Este documento presenta una arquitectura para construir APIs seguras y escalables usando Amazon API Gateway y AWS Lambda. Se define una API para una aplicación de mascotas que incluye registros de usuarios, autenticación, y operaciones CRUD para mascotas. La lógica de la aplicación se implementa en AWS Lambda y la autenticación se maneja con Amazon Cognito. API Gateway protege las APIs usando IAM y Swagger se usa para definir y publicar las APIs de forma automatizada.
Success for Box to OneDrive migration depends on how you plan, assess and remediate your target environment. Before initiating your migration, it’s imperative to assess your current environment to achieve better outcomes.
Are you planning to migrate your data from Box to OneDrive? If yes, it’s a complex and a challenging process, and because of its complexity, many migrations run into issues that interrupt or stop a process.
Watch these slides to learn about the facets of Box to OneDrive Migration before you start the migration. This will enable you to make the transition smooth, hassle-free and will derive better outcomes. You will learn
How to assess your current source environment
Importance of choosing the right tool
Problems faced during migration
Best practices
IBM API Connect is a Comprehensive API Solution. It is an integrated creation, runtime, management, and security foundation for enterprise grade API’s and Microservices to power modern digital applications.
In this webinar,
API Management Concepts
IBM API Connect overview and features
Kellton Tech’s API Strategy with IBM API Connect.
Technology: IBM API Connect 5.0
Amazon API Gateway is a fully managed service that makes it easy for developers to create, publish, maintain, monitor, and secure APIs at any scale. With a few clicks in the AWS Management Console, you can create an API that acts as a “front door” for applications to access data, business logic, or functionality from your back-end services, such as workloads running on Amazon Elastic Compute Cloud (Amazon EC2), code running on AWS Lambda, or any Web application. Amazon API Gateway handles all the tasks involved in accepting and processing up to hundreds of thousands of concurrent API calls, including traffic management, authorization and access control, monitoring, and API version management.
Presented by: Danilo Poccia, Technical Evangelist, Amazon Web Services
by Brigid Johnson, Product Management Manager, AWS
How to Use IAM Roles to Grant Access to AWS: Customers use IAM roles to delegate access to services, applications, accounts, and federated users using temporary credentials. We will start by defining use cases for IAM roles, tools to use IAM roles in your account, and techniques to manage role permissions. We will cover how customers can use roles to grant access to AWS. Using demonstrations, we will learn how to monitor roles across accounts, grant cross account access, and scope down permissions for a particular entity. This session will cover how to use roles for developers building applications on AWS and for administrators controlling and monitoring access. Level 300
Success for Box to OneDrive migration depends on how you plan, assess and remediate your target environment. Before initiating your migration, it’s imperative to assess your current environment to achieve better outcomes.
Are you planning to migrate your data from Box to OneDrive? If yes, it’s a complex and a challenging process, and because of its complexity, many migrations run into issues that interrupt or stop a process.
Watch these slides to learn about the facets of Box to OneDrive Migration before you start the migration. This will enable you to make the transition smooth, hassle-free and will derive better outcomes. You will learn
How to assess your current source environment
Importance of choosing the right tool
Problems faced during migration
Best practices
IBM API Connect is a Comprehensive API Solution. It is an integrated creation, runtime, management, and security foundation for enterprise grade API’s and Microservices to power modern digital applications.
In this webinar,
API Management Concepts
IBM API Connect overview and features
Kellton Tech’s API Strategy with IBM API Connect.
Technology: IBM API Connect 5.0
Amazon API Gateway is a fully managed service that makes it easy for developers to create, publish, maintain, monitor, and secure APIs at any scale. With a few clicks in the AWS Management Console, you can create an API that acts as a “front door” for applications to access data, business logic, or functionality from your back-end services, such as workloads running on Amazon Elastic Compute Cloud (Amazon EC2), code running on AWS Lambda, or any Web application. Amazon API Gateway handles all the tasks involved in accepting and processing up to hundreds of thousands of concurrent API calls, including traffic management, authorization and access control, monitoring, and API version management.
Presented by: Danilo Poccia, Technical Evangelist, Amazon Web Services
by Brigid Johnson, Product Management Manager, AWS
How to Use IAM Roles to Grant Access to AWS: Customers use IAM roles to delegate access to services, applications, accounts, and federated users using temporary credentials. We will start by defining use cases for IAM roles, tools to use IAM roles in your account, and techniques to manage role permissions. We will cover how customers can use roles to grant access to AWS. Using demonstrations, we will learn how to monitor roles across accounts, grant cross account access, and scope down permissions for a particular entity. This session will cover how to use roles for developers building applications on AWS and for administrators controlling and monitoring access. Level 300
This is the Lesson 2 of the "Azure Governance - Free training" serie.
This document describes Azure Locks and lists all key items you should now when designing your Azure Lock Hierarchy.
Finally, the document describes all methods/tools (GUI & CLI) you can use to create and apply Azure Locks to your Subscriptions, Resource Groups and Azure Resources.
AWS January 2016 Webinar Series - Introduction to Docker on AWSAmazon Web Services
Using Docker on your local development machine is simple, but running Docker applications at scale in production can be difficult.
In this webinar, we will discuss the difficulties of running Docker in production and how Amazon EC2 Container Service (ECS) can be used to reduce the operational burdens, and we will give an overview of the architecture powering Amazon ECS. We will also demo how to define multi-container applications with Docker Compose and deploy and scale them seamlessly to a cluster with Amazon ECS.
Learning Objectives:
Understand the benefits and architecture of Amazon ECS
Learn how to deploy and scale Docker containers on Amazon ECS
Who Should Attend:
Developers
Building an enterprise level single sign-on application with the help of keycloak (Open Source Identity and Access Management).
And understanding the way to secure your application; frontend & backend API’s. Managing user federation with minimum configuration.
by Kashif Imran, Sr. Solutions Architect, AWS
Serverless computing allows you to build and run applications without the need for provisioning or managing servers. With serverless computing, you can build web, mobile, and IoT backends; run stream processing or big data workloads; run chatbots, and more. In this session, you’ll learn how to get started with serverless computing with AWS Lambda, which lets you run code without provisioning or managing servers. We’ll introduce you to the basics of building with Lambda and how you can benefit from features such as continuous scaling, built-in high availability, integrations with AWS and third-party apps, and subsecond metering pricing. We’ll also introduce you to the broader portfolio of AWS services that help you build serverless applications with Lambda, including Amazon API Gateway, Amazon DynamoDB, AWS Step Functions, and more.
