SlideShare a Scribd company logo
1 of 13
Download to read offline
10/May/2013
Cloud Computing and the SysOp
Professional: How to get ready?
Eduardo Coelho - Congresso UNIFACEX
Friday, May 10, 13
hold on
✤ before we get started, let me show you some interesting facts
involving information security and privacy in our world
Friday, May 10, 13
Cryptogram newsletter published
the following on 15/Apr/2013
✤ One: Some of the Chinese military hackers who were implicated in a broad set of
attacks against the U.S. government and corporations were identified because they
accessed Facebook from the same network infrastructure they used to carry out
their attacks.
✤ Two: Hector Monsegur, one of the leaders of the LulzSec hacker movement, was
identified and arrested last year by the FBI. Although he practiced good computer
security and used an anonymous relay service to protect his identity, he slipped
up.
✤ And three: Paula Broadwell, who had an affair with CIA director David Petraeus,
similarly took extensive precautions to hide her identity. She never logged in to
her anonymous e-mail service from her home network. Instead, she used hotel
and other public networks when she e-mailed him. The FBI correlated hotel
registration data from several different hotels -- and hers was the common name.
Friday, May 10, 13
(continuing)
✤ There are simply too many ways to be tracked. The Internet, e-mail, cell phones, web browsers,
social networking sites, search engines: these have become necessities, and it's fanciful to expect
people to simply refuse to use them just because they don't like the spying, especially since the
full extent of such spying is deliberately hidden from us and there are few alternatives being
marketed by companies that don't spy.
✤ This isn't something the free market can fix. We consumers have no choice in the matter. All the
major companies that provide us with Internet services are interested in tracking us. Visit a
website and it will almost certainly know who you are; there are lots of ways to be tracked
without cookies. Cell phone companies routinely undo the web's privacy protection. One
experiment at Carnegie Mellon took real-time videos of students on campus and was able to
identify one-third of them by comparing their photos with publicly available tagged Facebook
photos.
✤ Maintaining privacy on the Internet is nearly impossible. If you forget even once to enable your
protections, or click on the wrong link, or type the wrong thing, you've permanently attached
your name to whatever anonymous service you're using. Monsegur slipped up once, and the FBI
got him. If the director of the CIA can't maintain his privacy on the Internet, we've got no hope.
Friday, May 10, 13
(continuing)
✤ So, we're done. Welcome to a world where Google knows exactly what
sort of porn you all like, and more about your interests than your
spouse does. Welcome to a world where your cell phone company
knows exactly where you are all the time. Welcome to the end of private
conversations, because increasingly your conversations are conducted
by e-mail, text, or social networking sites.
✤ And welcome to a world where all of this, and everything else that you
do or is done on a computer, is saved, correlated, studied, passed
around from company to company without your knowledge or consent;
and where the government accesses it at will without a warrant.
✤ Welcome to an Internet without privacy, and we've ended up here with
hardly a fight.
Friday, May 10, 13
Thoughts
✤ How many people actually understand how all of this impacts our
life?
✤ How good is it to be an IT professional which are probably in the best
position to fully antecipate bad outcomes and prevent bad things?
Friday, May 10, 13
Now let’s focus on the IT PRO
✤ Which is the set of abilities that will (is) be asked of System Operators
and Network Admins?
Friday, May 10, 13
By the way, what SysOp stands
for? (or will stand for)
✤ Windows Server Professionals
✤ Unix/Linux Server Professionals
✤ Network Appliance Professionals
✤ Security Officers
✤ DBAs
✤ Any above, but Management-focused
Friday, May 10, 13
The best SysOp in a nutshell
✤ basic dev knowledge
✤ basic ITIL best practices knowledge
✤ basic PMP knowledge
✤ basic COBIT knowledge
✤ good to awesome security knowledge
✤ advanced cloud platforms knowledge
✤ and of course:
✤ great communication skills
✤ good presentation
✤ self-managed
✤ self-motivated
Friday, May 10, 13
Difficulties a professional have to
deal with
✤ how to always keep up-to-date with technologies as a whole
✤ choosing the right technologies to be good at
✤ focusing too much on enhancing tech knowledge and forgeting about
behavioral skill set
✤ how to continuously position IT as strategic to the company
Friday, May 10, 13
Insights
✤ Cloud is not the problem, scaling IT is
✤ Spending less is possible, be creative
✤ Decide how YOU will enhance your career
By the way, that’s your job, not HR’s
✤ Infrastructure exists to support software, never forget that
Friday, May 10, 13
Conclusions
✤ Cloud demand a good understanding and creative solutions for load
balancing, clustering, fail-overs
✤ Cloud demand good knowledge of virtualization concepts
✤ Cloud demand a better understanding of security
✤ Cloud will force SysOps to have a more holistic view of IT
Friday, May 10, 13
thank you for your time =)
✤ facebook.com/eduardocoelholima
✤ slideshare.net/eduardocoelholima
✤ youtube.com/eduardocoelholima
Friday, May 10, 13

