Project Product. Thanks to Nilesh Bansal for material in these slides
|
|
- Antonia Mitchell
- 5 years ago
- Views:
Transcription
1 Project Product Thanks to Nilesh Bansal for material in these slides 1
2 REAL WORLD 2
3 Core Difference Project You define the problem statement 3
4 Core Difference Project You define the problem statement You are the primary user INPUT DATE: 03 / 06 /
5 Core Difference Project You define the problem statement You are the primary user OJen technically challenging and novel 5
6 Core Difference Project You define the problem statement You are the primary user OJen technically challenging and novel Product Solving someone else s problem Someone else is using the product OJen simple solu:ons to complex problems 6
7 Overview Usability Security Reliability Performance 7
8 USABILITY 8
9 Usability Most important, but oien overlooked Very difficult task 9
10 Usability Most important, but oien overlooked Very difficult task Silently observe user Make common easy, and uncommon possible 10
11 Google Search 11
12 Google Search Make common easy, uncommon possible 12
13 Google Search Make common easy, uncommon possible 13
14 Reasonable Defaults Customizable interface But 90% users do not customize They use what system provides by default 14
15 Features vs Solu:ons People are inherently lazy They do not want to use your product But people have real life problems And they want the easiest way to solve the problem If a feature is not easy to use, it does not exist 15
16 Google+ 16
17 Facebook always had lists 17
18 Affordance: Knobs are for turning A quality of an object that allows an individual to perform an aczon 18
19 BuVons for pressing 19
20 Is This Really Necessary? 20
21 Affordance 21
22 Affordance 22
23 Affordance 23
24 Typography and Content Display More important informa:on in bigger font Progressively move down Use bold / yellow backgrounds to highlight 24
25 Layout Toronto Weather 25
26 Layout Toronto Weather 26
27 Typography / Text Name: Marshall Mathers User Id: eminem LocaZon: Detroit Bio: I am not afraid Url: h]p://twi]er.com/eminem Picture: 27
28 Typography / Text Name: Marshall Mathers User Id: eminem LocaZon: Detroit Bio: I am not afraid Url: h]p://twi]er.com/eminem Picture: 28
29 Consistency Consistent terminology Login or Sign In? Pick one. Do not mix Logout and Sign Out. Different terminology User Se`ngs Account Se`ngs User Preferences Account SeZngs 29
30 Example: Delete / Undo Confirma:on boxes are intrusive 30
31 Example: Delete / Undo Provide an Undo op:on 31
32 Aesthe:cs Beauty mavers. Direct correla:on to sales Clients will buy a sleeker looking sojware over one with more features 32
33 Please, do not design like this 33
34 SECURITY 34
35 ALWAYS think about security Sony Playsta:on Network Personal data of 77 million users stolen Lots of bad guys out there IBM monitors 150,000 security events per second Mostly automated, exploit common flaws Want to use your server as a bot Anonymous, LulzSec and others 35
36 XSS: Cross Site Scrip:ng AVacker injects a script into web page Contents of index.php: <input value= <? echo $_GET[ name ] > /> Request: index.php?name= /><script Escape HTML from all dynamic content before displaying Java has StringEscapeUZls.escapeHtml( ) 36
37 SQL Injec:on SELECT login_id, full_name FROM table WHERE = 'x' AND 1=(SELECT COUNT(*) FROM table);'; Always escape strings Use PreparedStatement (in Java) 37
38 Other Security Issues Always store passwords using one- way encryp:on Can not be decrypted Check for user privileges Specially when including or redireczng to other files Keep base system secure Stop unnecessary services Update regularly for security patches Use firewalls 38
39 RELIABILITY 39
40 Up:me Near- 100% availability is important System is always operazonal No data loss Backups and disaster recovery Remember Failures are correlated Human errors are common cause 40
