Project Product. Thanks to Nilesh Bansal for material in these slides

Size: px
Start display at page:

Download "Project Product. Thanks to Nilesh Bansal for material in these slides"

Transcription

1 Project Product Thanks to Nilesh Bansal for material in these slides 1

2 REAL WORLD 2

3 Core Difference Project You define the problem statement 3

4 Core Difference Project You define the problem statement You are the primary user INPUT DATE: 03 / 06 /

5 Core Difference Project You define the problem statement You are the primary user OJen technically challenging and novel 5

6 Core Difference Project You define the problem statement You are the primary user OJen technically challenging and novel Product Solving someone else s problem Someone else is using the product OJen simple solu:ons to complex problems 6

7 Overview Usability Security Reliability Performance 7

8 USABILITY 8

9 Usability Most important, but oien overlooked Very difficult task 9

10 Usability Most important, but oien overlooked Very difficult task Silently observe user Make common easy, and uncommon possible 10

11 Google Search 11

12 Google Search Make common easy, uncommon possible 12

13 Google Search Make common easy, uncommon possible 13

14 Reasonable Defaults Customizable interface But 90% users do not customize They use what system provides by default 14

15 Features vs Solu:ons People are inherently lazy They do not want to use your product But people have real life problems And they want the easiest way to solve the problem If a feature is not easy to use, it does not exist 15

16 Google+ 16

17 Facebook always had lists 17

18 Affordance: Knobs are for turning A quality of an object that allows an individual to perform an aczon 18

19 BuVons for pressing 19

20 Is This Really Necessary? 20

21 Affordance 21

22 Affordance 22

23 Affordance 23

24 Typography and Content Display More important informa:on in bigger font Progressively move down Use bold / yellow backgrounds to highlight 24

25 Layout Toronto Weather 25

26 Layout Toronto Weather 26

27 Typography / Text Name: Marshall Mathers User Id: eminem LocaZon: Detroit Bio: I am not afraid Url: h]p://twi]er.com/eminem Picture: 27

28 Typography / Text Name: Marshall Mathers User Id: eminem LocaZon: Detroit Bio: I am not afraid Url: h]p://twi]er.com/eminem Picture: 28

29 Consistency Consistent terminology Login or Sign In? Pick one. Do not mix Logout and Sign Out. Different terminology User Se`ngs Account Se`ngs User Preferences Account SeZngs 29

30 Example: Delete / Undo Confirma:on boxes are intrusive 30

31 Example: Delete / Undo Provide an Undo op:on 31

32 Aesthe:cs Beauty mavers. Direct correla:on to sales Clients will buy a sleeker looking sojware over one with more features 32

33 Please, do not design like this 33

34 SECURITY 34

35 ALWAYS think about security Sony Playsta:on Network Personal data of 77 million users stolen Lots of bad guys out there IBM monitors 150,000 security events per second Mostly automated, exploit common flaws Want to use your server as a bot Anonymous, LulzSec and others 35

36 XSS: Cross Site Scrip:ng AVacker injects a script into web page Contents of index.php: <input value= <? echo $_GET[ name ] > /> Request: index.php?name= /><script Escape HTML from all dynamic content before displaying Java has StringEscapeUZls.escapeHtml( ) 36

37 SQL Injec:on SELECT login_id, full_name FROM table WHERE = 'x' AND 1=(SELECT COUNT(*) FROM table);'; Always escape strings Use PreparedStatement (in Java) 37

38 Other Security Issues Always store passwords using one- way encryp:on Can not be decrypted Check for user privileges Specially when including or redireczng to other files Keep base system secure Stop unnecessary services Update regularly for security patches Use firewalls 38

39 RELIABILITY 39

40 Up:me Near- 100% availability is important System is always operazonal No data loss Backups and disaster recovery Remember Failures are correlated Human errors are common cause 40

41 Redundancy Hot Failover AutomaZc switch from failed to available system Hardware Redundancy RAID 10 mirror all data Two network switches, two Ethernet cards, two power supplies, two HBA (host bus adapter) controllers etc.. Redundant Infrastructure 41

42 Simplified Infrastructure Example Apache HTTPD Use of virtual IP to make sure the user is always directed to the server that is available. Apache acts as front- end proxy to redirect the request to backend Tomcat. ApplicaZon Server Tomcat is commonly used Java app server. Most code runs on this machine. Apache HTTPD Load Balancer and Proxy Pass module are used to provide failover and redundancy. Databases Master Slave replicated database servers. ApplicaZon server maintains the sate of each server to provide reliability. All writes must happen on master. 42