As serverless architectures become more popular, AWS customers need a framework of patterns to help them deploy their workloads without managing servers or operating systems.
by Fritz Kunstler, Sr. AWS Security Consultant AWS
Join us for four days of security and compliance sessions and hands-on labs led by our AWS security pros during AWS Security Week at the San Francisco Loft. Join us for all four days, or pick just the days that are most relevant to you. We'll open on Monday with Security 101 day, followed by sessions Tuesday on Identity and Access Management, our popular Threat Detection and Remediation day Wednesday will feature an updated GuardDuty lab, and we'll end Thursday with Incident Response sessions, labs, and a talk by Netflix on their new open source IR tool. This week will also feature Dome9 as a sponsor, and you can hear them speak and present a hands-on workshop Monday during Security 101 day.
Automate Best Practices and Operational Health for AWS Resources with AWS Tru...Amazon Web Services
Notice: This Workshop requires a laptop computer and an active AWS account with Administrator privileges.
It can be challenging to optimize AWS resources across cost, performance, security, and fault tolerance, much less do it automatically. AWS Trusted Advisor, an online resource, provides real-time guidance to help you provision your resources following AWS best practices. AWS Health provides ongoing visibility into the state of your AWS resources and remediation guidance for resource performance or availability issues that may affect your applications. Learn how to safely automate these best practices using Amazon CloudWatch Events and AWS Lambda, with samples for you to use. We also introduce you to AWS Health tools, a community-based source of tools to automate remediation actions and customize health alerts. See how to automate AWS best practices from Trusted Advisor and implement remediation from the AWS Health API on your AWS resources. Attendees should bring their own laptops.
AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...Amazon Web Services
AWS IAM and Amazon VPC offer powerful tools that help you adhere to the principle of least privilege in your resource permissions and network security settings. This workshop will start with the fundamentals of IAM and VPC security techniques and will give you hands-on experience in writing, testing, applying, troubleshooting, and auditing progressively more tightly scoped IAM policies. You will also get experience building and monitoring VPC security groups that grant only the access required to perform tasks.
Identity Management with the ForgeRock Identity Platform - So What’s New?ForgeRock
It’s no secret that Identity Management is a key component to any modern identity solution. Organizations need to easily provision, de-provision and perform synchronization & reconciliation tasks across not just users, but devices and things as well. The future of Identity Management will require the unique flexibility of a service based approach with custom configurable administrative and self-service capabilities that can handle any kind of Identity. Find out more about how all forms of identity (business, consumer and device) can by centralized, normalized, coordinated and managed by policy - and automated to ensure a consistent experience that complies with regulations and policies. Discover how ForgeRock can help you deliver Identity Management the right way to your customers, partners and employees.
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
API Management Part 1 - An Introduction to Azure API ManagementBizTalk360
Building APIs is not just about technology. APIs enable many new business opportunities, but only if done correctly. Enter API Management platforms to provide the building blocks behind a successful API program. As a result of lucrative opportunities, many Software vendors have emerged or pivoted from their SOA management roots to provide API Management capabilities.
In this session, Kent will introduce you to Microsoft’s Azure API Management platform by providing an overview that highlights its capabilities and the opportunities that emerge for organizations. As part of this presentation, Kent will demonstrate how developers can create their first API and discuss strategies for transforming existing services to leverage Azure API Management.
This presentation will consist of general guidance on API Management, an Azure API Management portal walk-through and demos that re-enforce the concepts that were introduced.
Las arquitecturas sin servidores le permiten construir y ejecutar aplicaciones y servicios sin la necesidad de administrar la infraestructura que necesitan. Con las arquitecturas sin servidores en AWS su aplicación si se ejecuta en servidores pero toda la administración de los mismos la hace AWS.
En este webinar, usted aprenderá cómo construir aplicaciones y servicios mediante el uso de una arquitectura sin servidores o "serverless". Discutiremos cómo utilizar AWS Lambda para la ejecución de código para cualquier tipo de aplicación o servicio de backend; utilizar Amazon DynamoDB para almacenar los datos de la misma con una alta escalabilidad y redundancia; y utilizar Amazon API Gateway para crear y administrar puntos de conexión seguros API. También veremos un demo de cómo montar una arquitectura como estas y discutiremos las mejores prácticas y patrones utilizados por nuestros clientes para ejecutar aplicaciones sin servidores.
Objetivos de aprendizaje:
• Entender los conceptos básicos de arquitecturas sin servidores
• Aprender cómo usar Lambda, API Gateway y DynamoDB para ejecutar aplicaciones
¿Quién debería atender?:
• Desarrolladores, desarrolladores Web
This is the Lesson 2 of the "Azure Governance - Free training" serie.
This document describes Azure Locks and lists all key items you should now when designing your Azure Lock Hierarchy.
Finally, the document describes all methods/tools (GUI & CLI) you can use to create and apply Azure Locks to your Subscriptions, Resource Groups and Azure Resources.
AWS January 2016 Webinar Series - Introduction to Docker on AWSAmazon Web Services
Using Docker on your local development machine is simple, but running Docker applications at scale in production can be difficult.
In this webinar, we will discuss the difficulties of running Docker in production and how Amazon EC2 Container Service (ECS) can be used to reduce the operational burdens, and we will give an overview of the architecture powering Amazon ECS. We will also demo how to define multi-container applications with Docker Compose and deploy and scale them seamlessly to a cluster with Amazon ECS.
Learning Objectives:
Understand the benefits and architecture of Amazon ECS
Learn how to deploy and scale Docker containers on Amazon ECS
Who Should Attend:
Developers
Building an enterprise level single sign-on application with the help of keycloak (Open Source Identity and Access Management).
