices can help organizations operate at hyper scale with AWS. It notes that software delivery has changed and disruption is faster than ever. It outlines some key DevOps tools needed like CI/CD pipelines for managing releases, testing, and deploying applications. The document discusses how Amazon transformed its development practices using microservices and pipelines to allow for faster delivery. It provides examples of how other companies have benefited from DevOps. Finally, it highlights some key AWS services that can help with DevOps practices like monitoring, infrastructure as code, and continuous integration/delivery pipelines.
Smaller is Better - Exploiting Microservice Architectures on AWS - Technical 201Amazon Web Services
Microservice oriented architectures have been implemented and deployed by many and are on the near-term agenda of many others. However, the distributed nature of microservices is a double edged sword, being the source of many of the benefits, but also the source of the pain and confusion that teams have endured. We will review best practices and recommended architectures for deploying microservices on AWS with a focus on how to exploit the benefits of microservices to decrease feature cycle times and costs while increasing reliability, scalability, and overall operational efficiency.
Speaker: Craig Dickson, Solutions Architect, Amazon Web Services
Featured Customer - MYOB
Presentation from Toronto's 2016 Canadian Executive Cloud & DevOps Summit on Friday, November 4th.
Speaker: Eric Gales, Director of AWS Canada
Title: Rogue Development: The New Normal
Eric Gales provides valuable insight about Amazon Web Services in Canada and discusses the importance of DevOps at the Canadian Executive Cloud & DevOps Summit in Toronto on June 9, 2017.
Virtual Desktops on AWS by Mike Burke, Farm Credit CanadaTriNimbus
Mike Burke, Velocity Enablement Manager at Farm Credit Canada presented at the Canadian Executive Cloud & DevOps Summit on June 9, 2017 in Toronto, ON hosted by TriNimbus Technologies.
Justin Fox from NuData Security, A Mastercard Company presents at the Canadian Executive Cloud & DevOps Summit in Toronto, June 9, 2017 on the topic "Security your DevOps Pipeline".
Dan Crawford - Canadian Executive Cloud & DevOps Summit PresentationTriNimbus
Dan Crawford of Klashwerks presents at the Canadian Executive Cloud & DevOps Summit on June 9, 2017 in Toronto, ON on the topic of "Transforming Ideas Into Reality Using Serverless Technologies"
Darin Briskman, Amazon Web Services delivers a keynote at the Canadian Executive Cloud & DevOps Summit in Toronto on June 9, 2017 on the topic of Artificial Intelligence.
Agility and Control from AWS [FutureStack16]New Relic
The document discusses how DevOps practices can help organizations operate at hyper scale with AWS. It notes that software delivery has changed and disruption is faster than ever. It outlines some key DevOps tools needed like CI/CD pipelines for managing releases, testing, and deploying applications. The document discusses how Amazon transformed its development practices using microservices and pipelines to allow for faster delivery. It provides examples of how other companies have benefited from DevOps. Finally, it highlights some key AWS services that can help with DevOps practices like monitoring, infrastructure as code, and continuous integration/delivery pipelines.
Smaller is Better - Exploiting Microservice Architectures on AWS - Technical 201Amazon Web Services
Microservice oriented architectures have been implemented and deployed by many and are on the near-term agenda of many others. However, the distributed nature of microservices is a double edged sword, being the source of many of the benefits, but also the source of the pain and confusion that teams have endured. We will review best practices and recommended architectures for deploying microservices on AWS with a focus on how to exploit the benefits of microservices to decrease feature cycle times and costs while increasing reliability, scalability, and overall operational efficiency.
Speaker: Craig Dickson, Solutions Architect, Amazon Web Services
Featured Customer - MYOB
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCCA Technologies
Cloud computing started a technology revolution; now DevOps is driving that revolution forward. By enabling new approaches to service delivery, cloud and DevOps together are delivering even greater speed, agility and efficiency. No wonder leading innovators are adopting DevOps and cloud together! This presentation explores the synergies in these two approaches, with practical tips, techniques, research data, war stories, case studies and recommendations.
Security at the Speed of Software DevelopmentDevOps.com
This document proposes a 3-part framework for adopting DevSecOps practices and culture change. The first part is to win over developers by building trust between security and development teams. The second part is to make security practices easy for developers to understand and implement. Visual tools are proposed to show maturity levels and guide progress. The third part is to provide transparency to management on adoption status through regular reporting. Easy-to-use security tools integrated into the development pipeline are also recommended, starting with software composition analysis and integrating static and interactive application security testing.
Delivering DevOps on AWS: Accelerating Software Delivery with AWS Developer T...Amazon Web Services
Software release cycles are now measured in days, rather than months. Cutting-edge companies continually deliver high-quality software at a fast pace to remain competitive. In this session, we cover how you can begin your DevOps journey by sharing best practices and tools used by Amazon’s two pizza engineering teams. We’ll showcase how you can accelerate developer productivity by implementing continuous integration and delivery workflows. We’ll also provide an introduction to AWS CodeStar, AWS CodeCommit, AWS CodeBuild, AWS CodePipeline, and AWS CodeDeploy – the services inspired by Amazon's internal developer tools and DevOps practice.
AWS re:Invent 2016: Leverage the Power of the Crowd To Work with Amazon Mecha...Amazon Web Services
With Amazon Mechanical Turk (MTurk), you can leverage the power of the crowd for a host of tasks ranging from image moderation and video transcription to data collection and user testing. You simply build a process that submit tasks to the Mechanical Turk marketplace and get results quickly, accurately, and at scale. In this session, Russ, from Rainforest QA, shares best practices and lessons learned from his experience using MTurk. The session covers the key concepts of MTurk, getting started as a Requester, and using MTurk via the API. You learn how to set and manage Worker incentives, achieve great Worker quality, and how to integrate and scale your crowdsourced application. By the end of this session, you will have a comprehensive understanding of MTurk and know how to get started harnessing the power of the crowd.
Slides given at Agile 2015 to support talk with Josh Long
Walks through basic ideas of Cloud Foundry BOSH, Cloud Foundry Elastic Runtime and Spring Boot/Spring Cloud.
Covered these slides in ~20 minutes, then did 50 minutes of Lattice demos and Spring live coding.