43 Monitoring Open Source CacZ Nagios Custom Internal System Check module Paid Hosted Site 24x7 43

44 PERFORMANCE 44

45 Performance and Scalability Don't op:mize un:l you need to Make code readable Use Profiler (for Java, Netbeans is great and free) Common tricks Cache Pre- compute Sample Parallelize Using mulz- core To different machines 45

46 Scalability, Consistency, Reliability You can only easily have two of the three Consistency: among mulzple replica of data Reliability: conznuous operazonal Scalability: growing with increase in number of users reliability consistency scalability 46

47 Caching and Pre- compu:ng User queries are correlated Caching is most common opzmizazon Must be willing to sacrifice some consistency Fully or par:ally pre- compute Every night, create useful stazszcs (e.g., a stazszcal histogram of word frequencies in search services) Sample Approximate results are fine 47

48 CPU Op:miza:ons Mul:- thread Java has package to manage Executors Pay a]enzon to thread safety Use op:mized collec:ons CERN Colt, GNU Trove to save memory Use a Profiler 48

49 Code Quality vs Performance KISS Keep It Simple Stupid KIWI Kill It With Iron Upgrade your hardware (more disks, more memory, etc.) 49

50 CONCLUSION 50

51 Ques:ons? 51

Large-Scale Web Applications

Large-Scale Web Applications Large-Scale Web Applications Mendel Rosenblum Web Application Architecture Web Browser Web Server / Application server Storage System HTTP Internet CS142 Lecture Notes - Intro LAN 2 Large-Scale: Scale-Out

More information

Scaling Without Sharding. Baron Schwartz Percona Inc Surge 2010

Scaling Without Sharding. Baron Schwartz Percona Inc Surge 2010 Scaling Without Sharding Baron Schwartz Percona Inc Surge 2010 Web Scale!!!! http://www.xtranormal.com/watch/6995033/ A Sharding Thought Experiment 64 shards per proxy [1] 1 TB of data storage per node

More information

MySQL HA Solutions. Keeping it simple, kinda! By: Chris Schneider MySQL Architect Ning.com

MySQL HA Solutions. Keeping it simple, kinda! By: Chris Schneider MySQL Architect Ning.com MySQL HA Solutions Keeping it simple, kinda! By: Chris Schneider MySQL Architect Ning.com What we ll cover today High Availability Terms and Concepts Levels of High Availability What technologies are there

More information

The Ultimate Windows 10 Hardening Guide: What to Do to Make Hackers Pick Someone Else

The Ultimate Windows 10 Hardening Guide: What to Do to Make Hackers Pick Someone Else The Ultimate Windows 10 Hardening Guide: What to Do to Make Hackers Pick Someone Else Paula Januszkiewicz CQURE: CEO, Penetration Tester CQURE Offices: New York, Dubai, Warsaw MVP: Enterprise Security,

More information

Objec&ves. Review: Security. Google s AI is wri&ng poetry SQL INJECTION ATTACK. SQL Injec&on. SQL Injec&on. Security:

Objec&ves. Review: Security. Google s AI is wri&ng poetry SQL INJECTION ATTACK. SQL Injec&on. SQL Injec&on. Security: Objec&ves Security: Ø Injec&on a6acks Ø Cross-site scrip&ng Ø Insecure direct object reference Group photo Review: Security Why has the Web become such a huge target? How can you protect against security

More information

Real World Web Scalability. Ask Bjørn Hansen Develooper LLC

Real World Web Scalability. Ask Bjørn Hansen Develooper LLC Real World Web Scalability Ask Bjørn Hansen Develooper LLC Hello. 28 brilliant methods to make your website keep working past $goal requests/transactions/sales per second/hour/day Requiring minimal extra

More information

<Insert Picture Here> MySQL Web Reference Architectures Building Massively Scalable Web Infrastructure

<Insert Picture Here> MySQL Web Reference Architectures Building Massively Scalable Web Infrastructure MySQL Web Reference Architectures Building Massively Scalable Web Infrastructure Mario Beck (mario.beck@oracle.com) Principal Sales Consultant MySQL Session Agenda Requirements for

More information

SQL Azure. Abhay Parekh Microsoft Corporation

SQL Azure. Abhay Parekh Microsoft Corporation SQL Azure By Abhay Parekh Microsoft Corporation Leverage this Presented by : - Abhay S. Parekh MSP & MSP Voice Program Representative, Microsoft Corporation. Before i begin Demo Let s understand SQL Azure

More information

BeBanjo Infrastructure and Security Overview

BeBanjo Infrastructure and Security Overview BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits

More information

SQL Server 2014 Training. Prepared By: Qasim Nadeem

SQL Server 2014 Training. Prepared By: Qasim Nadeem SQL Server 2014 Training Prepared By: Qasim Nadeem SQL Server 2014 Module: 1 Architecture &Internals of SQL Server Engine Module : 2 Installing, Upgrading, Configuration, Managing Services and Migration

More information

Web Application Penetration Testing

Web Application Penetration Testing Web Application Penetration Testing COURSE BROCHURE & SYLLABUS Course Overview Web Application penetration Testing (WAPT) is the Security testing techniques for vulnerabilities or security holes in corporate

More information

Application vulnerabilities and defences

Application vulnerabilities and defences Application vulnerabilities and defences In this lecture We examine the following : SQL injection XSS CSRF SQL injection SQL injection is a basic attack used to either gain unauthorized access to a database

More information

WHITE PAPER AGILOFT SCALABILITY AND REDUNDANCY

WHITE PAPER AGILOFT SCALABILITY AND REDUNDANCY WHITE PAPER AGILOFT SCALABILITY AND REDUNDANCY Table of Contents Introduction 3 Performance on Hosted Server 3 Figure 1: Real World Performance 3 Benchmarks 3 System configuration used for benchmarks 3

More information

Avoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition

Avoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition One Stop Virtualization Shop Avoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition Written by Edwin M Sarmiento, a Microsoft Data Platform

More information

Real Life Web Development. Joseph Paul Cohen

Real Life Web Development. Joseph Paul Cohen Real Life Web Development Joseph Paul Cohen joecohen@cs.umb.edu Index 201 - The code 404 - How to run it? 500 - Your code is broken? 200 - Someone broke into your server? 400 - How are people using your

More information

How To Use My Alternative High

How To Use My Alternative High How To Use My Alternative High Preface Preface I put this together to address the issues and questions that come up all the time in class, especially for newer students. Preface I did this so that I could

More information

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,

More information

Microsoft SQL AlwaysOn and High Availability

Microsoft SQL AlwaysOn and High Availability Course 55153A: Microsoft SQL AlwaysOn and High Availability Course details Course Outline Module 1: Course Overview This module explains how the class will be structured and introduces course materials

More information

Storage Area Network (SAN) Training Presentation. July 2007 IBM PC CLUB Jose Medeiros Storage Systems Engineer MCP+I, MCSE, NT4 MCT

Storage Area Network (SAN) Training Presentation. July 2007 IBM PC CLUB Jose Medeiros Storage Systems Engineer MCP+I, MCSE, NT4 MCT Storage Area Network (SAN) Training Presentation July 007 IBM PC CLUB Jose Medeiros Storage Systems Engineer MCP+I, MCSE, NT MCT Agenda Training Objectives Basic SAN information Terminology SAN Infrastructure

More information

NET 311 D INFORMATION SECURITY

NET 311 D INFORMATION SECURITY 1 NET 311 D INFORMATION SECURITY Networks and Communication Department TUTORIAL 6 :Securing Your Windows 8 System 4 Steps to secure your windows 8 system 2 1. Configure Windows 8 Settings. 2. Installing

More information

High Availability Overview Paper

High Availability Overview Paper High Availability Overview Paper March 2001 Please note: The information contained in this document is intended as a guide to implementing high availability systems. Please keep in mind, however, that

More information

Polarion 18.2 Enterprise Setup

Polarion 18.2 Enterprise Setup SIEMENS Polarion 18.2 Enterprise Setup POL005 18.2 Contents Overview........................................................... 1-1 Terminology..........................................................

More information

TomcatCon London 2017 Clustering Mark Thomas

TomcatCon London 2017 Clustering Mark Thomas TomcatCon London 2017 Clustering Mark Thomas Agenda Reverse Proxies Load-balancing Clustering Reverse Proxies bz.apache.org httpd instance Reverse Proxy Bugzilla (main) bz.apache.org/bugzilla httpd instance

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

Introduction Chapter 1. General Information Chapter 2. Servers Used... 9

Introduction Chapter 1. General Information Chapter 2. Servers Used... 9 Chapter 1 General Information Contents Contents Introduction... 5 Chapter 1. General Information... 6 Chapter 2. Servers Used... 9 Chapter 3. Installing and Configuring Failover Cluster for MS SQL Databases...

