This document discusses securing data in serverless applications and messaging services. It covers authentication using IAM users, roles and groups. It also covers authorization using identity-based and resource-based policies. Additionally, it discusses encrypting messages in transit using HTTPS and at rest using server-side encryption with AWS KMS customer master keys and data encryption keys. It provides examples of policies for Amazon SNS topics, SQS queues and KMS customer master keys.
Protecting Amazon EC2 Instances, Relational Databases, and NoSQL Workloads (S...Amazon Web Services
For many IT professionals, cloud data protection can be challenging. In this session, we explore options for protecting and restoring your Amazon EC2 instances, relational databases, and NoSQL databases, such as MongoDB and Cassandra. We show you how solutions such as Rubrik Cloud Data Management and Rubrik Datos IO augment your Amazon EC2 backup strategy, including lifecycle management of Amazon EBS snapshots and Amazon Machine Images (AMI), automation and simplification of Amazon EBS volume and file-level restores from Amazon EBS snapshots, and application-consistent backup and recovery for Oracle, Microsoft SQL Server, MongoDB, and Cassandra databases on Amazon EC2. This session is brought to you by AWS partner, Rubrik.
Unleash the Power of Temporary AWS Credentials (a.k.a. IAM roles) (SEC390-R1)...Amazon Web Services
The document discusses AWS Identity and Access Management (IAM) roles, which allow granting temporary security credentials to users, applications, and AWS services. IAM roles provide a secure way to delegate access and are easy to manage. The presentation covers when and how to use IAM roles, including for cross-account access, granting least privilege access, and enabling AWS services to access resources. It also provides examples of using IAM roles for EC2 instances and with AWS Secrets Manager.
[REPEAT 1] Managing Identity Management, Authentication, & Authorization for ...Amazon Web Services
Build a serverless microservices application demonstrating end-to-end authentication and authorization through the use of Amazon Cognito, Amazon API Gateway, AWS Lambda, and all-things AWS Identity and Access Management (IAM). You will build an end-to-end functional app with a secure identity provider showcasing user authentication patterns.
The document discusses Amazon Neptune, a fully managed graph database service. It provides examples of how Neptune can be used to query highly connected data through property graphs and RDF models. It also summarizes the key capabilities of Neptune such as its support for popular graph query languages like Gremlin and SPARQL and how Neptune can be used alongside machine learning. Finally, it provides a preview of Neptune's general availability planned for 2018 across multiple AWS regions.
Optimizing Costs as You Scale on AWS (ENT302) - AWS re:Invent 2018Amazon Web Services
The cloud offers a first-in-a-career opportunity to constantly optimize your costs as you grow and stay on the leading edge of innovation. By developing a cost-conscious culture and assigning the responsibility for efficiency to the appropriate business owners, you can deliver innovation efficiently and cost effectively. In this session, we share The Vanguard Group’s real-world experience of optimizing their costs, and we review a wide range of cost planning, monitoring, and optimization strategies.
Deep Dive on Amazon S3 Storage Classes: Creating Cost Efficiencies across You...Amazon Web Services
"Amazon S3 supports a range of storage classes that can help you cost-effectively store data without impacting performance or availability. Each of our storage classes offer different data-access levels, retrieval times, and costs to support various use cases. In this session, Amazon S3 experts dive deep into the different Amazon S3 storage classes, their respective attributes, and when you should use them.
"
With Alexa for Business, you can deploy and manage Alexa devices in your organization. Join us in this session to learn how you can set up an Alexa-enabled conference room and integrate Alexa with your existing equipment. Learn to build Alexa skills, and voice-enable applications such as SalesForce, ServiceNow and Trello. Discover how to build private skills for your organization and deploy them to Alexa devices and users in your workplace. Come and experience Alexa for Business in action, and get some great ideas for transforming your business.
A Chronicle of Airbnb Architecture Evolution (ARC407) - AWS re:Invent 2018Amazon Web Services
Airbnb is going through tremendous growth internationally, evolving from a home sharing company to a global travel community with many product offerings. The growth driven by the business, increase in traffic, and aggressive hiring created a new challenge for the Production Infrastructure Team. The team has grown from a small team of 10 to a production platform organization with 100 engineers that builds foundational services that support homes, experiences, luxury, and China. We shifted our priority and focus to move away from putting out fires to building a platform that can grow with the company. In this session, we chronicle Airbnb’s architectural evolution that aligns with organizational growth strategy, and review how we overcame different architectural challenges leveraging AWS technologies.
Protecting Amazon EC2 Instances, Relational Databases, and NoSQL Workloads (S...Amazon Web Services
For many IT professionals, cloud data protection can be challenging. In this session, we explore options for protecting and restoring your Amazon EC2 instances, relational databases, and NoSQL databases, such as MongoDB and Cassandra. We show you how solutions such as Rubrik Cloud Data Management and Rubrik Datos IO augment your Amazon EC2 backup strategy, including lifecycle management of Amazon EBS snapshots and Amazon Machine Images (AMI), automation and simplification of Amazon EBS volume and file-level restores from Amazon EBS snapshots, and application-consistent backup and recovery for Oracle, Microsoft SQL Server, MongoDB, and Cassandra databases on Amazon EC2. This session is brought to you by AWS partner, Rubrik.
