En la presentación encontraréis una pequeña introducción sobre qué es AWS, una visión general de los servicios que ofrecemos, comentaremos alguno de nuestros casos de éxito y, finalmente, comentaremos el programa de créditos que ofrece AWS para organizaciones sin ánimo de lucro.
La grabación del webinar se puede encontrar aquí: https://pages.awscloud.com/EMEA_WEW_ps-es-npo_webinar.html
Obtenga más información acerca de AWS para organizaciones sin ánimo de lucro aquí: https://aws.amazon.com/es/government-education/nonprofits/
AWS 101 and the benefits of Migrating to the CloudCloudHesive
The document discusses a presentation given by Patrick Hannah, VP of Engineering at CloudHesive, about migrating to the AWS cloud. It provides examples of how CloudHesive has helped customers migrate applications like eCommerce platforms, SaaS applications, and end user computing to AWS. The presentation covers where to start when adopting AWS, suggested approaches to migration, choices around virtual machines, containers and serverless functions, and storage options.
Amazon Elastic Compute Cloud (Amazon EC2) provides a broad selection of instance types to accommodate a diverse mix of workloads. In this technical session, we provide an overview of the Amazon EC2 instance platform, key platform features, and the concept of instance generations. We dive into the current generation design choices of the different instance families, including the General Purpose, Compute Optimized, Storage Optimized, Memory Optimized, and GPU instance families. We also detail best practices and share performance tips for getting the most out of your Amazon EC2 instances.
AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organisation's security and compliance objectives.
This document discusses how companies are increasingly data-centric and how data has become a strategic asset. It introduces several AWS database and data storage services like Amazon Aurora, DynamoDB, DocumentDB, ElastiCache, Neptune, Timestream, and QLDB. These services provide different data models and use cases like relational, key-value, document, in-memory, graph, time-series, and ledger data. The document highlights features of each service like performance, scalability, availability, security, and ease of use. It also discusses how the AWS Database Migration Service can help migrate databases to AWS.
Best Practices for Building Partner-Managed Services on AWSAmazon Web Services
The document discusses AWS Managed Service Partners and the AWS Managed Service Program. It provides an overview of the program and outlines the prerequisites, validation process, and checklist that AWS Managed Service Partners must complete. The validation ensures partners have the necessary certifications, staffing, security practices, customer support, and optimization processes in place to properly manage customer workloads on AWS. The program helps both customers find qualified partners and partners structure their own managed service offerings on AWS.
This session is designed to introduce you to fundamental cloud computing and AWS security concepts that will help you prepare for the Security Week sessions, demos, and labs. We will ensure you have an AWS account and understand EC2, prepare you to get set up on the AWS Command Line Interface (CLI) to access the AWS Management Console, introduce you to in source repositories, discuss SSH access and necessary SDKs, and more.
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatchAmazon Web Services
You may already know that you can use Amazon CloudWatch to view graphs of your AWS resources like Amazon Elastic Compute Cloud instances or Amazon Simple Storage Service. But, did you know that you can monitor your on-premises servers with Amazon CloudWatch Logs? Or, that you can integrate CloudWatch Logs with Elasticsearch for powerful visualization and analysis? This session will offer a tour of the latest monitoring and automation capabilities that we’ve added, how you can get even more done with Amazon CloudWatch.
AWS 101 and the benefits of Migrating to the CloudCloudHesive
The document discusses a presentation given by Patrick Hannah, VP of Engineering at CloudHesive, about migrating to the AWS cloud. It provides examples of how CloudHesive has helped customers migrate applications like eCommerce platforms, SaaS applications, and end user computing to AWS. The presentation covers where to start when adopting AWS, suggested approaches to migration, choices around virtual machines, containers and serverless functions, and storage options.
Amazon Elastic Compute Cloud (Amazon EC2) provides a broad selection of instance types to accommodate a diverse mix of workloads. In this technical session, we provide an overview of the Amazon EC2 instance platform, key platform features, and the concept of instance generations. We dive into the current generation design choices of the different instance families, including the General Purpose, Compute Optimized, Storage Optimized, Memory Optimized, and GPU instance families. We also detail best practices and share performance tips for getting the most out of your Amazon EC2 instances.
AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organisation's security and compliance objectives.