41 Redundancy Hot Failover AutomaZc switch from failed to available system Hardware Redundancy RAID 10 mirror all data Two network switches, two Ethernet cards, two power supplies, two HBA (host bus adapter) controllers etc.. Redundant Infrastructure 41
42 Simplified Infrastructure Example Apache HTTPD Use of virtual IP to make sure the user is always directed to the server that is available. Apache acts as front- end proxy to redirect the request to backend Tomcat. ApplicaZon Server Tomcat is commonly used Java app server. Most code runs on this machine. Apache HTTPD Load Balancer and Proxy Pass module are used to provide failover and redundancy. Databases Master Slave replicated database servers. ApplicaZon server maintains the sate of each server to provide reliability. All writes must happen on master. 42
43 Monitoring Open Source CacZ Nagios Custom Internal System Check module Paid Hosted Site 24x7 43
44 PERFORMANCE 44
45 Performance and Scalability Don't op:mize un:l you need to Make code readable Use Profiler (for Java, Netbeans is great and free) Common tricks Cache Pre- compute Sample Parallelize Using mulz- core To different machines 45
46 Scalability, Consistency, Reliability You can only easily have two of the three Consistency: among mulzple replica of data Reliability: conznuous operazonal Scalability: growing with increase in number of users reliability consistency scalability 46
47 Caching and Pre- compu:ng User queries are correlated Caching is most common opzmizazon Must be willing to sacrifice some consistency Fully or par:ally pre- compute Every night, create useful stazszcs (e.g., a stazszcal histogram of word frequencies in search services) Sample Approximate results are fine 47
48 CPU Op:miza:ons Mul:- thread Java has package to manage Executors Pay a]enzon to thread safety Use op:mized collec:ons CERN Colt, GNU Trove to save memory Use a Profiler 48
49 Code Quality vs Performance KISS Keep It Simple Stupid KIWI Kill It With Iron Upgrade your hardware (more disks, more memory, etc.) 49
50 CONCLUSION 50
51 Ques:ons? 51
Large-Scale Web Applications
Large-Scale Web Applications Mendel Rosenblum Web Application Architecture Web Browser Web Server / Application server Storage System HTTP Internet CS142 Lecture Notes - Intro LAN 2 Large-Scale: Scale-Out
More informationScaling Without Sharding. Baron Schwartz Percona Inc Surge 2010
Scaling Without Sharding Baron Schwartz Percona Inc Surge 2010 Web Scale!!!! http://www.xtranormal.com/watch/6995033/ A Sharding Thought Experiment 64 shards per proxy [1] 1 TB of data storage per node
More informationMySQL HA Solutions. Keeping it simple, kinda! By: Chris Schneider MySQL Architect Ning.com
MySQL HA Solutions Keeping it simple, kinda! By: Chris Schneider MySQL Architect Ning.com What we ll cover today High Availability Terms and Concepts Levels of High Availability What technologies are there
More informationThe Ultimate Windows 10 Hardening Guide: What to Do to Make Hackers Pick Someone Else
The Ultimate Windows 10 Hardening Guide: What to Do to Make Hackers Pick Someone Else Paula Januszkiewicz CQURE: CEO, Penetration Tester CQURE Offices: New York, Dubai, Warsaw MVP: Enterprise Security,
More informationObjec&ves. Review: Security. Google s AI is wri&ng poetry SQL INJECTION ATTACK. SQL Injec&on. SQL Injec&on. Security:
Objec&ves Security: Ø Injec&on a6acks Ø Cross-site scrip&ng Ø Insecure direct object reference Group photo Review: Security Why has the Web become such a huge target? How can you protect against security
More informationReal World Web Scalability. Ask Bjørn Hansen Develooper LLC
Real World Web Scalability Ask Bjørn Hansen Develooper LLC Hello. 28 brilliant methods to make your website keep working past $goal requests/transactions/sales per second/hour/day Requiring minimal extra