Our company underwent a DevOps transformation, moving from a waterfall process to agile methodologies and practices like sprints, continuous delivery, and monitoring. This allowed us to accelerate delivery, improve repeatability, and optimize resources. We also transitioned our on-premises box product to a cloud service hosted on Microsoft Azure.
DevOps đại diện cho một sự thay đổi trong văn hóa CNTT, tập trung vào cung cấp dịch vụ CNTT nhanh chóng thông qua áp dụng Agile, Lean trong bối cảnh của phương pháp tiếp cận theo định hướng về hệ thống. DevOps nhấn mạnh yếu tố con người (và văn hóa), và tìm cách cải thiện sự phối hợp giữa các hoạt động và đội ngũ phát triển, triển khai DevOps sử dụng công nghệ - đặc biệt là các công cụ tự động hóa có thể tận dụng một cơ sở hạ tầng ngày càng hiệu quả và tăng cường theo hướng có thể lập trình được và bạn sẽ có một cơ sở hạ tầng linh động trong chu trình phát triển.
Visibility and Control in the Cloud: How to Get your Boss Comfortable with AW...Amazon Web Services
In this session we will cover key areas for building a business case for the Cloud. Topics covered will include:
Goals in moving your infrastructure to AWS.
Challenges faced along the way.
The 5 steps to achieving visibility and control of AWS across business functions.
Craig partners with Cloud leaders such as Amazon to build Innovative Solutions for the local and international market. His first company Cloud business Devnet was acquired by Cloud Sherpas / Accenture. He is active in the AWS users group and many startup groups. He is currently Founder & CEO of CloudMGR - AWS Advanced Technology Partner
Speaker: Craig Deveson, Founder & CEO, CloudMGR
Azure Security Center provides security posture management and threat protection for your hybrid cloud workloads. Cloud Security Posture Management includes Policies, initiatives, recommendations, secure scores, and security controls. Cloud Workload Protection protects threats against servers, cloud-native workloads, databases, and storage security alerts and incidents.
When it comes to managing the security of your AWS environment, traditional, on-premise, perimeter-only tactics must evolve to be environment-aware, data-centric, and automated wherever possible.
Speed of detection and agility in recovery are your new challenges and AWS Config, Cloudwatch, and Lambda are your new allies that help address them.
Learn about high-speed security incident response and recovery at the push of a button perhaps. This talk provides an overview with detailed examples of configuration management, event notification, and automatic execution to rapidly detect and react to potential security concerns within your AWS environment.
Speaker: Don Bailey, Principal Security Engineer, Amazon Web Services & Joshua Du Lac, Senior Security Consultant, Amazon Web Services
devops, microservices, and platforms, oh my!Andrew Shafer
A story about a boy and his quest to build great software delivered at the Cloud Foundry Summit in Santa Clara May 2015. (https://www.youtube.com/watch?v=rX4mQHPWuUY) Walk through the history of my personal career, and the evolution of the industry highlighting themes like devops, microservices and platforms.
Security will always be our top priority. Agile deployment methods require a set of dynamic built-in security controls that keep pace with innovation and scale. In this session we will utilise the power of automation with the AWS platform to increase the agility of developers while maintaining a strong security posture.
Speaker: David Faulkner, Senior Technical Account Manager, Amazon Web Services
http://stiller.co.il/blog/2014/01/upcoming-event-from-alm-to-devops/
How do companies like Microsoft, Twitter, Facebook and LinkedIn achieve high levels of execution which allow implementing hundreds and even thousands of lines of code every day, while maintaining a high & consistent level of performance, security and availability? How can the development and operation environments work together to create a meaningful competitive edge for the organization?
In an era where time-to-market and product quality have a critical meaning, the DevOps methodology offers simple and effective ways to shorten schedules, improve the product quality and maintain a competitive edge.
In this presentation, which is part of the "From ALM to DevOps" day, I explain and demonstrate the principles of DevOps in Windows Azure. Also demonstrated is the possible synchronization between Team Foundation Server (TFS) and Microsoft System Center (SCOM),
DevOps at Scale: How Datadog is using AWS and PagerDuty to Keep Pace with Gr...Amazon Web Services
Meeting the demands of everchanging IT management and security requirements means evolving both how you respond to and resolve incidents. It’s critical for organizations to adopt a scalable DevOps solution that integrates with their current monitoring systems to enable collaboration across development and operations teams, reducing the mean time to resolution. PagerDuty works with AWS services like Amazon CloudWatch, to provide rapid incident response with rich, contextual details that allow you to analyze trends and monitor the performance of your applications and AWS environment.
This document discusses Microsoft Azure and DevOps practices. It provides an overview of DevOps and the Microsoft ecosystem. Key DevOps practices enabled in Azure are discussed, including infrastructure as code using ARM templates, continuous integration and deployment using Visual Studio Team Services, release management, and monitoring with Application Insights. The goal of DevOps is to achieve end-to-end automation through practices like infrastructure as code, continuous integration and delivery, and monitoring across the development lifecycle.
Devops is a cultural movement gathering developers and IT Pros responsible for operating applications around common values, goals, practices and tools in order to accelerate development and deployment cycles, creating fast feedback loops between development and operations. Like agility 15 years ago, Devops adoption, accelerated by Cloud platforms adoption, involves organizational, cultural, as well as tehcnical aspects. Emerging movement a few years ago, now well established at consumer web and mobile companies, Devops starts to get in the Enterprise.
This presentation will explain the cultural and organizational aspects of the Devops movement, then will give an overview of the most common tools that are used to implement a Devops approach, showing that Microsoft is one of the few providers proposing a complete and integrated toolset, that works seamlessly for .NET developers, while integrating the most popular third party open source and proprietary tools, making Azure a great platform to implement a Devops approach for Linux, Java and open source workloads. We will talk about Visual Studio Online, Windows Azure, System Center, Windows Server, Azure Pack, PowerShell, NewRelic, Chef & Puppet integrations, Jenkins, …
This deck was presented at Microsoft Techdays 2014, Read more at http://www.microsoft.com/france/mstechdays/programmes/2014/fiche-session.aspx?ID=07af5982-c413-46c3-8214-bba12365529b#0CDPXYrtwEbWxrgW.99
Your Journey to Cloud-Native Begins with DevOps, Microservices, and ContainersAtlassian
Everyone is excited about cloud-native applications. And for good reason! They're scalable, resilient, portable across cloud environments, and make it easier to incorporate customer feedback quickly. But there's a catch: cloud-native applications fundamentally change the way you provision, deploy, and manage your infrastructure.
