MJ Berends talk - Women & Non-Binary Focused Intro to AWSAWS Chicago
"how to develop for aws on your local machine using localstack / moto" - MJ Berends, Data Apps Team Lead at Jellyvision // @apprxlinear (https://twitter.com/apprxlinear)
The document provides an overview of Amazon Web Services (AWS) storage options. It discusses Elastic Block Store (EBS) which provides block-level storage volumes for EC2 instances; instance store volumes which are temporary storage attached to an EC2 host; Amazon Simple Storage Service (S3) which provides scalable object storage; and Amazon Glacier which provides low-cost archival storage. For each service, it outlines their key features and characteristics as well as ideal and non-ideal usage patterns. The document concludes with a brief recap of the main differences between EBS, S3, and Glacier storage services.
Introduction to scaling your WordPress site past a single node using AWSWP Engine
Multi-node sites give you high availability, but come with their own constraints and challenges. Hear the team from WP Engine as they talk about how to optimize your high-availability WordPress sites on AWS instances.
This document provides an overview of serverless computing and introduces serverless frameworks for ClojureScript including CLJS-Lambda and Serverless-Cljs. It defines serverless as exposing single functions that are run on shared servers and paid for only by execution time. Recommended resources on serverless architectures and the AWS serverless page are provided. The document discusses JVM options for ClojureScript lambdas and introduces lein plugins and templates for building, testing, and deploying serverless ClojureScript functions to AWS Lambda including commands for building, deploying, and invoking functions.
WordCamp IL 2016 - WordPress Scale on AWSBoaz Ziniman
One of the most popular CMS, WordPress, was not designed for the cloud era. Running a high demand and highly available WordPress in a cluster can be a complex task.
There are several solutions to this problem and this session will focus on one of them. Using several AWS services (EC2, RDS, S3, EFS, CloudFormation and others) and Zend Server, we will create a complex setup running in minutes and scale it up and down by demand.
This document summarizes a presentation on containerizing applications and deploying them to cloud platforms. It discusses Docker containers and containerization as a way to package applications. It then covers deploying .NET Core applications in Docker containers and pushing the images to cloud container registries on platforms like AWS ECS and Azure Container Instances. Finally, it demonstrates containerizing other applications built with technologies like Java Spring Boot, Python Flask, and JavaScript React.
Structuring node.js projects - Seven Peaks Software (Node.JS Meetup 18 nov 2021)Seven Peaks Speaks
Denis is a professional programmer who has 12+ years of experience working in various startups!
Denis was dive deep into Structuring your Node.JS app, DI Container, Async Local Storage, Request handlers, Services, Unit of Work and Testing.
For more info about Seven Peaks Software:
https://lnkd.in/g2jMsDy
AWS is a cloud computing platform that allows users to rent computing resources like servers and storage on a pay-as-you-go basis measured in milliseconds. It launched in 2002 for internal Amazon use and publicly in 2004. It now has over 35 billion in annual revenue and 25,000 employees across 18 regions and multiple availability zones. Popular AWS services discussed include EC2 for virtual servers, S3 for object storage, EFS for shared file storage, Batch for running large jobs, Lambda for serverless functions, and RDS for databases. The document provides an overview of AWS services and examples of how a company uses services like EC2, S3, EFS, Batch and Lambda in their infrastructure.
This document discusses implementing real-time web applications using SignalR and Azure Service Bus. It provides an overview of real-time web capabilities, examples using SignalR for forced video switching and real-time deals, and scaling out applications using the publish-subscribe pattern with Azure Service Bus. The document also includes a demonstration of using SignalR with Azure for continuous integration and horizontal scaling.
This document is a presentation about serverless systems and architectures. It introduces serverless computing as a highly abstracted cloud computing model where infrastructure is fully managed by a third party. Key benefits of serverless include no server management, easy scalability, and pay-per-use pricing. The presentation demonstrates serverless concepts like AWS Lambda and event-driven architectures using examples and demos. It also discusses developing serverless applications locally and using frameworks like Spring with serverless.
These are the slides of the second talk of the second Tech Talk@TransferWise Singapore, which happened on the 1st of March 2018.
We take a look at what Serverless Computing is, find out what we can do with Amazon Web Services Lambda and when it can be useful. We also explore how it has evolved for the past 3 years and learn about its remaining limitations.