This document discusses how companies are increasingly data-centric and how data has become a strategic asset. It introduces several AWS database and data storage services like Amazon Aurora, DynamoDB, DocumentDB, ElastiCache, Neptune, Timestream, and QLDB. These services provide different data models and use cases like relational, key-value, document, in-memory, graph, time-series, and ledger data. The document highlights features of each service like performance, scalability, availability, security, and ease of use. It also discusses how the AWS Database Migration Service can help migrate databases to AWS.
Best Practices for Building Partner-Managed Services on AWSAmazon Web Services
The document discusses AWS Managed Service Partners and the AWS Managed Service Program. It provides an overview of the program and outlines the prerequisites, validation process, and checklist that AWS Managed Service Partners must complete. The validation ensures partners have the necessary certifications, staffing, security practices, customer support, and optimization processes in place to properly manage customer workloads on AWS. The program helps both customers find qualified partners and partners structure their own managed service offerings on AWS.
This session is designed to introduce you to fundamental cloud computing and AWS security concepts that will help you prepare for the Security Week sessions, demos, and labs. We will ensure you have an AWS account and understand EC2, prepare you to get set up on the AWS Command Line Interface (CLI) to access the AWS Management Console, introduce you to in source repositories, discuss SSH access and necessary SDKs, and more.
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatchAmazon Web Services
You may already know that you can use Amazon CloudWatch to view graphs of your AWS resources like Amazon Elastic Compute Cloud instances or Amazon Simple Storage Service. But, did you know that you can monitor your on-premises servers with Amazon CloudWatch Logs? Or, that you can integrate CloudWatch Logs with Elasticsearch for powerful visualization and analysis? This session will offer a tour of the latest monitoring and automation capabilities that we’ve added, how you can get even more done with Amazon CloudWatch.
In this webinar, you'll learn about the foundational security blocks and how to start using them effectively to create robust and secure architectures. Discover how Identity and Access management is done and how it integrates with other AWS services. In addition, learn how to improve governance by using AWS Security Hub, AWS Config and CloudTrail to gain unprecedented visibility of activity in the account. Subsequently use AWS Config rules to rectify configuration issues quickly and effectively.
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon Web Services
Amazon GuardDuty is a threat detection service that monitors AWS accounts and the applications within them for malicious or unauthorized behavior. It uses machine learning, threat intelligence feeds, and other techniques to detect both known and unknown threats. GuardDuty analyzes AWS CloudTrail logs, VPC flow logs, and DNS logs to generate detailed findings on issues like reconnaissance, unauthorized access, and crypto-currency mining. It also integrates with other AWS services like Lambda and CloudWatch Events.
Presentation by John Mulhall of Maolte Technical Solutions Limited on Cloud Migrations for presentation to a meetup by Morgan McKinley Recruitment agency in their Dublin 4 offices on the 30th November 2022.
Amazon EC2 forms the backbone compute platform for hundreds of thousands of AWS customers, but how do you go beyond starting an instance and manually configuring it? This presentation will take you on a journey starting with the basics of key management and security groups and ending with an explanation of Auto Scaling and how you can use it to match capacity and costs to demand using dynamic policies.
Access a recorded version of the webinar based on this presentation on YouTube here: http://youtu.be/jLVPqoV4YjU
You can find the rest of the Masterclass webinar series for 2015 here: http://aws.amazon.com/campaigns/emea/masterclass/
If you are interested in learning about how you apply variety of different AWS services to specific challenges, please check out the Journey Through the Cloud series, which you can find here: http://aws.amazon.com/campaigns/emea/journey/
The AWS cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. Security for AWS is about three related elements: visibility, auditability, and control. You have to know what you have and where it is before you can assess the environment against best practices, internal standards, and compliance standards. Controls enable you to place precise, well-understood limits on the access to your information. Did you know, for example, that you can define a rule that says that “Tom is the only person who can access this data object that I store with Amazon, and he can only do so from his corporate desktop on the corporate network, from Monday-Friday 9-5 and when he uses MFA?” That’s the level of granularity you can choose to implement if you wish. In this session, we’ll cover these topics to provide a practical understanding of the security programs, procedures, and best practices you can use to enhance your current security posture.
Building a well-engaged and secure AWS account access management - FND207-R ...Amazon Web Services
The document discusses building a secure multi-account AWS environment through proper account segmentation and access management. It recommends creating dedicated accounts for organizational units (OUs), core services, logging/auditing, security tools, shared services, networking and more. The use of AWS Organizations, IAM policies, and service control policies (SCPs) to define and enforce access across accounts is also covered. Automating the deployment of baseline accounts and resources through the AWS Landing Zone solution is presented as a best practice.