Unleash the Power of Temporary AWS Credentials (a.k.a. IAM roles) (SEC390-R1)...Amazon Web Services
The document discusses AWS Identity and Access Management (IAM) roles, which allow granting temporary security credentials to users, applications, and AWS services. IAM roles provide a secure way to delegate access and are easy to manage. The presentation covers when and how to use IAM roles, including for cross-account access, granting least privilege access, and enabling AWS services to access resources. It also provides examples of using IAM roles for EC2 instances and with AWS Secrets Manager.
[REPEAT 1] Managing Identity Management, Authentication, & Authorization for ...Amazon Web Services
Build a serverless microservices application demonstrating end-to-end authentication and authorization through the use of Amazon Cognito, Amazon API Gateway, AWS Lambda, and all-things AWS Identity and Access Management (IAM). You will build an end-to-end functional app with a secure identity provider showcasing user authentication patterns.
The document discusses Amazon Neptune, a fully managed graph database service. It provides examples of how Neptune can be used to query highly connected data through property graphs and RDF models. It also summarizes the key capabilities of Neptune such as its support for popular graph query languages like Gremlin and SPARQL and how Neptune can be used alongside machine learning. Finally, it provides a preview of Neptune's general availability planned for 2018 across multiple AWS regions.
Optimizing Costs as You Scale on AWS (ENT302) - AWS re:Invent 2018Amazon Web Services
The cloud offers a first-in-a-career opportunity to constantly optimize your costs as you grow and stay on the leading edge of innovation. By developing a cost-conscious culture and assigning the responsibility for efficiency to the appropriate business owners, you can deliver innovation efficiently and cost effectively. In this session, we share The Vanguard Group’s real-world experience of optimizing their costs, and we review a wide range of cost planning, monitoring, and optimization strategies.
Deep Dive on Amazon S3 Storage Classes: Creating Cost Efficiencies across You...Amazon Web Services
"Amazon S3 supports a range of storage classes that can help you cost-effectively store data without impacting performance or availability. Each of our storage classes offer different data-access levels, retrieval times, and costs to support various use cases. In this session, Amazon S3 experts dive deep into the different Amazon S3 storage classes, their respective attributes, and when you should use them.
"
With Alexa for Business, you can deploy and manage Alexa devices in your organization. Join us in this session to learn how you can set up an Alexa-enabled conference room and integrate Alexa with your existing equipment. Learn to build Alexa skills, and voice-enable applications such as SalesForce, ServiceNow and Trello. Discover how to build private skills for your organization and deploy them to Alexa devices and users in your workplace. Come and experience Alexa for Business in action, and get some great ideas for transforming your business.
A Chronicle of Airbnb Architecture Evolution (ARC407) - AWS re:Invent 2018Amazon Web Services
Airbnb is going through tremendous growth internationally, evolving from a home sharing company to a global travel community with many product offerings. The growth driven by the business, increase in traffic, and aggressive hiring created a new challenge for the Production Infrastructure Team. The team has grown from a small team of 10 to a production platform organization with 100 engineers that builds foundational services that support homes, experiences, luxury, and China. We shifted our priority and focus to move away from putting out fires to building a platform that can grow with the company. In this session, we chronicle Airbnb’s architectural evolution that aligns with organizational growth strategy, and review how we overcame different architectural challenges leveraging AWS technologies.
MassMutual Goes Cloud First with Hybrid Cloud on AWS (ENT210) - AWS re:Invent...Amazon Web Services
In this session, we discuss how MassMutual adopts a cloud-first strategy, and we outline their journey to hybrid cloud on AWS. Specifically, we cover four aspects of MassMutual's hybrid cloud on AWS architecture: First, we talk about the use of the AWS Well-Architected Framework to create MassMutual’s cloud minimal viable product (MVP) document. Next, we do a deep dive into MassMutual's multi-account, multi-region architecture. We discuss achieving cloud governance, risk, and compliance through tooling and automation. Finally, we demonstrate how MassMutual deploys fully compliant hybrid cloud environments in less than five minutes. We also showcase some of MassMutual's actual hybrid deployments and share the benefits of using AWS.
Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018Amazon Web Services
Organizations that use data as a competitive differentiator are more likely to lead and outperform their peers. Many organizations have transformed their data architectures and adopted the cloud to meet a variety of scalability and automation challenges. In this session, we develop a blueprint for data flows from data sources to data lakes, data warehousing, advanced analytics, and machine learning (ML). We look at the big picture, understand how to build data pipelines and repositories for different use cases, and enable data science at enterprise scale in a way that unleashes the value of corporate data, and embeds AI/ML in business processes.
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Boaz Ziniman
Understand the values your organization can get from the cloud is the first step in your cloud transformation journey.
We will share best practices for getting started with Cloud Computing and not only from the technical perspective (culture change and gains, building teams, business case, project selection and more). Join us for this session and Let's Start your Cloud journey.