More information

ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS

ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS Dr Adnene Guabtni, Senior Research Scientist, NICTA/Data61, CSIRO Adnene.Guabtni@csiro.au EC2 S3 ELB RDS AMI

More information

Disaster Recovery (DR) Planning with the Cloud Desktop

Disaster Recovery (DR) Planning with the Cloud Desktop with the Cloud Desktop Info@RIAWorkSpace.com 877.361.3499 www.riaworkspace.com In preparing for the unexpected, most companies put specific disaster recovery plans in place. Without planning, recovering

More information

Web Applications. Software Engineering 2017 Alessio Gambi - Saarland University

Web Applications. Software Engineering 2017 Alessio Gambi - Saarland University Web Applications Software Engineering 2017 Alessio Gambi - Saarland University Based on the work of Cesare Pautasso, Christoph Dorn, Andrea Arcuri, and others ReCap Software Architecture A software system

More information

Hosting with Eduphoria

Hosting with Eduphoria Hosting with Eduphoria Hosted Migration Process What does my district need to do? How will this migration effect my district? Eduphoria's Hosted Environment Hosted vs Self hosted features User Account

More information

Web Pen Tes)ng. Michael Hicks CMSC 498L, Fall 2012 Part 2 slides due to Eric Eames, Lead Penetra)on Tester, SAIC, March 2012

Web Pen Tes)ng. Michael Hicks CMSC 498L, Fall 2012 Part 2 slides due to Eric Eames, Lead Penetra)on Tester, SAIC, March 2012 Web Pen Tes)ng Michael Hicks CMSC 498L, Fall 2012 Part 2 slides due to Eric Eames, Lead Penetra)on Tester, SAIC, March 2012 Exploi)ng Vulnerabili)es Code injec)on Cross site scrip)ng, SQL injec)on, (buffer

More information

Achieving Horizontal Scalability. Alain Houf Sales Engineer

Achieving Horizontal Scalability. Alain Houf Sales Engineer Achieving Horizontal Scalability Alain Houf Sales Engineer Scale Matters InterSystems IRIS Database Platform lets you: Scale up and scale out Scale users and scale data Mix and match a variety of approaches

More information

High Availability- Disaster Recovery 101

High Availability- Disaster Recovery 101 High Availability- Disaster Recovery 101 DBA-100 Glenn Berry, Principal Consultant, SQLskills.com Glenn Berry Consultant/Trainer/Speaker/Author Principal Consultant, SQLskills.com Email: Glenn@SQLskills.com

More information

SSL - Testing The Purchase Process. How To Make Test Purchases in Order to Understand the Purchase Process

SSL - Testing The Purchase Process. How To Make Test Purchases in Order to Understand the Purchase Process SSL - Testing The Purchase Process How To Make Test Purchases in Order to Understand the Purchase Process Updated: January 6, 2018 Table of Contents Table of Contents Overview... 1 Setting Up Testing Mode...

More information

MapReduce. Cloud Computing COMP / ECPE 293A

MapReduce. Cloud Computing COMP / ECPE 293A Cloud Computing COMP / ECPE 293A MapReduce Jeffrey Dean and Sanjay Ghemawat, MapReduce: simplified data processing on large clusters, In Proceedings of the 6th conference on Symposium on Opera7ng Systems

More information

CISC 7610 Lecture 5 Distributed multimedia databases. Topics: Scaling up vs out Replication Partitioning CAP Theorem NoSQL NewSQL

CISC 7610 Lecture 5 Distributed multimedia databases. Topics: Scaling up vs out Replication Partitioning CAP Theorem NoSQL NewSQL CISC 7610 Lecture 5 Distributed multimedia databases Topics: Scaling up vs out Replication Partitioning CAP Theorem NoSQL NewSQL Motivation YouTube receives 400 hours of video per minute That is 200M hours

More information

PeerStorage Arrays Unequalled Storage Solutions

PeerStorage Arrays Unequalled Storage Solutions Simplifying Networked Storage PeerStorage Arrays Unequalled Storage Solutions John Joseph, VP of Marketing EqualLogic,, 9 Townsend West, Nashua NH 03063 Phone: +1-603 603-249-7772, FAX: +1-603 603-579-6910

More information

Architekturen für die Cloud

Architekturen für die Cloud Architekturen für die Cloud Eberhard Wolff Architecture & Technology Manager adesso AG 08.06.11 What is Cloud? National Institute for Standards and Technology (NIST) Definition On-demand self-service >

More information

Site Performance, Optimization and Scalability Alan Dixon

Site Performance, Optimization and Scalability Alan Dixon Site Performance, Optimization and Scalability Alan Dixon http://blackflysolutions.ca/ Khalid Baheyeldin http://2bits.com DrupalCamp Toronto 2011 Agenda Introduction Symptoms and Tips Hardware and Software

More information

Chapter 12 Databases and Database Management Systems

Chapter 12 Databases and Database Management Systems Chapter 12 Databases and Database Management Systems permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. What Is a Database?