And understanding the way to secure your application; frontend & backend API’s. Managing user federation with minimum configuration.
by Kashif Imran, Sr. Solutions Architect, AWS
Serverless computing allows you to build and run applications without the need for provisioning or managing servers. With serverless computing, you can build web, mobile, and IoT backends; run stream processing or big data workloads; run chatbots, and more. In this session, you’ll learn how to get started with serverless computing with AWS Lambda, which lets you run code without provisioning or managing servers. We’ll introduce you to the basics of building with Lambda and how you can benefit from features such as continuous scaling, built-in high availability, integrations with AWS and third-party apps, and subsecond metering pricing. We’ll also introduce you to the broader portfolio of AWS services that help you build serverless applications with Lambda, including Amazon API Gateway, Amazon DynamoDB, AWS Step Functions, and more.
As serverless architectures become more popular, AWS customers need a framework of patterns to help them deploy their workloads without managing servers or operating systems.
by Fritz Kunstler, Sr. AWS Security Consultant AWS
Join us for four days of security and compliance sessions and hands-on labs led by our AWS security pros during AWS Security Week at the San Francisco Loft. Join us for all four days, or pick just the days that are most relevant to you. We'll open on Monday with Security 101 day, followed by sessions Tuesday on Identity and Access Management, our popular Threat Detection and Remediation day Wednesday will feature an updated GuardDuty lab, and we'll end Thursday with Incident Response sessions, labs, and a talk by Netflix on their new open source IR tool. This week will also feature Dome9 as a sponsor, and you can hear them speak and present a hands-on workshop Monday during Security 101 day.
Automate Best Practices and Operational Health for AWS Resources with AWS Tru...Amazon Web Services
Notice: This Workshop requires a laptop computer and an active AWS account with Administrator privileges.
It can be challenging to optimize AWS resources across cost, performance, security, and fault tolerance, much less do it automatically. AWS Trusted Advisor, an online resource, provides real-time guidance to help you provision your resources following AWS best practices. AWS Health provides ongoing visibility into the state of your AWS resources and remediation guidance for resource performance or availability issues that may affect your applications. Learn how to safely automate these best practices using Amazon CloudWatch Events and AWS Lambda, with samples for you to use. We also introduce you to AWS Health tools, a community-based source of tools to automate remediation actions and customize health alerts. See how to automate AWS best practices from Trusted Advisor and implement remediation from the AWS Health API on your AWS resources. Attendees should bring their own laptops.
AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...Amazon Web Services
AWS IAM and Amazon VPC offer powerful tools that help you adhere to the principle of least privilege in your resource permissions and network security settings. This workshop will start with the fundamentals of IAM and VPC security techniques and will give you hands-on experience in writing, testing, applying, troubleshooting, and auditing progressively more tightly scoped IAM policies. You will also get experience building and monitoring VPC security groups that grant only the access required to perform tasks.
Identity Management with the ForgeRock Identity Platform - So What’s New?ForgeRock
It’s no secret that Identity Management is a key component to any modern identity solution. Organizations need to easily provision, de-provision and perform synchronization & reconciliation tasks across not just users, but devices and things as well. The future of Identity Management will require the unique flexibility of a service based approach with custom configurable administrative and self-service capabilities that can handle any kind of Identity. Find out more about how all forms of identity (business, consumer and device) can by centralized, normalized, coordinated and managed by policy - and automated to ensure a consistent experience that complies with regulations and policies. Discover how ForgeRock can help you deliver Identity Management the right way to your customers, partners and employees.
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
API Management Part 1 - An Introduction to Azure API ManagementBizTalk360
Building APIs is not just about technology. APIs enable many new business opportunities, but only if done correctly. Enter API Management platforms to provide the building blocks behind a successful API program. As a result of lucrative opportunities, many Software vendors have emerged or pivoted from their SOA management roots to provide API Management capabilities.
In this session, Kent will introduce you to Microsoft’s Azure API Management platform by providing an overview that highlights its capabilities and the opportunities that emerge for organizations. As part of this presentation, Kent will demonstrate how developers can create their first API and discuss strategies for transforming existing services to leverage Azure API Management.
This presentation will consist of general guidance on API Management, an Azure API Management portal walk-through and demos that re-enforce the concepts that were introduced.
Las arquitecturas sin servidores le permiten construir y ejecutar aplicaciones y servicios sin la necesidad de administrar la infraestructura que necesitan. Con las arquitecturas sin servidores en AWS su aplicación si se ejecuta en servidores pero toda la administración de los mismos la hace AWS.
En este webinar, usted aprenderá cómo construir aplicaciones y servicios mediante el uso de una arquitectura sin servidores o "serverless". Discutiremos cómo utilizar AWS Lambda para la ejecución de código para cualquier tipo de aplicación o servicio de backend; utilizar Amazon DynamoDB para almacenar los datos de la misma con una alta escalabilidad y redundancia; y utilizar Amazon API Gateway para crear y administrar puntos de conexión seguros API. También veremos un demo de cómo montar una arquitectura como estas y discutiremos las mejores prácticas y patrones utilizados por nuestros clientes para ejecutar aplicaciones sin servidores.
Objetivos de aprendizaje:
• Entender los conceptos básicos de arquitecturas sin servidores
• Aprender cómo usar Lambda, API Gateway y DynamoDB para ejecutar aplicaciones
¿Quién debería atender?:
• Desarrolladores, desarrolladores Web
En la actualidad ser TCP es una de las profesiones mejor remuneradas en el país y el mundo, ya que la gran demanda de vuelos a nivel nacional e internacional exige a las aerolíneas el abastecerse de personal calificado para desempeñar este rol, por esta razón Liderazgo capacita a los aspirantes para desenvolverse en todas las actividades que requiere un TCP, con el objetivo fundamental de impartir conocimientos actuales en temas de aviación, seguridad en vuelo, mantener la calma en situaciones de emergencia, primeros auxilios, mercancías peligrosas, imagen personal y servicio al cliente.
Brief seminario internacional cierre de ventas octubre 2014Liderazgo Eventos
El objetivo de éste seminario es aportar a los participantes conocimientos y herramientas sobre los aspectos claves de la venta profesional y cierres efectivos, logrando mayor compromiso con la actividad, más orientación hacia los resultados, enfoque al cliente, y en general, cumplir con los objetivos comerciales que se les encomienden.
está dirigido a ejecutivos de Ventas, Vendedores, líderes de la Fuerza de Ventas, asistentes comerciales de tu organización y colaboradores en relación activa con Clientes, vendedores freelance, que estén dispuestos a esforzarse por mayores retos.