Architecture Patterns of Serverless Microservices (ARC304-R1) - AWS re:Invent...Amazon Web Services
This document outlines an agenda for a presentation on architecture patterns of serverless microservices. The presentation will cover serverless foundations, characteristics of microservices, and how to implement serverless microservices architectures using AWS services like Lambda and API Gateway. It will also discuss persistence and state management, service orchestration, auto scaling, logging and monitoring, and security models for serverless microservices. Related breakout sessions at the conference on serverless topics are also listed.
Don’t Let SFTP Weigh Down Your Migration to the Cloud (STG381-R1) - AWS re:In...Amazon Web Services
SFTP is a file exchange protocol that is deeply embedded in many enterprise applications across industries. If you've read this far, you likely already know that and are trying to figure out how you can (more) effectively run SFTP services in front of Amazon S3, potentially so you can migrate a key application to AWS. But you can't change your applications or break your client authentication schemes. Attend this session to learn an architecture and best practices with AWS-based tools that can simplify shifting (or improving) SFTP services to the cloud.
In this session, Tim Wagner, general manager of AWS Lambda and API Gateway, explores how developers can design, develop, deliver, and monitor cloud applications as they take advantage of the AWS serverless platform and developer toolset. He shares technical insights that developers can use to optimize their workflows and their use of cloud resources, which, in turn, can improve security, scalability, and availability. He also discusses common serverless patterns used by enterprises, and he dives into the operational and security features used by large and mature organizations. You will also hear from a Principal Architect of T-Mobile who will discuss how T-Mobile is driving adoption of serverless within the company.
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Amazon Web Services
How can you ensure your environment is Secure? How can you implement an effective governance model in your organization? The AWS Cloud Adoption Framework (CAF) and its Security Perspective provide a structured approach to make risk based decisions, build security guardrails and meet your compliance goals as you migrate to AWS. The Security perspective of the CAF provides a set of 5 core themes designed to help you structure your selection and implementation of controls that are right for your business: IAM, Detective Controls, Infrastructure Security, Data Protection and Incident response. In this session you will learn what it takes to lead a Secure Cloud Journey for your organization and make key strategic decisions.
Enhancing Media Workflows with Machine Learning (MAE303) - AWS re:Invent 2018Amazon Web Services
AI/ML is changing the way media companies produce and distribute content. In this workshop, we review many of the ways AI/ML can be applied throughout the entire media production and distribution process. We build an end-to-end metadata enrichment workflow that extracts meaningful metadata from content (audio, video, and images). We then build a solution that uses Amazon Rekognition, Amazon SageMaker, Amazon Transcribe, Amazon Comprehend, and Amazon Mechanical Turk to analyze content, and we use it to enrich a viewing experience and assist with compliance. We also build and train a custom object detection model, which will be used to augment the data that Amazon Rekognition provides. We cover all aspects of AI/ML-based metadata generation, from labeling a dataset, to training and hosting a model, all the way to validating the metadata prior to playout.
In this session, learn from market-leader Vonage how and why they re-architected their QoS-sensitive, highly available and highly performant legacy real-time communications systems to take advantage of Amazon EC2, Enhanced Networking, Amazon S3, ASG, Amazon RDS, Amazon ElastiCache, AWS Lambda, StepFunctions, Amazon SNS, Amazon SQS, Amazon Kinesis, Amazon EFS, and more. We also learn how Aspect, a multinational leader in call center solutions, used AWS Lambda, Amazon API Gateway, Amazon Kinesis, Amazon ElastiCache, Amazon Cognito, and Application Load Balancer with open-source API development tooling from Swagger, to build a comprehensive, microservices-based solution. Vonage and Aspect share their journey to TCO optimization, global outreach, and agility with best practices and insights.
How Rovio Uses ML to Acquire, Retain, and Monetize Users (GAM304) - AWS re:In...Amazon Web Services
Understanding gamer behavior is critical in acquiring, retaining, and monetizing users effectively. The cycle requires constant fine-tuning through expensive and complex live operations to offer fresh, fun, and challenging experiences. In this session, learn how Rovio uses machine learning (ML) to make this process faster, more efficient, and more accurate. Learn how to leverage AWS compute, analytics, and database services, such as Amazon S3, Amazon EC2, Amazon EMR, Amazon Athena, Amazon DynamoDB, and Amazon Redshift, to build an ML workflow that predicts the future interests and behaviors of gamers to better serve your needs and theirs.
Five New Security Automations Using AWS Security Services & Open Source (SEC4...Amazon Web Services
The document discusses five new security automation projects using AWS security services and open source tools. It describes a notification hub that centrally manages alerts across accounts, a Lambda function that validates the existence and code of incident response functions in other accounts, a tool that enables and manages GuardDuty across multiple accounts and aggregates findings, an open source security monitoring platform called MozDef, and a key remediation program. Lessons learned around automation and open source adoption are also discussed.
How Verizon is Accelerating Cloud Adoption and Migration with the AWS Service...Amazon Web Services
Many enterprises want to drive faster cloud adoption and time to market (TTM) by allowing their developers, who have various skill sets, to onboard onto AWS quickly using self-service. However, enabling security, governance, and compliance while not compromising user experience can be a challenge. In this session, Verizon demonstrates how they use the AWS Service Catalog Connector for ServiceNow to create a robust self-service computing environment while meeting Verizon’s governance and security controls and achieving their goal of migrating > 30% of their applications onto AWS in a short timeframe.