More information<Insert Picture Here> MySQL Web Reference Architectures Building Massively Scalable Web Infrastructure
MySQL Web Reference Architectures Building Massively Scalable Web Infrastructure Mario Beck (mario.beck@oracle.com) Principal Sales Consultant MySQL Session Agenda Requirements for
More informationSQL Azure. Abhay Parekh Microsoft Corporation
SQL Azure By Abhay Parekh Microsoft Corporation Leverage this Presented by : - Abhay S. Parekh MSP & MSP Voice Program Representative, Microsoft Corporation. Before i begin Demo Let s understand SQL Azure
More informationBeBanjo Infrastructure and Security Overview
BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits
More informationSQL Server 2014 Training. Prepared By: Qasim Nadeem
SQL Server 2014 Training Prepared By: Qasim Nadeem SQL Server 2014 Module: 1 Architecture &Internals of SQL Server Engine Module : 2 Installing, Upgrading, Configuration, Managing Services and Migration
More informationWeb Application Penetration Testing
Web Application Penetration Testing COURSE BROCHURE & SYLLABUS Course Overview Web Application penetration Testing (WAPT) is the Security testing techniques for vulnerabilities or security holes in corporate
More informationApplication vulnerabilities and defences
Application vulnerabilities and defences In this lecture We examine the following : SQL injection XSS CSRF SQL injection SQL injection is a basic attack used to either gain unauthorized access to a database
More informationWHITE PAPER AGILOFT SCALABILITY AND REDUNDANCY
WHITE PAPER AGILOFT SCALABILITY AND REDUNDANCY Table of Contents Introduction 3 Performance on Hosted Server 3 Figure 1: Real World Performance 3 Benchmarks 3 System configuration used for benchmarks 3
More informationAvoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition
One Stop Virtualization Shop Avoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition Written by Edwin M Sarmiento, a Microsoft Data Platform
More informationReal Life Web Development. Joseph Paul Cohen
Real Life Web Development Joseph Paul Cohen joecohen@cs.umb.edu Index 201 - The code 404 - How to run it? 500 - Your code is broken? 200 - Someone broke into your server? 400 - How are people using your
More informationHow To Use My Alternative High
How To Use My Alternative High Preface Preface I put this together to address the issues and questions that come up all the time in class, especially for newer students. Preface I did this so that I could
More informationMinimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,
More informationMicrosoft SQL AlwaysOn and High Availability
Course 55153A: Microsoft SQL AlwaysOn and High Availability Course details Course Outline Module 1: Course Overview This module explains how the class will be structured and introduces course materials
More informationStorage Area Network (SAN) Training Presentation. July 2007 IBM PC CLUB Jose Medeiros Storage Systems Engineer MCP+I, MCSE, NT4 MCT
Storage Area Network (SAN) Training Presentation July 007 IBM PC CLUB Jose Medeiros Storage Systems Engineer MCP+I, MCSE, NT MCT Agenda Training Objectives Basic SAN information Terminology SAN Infrastructure
More informationNET 311 D INFORMATION SECURITY
1 NET 311 D INFORMATION SECURITY Networks and Communication Department TUTORIAL 6 :Securing Your Windows 8 System 4 Steps to secure your windows 8 system 2 1. Configure Windows 8 Settings. 2. Installing
More informationHigh Availability Overview Paper
High Availability Overview Paper March 2001 Please note: The information contained in this document is intended as a guide to implementing high availability systems. Please keep in mind, however, that
More informationPolarion 18.2 Enterprise Setup
SIEMENS Polarion 18.2 Enterprise Setup POL005 18.2 Contents Overview........................................................... 1-1 Terminology..........................................................