The document discusses challenges and opportunities related to cloud computing adoption. It notes that the road to cloud success is not easy and organizations will face issues like managing a hybrid cloud environment and ensuring interoperability. It emphasizes the importance of understanding how cloud is changing IT and adopting the right cloud strategy and governance. The document provides advice on questions to consider when selecting public, private or hybrid cloud models and services. It also promotes partnering with a flexible cloud service provider to help manage increasingly complex hybrid IT environments.
by Rahul Sareen, Sr. IoT Consultant, AWS Professional Services
Serverless computing allows you to build and run applications without the need for provisioning or managing servers. With serverless computing, you can build web, mobile, and IoT backends; run stream processing or big data workloads; run chatbots, and more. In this session, you’ll learn how to get started with serverless computing with AWS Lambda, which lets you run code without provisioning or managing servers. We’ll introduce you to the basics of building with Lambda and how you can benefit from features such as continuous scaling, built-in high availability, integrations with AWS and third-party apps, and subsecond metering pricing. We’ll also introduce you to the broader portfolio of AWS services that help you build serverless applications with Lambda, including Amazon API Gateway, Amazon DynamoDB, AWS Step Functions, and more.
We describe how to use the Well-Architected Framework to evaluate the technology solutions built by your teams. The AWS Well-Architected Framework describes best practices across five pillars (Security, Reliability, Performance, Operational Excellence, and Cost), and provides a consistent approach to review architectures against those best practices. This review process shows where your architectures can be improved, and helps you address weakness that may put your business at risk
"Amazon Inspector is a new service from AWS that identifies security issues in your application deployments. Use Inspector with your applications to assess your security posture and identify areas that can be improved. Inspector works with your Amazon EC2 instances to monitor activity in your applications and system.
This session will cover getting started with Inspector, how to automate the process, how to manage and act on findings, and additional ways you can enhance your development and release lifecycle using Inspector."
Serverless computing - Build and run applications without thinking about serversAmazon Web Services
The document discusses serverless deployment patterns and tools for AWS Lambda functions. It describes common deployment patterns like blue/green, canary, and linear deployments. It then covers the AWS Serverless Application Model (SAM) which allows defining serverless applications using CloudFormation. The SAM CLI allows testing serverless applications locally. Lambda aliases and traffic shifting allow shifting traffic between Lambda function versions for deployments. Global variables and deployment preferences in SAM allow configuring safe linear deployments with validation hooks and alarms.
Real time monitoring of AWS components and the applications you run on AWS in real-time
You can use CloudWatch to collect and track metrics, which are the variables you want to measure for your resources and applications
CloudWatch alarms send notifications or automatically make changes to the resources you are monitoring based on rules that you define
This document outlines an agenda for an AWS Cost Management workshop. The agenda includes introductions and sessions on AWS Cost Explorer, AWS Budgets, AWS Reservations, and AWS Cost & Usage Reports. It provides overviews of AWS cost management products and highlights recent features including budget redesigns, forecasting enhancements, and reserved instance management updates.
AWS PrivateLink allows services running within AWS to connect to other services privately without an internet gateway, VPC peering, or EIPs. It creates private connectivity using interface or gateway endpoints within VPCs. Interface endpoints function like a network interface and support security groups, while gateway endpoints add routes to route tables. PrivateLink eliminates public access and simplifies networking management compared to traditional architectures using internet gateways or VPC peering.
Vladimir Simek presented on security and compliance in AWS. He discussed that security is a shared responsibility between AWS and customers. AWS manages security of the cloud through facilities, physical security, network security, and other measures. Customers are responsible for security in the cloud by defining controls for their applications and data. AWS provides tools like CloudTrail for visibility into API usage, AWS Config for auditing resource configurations, and IAM for control over user permissions to help customers meet their security needs.
This document discusses how AWS Control Tower can be used to govern multi-account AWS environments at scale. It provides an overview of AWS Control Tower's key capabilities including automated setup of a landing zone with best practice blueprints and guardrails, account factory for provisioning accounts, centralized identity and access management, and built-in monitoring and notifications. Examples are also given of how AWS Control Tower can be used to implement common multi-account architectures and operational models.