That's where DevOps, microservices, and containers come in. This session will show you how to combine them to create a highly-automated continuous delivery platform. By streamlining the process to resemble factory assembly lines, you can adapt quickly to market changes and keep your customers happy – without burning your team out.
The eBay Architecture: Striking a Balance between Site Stability, Feature Ve...Randy Shoup
The eBay architecture document discusses how eBay scales its platform to handle massive traffic while maintaining high availability and rapid feature development. Some key points are:
1) eBay uses horizontal scaling techniques like database sharding and separating functions across application servers to scale individual components.
2) The architecture emphasizes statelessness, caching, and minimizing database transactions to improve scalability and availability.
3) eBay evolved its architecture over several major versions to address scaling issues and allow for exponential growth in users and traffic over time.
Why AvePoint chose Azure for its Office 365 solutionsnj-azure
AvePoint chose to use Microsoft Azure for three main reasons:
1) Azure allows AvePoint to reduce security costs while maintaining flexibility, access, and control over their solutions.
2) Azure provides faster performance when communicating with Office 365 services compared to AWS.
3) The adoption of Microsoft's cloud is key to AvePoint's success given their focus on Office 365 and SharePoint solutions.
Resilience and Security @ Scale: Lessons LearnedJason Chan
This document discusses Netflix's approach to security and resilience at scale. It notes that Netflix has moved nearly 99% of its operations to the cloud to gain availability and agility. Some key points:
- Netflix relies heavily on automation rather than committees to evaluate architecture changes and standardized deployments.
- The "Simian Army" includes tools like Chaos Monkey that cause intentional failures to test resilience, and Conformity Monkey to ensure adherence to patterns.
- Security practices have adapted to the new environment, emphasizing integration, making secure options easy, and trusting but verifying controls. Base AMIs are tested like other packages.
AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organization's security and compliance objectives.
View a recording of the webinar based on this presentation on YouTube here: http://youtu.be/rXPyGDWKHIo
Veena Venugopal presented on cloud security and proposed an efficient and secure protocol for data storage in cloud computing. The protocol has three phases - setup, verification, and dynamic operations and verification. In the setup phase, the user encrypts and generates metadata for the file. A third party auditor verifies the integrity of the stored data by generating challenges and checking proofs from the cloud server. The protocol also supports dynamic operations like modification, insertion, and deletion of blocks while maintaining security. It provides confidentiality, public verifiability, and supports efficient dynamic operations on outsourced data in the cloud.
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCCA Technologies
Cloud computing started a technology revolution; now DevOps is driving that revolution forward. By enabling new approaches to service delivery, cloud and DevOps together are delivering even greater speed, agility and efficiency. No wonder leading innovators are adopting DevOps and cloud together! This presentation explores the synergies in these two approaches, with practical tips, techniques, research data, war stories, case studies and recommendations.
Security at the Speed of Software DevelopmentDevOps.com
This document proposes a 3-part framework for adopting DevSecOps practices and culture change. The first part is to win over developers by building trust between security and development teams. The second part is to make security practices easy for developers to understand and implement. Visual tools are proposed to show maturity levels and guide progress. The third part is to provide transparency to management on adoption status through regular reporting. Easy-to-use security tools integrated into the development pipeline are also recommended, starting with software composition analysis and integrating static and interactive application security testing.
Delivering DevOps on AWS: Accelerating Software Delivery with AWS Developer T...Amazon Web Services
Software release cycles are now measured in days, rather than months. Cutting-edge companies continually deliver high-quality software at a fast pace to remain competitive. In this session, we cover how you can begin your DevOps journey by sharing best practices and tools used by Amazon’s two pizza engineering teams. We’ll showcase how you can accelerate developer productivity by implementing continuous integration and delivery workflows. We’ll also provide an introduction to AWS CodeStar, AWS CodeCommit, AWS CodeBuild, AWS CodePipeline, and AWS CodeDeploy – the services inspired by Amazon's internal developer tools and DevOps practice.
AWS re:Invent 2016: Leverage the Power of the Crowd To Work with Amazon Mecha...Amazon Web Services
With Amazon Mechanical Turk (MTurk), you can leverage the power of the crowd for a host of tasks ranging from image moderation and video transcription to data collection and user testing. You simply build a process that submit tasks to the Mechanical Turk marketplace and get results quickly, accurately, and at scale. In this session, Russ, from Rainforest QA, shares best practices and lessons learned from his experience using MTurk. The session covers the key concepts of MTurk, getting started as a Requester, and using MTurk via the API. You learn how to set and manage Worker incentives, achieve great Worker quality, and how to integrate and scale your crowdsourced application. By the end of this session, you will have a comprehensive understanding of MTurk and know how to get started harnessing the power of the crowd.
Slides given at Agile 2015 to support talk with Josh Long
Walks through basic ideas of Cloud Foundry BOSH, Cloud Foundry Elastic Runtime and Spring Boot/Spring Cloud.
Covered these slides in ~20 minutes, then did 50 minutes of Lattice demos and Spring live coding.
Our company underwent a DevOps transformation, moving from a waterfall process to agile methodologies and practices like sprints, continuous delivery, and monitoring. This allowed us to accelerate delivery, improve repeatability, and optimize resources. We also transitioned our on-premises box product to a cloud service hosted on Microsoft Azure.
DevOps đại diện cho một sự thay đổi trong văn hóa CNTT, tập trung vào cung cấp dịch vụ CNTT nhanh chóng thông qua áp dụng Agile, Lean trong bối cảnh của phương pháp tiếp cận theo định hướng về hệ thống. DevOps nhấn mạnh yếu tố con người (và văn hóa), và tìm cách cải thiện sự phối hợp giữa các hoạt động và đội ngũ phát triển, triển khai DevOps sử dụng công nghệ - đặc biệt là các công cụ tự động hóa có thể tận dụng một cơ sở hạ tầng ngày càng hiệu quả và tăng cường theo hướng có thể lập trình được và bạn sẽ có một cơ sở hạ tầng linh động trong chu trình phát triển.
Visibility and Control in the Cloud: How to Get your Boss Comfortable with AW...Amazon Web Services
In this session we will cover key areas for building a business case for the Cloud. Topics covered will include:
Goals in moving your infrastructure to AWS.