Instrumenting Kubernetes for Observability Using AWS X-Ray and Amazon CloudWa...Amazon Web Services
In this hands-on workshop, we walk you through instrumenting container workloads running on the Amazon Elastic Container Service for Kubernetes (Amazon EKS). Learn how Amazon CloudWatch and the new AWS X-Ray capabilities enable you to quickly understand problem areas in your application and determine customer impact. To participate in this workshop, bring your laptop and have a nonproduction AWS account.
Build a Searchable Media Library & Moderate Content at Scale Using Machine Le...Amazon Web Services
Companies have to process, analyze, and extract meaning from ever-growing volumes of audio, image, and video data. Automating media workflows, such as image and video indexing or manual transcription for closed captions, can help you scale the growth of your media library and save time from manual, error-prone work. In this workshop, you learn how to automate workflows using the Media Analysis Solution, which includes Amazon Rekognition, Amazon Transcribe, and Amazon Comprehend. You learn how to extract metadata from media files and create a searchable library of metadata.
Build a Voice-Based Chatbot for Your Amazon Connect Contact Center (BAP401-R1...Amazon Web Services
Learn how easy it is to incorporate a voice-based Amazon Lex chatbot into your Amazon Connect contact center. In this workshop, we walk you through configuring your own Amazon Connect contact center, implementing a chatbot, and using it in your workflows to deliver a personalized voice-based caller experience. You also have the opportunity to further personalize caller experiences by using AWS Lambda to access caller information from your customer data system. Leave this workshop with a functioning Amazon Connect contact center and a voice-enabled chatbot that you can continually modify to your business needs. Come prepared to build by bringing your laptop and a phone to make test calls.
Improve Accessibility Using Machine Learning (AIM332) - AWS re:Invent 2018Amazon Web Services
Machine learning (ML) can help people with disabilities by using facial and object recognition, text-to-speech, automatic translation, and transcription to create assistive applications. In this chalk talk, learn how to assemble ML APIs from AWS to help people in new ways.
Stephen Schmidt, Chief Information Security Officer at AWS, addresses the current state of security in the cloud, with a particular focus on feature updates, the AWS internal "secret sauce," and what's on horizon in terms of security, identity, and compliance tooling.
Build the Next-Gen Meeting Room Experience Using Alexa for Business (BAP303-R...Amazon Web Services
Alexa for Business brings a conversational UI to help you simplify your meeting room experience. In this session, learn how you can bring Alexa for Business to your meeting room and integrate it with your existing meeting room systems. In addition, the Amazon IT team discusses best practices, and they describe how they piloted and deployed Alexa for Business in over 800 conference rooms at Amazon.
Leadership Session: Learn about 10 Years' of Windows and .NET Innovation on A...Amazon Web Services
Join this Leadership Session to learn about AWS’s strategy, the latest features, and best practices from customers on how to run Microsoft workloads like Windows, SQL Server, Active Directory, and .NET applications on AWS. Sandy Carter, Vice President for Enterprise Applications, discusses the evolution of AWS as the leading platform for hosting business-critical applications, and dispels the myths around running Microsoft workloads on AWS using real customer examples. In this session, we showcase how many organizations are benefitting by running Windows on AWS, from migrating legacy applications helping lower TCO, to building new innovative solutions to drive growth, in areas such as Machine Learning, Containers, and Serverless. Sandy shares the company’s vision for continuing to innovate in this space to make AWS the premier place for customers to run Microsoft workloads in the cloud.
Personalized Ad Targeting Using Real-Time, Content-Aware Machine Learning (CT...Amazon Web Services
Today, we can harness the power of machine learning services, such as Amazon Rekognition, Amazon Translate, and Amazon SageMaker, to automatically extract detailed information in the form of metadata to describe video content. Previously, creating the metadata for user-generated and professional video content was performed manually, which was both time-consuming and expensive. With Amazon Machine Learning, this metadata can be automatically generated and combined with viewers’ self-identified interests to create personalized advertising within video streams. This session features a demo of a camera matching objects in real time and a machine learning application suggesting relevant advertisements.
Discuss How to Secure Your Virtual Data Center in the Cloud (NET210-R1) - AWS...Amazon Web Services
In this introductory chalk talk, we cover how to secure your resources in the cloud for common AWS workloads such as Amazon EC2 computing, database, and serverless. We cover security best practices recommended by AWS for each workload using simple and effective identity and networking techniques. Learn how and why these controls do what they do, and come away with the ability to interpret and apply AWS identity and network access controls.
In this webinar, you'll learn how to create security workspaces for multiple teams through your AWS account. Discover how IAM works and find out how it integrates with AWS services. In addition, learn how AWS Config rules and AWS Cloud Trial can help you identify and rectify misconfiguration issues quickly and effectively.
