|By Jonathan Gershater||
|April 11, 2012 06:15 AM EDT||
I will simply explain each box in the above picture, at a high level, and explore further in future blog posts as I delve further into AWS.
(AWS is an abbreviation for Amazon Web Services)
Amazon Global Physical Infrastructure
AZ - Amazon zone - When you create an Amazon instance, you can select a region for your instance - USA, Eerope, AsiaPacific, Government/Federal. Separated zones - provided to allow for separate datacenters, power cooling and high availability.
Amazon EC2 - This is AWS' elastic compute cloud, the virtual hardware that makes up a customer's virtual datacenter that they store in the Amazon cloud. It is on-demand compute power that can scale up and down as needed; add/remove VMs as needed. Virtual hardware such as: virtual servers, Storage Attached Network, Firewalls and load balancers. Essentially the infrastructure. EC2 is AWS's IaaS run on XEN.
Instance - AMI - Amazon Machine Instance. An Amazon Virtual Machine on the XEN platform. AMI template from which VM is created and comes with a base Operating system: Windows, Linux, FreeBSD or openSolaris which can then be customized with additional software.
There are three payment models to pay for an AWS instance:
- on-demand - You pay list prices, for clock hour of services ued
- reserved instance - Pay up front for 1-3 years.; a lower hourly rate
- spot pricing - You bid to pay a certain price at a certain hour. then AWS establishes price for hour of compute time; re-evaluate market based on demand. This is often used in financial apps and biotech.
Instances are secured as follows:
- Security Groups - firewall, assign rules to a group, those rules only apply to systems in that group. VM belong to many groups. F/W on VM and network. Performance implication? only incoming not outgoing rule sets.
- keypair - used for linux SSH access or to decrypt the Windows Administrator password.
- inbound firewall All traffic is blocked by default until you create a rule to allow the traffic.
S3 - Simple Storage Service. This is AWS's object storage. Cloud based storage that is durable and can scale to high amounts of data. AWS's primary storage accessible through console, API, erd party tools. You place files as needed, no need to pre-allocate storage, it will scale as needed and has a sophisticated access control mechanism.
Elastic Block Storage - Block level storage, essentially a virtual hard-drive on which you can store files, a database. You can create snapshots of an EBS and perform backup, recovery or replication to/from different environments, eg: test to production.
Amazon VPC - Virtual Private Cloud. You can create isolated part of AWS and get full control of nnetworks, subnets, encrypted VPN gateways, Internet gateways. Often used by Enterprise and government customers customers.
LB - This allows you to load balance traffic across multiple EC2 instances to provide fault tolerance.
Route 53 - This is AWS's DNS, domain name service. It allows you to manage the DNS entries for your web applications.
Amazon RDS - Relational Database System. You can get an instance of MYSQL or Oracle 11g. AWS performs the automated backup, scaling, patches and provides multiple redundant copies of the database.
Amazon SimpleDB - A simple database. You store data pairs in this redundant database that does not require schema updates. SmipleDB is not a relational database. It is good for heavy read applications, not transactions nor data requiring complex relationships.
EMR - Elastic Map Reduce - This allows you to perform Hadoop style large scale parallel processing of data without the setup or configuration of Hadoop clusters. Examples are indexing, data mining, log file analysis, data warehousing, bio-informatics analysis and machine learning.
Dev Pay - Allows businesses to do online billing and account management, that make it easy for business to sell applications built on AWS. Customers can pay for your application using their existing Amazon accounts.
FPS - Flexible Payment Service - Allows customers to pay for goods purchased on your application hosted on AWs, using the customer's existing Amazon payments system.
Cloudfront - AWS's CDN Content Delivery Network - You can deliver static or dynamic content worldwide with as low a latency as possible. AWS moves content from S3 to localized servers. You get a URL from cloud front.
Mechanical Turk - This allows developers to tap into the international market of low-cost labor to perform repetitive "HITs" or Human Intelligence Tasks and then integrate the results of those tasks into their applications. For example: transcribing audio, identifying objects in video/photo or researching data details.
SNS - Simple Notification Service, Allows you to publish/subscribe per topic basis. this allows developers to publish messages from an application and immediately send them to subscribers (over HTTP,email, SMS). Subscribers don't need to poll/check for new messages.
SQS - Simple Queue Service - Allows you to buffer work on a queue; a hosted queue for storing messages as they travel between computers. Developers can move data between applications/computers.
SES - Simple Email Service - AWS's bulk and transactional email sending service.
IAM - Identity Access Management - Allows you to create individual user accounts with fine grained permissions and also access your corporate Directory stored outside of AWS.
MFA -MultiFactor Authentication - Users who authenticate using MFA, first enter a password, then a code from their MFA device. Something you know plus something you have.
Cloudwatch - monitoring metric data from Load Balancers etc
Deployment and Automation
Elastic Beanstalk - You upload an application and AWS creates runtime environment, takes care of databases, load balancers upgrades.
Cloud Formation - Provides templates for AWS infrastructure, security groups, design architecture and make copies on a repeatable basis.
Libraries and SDKs
Allows you to write code to use services using .Net, JAVA, Python
The web based AWS management console
Toolkit for Eclipse to build applications hosted on AWS.
Command line Interface
Use existing build tools, launch instances, create storage buckets, allows you to use make files and build scripts.
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
Oct. 21, 2016 12:15 PM EDT Reads: 857
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
Oct. 21, 2016 12:00 PM EDT Reads: 8,030
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...
Oct. 21, 2016 11:00 AM EDT Reads: 906
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Oct. 21, 2016 10:50 AM EDT Reads: 159
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Oct. 21, 2016 10:45 AM EDT Reads: 1,633
SYS-CON Events announced today that Transparent Cloud Computing (T-Cloud) Consortium will exhibit at the 19th International Cloud Expo®, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The Transparent Cloud Computing Consortium (T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data proces...
Oct. 21, 2016 10:30 AM EDT Reads: 1,219
Donna Yasay, President of HomeGrid Forum, today discussed with a panel of technology peers how certification programs are at the forefront of interoperability, and the answer for vendors looking to keep up with today's growing industry for smart home innovation. "To ensure multi-vendor interoperability, accredited industry certification programs should be used for every product to provide credibility and quality assurance for retail and carrier based customers looking to add ever increasing num...
Oct. 21, 2016 09:15 AM EDT Reads: 243
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
Oct. 21, 2016 08:45 AM EDT Reads: 11,117
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Oct. 21, 2016 08:45 AM EDT Reads: 1,365
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
Oct. 21, 2016 08:00 AM EDT Reads: 5,573
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Oct. 21, 2016 07:45 AM EDT Reads: 3,731
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Oct. 21, 2016 07:15 AM EDT Reads: 1,280
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service.
Oct. 21, 2016 07:15 AM EDT Reads: 877
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Oct. 21, 2016 06:45 AM EDT Reads: 1,788
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
Oct. 21, 2016 06:15 AM EDT Reads: 4,638
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessi...
Oct. 21, 2016 05:45 AM EDT Reads: 5,050
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Oct. 21, 2016 05:00 AM EDT Reads: 3,941
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Oct. 21, 2016 04:30 AM EDT Reads: 3,074
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Oct. 21, 2016 04:15 AM EDT Reads: 1,717
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
Oct. 21, 2016 04:00 AM EDT Reads: 10,932