Quito: 20 de octubre del 2014
Guayaquil: 21 de octubre del 2014
Comunícate con nosotros: (02)2229667, 0984535948
Mail: info@liderazgo.com.ec
More info:
Taller de Artes Visuales - 1ro 4ta Técnica
Docentes García Dopazo y García Weis
Año 2013
Guido García Cattáneo
Luciano Garay
Andrés Derruder
Nicolás Bejarano
Facundo Giménez
Seminario taller internacional servicio al cliente 2015Liderazgo Eventos
El servicio y atención a clientes, tanto internos como externos, se ha convertido en un elemento estratégico para las organizaciones. En la actualidad, un buen servicio es insuficiente, el cliente ACTUAL es más exigente, está informado, actualizado y con conocimiento específico del producto y/o servicio. Empoderar al equipo de trabajo con habilidades y herramientas efectivas para que logre SUPERAR LAS EXPECTATIVAS DE SUS CLIENTES DESPUÉS DE LA VENTA, es la mejor decisión que se puede tomar a favor de toda la empresa.
NTV Tablet es una aplicación para tabletas Android orientada a la venta: ayudamos a su equipo comercial a cerrar más ventas y con mayor rapidez, a la vez que mejoramos su productividad y su eficiencia.
NTV Tablet no es tan sólo una forma ágil, visulamente rica y cómoda de mostrar su catálogo de productos, sino que desde ella, puede realizar sus pedidos, gestionarlos, modificarlos y enviarlos a su programa de gestión además de mantener permanentemente actualizado su catálogo, y sus clientes.
AWS proporciona una gama de servicios que lo ayudan a desarrollar aplicaciones móviles que pueden escalarse a cientos de millones de usuarios y alcanzar a un público global. Con AWS, es posible comenzar rápidamente, garantizar un alto nivel de calidad con pruebas en dispositivos reales en la nube y medir y mejorar la participación de los usuarios.
Este verano llegan a ENCAMINA “Los Imprescindibles”, unos superhéroes muy especiales que vienen dispuestos a combatir el aburrimiento y pasarte todos sus superpoderes.
El primero en aterrizar ha sido .Net Core.
En “Los Imprescindibles de .Net Core“, compartimos contigo las reflexiones y valoraciones que Alberto Díaz, Adrián Díaz y Juan Carlos Martínez han hecho sobre cómo usarlo, sus escenarios, versionados, integraciones, etc.
Seguridad en las apis desde un punto de vista de developerCloudAppi
Seguridad en las APIs. Se explican cuales son las consideraciones a tener en cuenta en la seguridad de nuestras APIs, cuales son los principales sistemas de autenticación y autorización y se hace una introducción a los API Managers, con un ejemplo de APIgee y de WSO2.
Presentación que muestra como definir una API Rest con RAML, definiendo los servicios GET/PUT/POST... Se utilizarán las herramientas de Mulesoft para diseñar la API con ApiDesigner
La seguridad siempre será el elemento más importante en cualquier conversación de migración a la nube. Las preocupaciones ya no refierense a si la nube es segura o no, sino a la protección de datos en la nube y al cumplimiento de estrictos requisitos de seguridad y conformidad, que en general son específicos para cada sector y país.
Tutoriales - Explorando AWS con Java.
Aprende a descubrir los diferentes servicios que ofrece AWS para explotar por medio de Java a través de la capa gratuita.
Transparencias de la charla "Qué es eso de OAuth y como se implementa en Symfony2 (y otros)".
En esta charla dimos un repaso a los conceptos más importantes de OAuth y vimos cómo implementar nuestro propio servidor de autenticación/autorización usando Symfony2.
En este webinar, aprenderá cómo las empresas pueden aprovechar la nube de AWS para automatizar los pipelines de desarrollo de software. Este enfoque permite que su equipo sea más ágil, mejorando su capacidad para entregar aplicaciones y servicios rápidamente.
Neste webinar, você aprenderá como as empresas podem se valer da nuvem da AWS para automatizar os pipelines de desenvolvimento de software. Essa abordagem permite que sua equipe seja mais ágil, melhorando sua capacidade para entregar aplicações e serviços mais rapidamente.
Las tecnologías como los contenedores y kubernetes pueden hacer que sus procesos de entrega de software sean más fáciles y más rápidos. En este webinar, hablaremos sobre cómo usar el Amazon Kubernetes Service (EKS) para construir aplicaciones modernas con grupos Kubernetes totalmente administrados.
Tecnologias como containers e Kubernetes podem tornar seus processos de entrega de software mais fáceis e rápidos. Neste webinar, falaremos sobre como usar o Amazon Elastic Kubernetes Service (EKS) para criar aplicativos modernos com clusters de Kubernetes totalmente gerenciados.
Ransomware é uma das ameaças de crescimento mais rápido para qualquer organização. Nenhuma empresa, grande ou pequena, está imune a ataques de cibercriminosos. Nesta sessão, mostramos como você pode aproveitar os serviços e recursos da nuvem AWS para proteger seus dados mais valiosos de ataques cibernéticos e acelerar a restauração de operações.
El ransomware es una de las amenazas de más rápido crecimiento para cualquier organización. Ninguna empresa, grande o pequeña, es inmune a los ataques de los ciberdelincuentes. En esta sesión, mostramos cómo puede aprovechar los servicios y las capacidades de la nube AWS para proteger sus datos más valiosos de los ataques cibernéticos y acelerar la restauración de las operaciones.
Ransomware é uma prática maliciosa que tem se popularizado nos últimos anos. Nessa sessão, mostraremos como através da Amazon Web Services nossos clientes podem desenvolver uma estratégia pró-ativa de mitigação a ataques de ransomware, tanto em cenários on-premises como operando na nuvem.
El ransomware es una práctica maliciosa que se ha popularizado en los últimos años. En esta sesión les mostraremos cómo desde Amazon Web Services nuestros clientes pueden desarrollar una estrategia proactiva de mitigación frente a ataques de ransomware, tanto en escenarios on-premises, como operando en la nube.