Docker is launching a plugin system to provide an open and extensible platform while maintaining a consistent user experience. Plugins will enable new functionality like networking, data volumes, logging and scheduling to be added or swapped out. Developers can decide which plugins to use for their applications in different environments. The demo showed how plugins allow stateful containers with network identity to be portable across servers during upgrades by using Flocker and Weave plugins with Docker Swarm and Compose.
This document summarizes serverless design patterns and tools. It begins with a brief history of cloud computing and an introduction to serverless computing. Common serverless use cases like event-driven applications and stream processing are described. Several serverless patterns are then outlined, such as hosting a static website or REST API using AWS Lambda and API Gateway. Finally, the document demonstrates a serverless application and discusses future directions for serverless technologies.
DNN & The CloudOS: Windows Azure on your termsJess Coburn
As you look to deploy your DNN/Evoq website, there's more than one path to the cloud. In this presentation we'll review how you can deploy many of the Azure services yourself, with the same tools, the same technology and even the same user interface but in your datacenter, on your servers and customized to your unique business needs.
A 5 Minute Intro To Weave - Software Circus July 2015Weaveworks
Weave is a tool that provides portable application clusters, service discovery, automatic IP address allocation, and load balancing for containers. It requires minimal configuration and allows containers to connect to each other without specialist networking knowledge. Weave Net provides these capabilities on a single host, multiple hosts, and multiple clouds. Weave Run automates service discovery, IP addressing, load balancing, and DNS for containers without any configuration required. Weave Scope provides visualization of container networks.
TDD a REST API With Node.js and MongoDBValeri Karpov
This document discusses developing and testing a MongoDB and Node.js REST API. It introduces MongoDB and Node.js, and then covers building an API with the following parts: using Mongoose to define schemas for products, categories, and users; building routes with Express; and testing with Mocha and Superagent. Key topics include schema design principles, building RESTful routes, and testing the API end-to-end. The goal is to learn how to structure APIs on MongoDB with Node.js and ensure quality with testing.
This document provides an overview and summary of various Amazon Web Services (AWS) that can be used for web hosting, including:
- Amazon EC2 for scalable and reliable cloud computing. EC2 offers flexibility through multiple instance types and platforms.
- Amazon S3 for simple storage service.
- Amazon EBS for persistent block storage for EC2 instances. EBS volumes provide off-instance storage that persists independently.
- Amazon SQS for a scalable hosted queue for passing messages between applications. SQS offers unlimited queue scaling and message retention.
1. The document discusses how OpsWorks has made the presenter's life easier as a developer who also handles operations. OpsWorks provides hosted infrastructure on AWS for deploying applications using Chef recipes.
2. It describes the main structures in OpsWorks - stacks, layers, apps, and instances. Stacks represent entire applications, layers define different parts like web servers, apps contain specific settings, and instances define the servers.
3. The presenter discusses using OpsWorks with Ruby on Rails applications, including customizing Chef recipes, deploying code, and integrating other AWS services for monitoring, security, and scaling. While documentation can be confusing, OpsWorks provides an easy way for developers to manage operations.
This document discusses tools for creating a WordPress development environment. It covers common development setups like LAMP/LEMP stacks, tools for local development like text editors and version control, and options for setting up a local environment like MAMP, native Linux/Mac stacks, Virtual Machines with Vagrant/VVV, and containers with Docker. The goals are to choose tools that allow for effective collaboration, testing, and deploying code across different environments.
The document discusses various ways to deploy WordPress sites, including provisioning options like Digital Ocean docs, WordPress TV, and Roots/Trellis with Ansible. It also covers deployment categories like version control, hosted options like WP Engine and Pantheon, WordPress plugins for deployment like Revisr and Versionpress, services like AWS CodeDeploy and DeployBot, and command line tools like Git, Capistrano, Ansible, and Docker. Specific examples are provided for deploying with WP Engine, Revisr, VersionPress, DeployBot, Capistrano, and Ansible. Database deployment options mentioned include WP Migrate DB Pro, WP CLI, and VersionPress.
This document discusses Viadeo's plans to move its entire infrastructure to AWS. It provides background on Viadeo's current infrastructure and use of AWS services. Key reasons for fully migrating to AWS include improving agility, optimizing costs by avoiding hardware refreshes, implementing stronger disaster recovery, and efficiently handling unpredictable workloads. The migration will be gradual rather than a "big bang." Challenges include some initial performance/cost trade-offs and cleaning up technical debt. Automation, scalability, and safety will be top objectives.