MassMutual Goes Cloud First with Hybrid Cloud on AWS (ENT210) - AWS re:Invent...Amazon Web Services
In this session, we discuss how MassMutual adopts a cloud-first strategy, and we outline their journey to hybrid cloud on AWS. Specifically, we cover four aspects of MassMutual's hybrid cloud on AWS architecture: First, we talk about the use of the AWS Well-Architected Framework to create MassMutual’s cloud minimal viable product (MVP) document. Next, we do a deep dive into MassMutual's multi-account, multi-region architecture. We discuss achieving cloud governance, risk, and compliance through tooling and automation. Finally, we demonstrate how MassMutual deploys fully compliant hybrid cloud environments in less than five minutes. We also showcase some of MassMutual's actual hybrid deployments and share the benefits of using AWS.
Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018Amazon Web Services
Organizations that use data as a competitive differentiator are more likely to lead and outperform their peers. Many organizations have transformed their data architectures and adopted the cloud to meet a variety of scalability and automation challenges. In this session, we develop a blueprint for data flows from data sources to data lakes, data warehousing, advanced analytics, and machine learning (ML). We look at the big picture, understand how to build data pipelines and repositories for different use cases, and enable data science at enterprise scale in a way that unleashes the value of corporate data, and embeds AI/ML in business processes.
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Boaz Ziniman
Understand the values your organization can get from the cloud is the first step in your cloud transformation journey.
We will share best practices for getting started with Cloud Computing and not only from the technical perspective (culture change and gains, building teams, business case, project selection and more). Join us for this session and Let's Start your Cloud journey.
Architecture Patterns of Serverless Microservices (ARC304-R1) - AWS re:Invent...Amazon Web Services
This document outlines an agenda for a presentation on architecture patterns of serverless microservices. The presentation will cover serverless foundations, characteristics of microservices, and how to implement serverless microservices architectures using AWS services like Lambda and API Gateway. It will also discuss persistence and state management, service orchestration, auto scaling, logging and monitoring, and security models for serverless microservices. Related breakout sessions at the conference on serverless topics are also listed.
Don’t Let SFTP Weigh Down Your Migration to the Cloud (STG381-R1) - AWS re:In...Amazon Web Services
SFTP is a file exchange protocol that is deeply embedded in many enterprise applications across industries. If you've read this far, you likely already know that and are trying to figure out how you can (more) effectively run SFTP services in front of Amazon S3, potentially so you can migrate a key application to AWS. But you can't change your applications or break your client authentication schemes. Attend this session to learn an architecture and best practices with AWS-based tools that can simplify shifting (or improving) SFTP services to the cloud.
In this session, Tim Wagner, general manager of AWS Lambda and API Gateway, explores how developers can design, develop, deliver, and monitor cloud applications as they take advantage of the AWS serverless platform and developer toolset. He shares technical insights that developers can use to optimize their workflows and their use of cloud resources, which, in turn, can improve security, scalability, and availability. He also discusses common serverless patterns used by enterprises, and he dives into the operational and security features used by large and mature organizations. You will also hear from a Principal Architect of T-Mobile who will discuss how T-Mobile is driving adoption of serverless within the company.
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Amazon Web Services
How can you ensure your environment is Secure? How can you implement an effective governance model in your organization? The AWS Cloud Adoption Framework (CAF) and its Security Perspective provide a structured approach to make risk based decisions, build security guardrails and meet your compliance goals as you migrate to AWS. The Security perspective of the CAF provides a set of 5 core themes designed to help you structure your selection and implementation of controls that are right for your business: IAM, Detective Controls, Infrastructure Security, Data Protection and Incident response. In this session you will learn what it takes to lead a Secure Cloud Journey for your organization and make key strategic decisions.
Enhancing Media Workflows with Machine Learning (MAE303) - AWS re:Invent 2018Amazon Web Services
AI/ML is changing the way media companies produce and distribute content. In this workshop, we review many of the ways AI/ML can be applied throughout the entire media production and distribution process. We build an end-to-end metadata enrichment workflow that extracts meaningful metadata from content (audio, video, and images). We then build a solution that uses Amazon Rekognition, Amazon SageMaker, Amazon Transcribe, Amazon Comprehend, and Amazon Mechanical Turk to analyze content, and we use it to enrich a viewing experience and assist with compliance. We also build and train a custom object detection model, which will be used to augment the data that Amazon Rekognition provides. We cover all aspects of AI/ML-based metadata generation, from labeling a dataset, to training and hosting a model, all the way to validating the metadata prior to playout.
In this session, learn from market-leader Vonage how and why they re-architected their QoS-sensitive, highly available and highly performant legacy real-time communications systems to take advantage of Amazon EC2, Enhanced Networking, Amazon S3, ASG, Amazon RDS, Amazon ElastiCache, AWS Lambda, StepFunctions, Amazon SNS, Amazon SQS, Amazon Kinesis, Amazon EFS, and more. We also learn how Aspect, a multinational leader in call center solutions, used AWS Lambda, Amazon API Gateway, Amazon Kinesis, Amazon ElastiCache, Amazon Cognito, and Application Load Balancer with open-source API development tooling from Swagger, to build a comprehensive, microservices-based solution. Vonage and Aspect share their journey to TCO optimization, global outreach, and agility with best practices and insights.