Al mover datos a la nube, los clientes deben comprender los métodos óptimos para los diferentes casos de uso, los tipos de datos que están moviendo y los recursos disponibles en la red, entre otros. Las soluciones de migración y transferencia de AWS contemplan desde la migración de datos con conectividad limitada, almacenamiento en la nube híbrida, transferencias frecuentes de archivos B2B, hasta transferencias de datos en línea y sin conexión. En esta sesión, le mostramos cómo puede acelerar la migración y transferencia de datos de manera simplificada desde y hacia la nube de AWS.
Ao mover dados para a nuvem, os clientes precisam entender os métodos ideais de movê-los para diferentes casos de uso, os tipos de dados que estão movendo e os recursos de rede disponíveis, entre outras considerações. As soluções de migração e transferência da AWS atendem desde a migração de dados com conectividade limitada, armazenamento em nuvem híbrida, transferências frequentes de arquivos B2B até transferências de dados online e offline. Nessa sessão, mostraremos como você pode simplificar e acelerar sua migração e transferência de dados de e para a nuvem AWS.
El almacenamiento de archivos tiene diversos casos de uso; como directorios de usuarios, datos de aplicaciones, archivos multimedia y almacenamiento compartido para cargas de trabajo de alto rendimiento. La administración del almacenamiento de archivos en instalaciones propias suele ser un trabajo pesado, indiferenciado, con altos costos de adquisición, carga operativa para configurar y administra, lo que conlleva a desafíos de escalabilidad. En esta sesión, le mostramos cómo puede aprovechar las soluciones de archivos totalmente administradas de AWS para dejar de preocuparse por la sobrecarga administrativa de configurar, proteger, mantener y realizar copias de seguridad de su infraestructura de archivos.
La visualización de datos analíticos es un reto al que se enfrentan muchas organizaciones, el poder crear tableros, alertas, agregar predicciones a sus datos y actuar de acuerdo a estas de manera rápida es una necesidad de todos los negocios actuales. Únase a nuestros arquitectos para aprender como Amazon QuickSight le permite agregar inteligencia de negocios a sus aplicaciones y crear predicciones a futuro de sus datos. Amazon QuickSight es un servicio de inteligencia de negocios escalable y serverless creado para la nube, a través del cual podrá explotar sus datos de negocio para convertirlos en insights para hacer decisiones informadas sobre su negocio sin preocuparse de la gestión, escalamiento y la disponibilidad de la infraestructura de cómputo.
A visualização de dados é um desafio que muitas organizações enfrentam hoje. Criar dashboards, alertas, fazer previsões e agir rapidamente de acordo com os insights dos dados é uma necessidade de todas as empresas. Junte-se aos nossos arquitetos para aprender como o Amazon QuickSight o ajudará a adicionar BI aos seus aplicativos. O Amazon Quicksight é um serviço de BI escalável e serverless criado para a nuvem. Com ele, você pode explorar seus dados para obter insights e tomar decisões embasadas em seus negócios, sem se preocupar em gerenciar e dimensionar servidores e manter a disponibilidade de sua infraestrutura.
Executar projetos de Big Data nunca foi tão simples. Com a AWS, você pode executar Hadoop, Spark, Hive, Flink e frameworks semelhantes de maneira mais rápida e econômica. Neste webinar, você aprenderá como melhorar o desempenho do processamento de seus dados e reduzir custos, especialmente quando comparado a um ambiente on-premises.
3Redu: Responsabilidad, Resiliencia y Respetocdraco
¡Hola! Somos 3Redu, conformados por Juan Camilo y Cristian. Entendemos las dificultades que enfrentan muchos estudiantes al tratar de comprender conceptos matemáticos. Nuestro objetivo es brindar una solución inclusiva y accesible para todos.
Es un diagrama para La asistencia técnica o apoyo técnico es brindada por las compañías para que sus clientes puedan hacer uso de sus productos o servicios de la manera en que fueron puestos a la venta.
En este documento analizamos ciertos conceptos relacionados con la ficha 1 y 2. Y concluimos, dando el porque es importante desarrollar nuestras habilidades de pensamiento.
Sara Sofia Bedoya Montezuma.
9-1.
Inteligencia Artificial y Ciberseguridad.pdfEmilio Casbas
Recopilación de los puntos más interesantes de diversas presentaciones, desde los visionarios conceptos de Alan Turing, pasando por la paradoja de Hans Moravec y la descripcion de Singularidad de Max Tegmark, hasta los innovadores avances de ChatGPT, y de cómo la IA está transformando la seguridad digital y protegiendo nuestras vidas.
Índice del libro "Big Data: Tecnologías para arquitecturas Data-Centric" de 0...Telefónica
Índice del libro "Big Data: Tecnologías para arquitecturas Data-Centric" de 0xWord escrito por Ibón Reinoso ( https://mypublicinbox.com/IBhone ) con Prólogo de Chema Alonso ( https://mypublicinbox.com/ChemaAlonso ). Puedes comprarlo aquí: https://0xword.com/es/libros/233-big-data-tecnologias-para-arquitecturas-data-centric.html
2. ¿Qué vamos a ver en esta sesión?
1. Nuevo modelo de desarrollo: Completamente
gerenciado
2. Declarar APIs con Amazon API Gateway
3. Lógica de la aplicación en AWS Lambda
4. APIs de Login y Registro, utilizando Amazon Cognito
5. Autorización utilizando AWS IAM (STS)
6. Generación de SDK para cliente
3. Totalmente Gerenciado
API: Modelo Totalmente gerenciado
InternetMobile apps
Funciones
AWS Lambda
AWS
API Gateway
cache
Endpoints en
Amazon EC2
Cualquier otro
endpoint público
Amazon
CloudWatch
Amazon
CloudFront
API
Gateway
API Gateway
Otros
Servicios
AWS
Funciones
AWS Lambda
4. Puntos Principales
AWS Lambda + Amazon API Gateway =
0 (cero) infraestructura para administrar
Seguridad = Prioridad:
Aproveche la integración con AWS Identity and
Access Management
Swagger + client SDK = Automatización de workflows
5. Servicios que vamos a utilizar
Amazon API Gateway AWS Lambda Amazon Cognito Amazon DynamoDB
Publica las APIs y
enruta las llamadas
Ejecuta: Lógica de
autenticación y lógica
de la aplicación
Gerencia de
identidades y entrega
credenciales AWS
Almacén de datos:
Usuarios y Mascotas
7. No-Autenticadas
Flujo de las llamadas
Mobile apps
AWS Lambda lambdaHandler
Register (/user-POST)
Login (/login-POST)
API Gateway
Autenticadas
Mobile apps AWS Lambda lambdaHandler
ListPets (/pets – GET)
GetPet (/pets/{petId}-GET
API Gateway
Assume Role
CreatePet (/pets – POST)
Sigv4
Usando las
credenciales AWS
Invoca con las
credenciales AWS Autorizado por IAM
Recibe
credenciales AWS
APIs:
/user
/login
APIs:
/pets
/pets/{petId}
Table: petstoreapp-users
IdentityPool: PetStoreApp
Table:
petstoreapp-pets
8. ¿Qué tiene de diferente este modelo?