This document provides an overview of AWS Systems Manager, which is a collection of capabilities for configuring and managing Amazon EC2 instances, on-premises servers, and other AWS resources at scale. It addresses challenges like achieving compliance for instances, scalability, support for multi-cloud and hybrid environments, providing developer power, handling limited internet access, and low cost. Key capabilities of AWS Systems Manager include automation, compliance, running commands, patching, state management, and maintenance windows. The document provides examples of using it for bastion hosts, inventory, auditing changes, and patch compliance.
Being able to rapidly iterate on, build, and test your code is key to being a productive developer. Without local automation, working with the numerous platforms and technologies in your stack can become very frustrating. In this webinar, Ben Bromhead CTO of Instaclustr will explore best practices to easily integrate Apache CassandraTM into your development workflow, so you spend more time writing good code and less time fighting your environment.
Moving at the Speed-of-Cloud Without Getting OwnedDevOps.com
This document discusses improving security on Amazon Web Services (AWS) infrastructure. It recommends beginning with low-hanging fruit like enforcing password policies and multi-factor authentication. It also recommends implementing monitoring tools like Scout2 and CloudTrail logging. Additional recommendations include securing network access, using EC2 roles instead of long-term credentials, and configuring S3 bucket policies restrictively. The document provides examples of how these security measures were implemented at Etsy to improve their AWS security posture.
Moving at the Speed-of-Cloud Without Getting OwnedDeborah Schalm
There are two kinds of people in this community: those who embrace the cloud and all it has to offer, and those who have the cloud thrust upon them.
In this talk, we focused on Security, DevOps and You. How do you go about setting up security in an environment that wasn't set up with security in mind? How do you go about working in an infrastructure that you are completely unfamiliar with? Security is always evolving and as security professionals it's critical that we know the answers to these solutions before these scenarios crop up.
Join Etsy, DevOps.com, and Evident.io to explore the needs of Devops, Security and IT and how to move at the speed-of-cloud together without creating vulnerabilities. In this webinar we will discuss:
Automation vs AWS Management Console
Identity and Access Management (IAM)
S3 Bucket policies
Logging and alerting so you have proper visibility into your environment
It's 10pm, Do You Know Where Your Access Keys Are?Ken Johnson
Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against real-world attacks.
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018HashiCorp
Vault is a tool for centrally managing secrets like passwords, API keys, and certificates. It addresses the problem of "secrets sprawl" where credentials are stored insecurely in multiple places like source code, emails, and configuration files. Vault centralizes secrets management, provides access control and auditing, and generates unique short-lived credentials to reduce risk if a secret is compromised. It also supports encrypting sensitive data for additional protection. Implementing Vault involves deciding where it will run, who will manage encryption keys, which secrets it will store, where audit logs will go, and who will operate and configure the system on an ongoing basis.
This document discusses implementing real-time web applications using SignalR and Azure Service Bus. It provides an overview of real-time web capabilities, examples using SignalR for forced video switching and real-time deals, and scaling out applications using the publish-subscribe pattern with Azure Service Bus. The document also includes a demonstration of using SignalR with Azure for continuous integration and horizontal scaling.
This document is a presentation about serverless systems and architectures. It introduces serverless computing as a highly abstracted cloud computing model where infrastructure is fully managed by a third party. Key benefits of serverless include no server management, easy scalability, and pay-per-use pricing. The presentation demonstrates serverless concepts like AWS Lambda and event-driven architectures using examples and demos. It also discusses developing serverless applications locally and using frameworks like Spring with serverless.
These are the slides of the second talk of the second Tech Talk@TransferWise Singapore, which happened on the 1st of March 2018.
We take a look at what Serverless Computing is, find out what we can do with Amazon Web Services Lambda and when it can be useful. We also explore how it has evolved for the past 3 years and learn about its remaining limitations.
Docker is launching a plugin system to provide an open and extensible platform while maintaining a consistent user experience. Plugins will enable new functionality like networking, data volumes, logging and scheduling to be added or swapped out. Developers can decide which plugins to use for their applications in different environments. The demo showed how plugins allow stateful containers with network identity to be portable across servers during upgrades by using Flocker and Weave plugins with Docker Swarm and Compose.
This document summarizes serverless design patterns and tools. It begins with a brief history of cloud computing and an introduction to serverless computing. Common serverless use cases like event-driven applications and stream processing are described. Several serverless patterns are then outlined, such as hosting a static website or REST API using AWS Lambda and API Gateway. Finally, the document demonstrates a serverless application and discusses future directions for serverless technologies.