How Rovio Uses ML to Acquire, Retain, and Monetize Users (GAM304) - AWS re:In...Amazon Web Services
Understanding gamer behavior is critical in acquiring, retaining, and monetizing users effectively. The cycle requires constant fine-tuning through expensive and complex live operations to offer fresh, fun, and challenging experiences. In this session, learn how Rovio uses machine learning (ML) to make this process faster, more efficient, and more accurate. Learn how to leverage AWS compute, analytics, and database services, such as Amazon S3, Amazon EC2, Amazon EMR, Amazon Athena, Amazon DynamoDB, and Amazon Redshift, to build an ML workflow that predicts the future interests and behaviors of gamers to better serve your needs and theirs.
Five New Security Automations Using AWS Security Services & Open Source (SEC4...Amazon Web Services
The document discusses five new security automation projects using AWS security services and open source tools. It describes a notification hub that centrally manages alerts across accounts, a Lambda function that validates the existence and code of incident response functions in other accounts, a tool that enables and manages GuardDuty across multiple accounts and aggregates findings, an open source security monitoring platform called MozDef, and a key remediation program. Lessons learned around automation and open source adoption are also discussed.
How Verizon is Accelerating Cloud Adoption and Migration with the AWS Service...Amazon Web Services
Many enterprises want to drive faster cloud adoption and time to market (TTM) by allowing their developers, who have various skill sets, to onboard onto AWS quickly using self-service. However, enabling security, governance, and compliance while not compromising user experience can be a challenge. In this session, Verizon demonstrates how they use the AWS Service Catalog Connector for ServiceNow to create a robust self-service computing environment while meeting Verizon’s governance and security controls and achieving their goal of migrating > 30% of their applications onto AWS in a short timeframe.
Instrumenting Kubernetes for Observability Using AWS X-Ray and Amazon CloudWa...Amazon Web Services
In this hands-on workshop, we walk you through instrumenting container workloads running on the Amazon Elastic Container Service for Kubernetes (Amazon EKS). Learn how Amazon CloudWatch and the new AWS X-Ray capabilities enable you to quickly understand problem areas in your application and determine customer impact. To participate in this workshop, bring your laptop and have a nonproduction AWS account.
Build a Searchable Media Library & Moderate Content at Scale Using Machine Le...Amazon Web Services
Companies have to process, analyze, and extract meaning from ever-growing volumes of audio, image, and video data. Automating media workflows, such as image and video indexing or manual transcription for closed captions, can help you scale the growth of your media library and save time from manual, error-prone work. In this workshop, you learn how to automate workflows using the Media Analysis Solution, which includes Amazon Rekognition, Amazon Transcribe, and Amazon Comprehend. You learn how to extract metadata from media files and create a searchable library of metadata.
Build a Voice-Based Chatbot for Your Amazon Connect Contact Center (BAP401-R1...Amazon Web Services
Learn how easy it is to incorporate a voice-based Amazon Lex chatbot into your Amazon Connect contact center. In this workshop, we walk you through configuring your own Amazon Connect contact center, implementing a chatbot, and using it in your workflows to deliver a personalized voice-based caller experience. You also have the opportunity to further personalize caller experiences by using AWS Lambda to access caller information from your customer data system. Leave this workshop with a functioning Amazon Connect contact center and a voice-enabled chatbot that you can continually modify to your business needs. Come prepared to build by bringing your laptop and a phone to make test calls.
Improve Accessibility Using Machine Learning (AIM332) - AWS re:Invent 2018Amazon Web Services
Machine learning (ML) can help people with disabilities by using facial and object recognition, text-to-speech, automatic translation, and transcription to create assistive applications. In this chalk talk, learn how to assemble ML APIs from AWS to help people in new ways.
Stephen Schmidt, Chief Information Security Officer at AWS, addresses the current state of security in the cloud, with a particular focus on feature updates, the AWS internal "secret sauce," and what's on horizon in terms of security, identity, and compliance tooling.
Build the Next-Gen Meeting Room Experience Using Alexa for Business (BAP303-R...Amazon Web Services
Alexa for Business brings a conversational UI to help you simplify your meeting room experience. In this session, learn how you can bring Alexa for Business to your meeting room and integrate it with your existing meeting room systems. In addition, the Amazon IT team discusses best practices, and they describe how they piloted and deployed Alexa for Business in over 800 conference rooms at Amazon.
Leadership Session: Learn about 10 Years' of Windows and .NET Innovation on A...Amazon Web Services
Join this Leadership Session to learn about AWS’s strategy, the latest features, and best practices from customers on how to run Microsoft workloads like Windows, SQL Server, Active Directory, and .NET applications on AWS. Sandy Carter, Vice President for Enterprise Applications, discusses the evolution of AWS as the leading platform for hosting business-critical applications, and dispels the myths around running Microsoft workloads on AWS using real customer examples. In this session, we showcase how many organizations are benefitting by running Windows on AWS, from migrating legacy applications helping lower TCO, to building new innovative solutions to drive growth, in areas such as Machine Learning, Containers, and Serverless. Sandy shares the company’s vision for continuing to innovate in this space to make AWS the premier place for customers to run Microsoft workloads in the cloud.