“Serverless” – La aplicación puede usar muchos
servidores, pero no necesito administrar ninguno.
Autorización: Realizada por AWS, basada en Roles
Definición e implementación de APIs usando
Swagger
10. Amazon API Gateway - Conceptos
Gerenciamiento de
implementaciones –
múltiples versiones y
ambientes (stages)
Definición y
Publicación de APIs
Usa las credenciales de
AWS IAM para el control
de acceso a sus recursos
(Como si fueran servicios
AWS)
Aprovecha los mecanismos
de Autorización de AWS
Gestión de tráfico de
red
Protección DDoS y
“Throttling”
11. Modelo de API: Recursos, Métodos e Integración
rest-api-id
resou
rce-id
ARN
12. Recursos y Métodos
• POST – Recibe usuario y
contraseña; registra (crea) el
nuevo usuario en DynamoDB
/users
• POST – Recibe usuario y
contraseña; autentica; solicita
credenciales AWS a cognito y las
retorna a la App
/login
• POST – Recibe los datos de la
mascota;los guarda en DynamoDB
• GET – Retorna una lista de
mascotas desde DynamoDB
/pets
• GET – Retorna la información de la
mascota, a partir de su petID/pets/{petId}
No Autenticado
Autenticado
14. Method Response
Integration
(Req. & Resp)
Method Request
Method
Usando Swagger para automatizar el proceso
/users:
post:
summary: Registers a new user
consumes:
- application/json
produces:
- application/json
parameters:
- name: NewUser
in: body
schema:
$ref: '#/definitions/User’
x-amazon-apigateway-integration:
type: aws
uri: arn:aws:apigateway:us-east-1:lambda:path/2015-03-31...
credentials: arn:aws:iam::964405213927:role/pet_store_lambda_invoke
...
responses:
200:
schema:
$ref: '#/definitions/RegisterUserResponse'
15. Usando Swagger para automatizar el proceso
Usando AWS CLIaws apigateway import-rest-api --body file://swagger.yaml
Usando la Consola
16. Beneficios de usar Swagger
• Las definiciones de las API permanecen en su
repositorio, con el resto del código de la aplicación.
• Pueden ser usadas en conjunto con otras utilidades de
Swagger (por ejemplo, generación de documentación).
• Las APIs pueden ser importadas e implementadas en
su propio script.
18. Escalabilidad y Alto desempeño;
Eficiente y Económica
No hay infraestructura para
administrar
Pague solo por lo que use: Lambda
adecúa automáticamente la
capacidad para responder a los
volúmenes de solicitudes.
Use su propio código
Funciones Lambda : Ejecución de código basada en eventos, Stateless
Ejecute su código en una variedad
de lenguajes estándar. Use threads,
procesos, archivos y shell scripts, de
la forma usual.
Enfóquese en su lógica de negocio.
Cargue su código y AWS Lambda se
encarga del resto.
AWS Lambda - Conceptos
19. Lambda handler.
lambdaHandler
(en el código
Java)
Acción: Register
Acción: Login
Acción:
Create Pet
Acción:
Get Pet
Gestión de
identidades
Pet store
database
Amazon API
Gateway
Integration request
User
database
20. Excepciones mapeadas a HTTP Status.
Register action
Login action
Create Pet action
Get Pet action
BadRequestException
BAD_REQUEST +
Stack Trace
InternalErrorException
INTERNAL_ERROR +
Stack Trace
lambdaHandler
(en el código
Java)
Amazon API
Gateway
responses:
"default":
statusCode: "200"
"BAD.*":
statusCode: "400"
"INT.*":
statusCode: "500"
21. Mapping Template es una herramienta poderosa
Encuentre más acerca de nuestros ”mapping templates”:
http://amzn.to/1L1hSF5
23. Amazon Cognito - Conceptos
Gestión de usuarios
autenticados e invitados,
entre diferentes
proveedores de identidad
Gestión de Identidad
Sincroniza datos de los
usuarios entre dispositivos
y plataformas, via nube
Sincronización de
datos
Facilita el acceso seguro
a servicios AWS desde
plataformas y
dispositivos móviles
Acceso seguro a
recursos AWS
24. Definición de las APIs (No Autenticadas)
• POST
• Recibe un usuario y contraseña
• Encripta la contraseña (con salt) y registra la
cuenta del usuario en DynamoDB
• Hace una llamada a Cognito, para registrar
el usuario y generar las credenciales
• Retorna las informaciones de usuario y
credenciales temporales
/users
• POST
• Recibe un usuario y contraseña
• Autentica el usuario (contra la información
en DynamoDB)
• Si la autenticación es exitosa, hace una
llamada a Cognito para generar credenciales
• Retorna las credenciales temporales
/login
25. Recibiendo las credenciales temporales.
Llamada a la API
login
(sin autenticación)
Cliente API
Gateway
Backend
/login
Login
action
BD
Usuarios
Credenciales OK
Solicita OIDC
Obtiene el token
OpenID
Recibe las
credenciales
AWS para firmar
las llamadas API
Usando el token
OIDC, solicita
credenciales AWS
Genera las
credenciales AWS
Access key +
secret key +
session token
/login
1.
2.
3.