More informationTomcatCon London 2017 Clustering Mark Thomas
TomcatCon London 2017 Clustering Mark Thomas Agenda Reverse Proxies Load-balancing Clustering Reverse Proxies bz.apache.org httpd instance Reverse Proxy Bugzilla (main) bz.apache.org/bugzilla httpd instance
More informationCloud FastPath: Highly Secure Data Transfer
Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance
More informationIntroduction Chapter 1. General Information Chapter 2. Servers Used... 9
Chapter 1 General Information Contents Contents Introduction... 5 Chapter 1. General Information... 6 Chapter 2. Servers Used... 9 Chapter 3. Installing and Configuring Failover Cluster for MS SQL Databases...
More informationARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS
ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS Dr Adnene Guabtni, Senior Research Scientist, NICTA/Data61, CSIRO Adnene.Guabtni@csiro.au EC2 S3 ELB RDS AMI
More informationDisaster Recovery (DR) Planning with the Cloud Desktop
with the Cloud Desktop Info@RIAWorkSpace.com 877.361.3499 www.riaworkspace.com In preparing for the unexpected, most companies put specific disaster recovery plans in place. Without planning, recovering
More informationWeb Applications. Software Engineering 2017 Alessio Gambi - Saarland University
Web Applications Software Engineering 2017 Alessio Gambi - Saarland University Based on the work of Cesare Pautasso, Christoph Dorn, Andrea Arcuri, and others ReCap Software Architecture A software system
More informationHosting with Eduphoria
Hosting with Eduphoria Hosted Migration Process What does my district need to do? How will this migration effect my district? Eduphoria's Hosted Environment Hosted vs Self hosted features User Account
More informationWeb Pen Tes)ng. Michael Hicks CMSC 498L, Fall 2012 Part 2 slides due to Eric Eames, Lead Penetra)on Tester, SAIC, March 2012
Web Pen Tes)ng Michael Hicks CMSC 498L, Fall 2012 Part 2 slides due to Eric Eames, Lead Penetra)on Tester, SAIC, March 2012 Exploi)ng Vulnerabili)es Code injec)on Cross site scrip)ng, SQL injec)on, (buffer
More informationAchieving Horizontal Scalability. Alain Houf Sales Engineer
Achieving Horizontal Scalability Alain Houf Sales Engineer Scale Matters InterSystems IRIS Database Platform lets you: Scale up and scale out Scale users and scale data Mix and match a variety of approaches
More informationHigh Availability- Disaster Recovery 101
High Availability- Disaster Recovery 101 DBA-100 Glenn Berry, Principal Consultant, SQLskills.com Glenn Berry Consultant/Trainer/Speaker/Author Principal Consultant, SQLskills.com Email: Glenn@SQLskills.com
More informationSSL - Testing The Purchase Process. How To Make Test Purchases in Order to Understand the Purchase Process
SSL - Testing The Purchase Process How To Make Test Purchases in Order to Understand the Purchase Process Updated: January 6, 2018 Table of Contents Table of Contents Overview... 1 Setting Up Testing Mode...
More informationMapReduce. Cloud Computing COMP / ECPE 293A
Cloud Computing COMP / ECPE 293A MapReduce Jeffrey Dean and Sanjay Ghemawat, MapReduce: simplified data processing on large clusters, In Proceedings of the 6th conference on Symposium on Opera7ng Systems
More informationCISC 7610 Lecture 5 Distributed multimedia databases. Topics: Scaling up vs out Replication Partitioning CAP Theorem NoSQL NewSQL
CISC 7610 Lecture 5 Distributed multimedia databases Topics: Scaling up vs out Replication Partitioning CAP Theorem NoSQL NewSQL Motivation YouTube receives 400 hours of video per minute That is 200M hours
More informationPeerStorage Arrays Unequalled Storage Solutions
Simplifying Networked Storage PeerStorage Arrays Unequalled Storage Solutions John Joseph, VP of Marketing EqualLogic,, 9 Townsend West, Nashua NH 03063 Phone: +1-603 603-249-7772, FAX: +1-603 603-579-6910
More informationArchitekturen für die Cloud
Architekturen für die Cloud Eberhard Wolff Architecture & Technology Manager adesso AG 08.06.11 What is Cloud? National Institute for Standards and Technology (NIST) Definition On-demand self-service >
More informationSite Performance, Optimization and Scalability Alan Dixon
Site Performance, Optimization and Scalability Alan Dixon http://blackflysolutions.ca/ Khalid Baheyeldin http://2bits.com DrupalCamp Toronto 2011 Agenda Introduction Symptoms and Tips Hardware and Software
More informationChapter 12 Databases and Database Management Systems
Chapter 12 Databases and Database Management Systems permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. What Is a Database?
