This document discusses Microsoft Azure's infrastructure as a service capabilities including provisioning virtual machines and environments, disk types, virtual networking, connectivity options like SQL Azure Data Sync and Service Bus, and hybrid public/private cloud capabilities. It also mentions Azure's DNS services and VPN connectivity options like IKE and encryption standards.
This session is designed to introduce you to fundamental cloud computing and AWS security concepts that will help you prepare for the Security Week sessions, demos, and workshops. We will also provide an overview of the Security pillar of the AWS Cloud Adoption Framework (CAF) and talk about how AWS keeps humans away from data—and how you can, too.
These are slides from an introductory session for Microsoft Azure done at IIT Sri Lanka giving the students hands-on exposure to Microsoft Azure. Introducing them to Azure App Service and Azure Functions.
Slides from AIS and Microsoft's half-day session on the recently-announced Windows Azure Infrastructure as a Service (IaaS) offering. After a brief overview of the Azure Platform as a Service (PaaS) model, we will focus on key IaaS concepts. Additionally, we will walk you through a number of scenarios enabled by Azure IaaS and several demonstrations.
Agenda:
Overview of Windows Azure Platform
Azure IaaS
Why IaaS?
IaaS Core Concepts
Supported Applications
Azure Virtual Machines
Disk Mobility
VM export / Import
Availability
Azure Virtual Network
AWS is architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely. When using AWS, not only are infrastructure headaches removed, but so are many of the security issues that come with them.
One of the biggest announcements at the Microsoft Ignite 2019 is Azure Arc – the hybrid and multi-cloud platform from Microsoft.
View this content to learn how Azure Arc allows enterprises to manage on-prem and cloud resources like Windows VMs, Linux Servers, Kubernetes clusters, and Azure data services by centrally organizing and governing from a single place.
Training for AWS Solutions Architect at http://zekelabs.com/courses/amazon-web-services-training-bangalore/.This slide describes about IPv4 vs IPv6, types of records, simple routing policy, weighted routing policy, latency routing policy, failover routing policy and geolocation routing policy
___________________________________________________
zekeLabs is a Technology training platform. We provide instructor led corporate training and classroom training on Industry relevant Cutting Edge Technologies like Big Data, Machine Learning, Natural Language Processing, Artificial Intelligence, Data Science, Amazon Web Services, DevOps, Cloud Computing and Frameworks like Django,Spring, Ruby on Rails, Angular 2 and many more to Professionals.
Reach out to us at www.zekelabs.com or call us at +91 8095465880 or drop a mail at info@zekelabs.com
AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organisation's security and compliance objectives.
Disaster Recovery Planning using Azure Site RecoveryNitin Agarwal
Disaster recovery and business continuity solutions have been historically expensive and time consuming. Microsoft Azure Site Recovery (ASR) makes Disaster Recovery (DR) planning and implementation simpler and affordable for all types of organizations.
Join our team of cloud experts for a walk through of DR and ASR basics. We'll highlight best practices for ASR deployments and help you get a sense of the costs for implementing a solution.
At AWS, cloud security is our highest priority. All AWS customers inherit the best practices of AWS policies, architecture, and operational processes built to satisfy the requirements of the most security-sensitive organizations in the most highly-regulated industries in the world – including financial services. In this talk, AWS experts discuss the fundamentals of AWS Cloud security, best practices, and services customers can leverage in order to operate and innovate in the cloud – more securely than on premises.
This session is designed to introduce you to fundamental cloud computing and AWS security concepts that will help you prepare for the Security Week sessions, demos, and workshops. We will also provide an overview of the Security pillar of the AWS Cloud Adoption Framework (CAF) and talk about how AWS keeps humans away from data—and how you can, too.
These are slides from an introductory session for Microsoft Azure done at IIT Sri Lanka giving the students hands-on exposure to Microsoft Azure. Introducing them to Azure App Service and Azure Functions.
Slides from AIS and Microsoft's half-day session on the recently-announced Windows Azure Infrastructure as a Service (IaaS) offering. After a brief overview of the Azure Platform as a Service (PaaS) model, we will focus on key IaaS concepts. Additionally, we will walk you through a number of scenarios enabled by Azure IaaS and several demonstrations.
Agenda:
Overview of Windows Azure Platform
Azure IaaS
Why IaaS?
IaaS Core Concepts
Supported Applications
Azure Virtual Machines
Disk Mobility
VM export / Import
Availability
Azure Virtual Network
AWS is architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely. When using AWS, not only are infrastructure headaches removed, but so are many of the security issues that come with them.