Resiliency-and-Availability-Design-Patterns-for-the-CloudAmazon Web Services
We have traditionally built robust software systems by trying to avoid mistakes and by dodging failures when they occur in production or by testing parts of the system in isolation from one another. Modern methods and techniques take a very different approach based on resiliency, which promotes embracing failure instead of trying to avoid it. Resilient architectures enhance observability, leverage well-known patterns such as graceful degradation, timeouts and circuit breakers. In this session, will review the most useful patterns for building resilient software systems and especially show the audience how they can benefit from the patterns.
AWS is architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely. When using AWS, not only are infrastructure headaches removed, but so are many of the security issues that come with them.
AWS Identity and Access Management (IAM) allows you to securely control access to AWS resources. IAM controls who can be authenticated and authorized to use resources by managing users, groups, roles, and their permissions. IAM supports single-factor, multi-factor, and two-factor authentication to verify identities. Authorization occurs after authentication and provides permissions to access resources. IAM helps create and manage users, groups, roles, and their permissions to govern access to AWS services.
El documento describe cómo el cómputo en la nube se ha convertido en la nueva norma, con AWS atendiendo a más de un millón de clientes activos cada mes en 190 países. Se argumenta que las empresas deben migrar aplicaciones existentes a la nube lo más rápido posible y desplegar nuevas aplicaciones de forma predeterminada en la nube para innovar más rápido, eliminar la deuda tecnológica y reducir el riesgo.
El documento discute cómo AWS está transformando la industria de TI al permitir la innovación y reducir los costos. Ofrece una amplia variedad de servicios de nube que permiten la escalabilidad, disponibilidad y elasticidad. También describe cómo las organizaciones están adoptando arquitecturas híbridas para aprovechar los beneficios de la nube pública y privada de manera consistente.
In this webinar, you'll learn about the foundational security blocks and how to start using them effectively to create robust and secure architectures. Discover how Identity and Access management is done and how it integrates with other AWS services. In addition, learn how to improve governance by using AWS Security Hub, AWS Config and CloudTrail to gain unprecedented visibility of activity in the account. Subsequently use AWS Config rules to rectify configuration issues quickly and effectively.
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon Web Services
Amazon GuardDuty is a threat detection service that monitors AWS accounts and the applications within them for malicious or unauthorized behavior. It uses machine learning, threat intelligence feeds, and other techniques to detect both known and unknown threats. GuardDuty analyzes AWS CloudTrail logs, VPC flow logs, and DNS logs to generate detailed findings on issues like reconnaissance, unauthorized access, and crypto-currency mining. It also integrates with other AWS services like Lambda and CloudWatch Events.
Presentation by John Mulhall of Maolte Technical Solutions Limited on Cloud Migrations for presentation to a meetup by Morgan McKinley Recruitment agency in their Dublin 4 offices on the 30th November 2022.
Amazon EC2 forms the backbone compute platform for hundreds of thousands of AWS customers, but how do you go beyond starting an instance and manually configuring it? This presentation will take you on a journey starting with the basics of key management and security groups and ending with an explanation of Auto Scaling and how you can use it to match capacity and costs to demand using dynamic policies.
Access a recorded version of the webinar based on this presentation on YouTube here: http://youtu.be/jLVPqoV4YjU
You can find the rest of the Masterclass webinar series for 2015 here: http://aws.amazon.com/campaigns/emea/masterclass/
If you are interested in learning about how you apply variety of different AWS services to specific challenges, please check out the Journey Through the Cloud series, which you can find here: http://aws.amazon.com/campaigns/emea/journey/
The AWS cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. Security for AWS is about three related elements: visibility, auditability, and control. You have to know what you have and where it is before you can assess the environment against best practices, internal standards, and compliance standards. Controls enable you to place precise, well-understood limits on the access to your information. Did you know, for example, that you can define a rule that says that “Tom is the only person who can access this data object that I store with Amazon, and he can only do so from his corporate desktop on the corporate network, from Monday-Friday 9-5 and when he uses MFA?” That’s the level of granularity you can choose to implement if you wish. In this session, we’ll cover these topics to provide a practical understanding of the security programs, procedures, and best practices you can use to enhance your current security posture.
Building a well-engaged and secure AWS account access management - FND207-R ...Amazon Web Services
The document discusses building a secure multi-account AWS environment through proper account segmentation and access management. It recommends creating dedicated accounts for organizational units (OUs), core services, logging/auditing, security tools, shared services, networking and more. The use of AWS Organizations, IAM policies, and service control policies (SCPs) to define and enforce access across accounts is also covered. Automating the deployment of baseline accounts and resources through the AWS Landing Zone solution is presented as a best practice.