More information

Microsoft SQL AlwaysOn and High Availability

Microsoft SQL AlwaysOn and High Availability Microsoft SQL AlwaysOn and High Availability 55153; 2 Days, Instructor-led Course Description This two-day instructor-led course is designed for database administrators to familiarize them with the concepts

More information

Cloud Computing. What is cloud computing. CS 537 Fall 2017

Cloud Computing. What is cloud computing. CS 537 Fall 2017 Cloud Computing CS 537 Fall 2017 What is cloud computing Illusion of infinite computing resources available on demand Scale-up for most apps Elimination of up-front commitment Small initial investment,

More information

Microsoft SQL Server

Microsoft SQL Server Microsoft SQL Server Abstract This white paper outlines the best practices for Microsoft SQL Server Failover Cluster Instance data protection with Cohesity DataPlatform. December 2017 Table of Contents

More information

Scaling Databases with DBIx::Router. Perrin Harkins We Also Walk Dogs

Scaling Databases with DBIx::Router. Perrin Harkins We Also Walk Dogs Scaling Databases with DBIx::Router Perrin Harkins We Also Walk Dogs What is DBIx::Router? Load-balancing Failover Sharding Transparent (Mostly.) Why would you need this? Web and app servers are easy to

More information

OWASP Top 10 Risks. Many thanks to Dave Wichers & OWASP

OWASP Top 10 Risks. Many thanks to Dave Wichers & OWASP OWASP Top 10 Risks Dean.Bushmiller@ExpandingSecurity.com Many thanks to Dave Wichers & OWASP My Mom I got on the email and did a google on my boy My boy works in this Internet thing He makes cyber cafes

More information

MaintMaster Technical White Paper

MaintMaster Technical White Paper MaintMaster Technical White Paper Welcome to MaintMaster! MaintMaster is a leading tool for return on operational reliability for discrete manufacturing. This White Paper covers most of the technical aspects

More information

HA solution with PXC-5.7 with ProxySQL. Ramesh Sivaraman Krunal Bauskar

HA solution with PXC-5.7 with ProxySQL. Ramesh Sivaraman Krunal Bauskar HA solution with PXC-5.7 with ProxySQL Ramesh Sivaraman Krunal Bauskar Agenda What is Good HA eco-system? Understanding PXC-5.7 Understanding ProxySQL PXC + ProxySQL = Complete HA solution Monitoring using

More information

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE Enterprise Overview Benefits and features of s Enterprise plan 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com This paper summarizes the benefits and features of s Enterprise plan. State of

More information

Enterprise Open Source Databases

Enterprise Open Source Databases Enterprise Open Source Databases WHITE PAPER MariaDB vs. Oracle MySQL vs. EnterpriseDB MariaDB TX Born of the community. Raised in the enterprise. MariaDB TX, with a history of proven enterprise reliability

More information

HOW TO PLAN & EXECUTE A SUCCESSFUL CLOUD MIGRATION

HOW TO PLAN & EXECUTE A SUCCESSFUL CLOUD MIGRATION HOW TO PLAN & EXECUTE A SUCCESSFUL CLOUD MIGRATION Steve Bertoldi, Solutions Director, MarkLogic Agenda Cloud computing and on premise issues Comparison of traditional vs cloud architecture Review of use

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

An analysis of security in a web application development process

An analysis of security in a web application development process An analysis of security in a web application development process Florent Gontharet Ethical Hacking University of Abertay Dundee MSc Ethical Hacking 2015 Table of Contents Abstract...2 Introduction...3

More information

Chapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al.

Chapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter 6: Distributed Systems: The Web Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter Outline Web as a distributed system Basic web architecture Content delivery networks

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define

More information

Properties of High Quality Software. CSE219, Computer Science III Stony Brook University

Properties of High Quality Software. CSE219, Computer Science III Stony Brook University Properties of High Quality Software CSE219, Computer Science III Stony Brook University http://www.cs.stonybrook.edu/~cse219 Software Engineering Basics Important Principles for creating a Software Solution:

More information

Deployment. Chris Wilson, AfNOG / 26

Deployment. Chris Wilson, AfNOG / 26 Deployment Chris Wilson, AfNOG 2016 1 / 26 About this presentation Based on previous talks by Joel Jaeggli, Evelyn Namara and NSRC, with thanks! You can access this presentation at: Online: http://afnog.github.io/sse/apache/

