background preloader

Tombeeler

Facebook Twitter

tom beeler

Summer Term CNT3014

Jeanne Ross of MIT CISR on Enterprise Architecture. School. AWS Essentials Student Guide Version 2.5. AWS Products and Services - Global Compute, Storage, Database, Analytics, Mobile, Application, and Deployment Services. Amazon Web Services offers a broad set of global compute, storage, database, analytics, application, and deployment services that help organizations move faster, lower IT costs, and scale applications.

AWS Products and Services - Global Compute, Storage, Database, Analytics, Mobile, Application, and Deployment Services

These services are trusted by the largest enterprises and the hottest start-ups to power a wide variety of workloads including: web and mobile applications, data processing and warehousing, storage, archive, and many others. Amazon Web Services provides a variety of cloud-based computing services including a wide selection of compute instances which can scale up and down automatically to meet the needs of your application, a managed load balancing service as well as fully managed desktops in the cloud. Sign up with Amazon Web Services and receive 12 months of access to the AWS Free Usage Tier and enjoy AWS Basic Support features including, 24x7x365 customer service, support forums, and more.

Amazon EC2 provides resizable compute capacity in the cloud. Learn more » See pricing details » Amazon Web Services Sign In. Videos. An introduction to the concepts of Enterprise Architecture. Webinar: TOGAF & Major IT Frameworks (ITIL, COBIT, PRINCE2). What is ITIL? An example of a successful proof of concept - ETL Solutions. In software development, a proof of concept can be a vital tool to demonstrate the software’s capabilities and its fit with the client’s requirements.

An example of a successful proof of concept - ETL Solutions

But how do you go about creating one? A recent example from our data integration work in the Oil & Gas industry illustrates the steps we take to create a successful proof of concept. You may also be interested in: How to create a successful proof of concept. Step 1: Defining the client’s requirements Our clients’ needs can range from testing the suitability of the proposed software to sharing knowledge within the client’s organisation. In our example, there were two types of files - LAS and DLIS – to migrate in the context of the PPDM and WITSML industry standards. A List of Security Tools for Staying Safe in the Cloud. Customer access points, also called API endpoints, allow secure HTTP access (HTTPS) so that you can establish secure communication sessions with your AWS services using SSL/TLS.

A List of Security Tools for Staying Safe in the Cloud

You can control how accessible your Amazon EC2 instances are by configuring built-in firewall rules – from totally public to completely private, or somewhere in between. And when your instances reside within a Virtual Private Cloud (VPC) subnet, you can control egress as well as ingress. The AWS Virtual Private Cloud (VPC) service allows you to add another layer of network security to your instances by creating private subnets and even adding an IPsec VPN tunnel between your home network and your AWS VPC. All AWS services provide HTTPS endpoints to support SSL/TLS encryption, but the Elastic Load Balancing service also provides SSL/TLS support for connections between clients and the load balancer and between the load balancer and your back-end instances.

Networking Best Practices for Large Deployments. Simple Storage Service (S3) - Online Cloud Storage for Data & Files. Tips for Securing Your EC2 Instance. Just like any host on the Internet, your EC2 instances can be vulnerable to attack.

Tips for Securing Your EC2 Instance

While the EC2 firewall is a very powerful tool for securing your instance from unwanted network traffic, if configured incorrectly, you may inadvertently leave your instance vulnerable to attack. The three most important things you can do to mitigate potential risks to your instances are: Lock down ports to prevent unauthorized access Ditch passwords and require administrators to use SSH keys Keep up to date with software patches This article is not intended to be an exhaustive EC2 security guide, nor are there any implicit or explicit guarantees that these steps will ensure absolute system security, but it's a good place to start. The basic mechanism for controlling network access to your EC2 instance is the Security Group, which acts like a built-in software firewall for your instance.

Security Groups can be used to secure ports over TCP, UDP, and ICMP protocols. Implementing IBM Software Defined Network for Virtual Environments. Ask. Answer. Explore. Whenever. AWS Best Practice. Cisco/Juniper Commands. Google. What is a Software Defined Network. Designing Your Cloud Infrastructure. Many network architectures include a tiered design with three or more tiers such as core, distribution, and access.

Designing Your Cloud Infrastructure

Designs are driven by the port bandwidth and quantity required at the edge, in addition to the ability of the distribution and core tiers to provide higher speed uplinks to aggregate traffic. Additional considerations include Ethernet broadcast boundaries and limitations, spanning tree or other loop-avoidance technologies. TechNet Windows Server 2012 IaaS Build Tables: Step-by-Step with PowerShell Examples.

A New Approach to Amazon EC2 Networking. You’ve been able to use the Amazon Virtual Private Cloud to construct a secure bridge between your existing IT infrastructure and the AWS cloud using an encrypted VPN connection.

A New Approach to Amazon EC2 Networking

All communication between Amazon EC2 instances running within a particular VPC and the outside world (the Internet) was routed across the VPN connection. Today we are releasing a set of features that expand the power and value of the Virtual Private Cloud. You can think of this new collection of features as virtual networking for Amazon EC2. While I would hate to be innocently accused of hyperbole, I do think that today’s release legitimately qualifies as massive, one that may very well change the way that you think about EC2 and how it can be put to use in your environment. The features include: CNT 3014. CompuCom. 911 Surf Report.