More Related Content

What's hot

Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevarajessica97
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Gloria flores
Gloria floresGloria flores
Gloria floresyaya700
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 

What's hot (20)

Powerpoint
PowerpointPowerpoint
Powerpoint
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
10things
10things10things
10things
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevara
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Gloria flores
Gloria floresGloria flores
Gloria flores
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 

Similar to Speaking - cloud computing and the sysop professional - how to get ready

Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Notes 21st century child navigating the digital world with your child 2015 -...
Notes 21st century child  navigating the digital world with your child 2015 -...Notes 21st century child  navigating the digital world with your child 2015 -...
Notes 21st century child navigating the digital world with your child 2015 -...Samuel Landete Benavente
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120jram2113
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social NetworksClint Hamada
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are EverywhereChristos Beretas
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2opiedog1
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 

Similar to Speaking - cloud computing and the sysop professional - how to get ready (17)

Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Notes 21st century child navigating the digital world with your child 2015 -...
Notes 21st century child  navigating the digital world with your child 2015 -...Notes 21st century child  navigating the digital world with your child 2015 -...
Notes 21st century child navigating the digital world with your child 2015 -...
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
The use of ict
The use of ictThe use of ict
The use of ict
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are Everywhere
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 

More from Eduardo Coelho

Dual stack IPv4 / IPv6 Security Issues - A simple proof of concept
Dual stack IPv4 / IPv6 Security Issues - A simple proof of conceptDual stack IPv4 / IPv6 Security Issues - A simple proof of concept
Dual stack IPv4 / IPv6 Security Issues - A simple proof of conceptEduardo Coelho
 
2013 09-21 e-learning, moodle and opensource - what do i have to do with it
2013 09-21 e-learning, moodle and opensource - what do i have to do with it 2013 09-21 e-learning, moodle and opensource - what do i have to do with it
2013 09-21 e-learning, moodle and opensource - what do i have to do with it Eduardo Coelho
 
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogosEduardo Coelho
 
2012 06-27 imersão academia de redes itcursos
2012 06-27 imersão academia de redes itcursos2012 06-27 imersão academia de redes itcursos
2012 06-27 imersão academia de redes itcursosEduardo Coelho
 
2012 06-05 porque voce precisa ser fera em linux.pdf
2012 06-05 porque voce precisa ser fera em linux.pdf2012 06-05 porque voce precisa ser fera em linux.pdf
2012 06-05 porque voce precisa ser fera em linux.pdfEduardo Coelho
 
2011 11-05 csi - valores pessoais
2011 11-05 csi - valores pessoais2011 11-05 csi - valores pessoais
2011 11-05 csi - valores pessoaisEduardo Coelho
 
2011 09-22 responsabilidade social, o profissional e a empresa.pdf
2011 09-22 responsabilidade social, o profissional e a empresa.pdf2011 09-22 responsabilidade social, o profissional e a empresa.pdf
2011 09-22 responsabilidade social, o profissional e a empresa.pdfEduardo Coelho
 