Challenges faced along the way.
The 5 steps to achieving visibility and control of AWS across business functions.
Craig partners with Cloud leaders such as Amazon to build Innovative Solutions for the local and international market. His first company Cloud business Devnet was acquired by Cloud Sherpas / Accenture. He is active in the AWS users group and many startup groups. He is currently Founder & CEO of CloudMGR - AWS Advanced Technology Partner
Speaker: Craig Deveson, Founder & CEO, CloudMGR
Azure Security Center provides security posture management and threat protection for your hybrid cloud workloads. Cloud Security Posture Management includes Policies, initiatives, recommendations, secure scores, and security controls. Cloud Workload Protection protects threats against servers, cloud-native workloads, databases, and storage security alerts and incidents.
When it comes to managing the security of your AWS environment, traditional, on-premise, perimeter-only tactics must evolve to be environment-aware, data-centric, and automated wherever possible.
Speed of detection and agility in recovery are your new challenges and AWS Config, Cloudwatch, and Lambda are your new allies that help address them.
Learn about high-speed security incident response and recovery at the push of a button perhaps. This talk provides an overview with detailed examples of configuration management, event notification, and automatic execution to rapidly detect and react to potential security concerns within your AWS environment.
Speaker: Don Bailey, Principal Security Engineer, Amazon Web Services & Joshua Du Lac, Senior Security Consultant, Amazon Web Services
devops, microservices, and platforms, oh my!Andrew Shafer
A story about a boy and his quest to build great software delivered at the Cloud Foundry Summit in Santa Clara May 2015. (https://www.youtube.com/watch?v=rX4mQHPWuUY) Walk through the history of my personal career, and the evolution of the industry highlighting themes like devops, microservices and platforms.
Security will always be our top priority. Agile deployment methods require a set of dynamic built-in security controls that keep pace with innovation and scale. In this session we will utilise the power of automation with the AWS platform to increase the agility of developers while maintaining a strong security posture.
Speaker: David Faulkner, Senior Technical Account Manager, Amazon Web Services
http://stiller.co.il/blog/2014/01/upcoming-event-from-alm-to-devops/
How do companies like Microsoft, Twitter, Facebook and LinkedIn achieve high levels of execution which allow implementing hundreds and even thousands of lines of code every day, while maintaining a high & consistent level of performance, security and availability? How can the development and operation environments work together to create a meaningful competitive edge for the organization?
In an era where time-to-market and product quality have a critical meaning, the DevOps methodology offers simple and effective ways to shorten schedules, improve the product quality and maintain a competitive edge.
In this presentation, which is part of the "From ALM to DevOps" day, I explain and demonstrate the principles of DevOps in Windows Azure. Also demonstrated is the possible synchronization between Team Foundation Server (TFS) and Microsoft System Center (SCOM),
DevOps at Scale: How Datadog is using AWS and PagerDuty to Keep Pace with Gr...Amazon Web Services
Meeting the demands of everchanging IT management and security requirements means evolving both how you respond to and resolve incidents. It’s critical for organizations to adopt a scalable DevOps solution that integrates with their current monitoring systems to enable collaboration across development and operations teams, reducing the mean time to resolution. PagerDuty works with AWS services like Amazon CloudWatch, to provide rapid incident response with rich, contextual details that allow you to analyze trends and monitor the performance of your applications and AWS environment.
This document discusses Microsoft Azure and DevOps practices. It provides an overview of DevOps and the Microsoft ecosystem. Key DevOps practices enabled in Azure are discussed, including infrastructure as code using ARM templates, continuous integration and deployment using Visual Studio Team Services, release management, and monitoring with Application Insights. The goal of DevOps is to achieve end-to-end automation through practices like infrastructure as code, continuous integration and delivery, and monitoring across the development lifecycle.
Devops is a cultural movement gathering developers and IT Pros responsible for operating applications around common values, goals, practices and tools in order to accelerate development and deployment cycles, creating fast feedback loops between development and operations. Like agility 15 years ago, Devops adoption, accelerated by Cloud platforms adoption, involves organizational, cultural, as well as tehcnical aspects. Emerging movement a few years ago, now well established at consumer web and mobile companies, Devops starts to get in the Enterprise.
This presentation will explain the cultural and organizational aspects of the Devops movement, then will give an overview of the most common tools that are used to implement a Devops approach, showing that Microsoft is one of the few providers proposing a complete and integrated toolset, that works seamlessly for .NET developers, while integrating the most popular third party open source and proprietary tools, making Azure a great platform to implement a Devops approach for Linux, Java and open source workloads. We will talk about Visual Studio Online, Windows Azure, System Center, Windows Server, Azure Pack, PowerShell, NewRelic, Chef & Puppet integrations, Jenkins, …
This deck was presented at Microsoft Techdays 2014, Read more at http://www.microsoft.com/france/mstechdays/programmes/2014/fiche-session.aspx?ID=07af5982-c413-46c3-8214-bba12365529b#0CDPXYrtwEbWxrgW.99
Your Journey to Cloud-Native Begins with DevOps, Microservices, and ContainersAtlassian
Everyone is excited about cloud-native applications. And for good reason! They're scalable, resilient, portable across cloud environments, and make it easier to incorporate customer feedback quickly. But there's a catch: cloud-native applications fundamentally change the way you provision, deploy, and manage your infrastructure.
That's where DevOps, microservices, and containers come in. This session will show you how to combine them to create a highly-automated continuous delivery platform. By streamlining the process to resemble factory assembly lines, you can adapt quickly to market changes and keep your customers happy – without burning your team out.
The eBay Architecture: Striking a Balance between Site Stability, Feature Ve...Randy Shoup
The eBay architecture document discusses how eBay scales its platform to handle massive traffic while maintaining high availability and rapid feature development. Some key points are:
1) eBay uses horizontal scaling techniques like database sharding and separating functions across application servers to scale individual components.
2) The architecture emphasizes statelessness, caching, and minimizing database transactions to improve scalability and availability.
3) eBay evolved its architecture over several major versions to address scaling issues and allow for exponential growth in users and traffic over time.
Why AvePoint chose Azure for its Office 365 solutionsnj-azure
AvePoint chose to use Microsoft Azure for three main reasons:
1) Azure allows AvePoint to reduce security costs while maintaining flexibility, access, and control over their solutions.
2) Azure provides faster performance when communicating with Office 365 services compared to AWS.