More informationMicrosoft SQL AlwaysOn and High Availability
Microsoft SQL AlwaysOn and High Availability 55153; 2 Days, Instructor-led Course Description This two-day instructor-led course is designed for database administrators to familiarize them with the concepts
More informationCloud Computing. What is cloud computing. CS 537 Fall 2017
Cloud Computing CS 537 Fall 2017 What is cloud computing Illusion of infinite computing resources available on demand Scale-up for most apps Elimination of up-front commitment Small initial investment,
More informationMicrosoft SQL Server
Microsoft SQL Server Abstract This white paper outlines the best practices for Microsoft SQL Server Failover Cluster Instance data protection with Cohesity DataPlatform. December 2017 Table of Contents
More informationScaling Databases with DBIx::Router. Perrin Harkins We Also Walk Dogs
Scaling Databases with DBIx::Router Perrin Harkins We Also Walk Dogs What is DBIx::Router? Load-balancing Failover Sharding Transparent (Mostly.) Why would you need this? Web and app servers are easy to
More informationOWASP Top 10 Risks. Many thanks to Dave Wichers & OWASP
OWASP Top 10 Risks Dean.Bushmiller@ExpandingSecurity.com Many thanks to Dave Wichers & OWASP My Mom I got on the email and did a google on my boy My boy works in this Internet thing He makes cyber cafes
More informationMaintMaster Technical White Paper
MaintMaster Technical White Paper Welcome to MaintMaster! MaintMaster is a leading tool for return on operational reliability for discrete manufacturing. This White Paper covers most of the technical aspects
More informationHA solution with PXC-5.7 with ProxySQL. Ramesh Sivaraman Krunal Bauskar
HA solution with PXC-5.7 with ProxySQL Ramesh Sivaraman Krunal Bauskar Agenda What is Good HA eco-system? Understanding PXC-5.7 Understanding ProxySQL PXC + ProxySQL = Complete HA solution Monitoring using
More informationEnterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE
Enterprise Overview Benefits and features of s Enterprise plan 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com This paper summarizes the benefits and features of s Enterprise plan. State of
More informationEnterprise Open Source Databases
Enterprise Open Source Databases WHITE PAPER MariaDB vs. Oracle MySQL vs. EnterpriseDB MariaDB TX Born of the community. Raised in the enterprise. MariaDB TX, with a history of proven enterprise reliability
More informationHOW TO PLAN & EXECUTE A SUCCESSFUL CLOUD MIGRATION
HOW TO PLAN & EXECUTE A SUCCESSFUL CLOUD MIGRATION Steve Bertoldi, Solutions Director, MarkLogic Agenda Cloud computing and on premise issues Comparison of traditional vs cloud architecture Review of use
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationAn analysis of security in a web application development process
An analysis of security in a web application development process Florent Gontharet Ethical Hacking University of Abertay Dundee MSc Ethical Hacking 2015 Table of Contents Abstract...2 Introduction...3
More informationChapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al.