DNN & The CloudOS: Windows Azure on your termsJess Coburn
As you look to deploy your DNN/Evoq website, there's more than one path to the cloud. In this presentation we'll review how you can deploy many of the Azure services yourself, with the same tools, the same technology and even the same user interface but in your datacenter, on your servers and customized to your unique business needs.
A 5 Minute Intro To Weave - Software Circus July 2015Weaveworks
Weave is a tool that provides portable application clusters, service discovery, automatic IP address allocation, and load balancing for containers. It requires minimal configuration and allows containers to connect to each other without specialist networking knowledge. Weave Net provides these capabilities on a single host, multiple hosts, and multiple clouds. Weave Run automates service discovery, IP addressing, load balancing, and DNS for containers without any configuration required. Weave Scope provides visualization of container networks.
TDD a REST API With Node.js and MongoDBValeri Karpov
This document discusses developing and testing a MongoDB and Node.js REST API. It introduces MongoDB and Node.js, and then covers building an API with the following parts: using Mongoose to define schemas for products, categories, and users; building routes with Express; and testing with Mocha and Superagent. Key topics include schema design principles, building RESTful routes, and testing the API end-to-end. The goal is to learn how to structure APIs on MongoDB with Node.js and ensure quality with testing.
This document provides an overview and summary of various Amazon Web Services (AWS) that can be used for web hosting, including:
- Amazon EC2 for scalable and reliable cloud computing. EC2 offers flexibility through multiple instance types and platforms.
- Amazon S3 for simple storage service.
- Amazon EBS for persistent block storage for EC2 instances. EBS volumes provide off-instance storage that persists independently.
- Amazon SQS for a scalable hosted queue for passing messages between applications. SQS offers unlimited queue scaling and message retention.
1. The document discusses how OpsWorks has made the presenter's life easier as a developer who also handles operations. OpsWorks provides hosted infrastructure on AWS for deploying applications using Chef recipes.
2. It describes the main structures in OpsWorks - stacks, layers, apps, and instances. Stacks represent entire applications, layers define different parts like web servers, apps contain specific settings, and instances define the servers.
3. The presenter discusses using OpsWorks with Ruby on Rails applications, including customizing Chef recipes, deploying code, and integrating other AWS services for monitoring, security, and scaling. While documentation can be confusing, OpsWorks provides an easy way for developers to manage operations.
This document discusses tools for creating a WordPress development environment. It covers common development setups like LAMP/LEMP stacks, tools for local development like text editors and version control, and options for setting up a local environment like MAMP, native Linux/Mac stacks, Virtual Machines with Vagrant/VVV, and containers with Docker. The goals are to choose tools that allow for effective collaboration, testing, and deploying code across different environments.
The document discusses various ways to deploy WordPress sites, including provisioning options like Digital Ocean docs, WordPress TV, and Roots/Trellis with Ansible. It also covers deployment categories like version control, hosted options like WP Engine and Pantheon, WordPress plugins for deployment like Revisr and Versionpress, services like AWS CodeDeploy and DeployBot, and command line tools like Git, Capistrano, Ansible, and Docker. Specific examples are provided for deploying with WP Engine, Revisr, VersionPress, DeployBot, Capistrano, and Ansible. Database deployment options mentioned include WP Migrate DB Pro, WP CLI, and VersionPress.
This document discusses Viadeo's plans to move its entire infrastructure to AWS. It provides background on Viadeo's current infrastructure and use of AWS services. Key reasons for fully migrating to AWS include improving agility, optimizing costs by avoiding hardware refreshes, implementing stronger disaster recovery, and efficiently handling unpredictable workloads. The migration will be gradual rather than a "big bang." Challenges include some initial performance/cost trade-offs and cleaning up technical debt. Automation, scalability, and safety will be top objectives.
This document provides an overview of AWS Systems Manager, which is a collection of capabilities for configuring and managing Amazon EC2 instances, on-premises servers, and other AWS resources at scale. It addresses challenges like achieving compliance for instances, scalability, support for multi-cloud and hybrid environments, providing developer power, handling limited internet access, and low cost. Key capabilities of AWS Systems Manager include automation, compliance, running commands, patching, state management, and maintenance windows. The document provides examples of using it for bastion hosts, inventory, auditing changes, and patch compliance.
Being able to rapidly iterate on, build, and test your code is key to being a productive developer. Without local automation, working with the numerous platforms and technologies in your stack can become very frustrating. In this webinar, Ben Bromhead CTO of Instaclustr will explore best practices to easily integrate Apache CassandraTM into your development workflow, so you spend more time writing good code and less time fighting your environment.