3) The adoption of Microsoft's cloud is key to AvePoint's success given their focus on Office 365 and SharePoint solutions.
Resilience and Security @ Scale: Lessons LearnedJason Chan
This document discusses Netflix's approach to security and resilience at scale. It notes that Netflix has moved nearly 99% of its operations to the cloud to gain availability and agility. Some key points:
- Netflix relies heavily on automation rather than committees to evaluate architecture changes and standardized deployments.
- The "Simian Army" includes tools like Chaos Monkey that cause intentional failures to test resilience, and Conformity Monkey to ensure adherence to patterns.
- Security practices have adapted to the new environment, emphasizing integration, making secure options easy, and trusting but verifying controls. Base AMIs are tested like other packages.
AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organization's security and compliance objectives.
View a recording of the webinar based on this presentation on YouTube here: http://youtu.be/rXPyGDWKHIo
Veena Venugopal presented on cloud security and proposed an efficient and secure protocol for data storage in cloud computing. The protocol has three phases - setup, verification, and dynamic operations and verification. In the setup phase, the user encrypts and generates metadata for the file. A third party auditor verifies the integrity of the stored data by generating challenges and checking proofs from the cloud server. The protocol also supports dynamic operations like modification, insertion, and deletion of blocks while maintaining security. It provides confidentiality, public verifiability, and supports efficient dynamic operations on outsourced data in the cloud.
Distinguishing, Evaluating, and Selecting Cloud Service ProvidersGartnerJessica
This presentation is focused on addressing the broad category of Cloud Service Providers. Gartner will provide a overview of how Cloud Service Providers are being defined and how they different from traditional providers of outsourcing or products. And more importantly, what are they offering that is different, new and seeks to solve business problems for the enterprise. This session will provide an overview of these areas and begin the discussion of how do clients develop the business case for certain cloud services offerings.
Topics Discussed
Gartner analysts discussed with participants the following topics:
What is a cloud service provider and how does it differ from traditional outsourcing providers?
How will the approaches to evaluate and select among these providers differ?
How does the business case analysis differ?
The document discusses the results of a study on the effects of a new drug on memory and cognitive function in older adults. The double-blind study involved giving either the new drug or a placebo to 100 volunteers aged 65-80 over a 6 month period. Testing showed those receiving the drug experienced statistically significant improvements in short-term memory retention and processing speed compared to the placebo group.
This was presented by Supratik Ghatak, Co-Founder Blazeclan, at the AWS Summit Mumbai 2013. CIO pain points, cloud migration reasons and strategies are the key focus of this presentation. CIOs and CTOs can gain insights into various ways of leveraging the AWS cloud. The presentation also talks about the priority areas for CIOs & CTOs to look at while using the cloud as well as how to plan their strategies around AWS cloud. Further case studies are depicted that show how organization
can benefit from AWS Cloud.
This document discusses cloud computing security and outlines several key points:
1. It introduces cloud computing and discusses how it has reduced upfront costs for companies while allowing resources to scale as needed.
2. It then outlines some of the major security concerns for cloud computing, including whether cloud providers can securely manage large numbers of customers and sensitive data.
3. The document proposes several cloud computing models and architectures aimed at improving security, governance, compliance and establishing trust in cloud systems.
Vladimir Simek presented on security and compliance in AWS. He discussed that security is a shared responsibility between AWS and customers. AWS manages security of the cloud through facilities, physical security, network security, and other measures. Customers are responsible for security in the cloud by defining controls for their applications and data. AWS provides tools like CloudTrail for visibility into API usage, AWS Config for auditing resource configurations, and IAM for control over user permissions to help customers meet their security needs.
Welcome to everything the cloud has to offer. Now, you need to keep your apps and workloads secure, without compromising the speed and flexibility of the cloud. This is the new economics of cloud security.
Learn more: https://www.alertlogic.com/neweconomics
AWS is architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely. When using AWS, not only are infrastructure headaches removed, but so are many of the security issues that come with them.
Basic Cloud Computing and underlying technology, Hypervisor, Cloud Services, Cloud Deployment Models, AWS, REST APIs, Cloud Investment Trends, Cloud Investments, Cloud Value chain and lot of terms and references for further reading.
This document discusses security best practices when using AWS. It covers the shared responsibility model between AWS and customers, leveraging AWS security features, understanding customer needs to form a security stance, and engaging security assessors early. It provides an overview of identity and access management tools like IAM, security groups, VPCs and direct connects. The document emphasizes applying a "security by design" approach when building on AWS.
Learn how cloud is the "New Normal" and the benefits of a cloud environment, with benefits for every industry, customer type, and stage of cloud adoption.
This session provides real guidance and practical answers to government users’ questions about security and compliance, helping agencies move away from the “worry-based fiction” of the cloud
Speaker: Stephen Squigg, Solutions Architect, Amazon Web Services, APAC
This presentation will give complete information regarding security issues related to cloud computing. To learn cloud computing fill up a simple form.
http://bit.ly/aDegGN
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
The document discusses security aspects of cloud computing. It outlines the essential characteristics of cloud computing including on-demand service, broad network access, resource pooling and others. It also describes different service models, deployment models and common cloud examples. The document then discusses top security concerns for cloud computing including threats from abuse and nefarious use, insecure interfaces, malicious insiders, shared technology issues and others. It provides guidance on security best practices when operating in the cloud.
This document discusses cloud security and provides an overview of McAfee's cloud security solutions. It summarizes McAfee's cloud security program, strengths, weaknesses, opportunities, threats, and competitors in the cloud security market. It also discusses Netflix's migration to the cloud for its infrastructure and content delivery and outlines Netflix's cloud security strategy.
Data and business systems are crucial to your daily operations, business insights and competitiveness. This puts intense pressure on IT professionals to avoid financial and operational exposure to significant downtime and data loss due to any planned or unplanned outage. We will share how to migrate, protect and recover your workloads between hypervisors, storage platforms and the cloud, with near zero downtime and risk-free while keeping your data protected up to time.