Chapter 6: Distributed Systems: The Web Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter Outline Web as a distributed system Basic web architecture Content delivery networks
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define
More informationProperties of High Quality Software. CSE219, Computer Science III Stony Brook University
Properties of High Quality Software CSE219, Computer Science III Stony Brook University http://www.cs.stonybrook.edu/~cse219 Software Engineering Basics Important Principles for creating a Software Solution:
More informationDeployment. Chris Wilson, AfNOG / 26
Deployment Chris Wilson, AfNOG 2016 1 / 26 About this presentation Based on previous talks by Joel Jaeggli, Evelyn Namara and NSRC, with thanks! You can access this presentation at: Online: http://afnog.github.io/sse/apache/
More informationBUSINESS CONTINUITY: THE PROFIT SCENARIO
WHITE PAPER BUSINESS CONTINUITY: THE PROFIT SCENARIO THE BENEFITS OF A COMPREHENSIVE BUSINESS CONTINUITY STRATEGY FOR INCREASED OPPORTUNITY Organizational data is the DNA of a business it makes your operation
More informationIntroduction to the Weebly Toolkit for Building Websites
Introduction to the Weebly Toolkit for Building Websites Maureen Pratchett July 2015 1 Objective The purpose of this workshop is not to teach you how to design or even build a website, but rather to introduce
More informationAn Application for Monitoring Solr
An Application for Monitoring Solr Yamin Alam Gauhati University Institute of Science and Technology, Guwahati Assam, India Nabamita Deb Gauhati University Institute of Science and Technology, Guwahati
More informationUsing EonStor DS Series iscsi-host storage systems with VMware vsphere 5.x
Using EonStor DS Series iscsi-host storage systems with VMware vsphere 5.x Application notes Abstract These application notes explain configuration details for using Infortrend EonStor DS Series iscsi-host
More informationConfiguring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.
Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure
More informationGroupWise Architecture and Best Practices. WebAccess. Kiran Palagiri Team Lead GroupWise WebAccess
GroupWise Architecture and Best Practices WebAccess Kiran Palagiri Team Lead GroupWise WebAccess kpalagiri@novell.com Ed Hanley Senior Architect ed.hanley@novell.com Agenda Kiran Palagiri Architectural
More informationBrocade Virtual Traffic Manager and Parallels Remote Application Server
White Paper Parallels Brocade Virtual Traffic Manager and Parallels Deployment Guide 01 Contents Preface...4 About This Guide...4 Audience...4 Contacting Brocade...4 Internet...4 Technical Support...4
More informationMySQL in the Cloud Tricks and Tradeoffs
MySQL in the Cloud Tricks and Tradeoffs Thorsten von Eicken CTO RightScale 1 MySQL & Amazon EC2 @RightScale Operating in Amazon EC2 since fall 2006 Cloud Computing Management System Replicated MySQL product
More informationSQL Server DBA Course Details
SQL Server DBA Course Details By Besant Technologies Course Name Category Venue SQL Server DBA Database Administration Besant Technologies No.24, Nagendra Nagar, Velachery Main Road, Address Velachery,
More information@joerg_schad Nightmares of a Container Orchestration System
@joerg_schad Nightmares of a Container Orchestration System 2017 Mesosphere, Inc. All Rights Reserved. 1 Jörg Schad Distributed Systems Engineer @joerg_schad Jan Repnak Support Engineer/ Solution Architect
More informationCarrier grade VoIP systems with Kamailio
Carrier grade VoIP systems with Kamailio Welcome! Kamailio project 1&1 Internet AG Linuxtag 2009, 24.06.2009 Outline 1. 1&1 VoIP backend purpose and usage architecture 2. Kamailio SIP server 3. High-availability
More informationSearch Engines. Information Retrieval in Practice
Search Engines Information Retrieval in Practice All slides Addison Wesley, 2008 Web Crawler Finds and downloads web pages automatically provides the collection for searching Web is huge and constantly
More informationLinux Administration
Linux Administration This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. It is designed for professionals