The document discusses challenges and opportunities related to cloud computing adoption. It notes that the road to cloud success is not easy and organizations will face issues like managing a hybrid cloud environment and ensuring interoperability. It emphasizes the importance of understanding how cloud is changing IT and adopting the right cloud strategy and governance. The document provides advice on questions to consider when selecting public, private or hybrid cloud models and services. It also promotes partnering with a flexible cloud service provider to help manage increasingly complex hybrid IT environments.
by Rahul Sareen, Sr. IoT Consultant, AWS Professional Services
Serverless computing allows you to build and run applications without the need for provisioning or managing servers. With serverless computing, you can build web, mobile, and IoT backends; run stream processing or big data workloads; run chatbots, and more. In this session, you’ll learn how to get started with serverless computing with AWS Lambda, which lets you run code without provisioning or managing servers. We’ll introduce you to the basics of building with Lambda and how you can benefit from features such as continuous scaling, built-in high availability, integrations with AWS and third-party apps, and subsecond metering pricing. We’ll also introduce you to the broader portfolio of AWS services that help you build serverless applications with Lambda, including Amazon API Gateway, Amazon DynamoDB, AWS Step Functions, and more.
We describe how to use the Well-Architected Framework to evaluate the technology solutions built by your teams. The AWS Well-Architected Framework describes best practices across five pillars (Security, Reliability, Performance, Operational Excellence, and Cost), and provides a consistent approach to review architectures against those best practices. This review process shows where your architectures can be improved, and helps you address weakness that may put your business at risk
"Amazon Inspector is a new service from AWS that identifies security issues in your application deployments. Use Inspector with your applications to assess your security posture and identify areas that can be improved. Inspector works with your Amazon EC2 instances to monitor activity in your applications and system.
This session will cover getting started with Inspector, how to automate the process, how to manage and act on findings, and additional ways you can enhance your development and release lifecycle using Inspector."
Serverless computing - Build and run applications without thinking about serversAmazon Web Services
The document discusses serverless deployment patterns and tools for AWS Lambda functions. It describes common deployment patterns like blue/green, canary, and linear deployments. It then covers the AWS Serverless Application Model (SAM) which allows defining serverless applications using CloudFormation. The SAM CLI allows testing serverless applications locally. Lambda aliases and traffic shifting allow shifting traffic between Lambda function versions for deployments. Global variables and deployment preferences in SAM allow configuring safe linear deployments with validation hooks and alarms.
Real time monitoring of AWS components and the applications you run on AWS in real-time
You can use CloudWatch to collect and track metrics, which are the variables you want to measure for your resources and applications
CloudWatch alarms send notifications or automatically make changes to the resources you are monitoring based on rules that you define
This document outlines an agenda for an AWS Cost Management workshop. The agenda includes introductions and sessions on AWS Cost Explorer, AWS Budgets, AWS Reservations, and AWS Cost & Usage Reports. It provides overviews of AWS cost management products and highlights recent features including budget redesigns, forecasting enhancements, and reserved instance management updates.
AWS PrivateLink allows services running within AWS to connect to other services privately without an internet gateway, VPC peering, or EIPs. It creates private connectivity using interface or gateway endpoints within VPCs. Interface endpoints function like a network interface and support security groups, while gateway endpoints add routes to route tables. PrivateLink eliminates public access and simplifies networking management compared to traditional architectures using internet gateways or VPC peering.
Vladimir Simek presented on security and compliance in AWS. He discussed that security is a shared responsibility between AWS and customers. AWS manages security of the cloud through facilities, physical security, network security, and other measures. Customers are responsible for security in the cloud by defining controls for their applications and data. AWS provides tools like CloudTrail for visibility into API usage, AWS Config for auditing resource configurations, and IAM for control over user permissions to help customers meet their security needs.
This document discusses how AWS Control Tower can be used to govern multi-account AWS environments at scale. It provides an overview of AWS Control Tower's key capabilities including automated setup of a landing zone with best practice blueprints and guardrails, account factory for provisioning accounts, centralized identity and access management, and built-in monitoring and notifications. Examples are also given of how AWS Control Tower can be used to implement common multi-account architectures and operational models.