Derek Ewell, Partner Solutions Architect, Amazon Web Services, ASEAN
Alexander Pak, Solutions Architect, Vision Solutions
Amazon Web Services (AWS) provides on-demand computing resources and services in the cloud, with pay-as-you-go pricing. This session provides an overview and describes how using AWS resources instead of your own is like purchasing electricity from a power company instead of running your own generator. Using AWS resources provides many of the same benefits as a public utility: Capacity exactly matches your need, you pay only for what you use, economies of scale result in lower costs, and the service is provided by a vendor experienced in running large-scale networks. A high-level overview of AWS infrastructure (such as AWS Regions and Availability Zones) and AWS services is provided as part of this session.
Speaker: Tom Whateley, Solutions Architect and Stephanie Zieno, Account Manager, Amazon Web Services
AWS re:Invent 2016: Identifying Your Migration Options: the 6 Rs (ENT311)Amazon Web Services
The document discusses the 6 Rs migration strategy for identifying migration options to AWS: Retain, Retire, Rehost, Replatform, Refactor, and Rearchitect (Replace). It provides descriptions and considerations for each option. It also discusses Scholastic's use of various migration strategies like Retain, Rehost/Replatform, Rearchitect, and Refactor for different applications. The document emphasizes using an assessment-based approach and mapping business drivers to the appropriate migration strategy.
Security in the cloud Workshop HSTC 2014Akash Mahajan
A broad overview of what it takes to be secure. This is more of an introduction where we introduce the basic terms around Cloud Computing and how do we go about securing our information assets(Data, Applications and Infrastructure)
The workshop was fun because all the slides were paired with real world examples of security breaches and attacks.
This document provides a summary of core security requirements for cloud computing. It discusses the need to plan for security in cloud environments given issues like multi-tenancy, availability, confidentiality, and integrity. Specific requirements mentioned include secure access and separation of resources for multi-tenancy, assurances around availability, strong identity management, encryption of data at rest and in motion, and checks to ensure data integrity. The document emphasizes the importance of independent audits of cloud providers and having clear expectations around security requirements and notifications of any failures to meet requirements.
This presentation includes cloud security overview, Could Security Access Broker, CASB's four pillars, proxy and API deployment mode and advantage and limitation of deployment modes
The document discusses cloud analytics, cloud testing, and virtual desktop infrastructure (VDI).
Cloud analytics allows organizations to implement analytics capabilities in the cloud to scale easily as the company grows and removes the burden of on-premise management. Cloud testing verifies cloud functions like redundancy and performance scalability. VDI creates a virtualized desktop environment on remote servers that users can access from any device, bringing benefits like access, security, cost reduction, and device portability.
(SEC320) Leveraging the Power of AWS to Automate Security & ComplianceAmazon Web Services
"You’ve made the move to AWS and are now reaping the benefits of decreased costs and increased business agility. How can you reap those same benefits for your cloud security and compliance operations? As building cloud-native applications requires different skill sets, architectures, integrations, and processes, implementing effective, scalable, and robust security for the cloud requires rethinking everything from your security tools to your team culture.
Attend this session to learn how to start down the path toward security and compliance automation and hear how DevSecOps leaders such as Intuit and Capital One are using AWS, DevOps, and automation to transform their security operations.
Session sponsored by evident.io"
Your organisation’s data are now everywhere: on your servers and your desktop PCs; on your employees’ smart phones, tablet computers and laptops; on social networks; and in public clouds. Some of these data require special protection but they also need to be accessed remotely, which makes security a considerable challenge. Can you trust public clouds to keep your data safe and secure? Can you trust your own internal systems? And on what criteria and risk management strategies should you base your trust? -- Dr Mark Ian Williams's presentation at the April 2012 'Why Cloud? Why now?' conference at the headquarters of the Institute of Chartered of Accountants of England Wales.
The do's and dont's of cloud computing - StatPro Cloud Summit 2012StatPro Group
Neil Smyth (@Neil_StatPro), Technology and Marketing Director at StatPro covers the do’s and don’t’s of cloud computing. Neil provides a comparison of traditional hosting versus SaaS and cloud computing, including an interesting look at how one compares to a housing estate and the other to a hotel. He then moves on to providing top tips on selecting a cloud computing vendor, including the key things to look out for such as infrastructure, security, scalability and the business model.
The cloud is driving significant change in how companies deploy and manage resources for their existing business applications. This session explains in non-technical terms how to evaluate if a move to the cloud is in your midst without being a technical expert. We'll explain the many different deployment options as well as business opportunities, pros and cons that companies should consider when addressing the cloud. This session will also provide an executive viewpoint on Azure and it's future potential for businesses.
In this session, we review how the combined use of Amazon Web Services native tools, advanced modeling, and machine learning techniques can simplify many of the hardest security problems that are within the customer’s responsibility. Join us as we explore how services like Amazon Virtual Private Cloud flow logs, AWS CloudTrail, and Amazon Inspector combine to enable highly automated, scalable, and comprehensive security for your AWS applications. Learn how to effectively harness the data provided by AWS for security, and understand how Cisco Stealthwatch Cloud and AWS create an integrated, effective security solution.
Cloud Security: Make Your CISO SuccessfulCloudPassage
Enterprises today cannot get by without a clear strategy for cloud security. Whether the organization’s adoption of cloud environments (private, public or hybrid) is mandated by business strategy or by unsanctioned employee use, CISOs and their security teams need to be prepared for this inevitable infrastructure shift.
Attend and learn how to build a cloud security strategy that makes your CISO successful. Join Rich Mogull, lead analyst at Securosis, and Nick Piagentini, Solution Architect at CloudPassage as they discuss the following topics:
-Cloud is Different, But Not the Way You Think
-Adapting Security for Cloud Computing Principles
-Getting Started: Practical Applications
-CISO Cloud Security Checklist
"Running enterprise workloads with sensitive data in AWS is hard and requires an in-depth understanding about software-defined security risks. At re:Invent 2014, Intuit and AWS presented ""Enterprise Cloud Security via DevSecOps"" to help the community understand how to embrace AWS features and a software-defined security model. Since then, we've learned quite a bit more about running sensitive workloads in AWS.
We've evaluated new security features, worked with vendors, and generally explored how to develop security-as-code skills. Come join Intuit and AWS to learn about second-year lessons and see how DevSecOps is evolving. We've built skills in security engineering, compliance operations, security science, and security operations to secure AWS-hosted applications. We will share stories and insights about DevSecOps experiments, and show you how to crawl, walk, and then run into the world of DevSecOps."
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
The Big Decision – What, when, and why?