More information

BUSINESS CONTINUITY: THE PROFIT SCENARIO

BUSINESS CONTINUITY: THE PROFIT SCENARIO WHITE PAPER BUSINESS CONTINUITY: THE PROFIT SCENARIO THE BENEFITS OF A COMPREHENSIVE BUSINESS CONTINUITY STRATEGY FOR INCREASED OPPORTUNITY Organizational data is the DNA of a business it makes your operation

More information

Introduction to the Weebly Toolkit for Building Websites

Introduction to the Weebly Toolkit for Building Websites Introduction to the Weebly Toolkit for Building Websites Maureen Pratchett July 2015 1 Objective The purpose of this workshop is not to teach you how to design or even build a website, but rather to introduce

More information

An Application for Monitoring Solr

An Application for Monitoring Solr An Application for Monitoring Solr Yamin Alam Gauhati University Institute of Science and Technology, Guwahati Assam, India Nabamita Deb Gauhati University Institute of Science and Technology, Guwahati

More information

Using EonStor DS Series iscsi-host storage systems with VMware vsphere 5.x

Using EonStor DS Series iscsi-host storage systems with VMware vsphere 5.x Using EonStor DS Series iscsi-host storage systems with VMware vsphere 5.x Application notes Abstract These application notes explain configuration details for using Infortrend EonStor DS Series iscsi-host

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

GroupWise Architecture and Best Practices. WebAccess. Kiran Palagiri Team Lead GroupWise WebAccess

GroupWise Architecture and Best Practices. WebAccess. Kiran Palagiri Team Lead GroupWise WebAccess GroupWise Architecture and Best Practices WebAccess Kiran Palagiri Team Lead GroupWise WebAccess kpalagiri@novell.com Ed Hanley Senior Architect ed.hanley@novell.com Agenda Kiran Palagiri Architectural

More information

Brocade Virtual Traffic Manager and Parallels Remote Application Server

Brocade Virtual Traffic Manager and Parallels Remote Application Server White Paper Parallels Brocade Virtual Traffic Manager and Parallels Deployment Guide 01 Contents Preface...4 About This Guide...4 Audience...4 Contacting Brocade...4 Internet...4 Technical Support...4

More information

MySQL in the Cloud Tricks and Tradeoffs

MySQL in the Cloud Tricks and Tradeoffs MySQL in the Cloud Tricks and Tradeoffs Thorsten von Eicken CTO RightScale 1 MySQL & Amazon EC2 @RightScale Operating in Amazon EC2 since fall 2006 Cloud Computing Management System Replicated MySQL product

More information

SQL Server DBA Course Details

SQL Server DBA Course Details SQL Server DBA Course Details By Besant Technologies Course Name Category Venue SQL Server DBA Database Administration Besant Technologies No.24, Nagendra Nagar, Velachery Main Road, Address Velachery,

More information

@joerg_schad Nightmares of a Container Orchestration System

@joerg_schad Nightmares of a Container Orchestration System @joerg_schad Nightmares of a Container Orchestration System 2017 Mesosphere, Inc. All Rights Reserved. 1 Jörg Schad Distributed Systems Engineer @joerg_schad Jan Repnak Support Engineer/ Solution Architect

More information

Carrier grade VoIP systems with Kamailio

Carrier grade VoIP systems with Kamailio Carrier grade VoIP systems with Kamailio Welcome! Kamailio project 1&1 Internet AG Linuxtag 2009, 24.06.2009 Outline 1. 1&1 VoIP backend purpose and usage architecture 2. Kamailio SIP server 3. High-availability

More information

Search Engines. Information Retrieval in Practice

Search Engines. Information Retrieval in Practice Search Engines Information Retrieval in Practice All slides Addison Wesley, 2008 Web Crawler Finds and downloads web pages automatically provides the collection for searching Web is huge and constantly

More information

Linux Administration

Linux Administration Linux Administration This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. It is designed for professionals

More information

ZENworks Mobile Workspace High Availability Environments. September 2017

ZENworks Mobile Workspace High Availability Environments. September 2017 ZENworks Mobile Workspace High Availability Environments September 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Information Security Policy

Information Security Policy Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated

More information

ElephantSQL. PostgreSQL as a Service. Product overview. Last Updated

ElephantSQL. PostgreSQL as a Service. Product overview. Last Updated ElephantSQL PostgreSQL as a Service Product overview Table of Contents...1 ElephantSQL...3 PostgreSQL as a Service...3 What is PostgreSQL?...3 Product overview...4 Product Details...4 SQL Browser...4 Other

More information

ArcGIS Server Web Server Web Applications WWW. Applications. ArcGIS Server Manager. GIS Server. Data. Desktop GIS. ArcGIS Desktop (content author) SOM