Moving at the Speed-of-Cloud Without Getting OwnedDevOps.com
This document discusses improving security on Amazon Web Services (AWS) infrastructure. It recommends beginning with low-hanging fruit like enforcing password policies and multi-factor authentication. It also recommends implementing monitoring tools like Scout2 and CloudTrail logging. Additional recommendations include securing network access, using EC2 roles instead of long-term credentials, and configuring S3 bucket policies restrictively. The document provides examples of how these security measures were implemented at Etsy to improve their AWS security posture.
Moving at the Speed-of-Cloud Without Getting OwnedDeborah Schalm
There are two kinds of people in this community: those who embrace the cloud and all it has to offer, and those who have the cloud thrust upon them.
In this talk, we focused on Security, DevOps and You. How do you go about setting up security in an environment that wasn't set up with security in mind? How do you go about working in an infrastructure that you are completely unfamiliar with? Security is always evolving and as security professionals it's critical that we know the answers to these solutions before these scenarios crop up.
Join Etsy, DevOps.com, and Evident.io to explore the needs of Devops, Security and IT and how to move at the speed-of-cloud together without creating vulnerabilities. In this webinar we will discuss:
Automation vs AWS Management Console
Identity and Access Management (IAM)
S3 Bucket policies
Logging and alerting so you have proper visibility into your environment
It's 10pm, Do You Know Where Your Access Keys Are?Ken Johnson
Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against real-world attacks.
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018HashiCorp
Vault is a tool for centrally managing secrets like passwords, API keys, and certificates. It addresses the problem of "secrets sprawl" where credentials are stored insecurely in multiple places like source code, emails, and configuration files. Vault centralizes secrets management, provides access control and auditing, and generates unique short-lived credentials to reduce risk if a secret is compromised. It also supports encrypting sensitive data for additional protection. Implementing Vault involves deciding where it will run, who will manage encryption keys, which secrets it will store, where audit logs will go, and who will operate and configure the system on an ongoing basis.
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOpsGarth Boyd
The document discusses various security risks and best practices for securing applications and data in the AWS cloud using a DevOps model. It covers topics like data breaches, weak identity and access management, insecure APIs, system vulnerabilities, account hijacking, and malicious insiders. For each risk, it provides examples of real security incidents and recommendations like implementing least privilege access with IAM, using services like AWS KMS and Secrets Manager for credential storage, enabling MFA, monitoring with GuardDuty and Inspector, and segmenting access. The overall message is that security must be automated, monitored, and built into DevOps workflows from the start when developing in AWS.
Moving the needle on cloud security - AWS Summit AtlantaChris Farris
Slides from my Dev Chat at the Atlanta AWS Summit.
or How 4th Grade Math, Spreadsheets and a lot of Lambda improved my employer's cloud security posture.
Netflix Open Source Meetup Season 4 Episode 3aspyker
In this episode, we will focus on security in the cloud at scale. We’ll have Netflix speakers discussing existing and upcoming security-related OSS releases, and we’ll also have external speakers from organizations that are using and contributing to Netflix security OSS.
First, Patrick Kelley from Netflix’s Security Operations team will speak about RepoMan, an upcoming OSS release designed to right-size AWS permissions. Then, Wes Miaw from Netflix’s Security Engineering team will discuss MSL (Message Security Layer).
We have two external speakers for this event - Chris Dorros from OpenDNS/Cisco will talk about his use of and contributions to Lemur, and Ryan Lane from Lyft will talk about their use of BLESS.
After the talks, we’ll have OSS authors at demo stations to answer questions and provide demos of Netflix security OSS, including Lemur, MSL, and Security Monkey.
Cloud security best practices in AWS by: Ankit GiriOWASP Delhi
An expert discusses best practices for securing an AWS account, including disabling root access keys and secrets, enabling multi-factor authentication for IAM users, using least privilege policies, rotating keys regularly, and more. Examples are given of real breaches that occurred due to exposed keys and misconfigured security groups and S3 buckets. Scripts for finding publicly accessible S3 buckets and exploiting server side request forgery vulnerabilities are also mentioned.
LASCON 2016 - It's 10PM Do You Know Where Your Access Keys Are?Ken Johnson
This document provides an overview of a presentation about AWS security best practices. It discusses several methods for hardening an AWS environment including: not using the root account, removing root access keys, auditing IAM policies, enabling multi-factor authentication, implementing a strong password policy, and restricting API access with MFA. It also covers ways to monitor an AWS environment for anomalies using CloudTrail, SNS, Config, and CloudWatch. Specific examples are given around setting up billing alerts with CloudWatch and SNS.