Enterprises are aware that the Cloud is changing IT, but security and performance remain a concern. Each cloud model has potential risks: reliability, adaptability, application compatibility, efficiency, scaling, lock- in, security and compliance. Companies must select an enterprise cloud solution to suit a complex mix of applications; these decisions require great care. Uni Systems’ Uni|Cloud was built to be enterprise class. The essential reason that many businesses today are using Uni Systems Cloud for their enterprise IT, is because it offers the only enterprise-class cloud solution in the Greek market, designed for mission-critical applications, coupled with application performance SLAs and security built for the enterprise, combined with cloud efficiency and consumption-based pricing/chargeback.
Security Spotlight: The Coca Cola Company - CSS ATX 2017Alert Logic
Andrew Delosky from Coca-Cola discusses Coca-Cola's experience moving to the cloud. He debunks common myths about cloud security and discusses how Coca-Cola implements a multi-layered security model in the cloud using tools like security groups, IAM, network segmentation, web application firewalls, and encryption. Delosky also talks about hybrid cloud options, being proactive about security, and how the cloud allows for agile development, DevSecOps, and improved scaling and performance while keeping data secure.
Infrastructure requirements of SaaS applications are dynamic and unpredictable. You need a solution which could handle dynamic and unpredictable nature.
This is the high level overview of the solution for SaaS applications infrastructure
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
We’ve entered a new connectivity oriented world where we can access information any time, any place, on any device, 24 hours a day, and cloud computing is a major enabler of this flexibility. Like you, more and more businesses are looking to the cloud for better, faster, more powerful and affordable communications and while many would think that security in the cloud is much different, the reality is less dramatic. Moving to the cloud still requires using proven security techniques, but sometimes in new and dynamic ways that adapt to the elastic nature of cloud architecture. Join us as we discuss the latest cloud security solutions, including real world examples of how organizations like yours are succeeding against new and evolving threats. We will examine security considerations beyond what is provided by security-conscious cloud providers like Amazon Web Services and what additional factors you might want to think about when deploying to the cloud.
Transforming cloud security into an advantageMoshe Ferber
- Moshe Ferber is an experienced information security professional who has founded and invested in several cloud security companies.
- The document discusses important concepts in cloud security including creating trust between cloud providers and customers, security best practices in development and operations, and compliance with standards and regulations.
- Key responsibilities in cloud security include securing data, applications, users and identities across the entire lifecycle from a shared responsibility model between providers and customers.
This paper discusses how information security function in enterprises must engage with business users and stakeholders to ensure innovation and adoption of digital transformation.
The promises of the digital new world is inextricably locked with cloud computing technologies.
Cloud computing technology is central to the converging interconnecting forces of collaboration, mobility, BYOD, IoT and social enterprise.
The information/data security and entitlements of users of these services and apps is bound to their identities and the contexts within which they may partake in this ecosystem.
Traditional security models, information governance, identity management and role based access control don’t quite cut the mustard.
However, new technologies are yet to be tested both commercially and functionally.
The potential benefits to the enterprise such as seamless collaboration, agility and efficiency are too rewarding to ignore. The security industry must help organisations balance the risks and rewards.
Convergence of Containers and Serverless by Mency WooTriNimbus
Presentation slides from the Vancouver AWS User Group Meetup on Jan. 29, 2019 with Mency Woo. Title is "The Convergence of Containers and Severless on AWS"
The DevSecOps Journey - (Anti)Patterns, Analytics and Insights. Presentation slides by Juni Mukherjee, Owner/Speaker/Author, CONTINUITY at the Canadian Executive Cloud & DevSecOps Summit. Toronto May 4, 2018 hosted by TriNimbus.
Top 5 Priorities for Cloud Security. Presentation slides by Teri Radichel, CEO, 2nd Sigh Lab at the Canadian Executive Cloud & DevSecOps Summit. Vancouver May 11, 2018 hosted by TriNimbus.
10,000 Foot View of Big Data. Presentation slides by Peter Smith, PhD, ACL at the Canadian Executive Cloud & DevSecOps Summit. Toronto May 4, 2018 and Vancouver, May 11, 2018 hosted by TriNimbus.
Machine Learning: Beyond the Hype. Presentation slides from Darin Briskman, Chief Technical Evangelist, Amazon Web Services at the Canadian Executive Cloud & DevSecOps Summit. May 4, 2018 in Toronto and May 11, 2018 in Vancouver. Hosted by TriNimbus
Amazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and BeyondTriNimbus
Presentation given by Mency Woo, Sr. Solutions Architect at TriNimbus Technologies, Inc. for the Vancouver Amazon Web Services Meetup Group on March 20, 2018 at ACL.
Many Windows shops want to move to the cloud, but are overwhelmed by the numerous options. In this talk we will take a look at how to move your Active Directory environment into AWS and provide some tips and tricks on how to make the most of the options available.
AWS re:Invent re:Cap 2017 - A presentation sharing all the latest updates from the keynote presentations and product announcements put together by Canadian Amazon Web Services Premier Consulting Partner, TriNimbus Technologies, Inc. www.trinimbus.com
Performance Optimization of Cloud Based Applications by Peter Smith, ACLTriNimbus
Peter Smith, PhD, Principal Software Engineer at ACL talks about Performance Optimization of Cloud Based Applications at TriNimbus' 2017 Canadian Executive Cloud & DevOps summit in Vancouver
Building and Operating AI Services at Scale by Randall Hunt, Amazon Web ServicesTriNimbus
Randall Hunt, Senior Technical Evangelist at Amazon Web Services talks about Building and Operating AI Services at Scale at TriNimbus' 2017 Canadian Executive Cloud & DevOps summit in Vancouver
Web App Security Presentation by Ryan Holland - 05-31-2017TriNimbus
Web App Security - A presentation by Ryan Holland, Sr. Director, Cloud Architecture at Alert Logic for the Vancouver AWS User Group Meetup on May 31, 2017.
VMware Cloud on AWS
Presentation from Vancouver AWS User Group Meetup on Wednesday, February 15, 2017 by Paul Gifford, Staff Systems Engineer at VMware.
DevOps in the Amazon Warehouse - Shawn GandhiTriNimbus
Presentation from Toronto's 2016 Canadian Executive Cloud & DevOps Summit on Friday, November 4th.