Resiliency-and-Availability-Design-Patterns-for-the-CloudAmazon Web Services
We have traditionally built robust software systems by trying to avoid mistakes and by dodging failures when they occur in production or by testing parts of the system in isolation from one another. Modern methods and techniques take a very different approach based on resiliency, which promotes embracing failure instead of trying to avoid it. Resilient architectures enhance observability, leverage well-known patterns such as graceful degradation, timeouts and circuit breakers. In this session, will review the most useful patterns for building resilient software systems and especially show the audience how they can benefit from the patterns.
AWS is architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely. When using AWS, not only are infrastructure headaches removed, but so are many of the security issues that come with them.
AWS Identity and Access Management (IAM) allows you to securely control access to AWS resources. IAM controls who can be authenticated and authorized to use resources by managing users, groups, roles, and their permissions. IAM supports single-factor, multi-factor, and two-factor authentication to verify identities. Authorization occurs after authentication and provides permissions to access resources. IAM helps create and manage users, groups, roles, and their permissions to govern access to AWS services.
El documento describe cómo el cómputo en la nube se ha convertido en la nueva norma, con AWS atendiendo a más de un millón de clientes activos cada mes en 190 países. Se argumenta que las empresas deben migrar aplicaciones existentes a la nube lo más rápido posible y desplegar nuevas aplicaciones de forma predeterminada en la nube para innovar más rápido, eliminar la deuda tecnológica y reducir el riesgo.
El documento discute cómo AWS está transformando la industria de TI al permitir la innovación y reducir los costos. Ofrece una amplia variedad de servicios de nube que permiten la escalabilidad, disponibilidad y elasticidad. También describe cómo las organizaciones están adoptando arquitecturas híbridas para aprovechar los beneficios de la nube pública y privada de manera consistente.
Este documento presenta una guía sobre las mejores prácticas para migrar a la nube. Explica que el proceso de migración incluye preparación, descubrimiento, planeación, diseño de aplicaciones, migración y validación, y optimización continua. También describe las herramientas de AWS que pueden usarse en cada etapa como AWS Cloud Adoption Framework, AWS Application Discovery Service, AWS Config y Amazon GuardDuty.
El documento presenta las mejores prácticas para migraciones de gran escala a la nube. Explica que una migración exitosa requiere preparación a nivel de personas, procesos y tecnología, incluyendo el patrocinio ejecutivo, la creación de un caso de negocio, el descubrimiento y mapeo del portafolio existente, y el diseño de la aplicación en la nube. También describe las herramientas y tecnologías de AWS que pueden usarse para la migración, como AWS Server Migration Service y AWS Database
El documento describe 4 razones por las que las empresas medianas y pequeñas deben migrar sus operaciones a la nube de AWS: 1) mayor productividad y eficiencia, 2) mayor capacidad de innovación y agilidad, 3) mayor seguridad y resiliencia operativa, y 4) reducción de costos. También señala algunos desafíos comunes que enfrentan este tipo de empresas y cómo la migración a AWS puede ayudar a superar esos desafíos a través de mayor automatización, escalabilidad, seguridad y pagos por uso.
¿Quiere conocer aspectos fundamentales de AWS o ampliar su experiencia?
Acompáñenos en este webinar en donde podrá adquirir conocimientos acerca de herramientas de administración, productividad, seguridad, identidad y conformidad.
Obtenga más información sobre las soluciones y los productos de la nube de AWS e información general sobre la informática en la nube.
El documento discute los desafíos de la adopción de la nube y estrategias para preparar equipos para la transformación a la nube. Señala que los desafíos no técnicos representan el 70% de los obstáculos. Propone formar equipos multifuncionales pequeños centrados en productos, capacitar al personal con certificaciones de AWS, y obtener el apoyo de los líderes para impulsar la transformación a la nube.
Este documento presenta varias arquitecturas serverless que utilizan IoT, machine learning y asistentes de voz. Describe cómo estas tecnologías se pueden usar para recomendaciones personalizadas, experiencias de compra nuevas, automatización de inventario, envíos con drones e interacciones por voz. Explica conceptos como serverless, IoT y machine learning, así como servicios de AWS como Lambda, Greengrass, SageMaker y servicios cognitivos.
