Home AWS Solution Architect Associate Exam Questions AWS News AWS Exam PDF

Featured Post

How to Pass AWS Certified Solutions Architect Associate SAA-C02 Exam in 2022?

 The AWS Certified Solution Architect Associate exam is the first step in a career in cloud computing. However, before you get started, you...

Sunday, September 29, 2019

Do Oracle's Claims About AWS Pass Scrutiny?

It was a major a week ago for big business IT occasions. Notwithstanding Pure Storage's Accelerate occasion, Oracle held its yearly client and accomplice journey, OpenWorld 2019. I went to Pure's occasion in the place where I grew up of Austin and had investigator Mark Vena go to the Oracle occasion in San Francisco.

I had the option to see the OpenWorld 2019 keynotes and observed Twitter, however, and wow was it fiery! Prophet referenced AWS more than I have ever observed an enormous organization talk about its rival. I had a couple of press, and even different examiners get some information about a portion of Oracle's cases identified with Amazon's AWS. I needed to get underneath them here and contrast with my very own compass. Net-net, I don't trust Oracle presented its defense against AWS.

Foundation

Prophet and AWS have altogether different plans of action AWS is an unadulterated cloud merchant principally in IaaS and PaaS with some half breed contributions like Snowball and Outposts, and Oracle is fundamentally an on-prem database and applications seller with some SaaS and IaaS contributions. That doesn't prevent the two from crashing at many, numerous clients. So how about we make a plunge.

I condense the Oracle guarantee, legitimately quote Oracle CEO Larry Ellison from the keynote, outline what I think Ellison is stating, and afterward give my take.

1/Oracle Claim: Autonomous frameworks wipe out human work, and when you take out human work you kill pilot blunder.

Ellison's Quote: "Self-ruling frameworks take out human work and when you kill human work you wipe out pilot blunder. In the event that you wipe out human blunder in self-ruling frameworks you kill information robbery. Mists are muddled. People commit errors. The Amazon information rupture, where Capital One had 100 million of their clients lose their own data happened in light of the fact that somebody committed an error. Somebody made a setup mistake. Presently, Amazon takes what I believe is a truly sensible position, saying, hello, you misconfigured the framework. That is your mix-up. We at Amazon can't be mindful. In the Oracle Autonomous Cloud, when you utilize the Oracle Autonomous Database, it designs itself. It's unrealistic for clients to make arrangement blunders on the grounds that there are no pilots to make mistakes. The framework designs itself. So in the AWS cloud, in the event that you make a blunder and it prompts cataclysmic information misfortune, it's on you. In the Oracle Cloud, when you utilize the independent database, the database consequently arrangements itself. The framework naturally designs itself. It naturally encodes itself. It consequently backs itself. All the security frameworks are programmed. People aren't included. There can be no human mistake." You can discover this at 4:20 in the session here.

Pat's Summary: The reason here was that on the off chance that you dispose of human mistake with a self-sufficient framework, you wipe out information robbery. Capital One was utilized for instance where 100M individuals were affected a programmer abusing a misconfigured outsider Web Application Firewall, a human blunder. Somebody committed an error, and Amazon doesn't acknowledge duty regarding client setup mistakes. As indicated by Oracle, The answer for this is Oracle's Autonomous Cloud administrations which naturally arrange themselves as Oracle clients are not ready to make setup blunders.

Pat's Take: I trust it's inconceivable for any cloud supplier, including Oracle, Microsoft Azure, Google Cloud, or IBM Cloud, to amazingly keep away from "design mistakes" in light of the fact that the extremely same activity by one client can be totally purposeful and vital and by another client, an arrangement blunder. One individual's open pail is another's shut container. Everybody's circumstance is diverse you truly can't state for sure that an open security gathering or even an open intermediary is a mistake. I am anticipating looking into progressively about Oracle's self-ruling database and Linux as the guarantee is intriguing. Most fascinating for me would be for a venture client state it has had no issues ever with the Autonomous database following a time of utilization.

2/Oracle guarantee: A solitary multi-reason database is superior to anything a few single-reason specific databases.

Ellison's statement: "This is only the start of a different design system. The one at Oracle where we state we are going to continue including highlights and information types and application types to the Oracle database, a solitary database, a solitary joined database that handles every one of your information types and every one of your applications versus Amazon saying that when something new comes up like the web of things, we'll give you a genuine quick IoT database. We have every one of the abilities in a single database. Amazon has a different database for the majority of one or the other makes a lot of issues. Every database has a section of your information. You must have specialists to keep up these databases." You can discover this at 30:40 in the session here.