2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti
2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti
2011 04-26 estacio fcc - palestra cloud computing para o profissional de tiEduardo Coelho
 
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...Eduardo Coelho
 
2010 09-22 infra rn security meeting - palestra firewalls opensource
2010 09-22 infra rn security meeting - palestra firewalls opensource2010 09-22 infra rn security meeting - palestra firewalls opensource
2010 09-22 infra rn security meeting - palestra firewalls opensourceEduardo Coelho
 
2012 11-09 facex - i pv6 transition planning-
2012 11-09 facex - i pv6 transition planning-2012 11-09 facex - i pv6 transition planning-
2012 11-09 facex - i pv6 transition planning-Eduardo Coelho
 
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerceEduardo Coelho
 

More from Eduardo Coelho (13)

Dual stack IPv4 / IPv6 Security Issues - A simple proof of concept
Dual stack IPv4 / IPv6 Security Issues - A simple proof of conceptDual stack IPv4 / IPv6 Security Issues - A simple proof of concept
Dual stack IPv4 / IPv6 Security Issues - A simple proof of concept
 
2013 09-21 e-learning, moodle and opensource - what do i have to do with it
2013 09-21 e-learning, moodle and opensource - what do i have to do with it 2013 09-21 e-learning, moodle and opensource - what do i have to do with it
2013 09-21 e-learning, moodle and opensource - what do i have to do with it
 
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos
 
2012 06-27 imersão academia de redes itcursos
2012 06-27 imersão academia de redes itcursos2012 06-27 imersão academia de redes itcursos
2012 06-27 imersão academia de redes itcursos
 
2012 06-05 porque voce precisa ser fera em linux.pdf
2012 06-05 porque voce precisa ser fera em linux.pdf2012 06-05 porque voce precisa ser fera em linux.pdf
2012 06-05 porque voce precisa ser fera em linux.pdf
 
2011 11-05 csi - valores pessoais
2011 11-05 csi - valores pessoais2011 11-05 csi - valores pessoais
2011 11-05 csi - valores pessoais
 
2011 09-22 responsabilidade social, o profissional e a empresa.pdf
2011 09-22 responsabilidade social, o profissional e a empresa.pdf2011 09-22 responsabilidade social, o profissional e a empresa.pdf
2011 09-22 responsabilidade social, o profissional e a empresa.pdf
 
2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti
2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti
2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti
 
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...
 
2010 09-22 infra rn security meeting - palestra firewalls opensource
2010 09-22 infra rn security meeting - palestra firewalls opensource2010 09-22 infra rn security meeting - palestra firewalls opensource
2010 09-22 infra rn security meeting - palestra firewalls opensource
 
2012 11-09 facex - i pv6 transition planning-
2012 11-09 facex - i pv6 transition planning-2012 11-09 facex - i pv6 transition planning-
2012 11-09 facex - i pv6 transition planning-
 
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce
 
Firewalls Opensource
Firewalls OpensourceFirewalls Opensource
Firewalls Opensource
 

Recently uploaded

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Recently uploaded (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Speaking - cloud computing and the sysop professional - how to get ready