Speaker: Shawn Gandhi, Head of Solutions Architecture, AWS Canada
Title: Rogue Development: DevOps in the Amazon Warehouse
Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...TriNimbus
Presentation from Vancouver’s 2016 Canadian Executive DevOps & Cloud Summit on Thursday, May 5th.
Speaker: Goran (Kima) Kimovski, Chief Solution Architect at TriNimbus
Title: Beyond Virtualization: IT In a World of Software Defined 'Everything'
Darragh Kennedy, Build Products Not Data CentresTriNimbus
Presentation from Vancouver’s 2016 Canadian Executive DevOps & Cloud Summit on Thursday, May 5th.
Speaker: Darragh Kennedy, Head Of Cloud Services at Lonely Planet
Title: Build Products Not Data Centres
Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...TriNimbus
Keynote presentation from Vancouver's 2016 Canadian Executive DevOps & Cloud Summit on Thursday, May 5th.
Speaker: Chris Munns, Business Development Manager, DevOps at Amazon Web Services
Title: DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Deploys a Year
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Staying Secure When Moving to the Cloud - Dave Millier
1. DON’T LOSE SIGHT!
STAYING SECURE WHEN MOVING TO THE CLOUD
DAVE MILLIER, CEO UZADO, CSO QUICK INTELLIGENCE, CEO MIDAC SOLUTIONS
AUTHOR OF THE SECURITY NOVEL, “BREACHED!”
2. AGENDA FOR TODAY
• Quick intro to Dave
• Security Challenges Moving to the Cloud
• Visibility Today
• Maintaining Visibility In The Cloud
• Cloud Security Alliance Cloud Controls Matrix
• Call to Action (yes, this means you!)
3.
4.
5. • Serial Entrepreneur, bought and sold 10+ companies over past 20 years
• Currently owns 3 IT-related Companies: MIDAC, Qi, Uzado
• Sold InfoSec company in 2014 to Robert Herjavec from Shark Tank
• Involved in Networking & InfoSec/Cybersecurity for about 25 years
• Loves tech!
• Loves dirt biking, owns a dirt bike and ATV training school!
ABOUT DAVE
6.
7. • A lot of people simply don’t understand what the cloud is (or isn’t!)
• More companies moving more services to the cloud every day
• Migration isn’t always done in a coordinated, well thought-out fashion
• Cloud is supposed to streamline things, but getting there isn’t always painless
SOME OF THE BIGGEST CHALLENGES
8. WHAT ARE THE SECURITY CONSIDERATIONS?
• Managing users access, permissions
• Protecting our data at rest
• Ensuring secure access to data (the right people at the right time)
• Knowing who is accessing what when
• Understanding where our data will reside (data residency issues)
10. “You can’t manage what you can’t measure.”
- Peter Drucker, known as the Founder of Modern Management
11. VISIBILITY TODAY
• Logs from our servers, network devices, security devices
• Logs from our authentication devices / vpn devices
• Real-time network monitoring from security tools on the wire
• Logs from our applications
• Vulnerability scan results from our assets
12. • Lack of visibility into what’s happening (can’t always get logs)
• Lack of control over users (corporate accounts and permissions don’t usually
carry over)
• Lack of understanding of what data is being stored where
• Data Residency
WHAT DO WE LOSE?
14. HOSTING PROVIDER VISIBILITY
• AWS and other providers give you access to a wealth of security and
operational information (AWS CloudTrail for example)
• Incorporate the information into your existing data sources
• Redesign your incident response process to use these data sources as part of
an investigation
• Figure out what information you have access to now, and map that to “new”
source(s) of information provided by the cloud provider
• Make them part of your incident response process!!!
15. SECURITY TOOLS VISIBILITY
• Virtual appliances (firewalls, IPS, WAF, etc.) - located elsewhere but use the
information they provide as you would if it was local
• If security is outsourced to hosting provider or to another 3rd party, ensure
they have comparable visibility into your new environment as they had before
• Providers like CloudCheckr have automated and streamlined the visibility into
AWS, leverage the heck out of them!
16. USER VISIBILITY
• Leverage federated identity management solutions where possible. Less
accounts for users, easier to migrate to cloud (assuming provider supports)
• Make sure that you maintain visibility into encrypted sessions (who’s logging in
from where when, what did they do?)
• Determine current levels of user behaviour visibility and try to maintain that
level of detail when you move the user workloads to the cloud
17. SERVER AND APPLICATION VISIBILITY
• Hosted servers still generate logs, collect them if at all possible
• Determine what you’re logging on local servers and configure hosted servers
the same
• Make sure your web apps have proper logging!
• Applications need to have proper auditing built in; even if you don’t see the
user activity you can recreate sessions with proper app logging
• Logging invalid activity just as important (don’t just log what was successful,
log what failed!)
18. CLOUD SECURITY ALLIANCE
• Cloud Controls Matrix
• Control framework based on 13 security and operational domains
• Foundation is mapped to industry recognized standards and frameworks such
as COBIT, ISO 27001/27002, PCI, NIST, NERC CIP, PIPEDA, HIPAA
• Tailors Information Security practices to the cloud
• Helps companies evaluate cloud vendor security
• Helps companies make decisions on their own cloud security requirements
19. USING THE CSA MATRIX
• Use the matrix to do a self-assessment against your organization, identifying
areas of criticality
• Use the matrix to perform an evaluation against a potential cloud vendor
• Compare results from cloud vendors against your areas of concern/focus
• Use gap analysis results to make educated informed decisions.
• May address findings by augmenting YOUR security, may choose a different
provider, may work with provider to identify potential shortcomings
20. DEFENSE IN DEPTH
• Don’t rely on a single security solution to protect your cloud deployment
• Many virtual firewalls/security devices have A/V and anti-malware scanners
built into them, use them! Along with host-based protection you now have
multiple controls in place complementing each other, so that even if one of
them fails another one can compensate
• Each layer of defense should support each other and provide an additional
level of protection (“Defense in Depth”)
21. WHAT DO YOU NEED TO DO NEXT?
• Go back to your office and ask questions
• What type of visibility do we have into our systems, our user activity, our security devices, and our
applications today? (same question whether locally hosted or already in the cloud)
• Have we used the CSA Cloud Controls Matrix to evaluate our vendors/partners?
• How do we ensure we keep the same level of visibility we have today in the cloud?
• How well do we understand our data, where it resides and what we are doing to protect it?
• There are a lot more questions that could be asked, but hopefully this helps get you
started!