Putting Cloud Controls to Work!
Threats are evolving, becoming increasingly sophisticated and more numerous as cloud adoption by enterprise is surging. Traditional approaches to securing IT systems have expanded to include new requirements of cloud computing. This webinar outlines how to successfully harden your AWS infrastructure with IAM best practices.
This deck covers:
1) Getting started with the basics
2) How organizations balance the 'need to grant access' with the requirement to secure and protect the business
3) Best practices for managing third-party identities and access control
User Credential handling in Web Applications done righttladesignz
In my work I often see very bad practices how the users' passwords are treated in web applications. This is a short summary of the current state of the art, how to do it the right way.
Automating AWS security and compliance John Varghese
The document discusses automating security and compliance on AWS. It begins with an overview of common cloud security threats and why automating security is important. It then covers AWS' shared responsibility model and various AWS services that can help with automation, including Security Hub, GuardDuty, Control Tower, Macie, Config, and WAF. These services aid in tasks like continuous monitoring, detecting threats, and automating response. The document emphasizes that automation is faster, more effective, reliable, and scalable than manual security and compliance processes. It provides examples of how different threats could be automatically detected and remediated.
Wrangling Security & Identity across 99+ AWS AccountsAndrew Bienert
The document discusses wrangling security and identity across 80+ AWS accounts at SEEK. It covers SEEK's use of AWS networking and multi-account architectures, patterns for secure cross-account communication and integration, and automating security across many accounts. Specific topics include VPC peering, IAM roles for cross-account access, using services like S3 and SNS for cross-account data and event sharing, common AWS account strategies, and how SEEK structures their accounts. Automation tools like Cloud Custodian are discussed for ensuring all S3 buckets are privately configured by default across accounts.
004 - Logging in the Cloud -- hide01.ir.pptxnitinscribd
Logging is important for security, compliance, and operations in the cloud. There are two main types of logs - logs of resources in the cloud (data plane) and logs of API calls that control cloud resources (control plane). CloudTrail is the primary way to log control plane API calls in AWS and provides information about who performed actions, resources affected, and other context. When implementing logging, accounts should be structured with organizational units and logging policies to ensure all accounts are logged appropriately for security and compliance.
Shared Security Responsibilities in AWS - LA AWS User Meetup - 2014-07-17John Martinez
This document discusses shared security responsibilities between AWS and customers. It begins with an introduction of the author. It then explains that while AWS manages physical infrastructure and network security, customers are responsible for identity and access management, application security, and compliance. The document provides recommendations for securing IAM, S3, and monitoring for suspicious activity. It emphasizes using services like IAM, CloudTrail, and CloudFormation to automate security best practices.
Mistakes to avoid in AWS include:
1) Leaving AWS credentials in code repositories which allows unauthorized access.
2) Having overly permissive inbound security group rules.
3) Not automating the termination of instances which can incur unnecessary costs.
4) Failing to monitor and optimize resources like CPU credits which can impact performance.
Is Multi-Cloud good or bad? How about Serverless? The answer to all these questions is Yes, sometimes. Whether you're new to all this or a long-time industry veteran, you'll surely come away from this approachable talk with a new understanding of cutting edge technology and actionable insights on how to make smart trade offs.
Vancouver Cloud Summit 2024 (2024-04-22)
Denver AWS Users' Group Meeting - July 2018 SlidesDavid McDaniel
This document summarizes the July 2018 meeting of the AWS Users' Group in Denver. It thanks sponsors Eplexity and Prestige for hosting the event and providing food and drinks. The agenda includes discussions on methodology changes when moving applications to the cloud as well as cloud optimization best practices. Attendees are provided WiFi login details and reminded to follow the group on Twitter. Upcoming events and resources are also listed.
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Rob Fuller
This talk (hopefully) provides some new pentesters tools and tricks. Basically a continuation of last year’s Dirty Little Secrets they didn’t teach you in Pentest class. Topics include; OSINT and APIs, certificate stealing, F**king with Incident Response Teams, 10 ways to psexec, and more. Yes, mostly using metasploit.
Chicago AWS Architectural Resilience Day 2024AWS Chicago
September 2024 the first-ever community Resilience Day in Chicago.
See the video recording on the AWSChicago Youtube: https://youtu.be/z4camus_96c
Thank you, presenters from AWS and PWC.