Personalized Ad Targeting Using Real-Time, Content-Aware Machine Learning (CT...Amazon Web Services
Today, we can harness the power of machine learning services, such as Amazon Rekognition, Amazon Translate, and Amazon SageMaker, to automatically extract detailed information in the form of metadata to describe video content. Previously, creating the metadata for user-generated and professional video content was performed manually, which was both time-consuming and expensive. With Amazon Machine Learning, this metadata can be automatically generated and combined with viewers’ self-identified interests to create personalized advertising within video streams. This session features a demo of a camera matching objects in real time and a machine learning application suggesting relevant advertisements.
Discuss How to Secure Your Virtual Data Center in the Cloud (NET210-R1) - AWS...Amazon Web Services
In this introductory chalk talk, we cover how to secure your resources in the cloud for common AWS workloads such as Amazon EC2 computing, database, and serverless. We cover security best practices recommended by AWS for each workload using simple and effective identity and networking techniques. Learn how and why these controls do what they do, and come away with the ability to interpret and apply AWS identity and network access controls.
In this webinar, you'll learn how to create security workspaces for multiple teams through your AWS account. Discover how IAM works and find out how it integrates with AWS services. In addition, learn how AWS Config rules and AWS Cloud Trial can help you identify and rectify misconfiguration issues quickly and effectively.
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...Amazon Web Services
Enterprises increasingly segregate workloads (or teams) into multiple AWS accounts as a best practice for security and billing purposes. Some enterprises even have healthy security budgets largely driven by legal requirements. But, what do you do if you don't have a regulatory imperative and the budget that comes with it? This session discusses Turner's journey from a handful of accounts to a secure, multi-account AWS environment. We discuss how we automate and audit across a global organization using almost exclusively native AWS tools.
Lock it Down: How to Secure your AWS Account and your Organization's AccountsAmazon Web Services
The cloud enables users to run workloads in a more secure fashion than what typically can be done in a traditional data-center. However, customers are still not sure how to actually harden their AWS accounts and resources and make sure compliance is being enforced. When large customers have multiple accounts, ensuring consistency around governance can also be of concern. In this session, we will review how to use automation, tools, and techniques to harden and audit your AWS account and also how to leverage AWS Organizations to ensure compliance in your enterprise.
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018Amazon Web Services
Security on AWS is robust and feature rich, but how do you know what to do and how to start? This workshop covers how to start your AWS threat response automation platform using native AWS tools and OSS. We begin with how to collect and analyze all the different data sources in an AWS account. Next, we cover how to take that log data and automatically address risks identified from network intrusion, insider threats, or misconfigurations. We also cover preventative controls that can help block risk in the first place and alert you when drift occurs. Finally, we cover how to scale this all out to multiple accounts.
The document discusses security segmentation and identity access management on AWS. It provides examples of using AWS Organizations, service control policies, and IAM policies to segment accounts and control access. It discusses using AWS Organizations to centrally govern accounts, AWS Resource Access Manager to share resources between accounts, and IAM policies for users, resources, and endpoints to control access to specific AWS resources like S3 buckets.
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 Amazon Web Services
The services that make up AWS are many and varied, but the set of concepts you need to secure your data and infrastructure is simple and straightforward. By the end of this session, you will know the fundamental patterns that you can apply to secure any workload you run in AWS with confidence. We cover the basics of network security, the process of reading and writing access management policies, and data encryption.
Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018Amazon Web Services
Amazon Elasticsearch Service has a rich set of security features that give you control over access to data in your domain. Whether you're using Amazon Cognito to integrate with your federated identity provider for a Kibana login, building a VPC application and integrating search, or using IAM for fine-grained access, you need to understand your options so you can keep your data safe. Leave this session with a practical set of tools for security.
AWS supports logging in with Federated Access, using SAML or integration with Active Directory. This is integrated with user Roles in AWS which provide the permissions to access various services. in this session we will explain the options for authentication. we will cover basic access control concepts and in addition we will use AWS Systems Manager to talk about how you can also facilitate secured access to your Instances.
AWS Services: IAM, AWS SSO, Managed Active Directory, AWS Systems Manager (With Demo)
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Amazon Web Services
GE has very deep security requirements for their cloud applications. In this session, hear their story on replacing on premises complex solutions with AWS native services like Amazon GuardDuty, VPC Flow logs, AWS CloudTrail, and AWS Config rules. Learn how large enterprises can accelerate their cloud adoption by meeting established security standards with AWS native services. Please join us for a speaker meet-and-greet following this session at the Speaker Lounge (ARIA East, Level 1, Willow Lounge). The meet-and-greet starts 15 minutes after the session and runs for half an hour.
Module 3: Security, Identity and Access Management
This module will cover:
Data Center Security
AWS Identity and Access Management (IAM) concepts including users, groups, roles and policies
AWS Shared Security Model
Identity Access Management (IAM)
Governance and Compliance
AWS CloudTrail for audit and change management
AWS Config and Config Rules
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018Amazon Web Services
Most workloads on AWS resemble a finely crafted cake, with delight at every layer. In this session, we help you master identity at each layer of deliciousness: from platform, to infrastructure, to applications, using services like AWS Identity and Access Management (IAM), AWS Directory Service, Amazon Cognito, and many more. Leave with a firm mental model for how identity works both harmoniously and independently throughout these layers, and with ready-to-use reference architectures and sample code. We keep things fun and lively along the way with lots of demos, which will hopefully make up for our decided lack of anything resembling the sweet confections we'll be talking so much about!