More informationZENworks Mobile Workspace High Availability Environments. September 2017
ZENworks Mobile Workspace High Availability Environments September 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
More informationInformation Security Policy
Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated
More informationElephantSQL. PostgreSQL as a Service. Product overview. Last Updated
ElephantSQL PostgreSQL as a Service Product overview Table of Contents...1 ElephantSQL...3 PostgreSQL as a Service...3 What is PostgreSQL?...3 Product overview...4 Product Details...4 SQL Browser...4 Other
More informationArcGIS Server Web Server Web Applications WWW. Applications. ArcGIS Server Manager. GIS Server. Data. Desktop GIS. ArcGIS Desktop (content author) SOM
ArcGIS Server on Linux and Unix Architecture and Deployment Recommendations Peter D Souza and Ravi Narayanan Developer Summit 2007 1 Our Assumptions Familiarity with ArcGIS Server Familiarity with Solaris
More informationDeveloping Enterprise Cloud Solutions with Azure
Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course
More information18-642: Security Mitigation & Validation
18-642: Security Mitigation & Validation 11/27/2017 Security Migitation & Validation Anti-Patterns for security mitigation & validation Poorly considered password policy Poorly considered privilege management
More informationSystem Structure. Steven M. Bellovin December 14,
System Structure Steven M. Bellovin December 14, 2015 1 Designing a System We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin December 14, 2015
More informationRTView Data Server SL Corporation. All Rights Reserved Sherrill-Lubinski Corporation. All Rights Reserved.
RTView Data Server Data Server - Benefits By default, RTView clients connect to data sources (SQL, TIBCO, JMX, etc) directly. However, data from any source can be redirected through the Data Server. Reasons
More informationScaleArc for SQL Server
Solution Brief ScaleArc for SQL Server Overview Organizations around the world depend on SQL Server for their revenuegenerating, customer-facing applications, running their most business-critical operations
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationPT Unified Application Security Enforcement. ptsecurity.com
PT Unified Application Security Enforcement ptsecurity.com Positive Technologies: Ongoing research for the best solutions Penetration Testing ICS/SCADA Security Assessment Over 700 employees globally Over
More informationJeffrey Garbus. ASE Administration. SAP* ASE 16/Sybase. 9 Rheinwerk. Publishing. Bonn Boston
Jeffrey Garbus SAP* ASE 16/Sybase ASE Administration 9 Rheinwerk Publishing Bonn Boston Acknowledgments 23 Preface 25 Introduction to SAP ASE System Administration 27 1.1 Placement within the SAP Landscape
More informationNext-Generation Cloud Platform
Next-Generation Cloud Platform Jangwoo Kim Jun 24, 2013 E-mail: jangwoo@postech.ac.kr High Performance Computing Lab Department of Computer Science & Engineering Pohang University of Science and Technology
More informationDEEP DIVE INTO CLOUD COMPUTING
International Journal of Research in Engineering, Technology and Science, Volume VI, Special Issue, July 2016 www.ijrets.com, editor@ijrets.com, ISSN 2454-1915 DEEP DIVE INTO CLOUD COMPUTING Ranvir Gorai
More informationvfire Officer App Server Installation Guide Version 1.3
vfire Officer App Server Installation Guide Table of Contents Version Details 3 Online Support 3 Copyright 3 About this Document 5 Intended Audience 5 Standards and Conventions 5 vfire Officer App Prerequisites
More informationCOPYRIGHTED MATERIAL. Introducing VMware Infrastructure 3. Chapter 1
Mccain c01.tex V3-04/16/2008 5:22am Page 1 Chapter 1 Introducing VMware Infrastructure 3 VMware Infrastructure 3 (VI3) is the most widely used virtualization platform available today. The lineup of products
More informationIT Service Delivery and Support Week Three. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao
IT Service Delivery and Support Week Three IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 Infrastructure Essentials Computer Hardware Operating Systems (OS) & System Software Applications