Angelo Mandato: Learn about the benefits with examples how to create and main...AWS Chicago
AWS Community Day Midwest 2024 |
Angelo Mandato |
AWS Columbus OH |
Learn about the benefits with examples how to create and maintain DEV, QA, and UAT environments using unique domain names
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungenpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-und-verwaltung-von-multiuser-umgebungen/
HCL Nomad Web wird als die nächste Generation des HCL Notes-Clients gefeiert und bietet zahlreiche Vorteile, wie die Beseitigung des Bedarfs an Paketierung, Verteilung und Installation. Nomad Web-Client-Updates werden “automatisch” im Hintergrund installiert, was den administrativen Aufwand im Vergleich zu traditionellen HCL Notes-Clients erheblich reduziert. Allerdings stellt die Fehlerbehebung in Nomad Web im Vergleich zum Notes-Client einzigartige Herausforderungen dar.
Begleiten Sie Christoph und Marc, während sie demonstrieren, wie der Fehlerbehebungsprozess in HCL Nomad Web vereinfacht werden kann, um eine reibungslose und effiziente Benutzererfahrung zu gewährleisten.
In diesem Webinar werden wir effektive Strategien zur Diagnose und Lösung häufiger Probleme in HCL Nomad Web untersuchen, einschließlich
- Zugriff auf die Konsole
- Auffinden und Interpretieren von Protokolldateien
- Zugriff auf den Datenordner im Cache des Browsers (unter Verwendung von OPFS)
- Verständnis der Unterschiede zwischen Einzel- und Mehrbenutzerszenarien
- Nutzung der Client Clocking-Funktion
This is the keynote of the Into the Box conference, highlighting the release of the BoxLang JVM language, its key enhancements, and its vision for the future.
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025BookNet Canada
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, transcript, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
Dev Dives: Automate and orchestrate your processes with UiPath MaestroUiPathCommunity
This session is designed to equip developers with the skills needed to build mission-critical, end-to-end processes that seamlessly orchestrate agents, people, and robots.
📕 Here's what you can expect:
- Modeling: Build end-to-end processes using BPMN.
- Implementing: Integrate agentic tasks, RPA, APIs, and advanced decisioning into processes.
- Operating: Control process instances with rewind, replay, pause, and stop functions.
- Monitoring: Use dashboards and embedded analytics for real-time insights into process instances.
This webinar is a must-attend for developers looking to enhance their agentic automation skills and orchestrate robust, mission-critical processes.
👨🏫 Speaker:
Andrei Vintila, Principal Product Manager @UiPath
This session streamed live on April 29, 2025, 16:00 CET.
Check out all our upcoming Dev Dives sessions at https://community.uipath.com/dev-dives-automation-developer-2025/.
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. 🌍
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! 🚀
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveScyllaDB
Want to learn practical tips for designing systems that can scale efficiently without compromising speed?
Join us for a workshop where we’ll address these challenges head-on and explore how to architect low-latency systems using Rust. During this free interactive workshop oriented for developers, engineers, and architects, we’ll cover how Rust’s unique language features and the Tokio async runtime enable high-performance application development.
As you explore key principles of designing low-latency systems with Rust, you will learn how to:
- Create and compile a real-world app with Rust
- Connect the application to ScyllaDB (NoSQL data store)
- Negotiate tradeoffs related to data modeling and querying
- Manage and monitor the database for consistently low latencies
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
HCL Nomad Web – Best Practices and Managing Multiuser Environmentspanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-and-managing-multiuser-environments/
HCL Nomad Web is heralded as the next generation of the HCL Notes client, offering numerous advantages such as eliminating the need for packaging, distribution, and installation. Nomad Web client upgrades will be installed “automatically” in the background. This significantly reduces the administrative footprint compared to traditional HCL Notes clients. However, troubleshooting issues in Nomad Web present unique challenges compared to the Notes client.
Join Christoph and Marc as they demonstrate how to simplify the troubleshooting process in HCL Nomad Web, ensuring a smoother and more efficient user experience.
In this webinar, we will explore effective strategies for diagnosing and resolving common problems in HCL Nomad Web, including
- Accessing the console
- Locating and interpreting log files
- Accessing the data folder within the browser’s cache (using OPFS)
- Understand the difference between single- and multi-user scenarios
- Utilizing Client Clocking
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...Alan Dix
Talk at the final event of Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence funded by the British Council UK-Saudi Challenge Fund 2024, Cardiff Metropolitan University, 29th April 2025
https://alandix.com/academic/talks/CMet2025-AI-Changes-Everything/
Is AI just another technology, or does it fundamentally change the way we live and think?