Identity Round Robin Workshop - Serverless Round: Security Week at the SF LoftAmazon Web Services
This document discusses identity and access management for serverless applications. It provides an overview of AWS Identity and Access Management (IAM) including IAM users, groups, roles, and policies. It also discusses Amazon Cognito for user management and the WildRydes serverless application workshop which involves restricting access to an S3 bucket and setting up user authentication with Cognito user pools.
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Amazon Web Services
Securing your data platforms in job zero. Powerful encryption capabilities are available in the core services of the AWS cloud. AWS continues to innovate and release enhancements to encryption-specific services, and expand the encryption capabilities in new services to make encryption easy for everyone. Learn how to take advantage of these services and features to protect and secure your data in the cloud.
Mao Danrong, Solutions Architect, AWS China
Blockchain has become a hot topic for enterprises, start-ups, entrepreneurs, and regulatory bodies. Companies are now beginning to understand its disruptive potential and are experimenting with its most promising applications. But, few companies have asked the more fundamental question: Are we ready to adopt a shared public database and Microservice architecture for financial transactions? In this session, we cover the use cases and emerging trends. We also demonstrate blockchain in use and show how to implement it with demo showing using AWS services.
Red Team vs. Blue Team on AWS ~ re:Invent 2018Teri Radichel
Red Teaming and Pen Testing steps taken on a vulnerable account followed by Blue Teaming and cloud security defensive strategies. Teri Radichel and Kolby Allen at re:Invent 2018
Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...Amazon Web Services
Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, Training and Certification
Virtual AWSome Day:
- Step-by-step introduction to the core AWS services for compute, storage, database, and networking.
- ideal for IT managers, system engineers, system administrators, and architects who are eager to learn more about cloud computing.
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...Amazon Web Services
by Jeff Levine, Security Specialist, Solutions Architect, AWS
In AWS, identity comes first. Before you can provision buckets, instances, VPCs, or any other infrastructure, you have to have an identity to authenticate and authorize those API calls. In this session, we'll rapidly immerse you in the fundamental primitives, mental models, and implementation patterns of the core AWS identity services such as AWS Identity & Access Management and AWS Organizations. With this knowledge in hand you'll be able to confidently construct a solid identity foundation for your workloads to sit atop.
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Amazon Web Services
Are you interested in becoming a IAM policy master and learning about powerful techniques for controlling access to AWS resources? If your answer is “yes,” this session is for you. Join us as we cover the different types of policies and describe how they work together to control access to resources in your account and across your AWS organization. We walk through use cases that help you delegate permission management to developers by demonstrating IAM permission boundaries. We take an in-depth look at controlling access to specific AWS regions using condition keys. Finally, we explain how to use tags to scale permissions management in your account. This session requires you to know the basics of IAM policies.
Similaire à Securing Data in Serverless Applications and Messaging Services (API317-R2) - AWS re:Invent 2018 (20)
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
1) The document discusses building a minimum viable product (MVP) using Amazon Web Services (AWS).
2) It provides an example of an MVP for an omni-channel messenger platform that was built from 2017 to connect ecommerce stores to customers via web chat, Facebook Messenger, WhatsApp, and other channels.
3) The founder discusses how they started with an MVP in 2017 with 200 ecommerce stores in Hong Kong and Taiwan, and have since expanded to over 5000 clients across Southeast Asia using AWS for scaling.
This document discusses pitch decks and fundraising materials. It explains that venture capitalists will typically spend only 3 minutes and 44 seconds reviewing a pitch deck. Therefore, the deck needs to tell a compelling story to grab their attention. It also provides tips on tailoring different types of decks for different purposes, such as creating a concise 1-2 page teaser, a presentation deck for pitching in-person, and a more detailed read-only or fundraising deck. The document stresses the importance of including key information like the problem, solution, product, traction, market size, plans, team, and ask.
This document discusses building serverless web applications using AWS services like API Gateway, Lambda, DynamoDB, S3 and Amplify. It provides an overview of each service and how they can work together to create a scalable, secure and cost-effective serverless application stack without having to manage servers or infrastructure. Key services covered include API Gateway for hosting APIs, Lambda for backend logic, DynamoDB for database needs, S3 for static content, and Amplify for frontend hosting and continuous deployment.
This document provides tips for fundraising from startup founders Roland Yau and Sze Lok Chan. It discusses generating competition to create urgency for investors, fundraising in parallel rather than sequentially, having a clear fundraising narrative focused on what you do and why it's compelling, and prioritizing relationships with people over firms. It also notes how the pandemic has changed fundraising, with examples of deals done virtually during this time. The tips emphasize being fully prepared before fundraising and cultivating connections with investors in advance.
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
This document discusses Amazon's machine learning services for building conversational interfaces and extracting insights from unstructured text and audio. It describes Amazon Lex for creating chatbots, Amazon Comprehend for natural language processing tasks like entity extraction and sentiment analysis, and how they can be used together for applications like intelligent call centers and content analysis. Pre-trained APIs simplify adding machine learning to apps without requiring ML expertise.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.