One of the biggest announcements at the Microsoft Ignite 2019 is Azure Arc – the hybrid and multi-cloud platform from Microsoft.
View this content to learn how Azure Arc allows enterprises to manage on-prem and cloud resources like Windows VMs, Linux Servers, Kubernetes clusters, and Azure data services by centrally organizing and governing from a single place.
Training for AWS Solutions Architect at http://zekelabs.com/courses/amazon-web-services-training-bangalore/.This slide describes about IPv4 vs IPv6, types of records, simple routing policy, weighted routing policy, latency routing policy, failover routing policy and geolocation routing policy
___________________________________________________
zekeLabs is a Technology training platform. We provide instructor led corporate training and classroom training on Industry relevant Cutting Edge Technologies like Big Data, Machine Learning, Natural Language Processing, Artificial Intelligence, Data Science, Amazon Web Services, DevOps, Cloud Computing and Frameworks like Django,Spring, Ruby on Rails, Angular 2 and many more to Professionals.
Reach out to us at www.zekelabs.com or call us at +91 8095465880 or drop a mail at info@zekelabs.com
AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organisation's security and compliance objectives.
Disaster Recovery Planning using Azure Site RecoveryNitin Agarwal
Disaster recovery and business continuity solutions have been historically expensive and time consuming. Microsoft Azure Site Recovery (ASR) makes Disaster Recovery (DR) planning and implementation simpler and affordable for all types of organizations.
Join our team of cloud experts for a walk through of DR and ASR basics. We'll highlight best practices for ASR deployments and help you get a sense of the costs for implementing a solution.
At AWS, cloud security is our highest priority. All AWS customers inherit the best practices of AWS policies, architecture, and operational processes built to satisfy the requirements of the most security-sensitive organizations in the most highly-regulated industries in the world – including financial services. In this talk, AWS experts discuss the fundamentals of AWS Cloud security, best practices, and services customers can leverage in order to operate and innovate in the cloud – more securely than on premises.
This webinar session introduced the basics of Azure (topics below) allowing you to get online and start working in the Azure environment.
• Azure Portal Demo
• Azure VMs
• Azure Storage
• Azure SQL
• Azure Connectivity options to the Data Center
Microsoft Azure là nền tảng cung cấp dịch vụ của Microsoft hoạt động dựa trên công nghệ điện toán đám mây. Microsoft Azure có thể được sử dụng cho lưu trữ website, đặt máy chủ dịch vụ cho game online và nhiều thứ khác nữa.
Microsoft Azure Platform-as-a-Service (PaaS)Chris Dufour
Azure is Microsoft’s cloud computing platform made up of a growing collection of integrated services: compute, storage, data, networking and apps.
Azure is the only major cloud platform ranked by Gartner as an industry leader for both Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS). This powerful combination of managed and unmanaged services lets you build, deploy and manage applications in any way you like for unmatched productivity.
In this talk we will take a look at Microsoft’s cloud strategy and see how you can leverage PaaS in your environment.
New capabilities for modern data integration in the cloudGaurav Malhotra
This deck focuses on the needs of the data integrator and data engineer whether that be for data warehousing & BI, advanced analytics of data for SaaS applications. We walk through a comprehensive set of new additions to Azure Data Factory and SSIS for moving and integrating data across on-premises and cloud. Topics and examples will include simple, scalable and reliable data pipelines in ADF using a serverless, parallel data movement service to/from the cloud, provisioning of Azure-SSIS Integration Runtime (IR) – dedicated servers for lifting & shifting SSIS packages to cloud– and its customization with your own/3rd party extensions, the execution of SSIS packages as first-class activities in ADF pipelines and their combination with other ADF activities to create modern ETL/ELT workflows all through the new code-free experience.
Azure Virtual Machines Deployment ScenariosBrian Benz
Architecture and Scenarios for deploying Database and middleware applications on Azure Virtual Machines including SQL Server, Oracle, Hadoop, and others.
Windows Server 2012 R2 at VMUG.org in LeedsSimon May
A brief overview of what's coming in Windows Server 2012 R2 that I delivered at VMUG recently. Details on virtualisation improvements, storage improvements, VDI and much more
The Cloud ecosystem has faced a drastic and fast pace of change over the past couple of years. Many of those developers who deal/dealt with Azure may get lost in numerous increments. Those who consider Azure environment may be confused with tons of options brought with Azure getting mature and robust. We suggest joining a quick catch-up session…
This is an edited version of the keynote deck in Azure-Readiness DevCamp
Going to the cloud with Microsoft and ITAdviser_Windows Azure overview for IT...Olimpia Oancea
We really believe that cloud is the new normal. For anyone who is looking to develop software, using a public cloud like Azure is a no-brainer. In the last year, we have not come across even a single scenario where a customer is looking to build a new innovative product, and they are going to deploy that in their own datacenter…
Olimpia Oancea, Co-Founder and CEO, ITAdviser
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
4. Line of Business Applications
Custom Applications, CRM, CMS, ERP, Business Intelligence
Application Infrastructure
File Servers, Databases, Identity, Source Control
Developer, Test and Staging Environments
Quickly Provision and Un-provision Entire Environments
Hybrid Applications
11. Base OS image for new Virtual Machines
Sys-Prepped/Generalized/Read Only
Created by uploading or by capture
Writable Disks for Virtual Machines
Created during VM creation or during
upload of existing VHDs.
