Using the AWS CDK In Real Life
Another Charioteer rolls their own security camera system. This time in the cloud, with the shiny new AWS CDK.
Another Charioteer rolls their own security camera system. This time in the cloud, with the shiny new AWS CDK.
AWS gives you two ways to store application configuration: Secrets Manager and Systems Manager Parameter Store. Both can store arbitrary configuration data. Both use IAM (Identity and Access Management) policies to control access. Both can encrypt the data. So which should you pick?
Check out our YouTube playlist to watch all the talks from Emerging Technologies for the Enterprise 2020. Abstract In this talk, Christopher Oster (Chief Software Systems Architect at Lutron Electronics) will provide a deep dive into the challenges and architectural considerations required to build a highly secure, responsive and scalable IoT cloud connecting a million … Read More
Cloud computing has reduced engineering costs and improved delivery effectiveness drastically over the last decade, but new systems and features can still see lead times of weeks or months even for a prototype release, and operations costs are still often inefficiently managed. Modern approaches in cloud computing, including the new area of serverless architectures, tackle … Read More
Despite the hype, deploying and running these containers in the real world is still a challenge. Today’s container frameworks force developers to compensate for many surprisingly restrictive operational constraints. Teams adopt containers only for stateless services, leaving behind many of their advantages in improving operability for the entire stack. The Autopilot Pattern is a powerful … Read More
Containers are not a new technology, but in recent years they’ve taken off and are changing the way software is deployed and managed. This talk will discuss why containers are such a hot topic right now, outlining current industry trends such as how virtualization and containerization are converging. John will also look at the road … Read More
The popular nosql database Cassandra eschews a master/slave partitioning design in favor of a fully peer-to-peer model which makes it robust and scalable but adds significant complexity to some areas of its design. I will explain the challenges and successes Cassandra has had in creating lightweight transactions, materialized views, and strongly consistent cluster membership within … Read More
With the creation of the Scala Center, Scala has achieved a level of open source collaboration that is heretofore unseen, where the worlds of government, academia, corporate enterprise and community are now actively engaging in a positive way to move the language forward in multiple dimensions. However, most other open source technologies do not have … Read More
The topic of DevSecOps is starting to percolate in the technology world’s brew. There are presentations, manifestos, blogs, and conference sessions all dedicated to the practice. As humble practitioners of the DevSecOps craft, this talk will focus on the Starbucks efforts to securely develop, deploy, and support a unified commerce platform for one of the … Read More
Data integration is a difficult problem. We know this because 80% of the time in every project is spent getting the data you want the way you want it. We know this because this problem remains challenging despite 40 years of attempts to solve it. All we want is a service that will be reliable, … Read More