Every technology has a direct impact with micro-ethical consequences, some good, some bad. However more profound are the ways in which some technologies reshape the very fabric of society with macro-ethical impacts. The invention of the stirrup revolutionised mounted combat, but as a side effect gave rise to the feudal system, which still shapes politics today. The internal combustion engine offers personal freedom and creates pollution, but has also transformed the nature of urban planning and international trade. When we look at AI the micro-ethical issues, such as bias, are most obvious, but the macro-ethical challenges may be greater.
At a micro-ethical level AI has the potential to deepen social, ethnic and gender bias, issues I have warned about since the early 1990s! It is also being used increasingly on the battlefield. However, it also offers amazing opportunities in health and educations, as the recent Nobel prizes for the developers of AlphaFold illustrate. More radically, the need to encode ethics acts as a mirror to surface essential ethical problems and conflicts.
At the macro-ethical level, by the early 2000s digital technology had already begun to undermine sovereignty (e.g. gambling), market economics (through network effects and emergent monopolies), and the very meaning of money. Modern AI is the child of big data, big computation and ultimately big business, intensifying the inherent tendency of digital technology to concentrate power. AI is already unravelling the fundamentals of the social, political and economic world around us, but this is a world that needs radical reimagining to overcome the global environmental and human challenges that confront us. Our challenge is whether to let the threads fall as they may, or to use them to weave a better future.
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfSoftware Company
Explore the benefits and features of advanced logistics management software for businesses in Riyadh. This guide delves into the latest technologies, from real-time tracking and route optimization to warehouse management and inventory control, helping businesses streamline their logistics operations and reduce costs. Learn how implementing the right software solution can enhance efficiency, improve customer satisfaction, and provide a competitive edge in the growing logistics sector of Riyadh.
Big Data Analytics Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
Devina Dhawan's talk - Women and non binary focused intro to AWS
1. Transitioning to AWS in a
hurry without getting owned
(Hopefully...)
Devina Dhawan
02/06/2017 - Women & Non-Binary Focused intro to AWS
Email: [email protected]
Twitter: @theulzo
1
2. Introduction
2
● Etsy (Jan 2015 - Present)
● Orbitz (May 2014 - Dec 2015)
● University of Illinois in Chicago
3. Etsy operates a global marketplace where people around the world connect,
both online and offline, to make, sell and buy unique goods.
3
4. Security at Etsy
4
● Evangelizing Security at Etsy
○ Candy is a great way to make
friends
○ Allow the conversation about
security to be comfortable
and inviting.
5. What is this talk about?
• I will help you improve your
existing AWS infrastructure
• You will walk away with action
items
• http://bit.ly/2EnZU1q
5
9. 9
● Evident.io
○ Scans of
configurations to
see if anything is
misconfigured
● Password policies?
● Multi-factor Authentication
● Jira Tickets
Evident.io
13. Changes I made… like a goon
• Password policy to the highest
scrutiny
• Removed all admin roles from
accounts that didn’t need them (aka
hadn’t used aws in 2 yrs and didn’t
have any api keys tied to their user)
13
15. My first Etsy communication
Hello X,
Looks like you still do not have MFA set up on your AWS account.
Go ahead and go to Identity & Access Management in your Amazon Web Services console ->
find your username -> Manage MFA Device.
Note: If you no longer need your AWS account, please let me know!
Devina
16. Version 2.0
Hello X,
Looks like you still do not have MFA set up on your AWS
account. It looks like you used your AWS account recently
as well, so please sign up for MFA by 03/31/16 or your
account will be suspended.
Go ahead and go to Identity & Access Management in
your Amazon Web Services console -> find your username
-> Manage MFA Device.
Note: If you no longer need your AWS account, please let
me know!
Your neighborhood candy provider,
Devina
37. ● Bug Bounties at Etsy:
https://www.etsy.com/bounty
● S3 Scanner
Github:
https://github.com/bear/s3scan
○ Report of all s3 buckets
and perms
○ Likely how bountiers are
finding out about your
misconfigured policies.
38. 38
So… it happened, what do I do now?
❏ Write down all the systems you need to take care of
❏ Find out what you need to fix on all systems, write that down
❏ Start with the low-hanging fruit
❏ Over communicate what you are doing.
❏ Work with networking on the AWS network
❏ Create default rulesets & roles
❏ Work with IT/helpdesk to handle account provisioning
❏ Work with systems engineering to handle provisioning of
services
❏ … profit?