12.
13.
14.
15. Disk Type Default Supported
OS Disk ReadWrite ReadOnly and ReadWrite
Data Disk None None, ReadOnly and ReadWrite
Modify using Set-AzureOSDisk or Set-AzureDataDisk
16.
17. Full Support for IaaS at spring launch
Capabilities
• Fully Customize VM with Data Disks and
Endpoint Configuration
• Automate Virtual Network Settings
Slide Objective:Microsoft provides a continuous solution from private cloud to the public cloud. No matter where you are on your technology roadmap we have a solution to fit your needs. We are a trusted advisor and platform in the traditional enterprise and ISV space and with the new IaaS offering we are making it easier to bring this same level of trust and ease of use to the public cloud.
Slide Objective:With the introduction of Windows Azure Virtual Machines and Virtual Networks there are an entirely new set of workloads that are suitable.
Slide Objective:Show images available at preview
Slide Objective:Explain workflow for provisioning VMs in the cloud Notes:Cloud First Provisioning means exactly what is says. Building a VM in the cloud first. You have three methods of starting this process: Build a VM from the portal, from the command line OR programmatically calling the REST API. Once your choice of provisioning is made you will need to select the image and instance size to start from. The newly created disk will be stored in blob storage and your machine will boot.
Slide Objective:Explain workflow for bringing your own VHDNotes:This use case is when you already have a “golden image(s)” your company uses for server provisioning or you have a VM running on premises that you would just like to run in our data center. You take the vhd – use CSUpload or System Center App Controller to upload as a page blob to a storage account. From there use the portal to add as an image (sysprepped) or disk (configured VM) and there you can create a VM based off of the vhd.
Slide Objective:Explain workflow for creating a custom image in the cloud Notes:This use case is all about using the capture feature of IaaS to create OS images. The first part you start with a base vhd that you then custom with software binaries, registry settings etc.. You run sysprep.exe and generalize/shutdown the OS. You can then upload it if coming from on-premises or just click the capture button if you created the VM in the cloud. Capture allows you to take a generalized VM and save the underlying VHD as a new image in your image library.
Slide Objective:Explain the benefits of image mobility Notes:One of the key benefits of IaaS is flexibility and control. The Windows Azure solution provides the capability of not only moving VHDs TO the cloud but also allows you to copy the VHD back down and run it locally or on another cloud provider. Great for testing out production issues or any other need where you require a copy of the production server.
Slide Objective:Explain the differences between disks and images with VMs
Slide Objective:Explain how disks are durable and how Windows Azure storage worksNotes:The OS and Data Disks are stored in Windows Azure storage. So in addition to the data being persistent you also get the benefits of storage which means your VHD is replicated 3X’s locally and also 3X’s in a separate data center in the same region (geo-replication)
Slide Objective:This slide simply highlights that if the physical hardware backing your VM goes down a new server will start and pick up the same VHD.
Slide Objective:VM sizes
Slide Objective:Data Disks can have caching enabled on up to 4 disks.
Slide Objective:Simple slide to highlight the different options available for management and automation.
Slide Objective:Highlight some of the functionality available to Windows Administrators to automate management / provisioning of virtual machines in the cloud.
Slide Objective:In Windows Azure previously you did not have control over the VM names. This is a net new. Notes:Windows Azure Provided DNS is also new. Previously you had to use the Windows Azure object model to get the IP addresses of different roles in your deployment. BYOD allows you to host Active Directory directly in the cloud or when used in conjunction with Virtual Networks (VPN) to build hybrid solutions where AD is hosted on premises and consumed in the cloud or both.
Slide Objective:Load balanced endpoints allow you to configure the load balance to distribute traffic to multiple VMs. This works with TCP/UDP and you can also configure an HTTP probe with a custom path to test the health of the VM.
Slide Objective:Load Balanced Input Endpoints allow you to configure the load balance to distribute traffic to multiple VMs. This works with TCP/UDP and you can also configure an HTTP probe with a custom path to test the health of the VM.