More informationThe Care and Feeding of a MySQL Database for Linux Adminstrators. Dave Stokes MySQL Community Manager
The Care and Feeding of a MySQL Database for Linux Adminstrators Dave Stokes MySQL Community Manager David.Stokes@Oracle.com Simple Introduction This is a general introduction to running a MySQL database
More informationHigh Noon at AWS. ~ Amazon MySQL RDS versus Tungsten Clustering running MySQL on AWS EC2
High Noon at AWS ~ Amazon MySQL RDS versus Tungsten Clustering running MySQL on AWS EC2 Introduction Amazon Web Services (AWS) are gaining popularity, and for good reasons. The Amazon Relational Database
More informationIntroduction to Database Services
Introduction to Database Services Shaun Pearce AWS Solutions Architect 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Today s agenda Why managed database services? A non-relational
More informationHigh Availability- Disaster Recovery 101
High Availability- Disaster Recovery 101 DBA-100 Glenn Berry, Principal Consultant, SQLskills.com Glenn Berry Consultant/Trainer/Speaker/Author Principal Consultant, SQLskills.com Email: Glenn@SQLskills.com
More informationIBM System Storage DS5020 Express
IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (FC/iSCSI) enables SAN tiering Balanced performance well-suited for
More informationSwitching to Innodb from MyISAM. Matt Yonkovit Percona
Switching to Innodb from MyISAM Matt Yonkovit Percona -2- DIAMOND SPONSORSHIPS THANK YOU TO OUR DIAMOND SPONSORS www.percona.com -3- Who We Are Who I am Matt Yonkovit Principal Architect Veteran of MySQL/SUN/Percona
More informationApplication Security through a Hacker s Eyes James Walden Northern Kentucky University
Application Security through a Hacker s Eyes James Walden Northern Kentucky University waldenj@nku.edu Why Do Hackers Target Web Apps? Attack Surface A system s attack surface consists of all of the ways
More informationScaling MongoDB: Avoiding Common Pitfalls. Jon Tobin Senior Systems
Scaling MongoDB: Avoiding Common Pitfalls Jon Tobin Senior Systems Engineer Jon.Tobin@percona.com @jontobs www.linkedin.com/in/jonathanetobin Agenda Document Design Data Management Replica3on & Failover
More informationPersistence & State. SWE 432, Fall 2016 Design and Implementation of Software for the Web
Persistence & State SWE 432, Fall 2016 Design and Implementation of Software for the Web Today What s state for our web apps? How do we store it, where do we store it, and why there? For further reading:
More informationWEB SECURITY: XSS & CSRF
WEB SECURITY: XSS & CSRF CMSC 414 FEB 22 2018 Cross-Site Request Forgery (CSRF) URLs with side-effects http://bank.com/transfer.cgi?amt=9999&to=attacker GET requests should have no side-effects, but often
More informationPolarion 18 Enterprise Setup
SIEMENS Polarion 18 Enterprise Setup POL005 18 Contents Terminology......................................................... 1-1 Overview........................................................... 2-1
More informationHigh performance and functionality
IBM Storwize V7000F High-performance, highly functional, cost-effective all-flash storage Highlights Deploys all-flash performance with market-leading functionality Helps lower storage costs with data
More informationDesign and Implementation of Real-time Visualization tool for Network Security Monitoring
Design and Implementation of Real-time Visualization tool for Network Security Monitoring Aneela Safdar Supervisor : Dr. Hanif Durad Co-Supervisor : M. Masoom Alam DCIS PIEAS Motivation To look what s
More informationiscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard
iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard On February 11 th 2003, the Internet Engineering Task Force (IETF) ratified the iscsi standard. The IETF was made up of
More informationOracle Exadata X7. Uwe Kirchhoff Oracle ACS - Delivery Senior Principal Service Delivery Engineer
Oracle Exadata X7 Uwe Kirchhoff Oracle ACS - Delivery Senior Principal Service Delivery Engineer 05.12.2017 Oracle Engineered Systems ZFS Backup Appliance Zero Data Loss Recovery Appliance Exadata Database
More information