ArcGIS Server Web Server Web Applications WWW. Applications. ArcGIS Server Manager. GIS Server. Data. Desktop GIS. ArcGIS Desktop (content author) SOM ArcGIS Server on Linux and Unix Architecture and Deployment Recommendations Peter D Souza and Ravi Narayanan Developer Summit 2007 1 Our Assumptions Familiarity with ArcGIS Server Familiarity with Solaris

More information

Developing Enterprise Cloud Solutions with Azure

Developing Enterprise Cloud Solutions with Azure Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course

More information

18-642: Security Mitigation & Validation

18-642: Security Mitigation & Validation 18-642: Security Mitigation & Validation 11/27/2017 Security Migitation & Validation Anti-Patterns for security mitigation & validation Poorly considered password policy Poorly considered privilege management

More information

System Structure. Steven M. Bellovin December 14,

System Structure. Steven M. Bellovin December 14, System Structure Steven M. Bellovin December 14, 2015 1 Designing a System We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin December 14, 2015

More information

RTView Data Server SL Corporation. All Rights Reserved Sherrill-Lubinski Corporation. All Rights Reserved.

RTView Data Server SL Corporation. All Rights Reserved Sherrill-Lubinski Corporation. All Rights Reserved. RTView Data Server Data Server - Benefits By default, RTView clients connect to data sources (SQL, TIBCO, JMX, etc) directly. However, data from any source can be redirected through the Data Server. Reasons

More information

ScaleArc for SQL Server

ScaleArc for SQL Server Solution Brief ScaleArc for SQL Server Overview Organizations around the world depend on SQL Server for their revenuegenerating, customer-facing applications, running their most business-critical operations

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

PT Unified Application Security Enforcement. ptsecurity.com

PT Unified Application Security Enforcement. ptsecurity.com PT Unified Application Security Enforcement ptsecurity.com Positive Technologies: Ongoing research for the best solutions Penetration Testing ICS/SCADA Security Assessment Over 700 employees globally Over

More information

Jeffrey Garbus. ASE Administration. SAP* ASE 16/Sybase. 9 Rheinwerk. Publishing. Bonn Boston

Jeffrey Garbus. ASE Administration. SAP* ASE 16/Sybase. 9 Rheinwerk. Publishing. Bonn Boston Jeffrey Garbus SAP* ASE 16/Sybase ASE Administration 9 Rheinwerk Publishing Bonn Boston Acknowledgments 23 Preface 25 Introduction to SAP ASE System Administration 27 1.1 Placement within the SAP Landscape

More information

Next-Generation Cloud Platform

Next-Generation Cloud Platform Next-Generation Cloud Platform Jangwoo Kim Jun 24, 2013 E-mail: jangwoo@postech.ac.kr High Performance Computing Lab Department of Computer Science & Engineering Pohang University of Science and Technology

More information

DEEP DIVE INTO CLOUD COMPUTING

DEEP DIVE INTO CLOUD COMPUTING International Journal of Research in Engineering, Technology and Science, Volume VI, Special Issue, July 2016 www.ijrets.com, editor@ijrets.com, ISSN 2454-1915 DEEP DIVE INTO CLOUD COMPUTING Ranvir Gorai

More information

vfire Officer App Server Installation Guide Version 1.3

vfire Officer App Server Installation Guide Version 1.3 vfire Officer App Server Installation Guide Table of Contents Version Details 3 Online Support 3 Copyright 3 About this Document 5 Intended Audience 5 Standards and Conventions 5 vfire Officer App Prerequisites

More information

COPYRIGHTED MATERIAL. Introducing VMware Infrastructure 3. Chapter 1

COPYRIGHTED MATERIAL. Introducing VMware Infrastructure 3. Chapter 1 Mccain c01.tex V3-04/16/2008 5:22am Page 1 Chapter 1 Introducing VMware Infrastructure 3 VMware Infrastructure 3 (VI3) is the most widely used virtualization platform available today. The lineup of products

More information

IT Service Delivery and Support Week Three. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao

IT Service Delivery and Support Week Three. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao IT Service Delivery and Support Week Three IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 Infrastructure Essentials Computer Hardware Operating Systems (OS) & System Software Applications

More information

The Care and Feeding of a MySQL Database for Linux Adminstrators. Dave Stokes MySQL Community Manager

The Care and Feeding of a MySQL Database for Linux Adminstrators. Dave Stokes MySQL Community Manager The Care and Feeding of a MySQL Database for Linux Adminstrators Dave Stokes MySQL Community Manager David.Stokes@Oracle.com Simple Introduction This is a general introduction to running a MySQL database