Slide Objective:Multiple virtual machines grouped in an availability set are required to have an SLA
Slide Objective:Discuss achieving very high availability with Windows AzureNotes:Fault Domain is a physical unit of failure, and is closely related to the physical infrastructure in the data centers. In Windows Azure the rack can be considered a fault domain. However there is no 1:1 mapping between fault domain and rack. Windows Azure Fabric is responsible to deploy the instances of your application in different fault domains. Obviously this only applies if you run more than 1 instanceRight now Fabric makes sure that your application uses at least 2 (two) fault domains, however depending on capacity and VM availability it may happen that it is spread across more than that. As a developer u have no direct control over how many fault domains your application will use but the way you configure it may impact your availabilityUpgrade Domain is a logical unit, which determines how particular service will be upgraded. The default number of upgrade domains that are configured for your application is 5 (five). You can control how many upgrade domains your application will use through the upgradeDomain configuration setting in your service definition file (CSDEF). Windows Azure Fabric ensures that particular upgrade domain is not within single fault domainThat is Upgrade domains are orthogonal to fault domainsRoles are then spread out over upgrade domains and fault domains. Subject to running a reasonable number of instances this removes the risk of a single point of failure
Slide Objective:Provide a graphical view of fault and upgrade domains for existing web and worker roles. Use to contrast existing skills with availability sets.Notes:You can see that our service is well spread out across both fault and upgrade domainsThe loss of a fault domain will not cause a failure of our service nor will the restart or change of an upgrade domain cause a failure of our serviceNotesUseful pre-reading here.http://blog.toddysm.com/2010/04/upgrade-domains-and-fault-domains-in-windows-azure.html
Slide Objective:Explain availability setsNotes:Availability sets tell the Fabric Controller to place VMs in the same set on different racks for faults and in separate upgrade domains for updates. This essentially tells the FC not to take the guest OS down of all VMs in the same set for host updates.
Notes:To achieve a 99.95% SLA you must use multiple instances grouped in availability sets.
Slide Objective:Explain that each tier of an application can be enabled with its own availability set which ensures at a physical hardware level in the data center that there is no single point of failure.
Slide Objective:Microsoft stack to provide connectivity between on-premise and cloud.Notes:Servicebusvs connect – SB requires app code change, Connect/Virtual Networks do not. Virtual Networks are the net new here. They provide site to site connectivity where Connect provided server to server connectivity.Virtual Networks are the more flexible and powerful option.
Slide Objective:VNET OverviewNotes:Windows Azure Virtual Networks is our solution to providing hybrid solutions and solutions that require advanced connectivity in the cloud. Hybrid on-premises to cloud is enabled by using the VPN solution that allows site<->site connectivity allowing machines on premise and machines in the cloud to appear on the same network.Advanced connectivity solutions are enabled because Windows Azure applications that are deployed in to a virtual network will have persistent IP addresses. This is a requirement for solutions like Active Directory. Other solutions enabled by virtual networks in the cloud are mixing VMs and web/worker role solutions in the same Windows Azure network. This allows for scenarios like web/worker roles to communicate back to VMs running applications like SQL server.
Slide Objective:Show VNET scenarios
Slide Objective:Show currently supported VPN devices
Building new PaaS applications is a no-brainer when looking at some of the benefits:Simplified Deployment and ConfigurationHealth ModelEasy High AvailabilityInstance ScalabilityOS PatchingAutomatic Firewall ConfigurationSimple Certificate DeploymentHowever, building new applications sometimes comes with a dependency on other systems or legacy code. This has sometimes blocked the development of PaaS applications. The IaaS offering will unblock these types of applications and allow for the two development models to co-exist and directly communicate.
Slide Objective:Explain benefits of a PaaS Model
Slide Objective:Compare the current mixed mode developer models
Slide Objective:Connecting cloud services without a VNEtNotes:This diagram illustrates how you can configure applications such as Windows Azure Web Sites or Cloud Services to connect to applications running on virtual machines without directly putting them on the same virtual network. Note currently Windows Azure Web Sites do not support virtual networks. The application on the VM will need to have an endpoint opened on it to allow inbound traffic from the other service. To secure connections it is recommended the firewall on the VM be configured to restrict traffic only from the service.
Slide Objective:Connecting cloud services with a VNETNotes:In this scenario a web/worker role is deployed on the same virtual network as the virtual machines.The benefit is direct connectivity without the need for configuring endpoints on the load balancer. This is a requirement for scenarios like AD that require persistent IP addresses or lots of ports (RPC/COM+).