28. APIs /pets (necesitan AuthN y AuthZ)
• POST
• Recibe información de la mascota
(nombre, tipo)
• Graba en DynamoDB
• Retorna el petID creado
• GET
• Retorna la lista de mascotas almacenada
en DynamoDB (incluyendo el petID)
/pets
• GET
• Recibe (en el path) el petID
• Usando mapping templates, se pasa el
parámetro petID a la función Lambda
• Busca la información de la mascota en
DynamoDB
• Retorna la información de la mascota
/pets/{petId}
30. API Gateway repasa las autorizaciones
credentials:
arn:aws:iam::*:user/*
En la consola En el archivo Swagger
31. El Rol IAM define la autorización
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"dynamodb:GetItem",
"dynamodb:PutItem",
"dynamodb:Scan",
"lambda:InvokeFunction",
"execute-api:invoke"
],
"Resource": [
"arn:aws:dynamodb:us-east-1:xxxxxx:table/test_pets",
"arn:aws:lambda:us-east-1:xxxxx:function:PetStore”,
"arn:aws:execute-api:us-east-1:xxxx:API_ID/*/POST/pets"
]
}
]
}
En este ejemplo, el rol permite
accesos a:
• DynamoDB
• API Gateway
• Lambda
Y permite definir acceso
solamente a recursos
específicos en esos servicios
32. Y todavía hay más: Fine-grained access permissions
Internet
Cliente
API
Gateway
Funciones
AWS Lambda
Amazon
CloudFront
DynamoDB
CognitoId2
…
"Condition": {
"ForAllValues:StringEquals": {
"dynamodb:LeadingKeys": [”${cognito-
identity.amazonaws.com:sub}"],
"dynamodb:Attributes": [
"UserId","GameTitle","Wins","Losses",
"TopScore","TopScoreDateTime”
]
},
"StringEqualsIfExists": {
"dynamodb:Select": "SPECIFIC_ATTRIBUTES”
}
}
…
Ejecuta con el
rol definido
UserID Wins Losses
cognitoId1 3 2
cognitoId2 5 8
cognitoId3 2 3
Informaciones de contexto (Cognito ID) son repasadas …
Con eso, AWS Lambda & DynamoDB seguirán coherentemente la política de acceso
33. Flujo autenticado completo
Mobile apps AWS Lambda lambdaHandler
API Gateway
Sigv4
Usa los mismos
permisos de las
credenciales de
usuario
Llamadas a los
servicios son
autorizadas
usando un rol
IAM
Documentación acerca de FGAC:
http://amzn.to/1YkxcjR
DynamoDB
34. Beneficios de usar AWS IAM (AuthN & AuthZ)
• Separación de funciones – la estrategia de
autorización se delega a un servicio dedicado
• Gestión centralizada de acceso, a través de un
conjunto único de políticas
• Credenciales y Roles pueden ser modificadas o
deshabilitadas con una llamada API
39. Beneficios del SDK generado
El SDK de cliente contiene la lógica para:
• Firmar las llamadas API usando sigv4
• Manejar respuestas reguladas (throttled)
• Marshal/unmarshal solicitudes y respuestas en objetos
40. AWS Lambda + Amazon API Gateway =
0 (cero) infraestructura para administrar
Seguridad = Prioridad:
Aproveche la integración con AWS Identity and
Access Management
Swagger + client SDK = Automatización de workflows
¿Qué vimos hoy?
Este ejemplo está disponible en la cuenta GitHub AWSLabs
https://github.com/awslabs/api-gateway-secure-pet-store
41. ¡Gracias !
Este ejemplo está disponible en la cuenta GitHub AWSLabs
https://github.com/awslabs/api-gateway-secure-pet-store
Notas del editor
¿
¡
A new, fully-managed development model : Model where AWS takes care of the infrastructure.
And, how the Amazon API Gateway integrates with other services:
Declare an API with Amazon API Gateway
Application logic in AWS Lambda
Register and login API with Amazon Cognito
Authorization with AWS IAM
Generate and connect the Client SDK
The first thing we want to look at is the standard flow of an API call, including all components in the system
First, a request comes in from a client, this could be a mobile device, a web application or a backend service
The requests arrives at one of our CloudFront PoP locations, it’s accepted and routed through to the API Gateway in the customer’s region
The API Gateway receives the request, then checks for records in the dedicated cache (if it is configured). If there are no cached records available then it will forward the request to the backend for processing
The backend can be a Lambda function, a web service running on Amazon EC2, or any other publicly accessible web service
Once the backend has processed the request the API call metrics are logged in Amazon CloudWatch and the content is returned to the client
First understand what has driven the decision to build API Gateway, from customer feedback to wider strategic decisions and market forces
Next, look at how the service works, and helps customers with their API services
Finally, open it out for Q&A at the end
Key Takeaways
AWS Lambda + Amazon API Gateway means no infrastructure to manage – we scale for you
Security is important, and complex – make the most of AWS Identity and Access Management. Security is a priority, take advantage of Authentication (Cognito) and Authorization (IAM) integration with API Gateway.
Swagger import and client SDK – we can automate most workflows
API Gateway: Host the API and route API calls
AWS Lambda: Execute our app’s business logic
Amazon Cognito: Generate temporary AWS credentials
Amazon DynamoDB: Data store
It is not serverless, it is just that the application can use lots of servers, and I don’t need to manage a single one.
Authorization of API calls is delegated to AWS. We just need to focus on our IAM roles.
Deployment of the API is automated using Swagger.
API definition and Swagger
API Gateway offers an “abstraction” of API or Backend logic.
Interface for developers (like a FrontEnd). You can keep the FrontEnd while doing modifications/improvements to the backend logic.
Define and host APIs: Manage deployments to multiple versions and environments
Manage network traffic: We have learnt a lot about manage network traffic throughout the years. DDoS protection and request throttling to safeguard your back end. (Layer 7/App (Scaling) and Layer 3 (syn flood))
Leverage AWS Auth: Leverage Identity and Access Management to authorize access to your cloud resources. Convert your API as if it were an AWS Service!!!! (every API method receives an ARN)
Left side: Public-side vs Right side: Integration with backend.
Demo 0:
Show the User App
Start with the reset app, to create a new user
Then: login and Get pets)
Show the Cloudwatch logs, showing the /login and the /pets calls
Show the tables in DynamoDB
Left side: Public-side vs Right side: Integration with backend.