  • 1. 10/May/2013 Cloud Computing and the SysOp Professional: How to get ready? Eduardo Coelho - Congresso UNIFACEX Friday, May 10, 13
  • 2. hold on ✤ before we get started, let me show you some interesting facts involving information security and privacy in our world Friday, May 10, 13
  • 3. Cryptogram newsletter published the following on 15/Apr/2013 ✤ One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. government and corporations were identified because they accessed Facebook from the same network infrastructure they used to carry out their attacks. ✤ Two: Hector Monsegur, one of the leaders of the LulzSec hacker movement, was identified and arrested last year by the FBI. Although he practiced good computer security and used an anonymous relay service to protect his identity, he slipped up. ✤ And three: Paula Broadwell, who had an affair with CIA director David Petraeus, similarly took extensive precautions to hide her identity. She never logged in to her anonymous e-mail service from her home network. Instead, she used hotel and other public networks when she e-mailed him. The FBI correlated hotel registration data from several different hotels -- and hers was the common name. Friday, May 10, 13
  • 4. (continuing) ✤ There are simply too many ways to be tracked. The Internet, e-mail, cell phones, web browsers, social networking sites, search engines: these have become necessities, and it's fanciful to expect people to simply refuse to use them just because they don't like the spying, especially since the full extent of such spying is deliberately hidden from us and there are few alternatives being marketed by companies that don't spy. ✤ This isn't something the free market can fix. We consumers have no choice in the matter. All the major companies that provide us with Internet services are interested in tracking us. Visit a website and it will almost certainly know who you are; there are lots of ways to be tracked without cookies. Cell phone companies routinely undo the web's privacy protection. One experiment at Carnegie Mellon took real-time videos of students on campus and was able to identify one-third of them by comparing their photos with publicly available tagged Facebook photos. ✤ Maintaining privacy on the Internet is nearly impossible. If you forget even once to enable your protections, or click on the wrong link, or type the wrong thing, you've permanently attached your name to whatever anonymous service you're using. Monsegur slipped up once, and the FBI got him. If the director of the CIA can't maintain his privacy on the Internet, we've got no hope. Friday, May 10, 13
  • 5. (continuing) ✤ So, we're done. Welcome to a world where Google knows exactly what sort of porn you all like, and more about your interests than your spouse does. Welcome to a world where your cell phone company knows exactly where you are all the time. Welcome to the end of private conversations, because increasingly your conversations are conducted by e-mail, text, or social networking sites. ✤ And welcome to a world where all of this, and everything else that you do or is done on a computer, is saved, correlated, studied, passed around from company to company without your knowledge or consent; and where the government accesses it at will without a warrant. ✤ Welcome to an Internet without privacy, and we've ended up here with hardly a fight. Friday, May 10, 13
  • 6. Thoughts ✤ How many people actually understand how all of this impacts our life? ✤ How good is it to be an IT professional which are probably in the best position to fully antecipate bad outcomes and prevent bad things? Friday, May 10, 13
  • 7. Now let’s focus on the IT PRO ✤ Which is the set of abilities that will (is) be asked of System Operators and Network Admins? Friday, May 10, 13
  • 8. By the way, what SysOp stands for? (or will stand for) ✤ Windows Server Professionals ✤ Unix/Linux Server Professionals ✤ Network Appliance Professionals ✤ Security Officers ✤ DBAs ✤ Any above, but Management-focused Friday, May 10, 13
  • 9. The best SysOp in a nutshell ✤ basic dev knowledge ✤ basic ITIL best practices knowledge ✤ basic PMP knowledge ✤ basic COBIT knowledge ✤ good to awesome security knowledge ✤ advanced cloud platforms knowledge ✤ and of course: ✤ great communication skills ✤ good presentation ✤ self-managed ✤ self-motivated Friday, May 10, 13
  • 10. Difficulties a professional have to deal with ✤ how to always keep up-to-date with technologies as a whole ✤ choosing the right technologies to be good at ✤ focusing too much on enhancing tech knowledge and forgeting about behavioral skill set ✤ how to continuously position IT as strategic to the company Friday, May 10, 13
  • 11. Insights ✤ Cloud is not the problem, scaling IT is ✤ Spending less is possible, be creative ✤ Decide how YOU will enhance your career By the way, that’s your job, not HR’s ✤ Infrastructure exists to support software, never forget that Friday, May 10, 13
  • 12. Conclusions ✤ Cloud demand a good understanding and creative solutions for load balancing, clustering, fail-overs ✤ Cloud demand good knowledge of virtualization concepts ✤ Cloud demand a better understanding of security ✤ Cloud will force SysOps to have a more holistic view of IT Friday, May 10, 13
  • 13. thank you for your time =) ✤ facebook.com/eduardocoelholima ✤ slideshare.net/eduardocoelholima ✤ youtube.com/eduardocoelholima Friday, May 10, 13