Session #3 - Agile Transformation in the Cloud: "Culture eats strategy for br...Amazon Web Services LATAM
El documento habla sobre la transformación ágil en la nube. Menciona algunos desafíos de las empresas como tiempo de lanzamiento lento, deuda técnica y baja productividad. También propone nuevos principios como comportarse como una startup, usar cloud computing y microservicios para superar estos desafíos. Finalmente, destaca la importancia de pensar a gran escala, empezar pequeño e ir rápido.
Historias de éxito en la modernización del Sector PúblicoAmazon Web Services
El documento describe los esfuerzos del Gobierno de Aragón para modernizar sus sistemas de TI mediante la nube. Está trabajando con AST, su proveedor de TI, para migrar aplicaciones a una nueva plataforma PaaS en la nube privada de AST con capacidad de desborde a AWS. También están capacitando a su personal de TI en tecnologías de AWS y colaborando con AWS para abordar los retos organizativos, técnicos y jurídicos de la transformación a la nube.
Acelere la velocidad de migración a la nube - MXO214 - Mexico City SummitAmazon Web Services
Esta sesión ofrece una visión detallada del Programa de Aceleración de Migraciones (Migration Acceleration Program, o MAP por sus siglas en inglés). MAP ofrece metodologías de migración, processos, un conjunto de herramientas, servicios de migración de AWS y de socios de negocios, y entrega un modelo de costo total de propiedad (TCO), un modelo de gobierno operativo, y un marco de referencia para la planeación de la migración. MAP fué desarrollado para apoyar a nuestros clientes y socios de negocios a manejar migraciones masivas de múltiples aplicaciones y procesos de cualquier estado actual a la nube de AWS. En esta sesión compartimos casos de uso e historias de migración, y discutimos como estos aprovecharon servicios de AWS como AWS Server Migration Service, AWS Application Discovery Service, AWS Database Migration Service, y otros servicios de migración que ayudan a acelerar la migración y adopción de la nube de AWS.
Servicios e infraestructura de AWS y la próxima región en Aragónjavier ramirez
AWS está montando una región de infraestructura en Aragón. Vale, pero ¿Qué significa eso? ¿Es tan diferente de un centro de datos convencional o de otros proveedores de nube? (Spoiler: Sí). En esta sesión te cuento por qué. Hay video en https://catedrasamcadt.unizar.es/noticias/el-momento-tecnologico-actual-contado-por-trabajadores-de-amazon-web-services/
Cómputo de usuario final en AWS con Amazon WorkSpaces y Amazon AppStream - MX...Amazon Web Services
Las organizaciones de TI actualmente necesitan apoyar una fuerza laboral moderna, flexible y global, así como garantizar que sus usuarios pueden ser productivos en cualquier lugar. Mover los escritorios y aplicaciones a AWS ofrece seguridad reforzada, mejora y desempeño con economía en la nube. En esta sesión, proporcionamos información general sobre los Amazon Workspaces y Amazon AppStream 2.0; además, discutimos las mejores prácticas para mover su cálculo de usuario final a AWS. Además, profundizamos en la Amazon AppStream 2.0 y demostramos algunas de las nuevas capacidades, incluyendo la integración de Microsoft Active Directory, inicio de sesión simple con SAML 2.0 y las nuevas instancias optimizadas para gráficos.
Este documento presenta la oferta de servicios en la nube de Business IT. Incluye análisis técnico y económico, plan de migración a Azure, preparación de ambientes en producción, despliegue, entrenamiento y soporte. También muestra un caso de referencia de migración a la nube híbrida de ScotiaBank con soluciones como Hyper-V, SCVMM, SCDPM y Lync.
El documento presenta una introducción a AWS (Amazon Web Services) y la nube, describiendo los fundamentos de AWS para construir una cultura de innovación como la obsesión por el cliente, el pensamiento a largo plazo, y estar dispuesto a fracasar e incomprendido. También resume los beneficios de moverse a la nube como escalar rápidamente, hacerse global en minutos, y reducir costes, además de resaltar las características diferenciadoras de AWS como su experiencia, variedad de servicios, e infraestructura global.
La seguridad en la nube de AWS es la mayor prioridad. Como cliente de AWS, se beneficiará de una arquitectura de red y un centro de datos diseñados para satisfacer los requisitos de seguridad de las organizaciones más exigentes. Los gobiernos, las instituciones académicas y las organizaciones benéficas deben hacer frente a desafíos, requisitos y misiones singulares. Desde seguridad a justicia penal, pasando por la investigación académica, aquí podrá obtener recursos que le ayudarán a conseguir su misión en la nube.