More information

High Noon at AWS. ~ Amazon MySQL RDS versus Tungsten Clustering running MySQL on AWS EC2

High Noon at AWS. ~ Amazon MySQL RDS versus Tungsten Clustering running MySQL on AWS EC2 High Noon at AWS ~ Amazon MySQL RDS versus Tungsten Clustering running MySQL on AWS EC2 Introduction Amazon Web Services (AWS) are gaining popularity, and for good reasons. The Amazon Relational Database

More information

Introduction to Database Services

Introduction to Database Services Introduction to Database Services Shaun Pearce AWS Solutions Architect 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Today s agenda Why managed database services? A non-relational

More information

High Availability- Disaster Recovery 101

High Availability- Disaster Recovery 101 High Availability- Disaster Recovery 101 DBA-100 Glenn Berry, Principal Consultant, SQLskills.com Glenn Berry Consultant/Trainer/Speaker/Author Principal Consultant, SQLskills.com Email: Glenn@SQLskills.com

More information

IBM System Storage DS5020 Express

IBM System Storage DS5020 Express IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (FC/iSCSI) enables SAN tiering Balanced performance well-suited for

More information

Switching to Innodb from MyISAM. Matt Yonkovit Percona

Switching to Innodb from MyISAM. Matt Yonkovit Percona Switching to Innodb from MyISAM Matt Yonkovit Percona -2- DIAMOND SPONSORSHIPS THANK YOU TO OUR DIAMOND SPONSORS www.percona.com -3- Who We Are Who I am Matt Yonkovit Principal Architect Veteran of MySQL/SUN/Percona

More information

Application Security through a Hacker s Eyes James Walden Northern Kentucky University

Application Security through a Hacker s Eyes James Walden Northern Kentucky University Application Security through a Hacker s Eyes James Walden Northern Kentucky University waldenj@nku.edu Why Do Hackers Target Web Apps? Attack Surface A system s attack surface consists of all of the ways

More information

Scaling MongoDB: Avoiding Common Pitfalls. Jon Tobin Senior Systems

Scaling MongoDB: Avoiding Common Pitfalls. Jon Tobin Senior Systems Scaling MongoDB: Avoiding Common Pitfalls Jon Tobin Senior Systems Engineer Jon.Tobin@percona.com @jontobs www.linkedin.com/in/jonathanetobin Agenda Document Design Data Management Replica3on & Failover

More information

Persistence & State. SWE 432, Fall 2016 Design and Implementation of Software for the Web

Persistence & State. SWE 432, Fall 2016 Design and Implementation of Software for the Web Persistence & State SWE 432, Fall 2016 Design and Implementation of Software for the Web Today What s state for our web apps? How do we store it, where do we store it, and why there? For further reading:

More information

WEB SECURITY: XSS & CSRF

WEB SECURITY: XSS & CSRF WEB SECURITY: XSS & CSRF CMSC 414 FEB 22 2018 Cross-Site Request Forgery (CSRF) URLs with side-effects http://bank.com/transfer.cgi?amt=9999&to=attacker GET requests should have no side-effects, but often

More information

Polarion 18 Enterprise Setup

Polarion 18 Enterprise Setup SIEMENS Polarion 18 Enterprise Setup POL005 18 Contents Terminology......................................................... 1-1 Overview........................................................... 2-1

More information

High performance and functionality

High performance and functionality IBM Storwize V7000F High-performance, highly functional, cost-effective all-flash storage Highlights Deploys all-flash performance with market-leading functionality Helps lower storage costs with data

More information

Design and Implementation of Real-time Visualization tool for Network Security Monitoring

Design and Implementation of Real-time Visualization tool for Network Security Monitoring Design and Implementation of Real-time Visualization tool for Network Security Monitoring Aneela Safdar Supervisor : Dr. Hanif Durad Co-Supervisor : M. Masoom Alam DCIS PIEAS Motivation To look what s

More information

iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard

iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard On February 11 th 2003, the Internet Engineering Task Force (IETF) ratified the iscsi standard. The IETF was made up of

More information

Oracle Exadata X7. Uwe Kirchhoff Oracle ACS - Delivery Senior Principal Service Delivery Engineer

Oracle Exadata X7. Uwe Kirchhoff Oracle ACS - Delivery Senior Principal Service Delivery Engineer Oracle Exadata X7 Uwe Kirchhoff Oracle ACS - Delivery Senior Principal Service Delivery Engineer 05.12.2017 Oracle Engineered Systems ZFS Backup Appliance Zero Data Loss Recovery Appliance Exadata Database

More information