API Gateway handles resources as typed objects. Resources can have models associated with them.
Models are simply the JSON schema representation of the request and response data models
If the API Gateway is aware of the request and response models it can
Generate SDKs that include actual objects for each request and response rather than generic (JSON Object)
Allow JSON traversal of requests and responses in the data transformation engine
aws apigateway import-rest-api --body file://swagger.yaml
Map the API definition with the swagger file.
Show the swagger.yaml file.
- Show the credentials for auth and no-auth calls.
- Swagger normally defines only the user-facing details of an API
- We have extended it to also specify how the API processes a request and interacts with the backend
A single file allows you to create the entire API
http://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-swagger-extensions.html
x-amazon-apigateway-auth Object
x-amazon-apigateway-authorizer Object
x-amazon-apigateway-authtype Property
x-amazon-apigateway-integration Object
x-amazon-apigateway-integration.requestTemplates Object
x-amazon-apigateway-integration.requestParameters Object
x-amazon-apigateway-integration.responses Object
x-amazon-apigateway-integration.response Object
x-amazon-apigateway-integration.responseTemplates Object
x-amazon-apigateway-integration.responseParameters Object
We recommend to use some definition file (like Swagger), so you can ”own” the definition (create, document, version, etc) and the API Gateway is just the tool to implement the API.
API definitions live in our source repository with the rest of the app.
They can be used with other utilities in the Swagger toolset (for example, documentation generation).
API can be imported and deployed in our build script.
Request routing and exceptions
No Infrastructure to manage: Focus on business logic, not infrastructure. You upload code; AWS Lambda handles everything else.
High performance at any scale; Cost-effective and efficient: Pay only for what you use: Lambda automatically matches capacity to your request rate. Purchase compute in 100ms increments.
Bring Your Own Code: Run code in a choice of standard languages. Use threads, processes, files, and shell scripts normally.
Show the transformation in the APIGW console
Show the Java Code (lambdaHandler) – RequestRouter.java
Show the actions code
Demo 2:
Start the App.
List the pets
Show DynamoDB, CloudWatch
Demo 3:
Create a new pet
Show DynamoDB, CloudWatch
Demo 4:
Login with an existing user, using CURL
Show CloudWatch
Demo 5:
Login with a non-existing user, using CURL
Notice the message and the status code: 400
Show CloudWatch
Show the code:
RequestRouter.java (line 48)
LoginDemoAction.java (line 75)
exception/BadRequestException.java (line 20)
configuration/ExceptionMessages.java (line 19)
Show API Gateway (mapping integration response)
Mapping templates are a powerful tool
Talk about variables ($input (json path, body, json, params), $context, $util (encode, decode, parsing, escape), $stageVariables)
Allows natively to use Apache Velocity Template Language (VTL) – use $util and $input.path to obtain an object representation (to use VTL on top of).
http://amzn.to/1L1hSF5
http://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-mapping-template-reference.html
Cognito: Identity Management Service (not an authentication service)
Identity management: Manage authenticated and guest users across identity providers (by assigning a unique identifier for each identity)
Secure AWS access: Securely access AWS services from mobile devices and platforms
Data synchronization: Synchronize users’ data across devices and platforms via the cloud
Demo 1:
Create a user using CURL
Show Cognito, DynamoDB, CloudWatch
We’ll go through a use case that leverage AWS Lambda and Amazon Cognito to retrieve temporary credentials for a particular end user and authorize access to the APIs
As discussed before the API Gateway helps customers leverage AWS Sigv4 – only one open API is required and then we can verify signatures on all other calls.
Show the code for LoginDemoAction.java
- Explain UserIdentity and UserCredentials objects (lines 85 and 86)
- Look at the code in provider/CognitoCredentialsProvider (UserIdentity in line 103 and UserCredentials in line 61)
Demo 4. Login with an existing user (via CURL)
Demo 2:
Open the App in the simulator (to do a query on the whole pet list)
Show CloudWatch logs.
Demo 2a:
Inside the App, look for the info on one of the pets
Show CloudWatch logs
We’ll go through a use case that leverage AWS Lambda and Amazon Cognito to retrieve temporary credentials for a particular end user and authorize access to the APIs
As discussed before the API Gateway helps customers leverage AWS Sigv4 – only one open API is required and then we can verify signatures on all other calls.
We’ll go through a use case that leverage AWS Lambda and Amazon Cognito to retrieve temporary credentials for a particular end user and authorize access to the APIs
As discussed before the API Gateway helps customers leverage AWS Sigv4 – only one open API is required and then we can verify signatures on all other calls.
See:
http://docs.aws.amazon.com/cognito/latest/developerguide/iam-roles.html
Not-related sample of a FGAC policy (just to compare):
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Stmt1461416614573",
"Action": [ "dynamodb:DeleteItem" ],
"Effect": "Allow",
"Resource": "*",
"Condition": {
"StringEquals": { "dynamodb:LeadingKeys": "pet123”
}
}
}
]
}
API Gateway can generate client SDKs based on a customer’s API definition.
Simply select the deployment the SDK should target, the platform, and setup a couple of parameters and the API Gateway generates an SDK and makes it available to download through an API or the management console
SDK are model-aware and also come with the built-in AWS core that allows them to handle throttling responses and sign requests using AWS Credentials
Show APIGSessionCredentialsProvider.m (line 58)
Developer just needs to provide username + password, and the method will return the credentials
The method lazily load the credentials (the SDK just call the method when there is no valid stored credentials)
Show the code: AppDelegate.m (line 78)
The generated client SDK knows how to:
Sign API calls using AWS signature version 4
Handle-throttled responses with exponential back-off
Marshal and unmarshal requests and responses to model objects
First understand what has driven the decision to build API Gateway, from customer feedback to wider strategic decisions and market forces
Next, look at how the service works, and helps customers with their API services
Finally, open it out for Q&A at the end
Key Takeaways
AWS Lambda + Amazon API Gateway means no infrastructure to manage – we scale for you
Security is important, and complex – make the most of AWS Identity and Access Management. Security is a priority, take advantage of Authentication (Cognito) and Authorization (IAM) integration with API Gateway.
Swagger import and client SDK – we can automate most workflows