El "Cloud Adoption Framework" de AWS - MXO210 - Mexico City SummitAmazon Web Services
El caso de negocio para el cómputo en la nube va más allá del costo total de propiedad (TCO, por sus siglas en inglés). AWS ayuda a las organizaciones a reducir el tiempo de lanzamiento de nuevos productos, tiempo invertido en el trabajo no diferenciado y mejorar la disponibilidad de las aplicaciones. En esta sesión, usted aprenderá sobre el "Cloud Adoption Framework" de AWS (AWS CAF por sus siglas en inglés). Este marco cuantifica no solo los ahorros de TCO, sino también el valor de negocio en la agilidad, reducción de riesgos y eficacia, lo que puede usar para construir un caso de negocio para el cambio. Después de esta sesión, usted deberá poder describir los beneficios de la nube para diferentes interesados en su organización y presentar un caso de negocio completo.
En este webinar, el equipo de expertos AWS presentará los pasos clave para iniciar su viaje de migración a la nube con seguridad y escalabilidad:
• Controladores de negocio comunes
• Etapas y fases de la migración
• Impactos (Cloud Adoption Framework)
• Estrategias
• Herramientas
• Casos de negocios
Este documento presenta los beneficios de migrar a AWS, incluyendo ahorro de costos, mayor productividad, mejor resiliencia operacional y mayor agilidad empresarial. Explica el proceso de migración en 4 etapas: evaluación, preparación y planificación, migración, y operaciones y optimizaciones. También incluye estudios de caso de empresas que lograron estas ventajas migrando a AWS.
AWS Initiate Day Mexico City | Marco de seguridad: planifique su viaje con la...Amazon Web Services LATAM
El documento describe las mejores prácticas de seguridad recomendadas por AWS para implementar servicios de seguridad de AWS más rápido. Explica el Marco de Adopción de la Nube de AWS y el Marco de Arquitectura Sólida de AWS, con un enfoque en el pilar de seguridad. También describe principios clave como implementar una sólida gestión de identidades, favorecer la trazabilidad, aplicar seguridad en todos los niveles e implementar operaciones de seguridad sólidas.
Similar a AWS para organizaciones sin ánimo de lucro (20)
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
1) The document discusses building a minimum viable product (MVP) using Amazon Web Services (AWS).
2) It provides an example of an MVP for an omni-channel messenger platform that was built from 2017 to connect ecommerce stores to customers via web chat, Facebook Messenger, WhatsApp, and other channels.
3) The founder discusses how they started with an MVP in 2017 with 200 ecommerce stores in Hong Kong and Taiwan, and have since expanded to over 5000 clients across Southeast Asia using AWS for scaling.
This document discusses pitch decks and fundraising materials. It explains that venture capitalists will typically spend only 3 minutes and 44 seconds reviewing a pitch deck. Therefore, the deck needs to tell a compelling story to grab their attention. It also provides tips on tailoring different types of decks for different purposes, such as creating a concise 1-2 page teaser, a presentation deck for pitching in-person, and a more detailed read-only or fundraising deck. The document stresses the importance of including key information like the problem, solution, product, traction, market size, plans, team, and ask.
This document discusses building serverless web applications using AWS services like API Gateway, Lambda, DynamoDB, S3 and Amplify. It provides an overview of each service and how they can work together to create a scalable, secure and cost-effective serverless application stack without having to manage servers or infrastructure. Key services covered include API Gateway for hosting APIs, Lambda for backend logic, DynamoDB for database needs, S3 for static content, and Amplify for frontend hosting and continuous deployment.
This document provides tips for fundraising from startup founders Roland Yau and Sze Lok Chan. It discusses generating competition to create urgency for investors, fundraising in parallel rather than sequentially, having a clear fundraising narrative focused on what you do and why it's compelling, and prioritizing relationships with people over firms. It also notes how the pandemic has changed fundraising, with examples of deals done virtually during this time. The tips emphasize being fully prepared before fundraising and cultivating connections with investors in advance.
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
This document discusses Amazon's machine learning services for building conversational interfaces and extracting insights from unstructured text and audio. It describes Amazon Lex for creating chatbots, Amazon Comprehend for natural language processing tasks like entity extraction and sentiment analysis, and how they can be used together for applications like intelligent call centers and content analysis. Pre-trained APIs simplify adding machine learning to apps without requiring ML expertise.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.