Pat's Summary: The reason here is that numerous one of a kind and specific databases make issues and that every database has distinctive APIs, security models, recuperation methodology, and adaptability strategies. Each single-reason database has diverse operational qualities that require an alternate group with remarkable aptitudes. Every database has a part of client information. Prophet offers a solitary joined database that supports different information types like social, report, spatial, and diagram and application types, for example, exchanges, investigation, ML, and IoT.

Pat's Take: I accept a methodology of utilizing a social database as the main spot for your applications is an obsolete perspective. Hasn't this been the thought since the 90's? When has a one-size-fits-all methodology at any point worked effectively in tech the most recent 10 years? A ton has changed from that point forward. With a completely overseen cloud database administration, designers work with APIs and truly couldn't care less what is running out of sight as long as it offers execution, security, and unwavering quality at the correct value point. Reason fabricated, oversaw databases enable designers to fractalize complex applications into littler pieces and consequently utilizing the best device to take care of the issue, regardless of whether it be a sledge, screwdriver, or saw. AWS can rollout numerous client models like AirBnB who use DynamoDB for snappy queries and customized search, ElastiCache for quicker (sub-ms) site rendering, and Amazon Aurora as its essential value-based database. I will be intently observing Oracle's Swiss Army blade database and in the event that it can convey on the guarantee, will give it credit.

3/Oracle guarantee: Oracle can slice your AWS bill down the middle.

Ellison's statement: "It costs route less to run Oracle Autonomous Database than to run Redshift, Aurora, or any Amazon database. All things considered, the Oracle Autonomous Database kills human blunders, however it's arranged so that the system can fizzle, and the framework continues running, that a server can come up short, and the framework continues running. It's a deficiency tolerant framework. That is the reason we're in any event multiple times more solid than Amazon. I figure I may transform it one year from now to multiple times. Prophet Autonomous database is a whole lot quicker than Redshift. Presently, we demonstrated really, the Oracle Autonomous Database being seven, eight times quicker than Redshift when you are doing investigation. Aurora is their best value-based database. We were, again around eight or multiple times quicker. They're 7x more slow. That implies they're 7x increasingly costly. That is the reason it's so natural for us to ensure. You take any application off an Amazon database, move it to Oracle we'll ensure bringing your Amazon charge, we'll ensure that bill will go into equal parts." You can discover this at 19:30 in the session here.

Pat's Summary: The case says that it costs significantly less to run Oracle Autonomous Database than to run Redshift, Aurora, or any Amazon database and that is the reason Oracle is 25X more solid than Amazon, and one year from now could be 100X. Amazon is 7X more slow, likening to 7X more cost. Prophet pairs down and says clients can present to Oracle their Amazon contract and will ensure the bill will be half if the client goes with Oracle.

Pat's Take: Ellison is notorious in the business for making egotistic cases. Along these lines it was essential to take a gander at the fine print which says the case applies to database and information stockroom as it were. The cost cases don't cover different administrations including process, stockpiling, or any of the several AWS administrations. The head-scratcher for me is that AWS databases like Amazon Aurora can be 10% of the cost of Oracle databases and AWS says it has marked down costs multiple times since it propelled in 2006. The other thing I simply acknowledged in the previous year about AWS is that it attempts its best to drive trust with clients through "downshifting", or prescribing to the client how to bring down it costs. The "AWS Trusted Advisor" looks how a client is using administrations and will make proposals on the most proficient method to spend in an unexpected way. I figure Oracle would be best served to have huge undertakings give tributes on slicing their cloud bills down the middle by moving from AWS to Oracle.

4/Oracle guarantee: Oracle is the main cloud that offers secure information disengagement.

Ellison's statement: "The various mists have a common a mutual Intel PC. Who offers it? Indeed, Amazon has code in that PC and you have code in that PC. You may be the main occupant in that PC however you share that PC with Amazon. Amazon additionally has code in there. That is not how our own work. For our situation, you're the main inhabitant and our system control code is in a different PC with independent memory and that structures these safe confinement zones. Dangers can't get into (our) cloud. Gen 1 cloud, one shared Intel PC. Amazon can see your information and you can see Amazon's code. Both downright terrible thoughts. Try not to have the option to access cloud control code." You can discover this at 27:30 in the session here.

Pat's Summary: The reason here is that the various mists share an Intel-based server and that the client and Amazon has code in that server, regardless of whether it's single-inhabitant. As indicated by Oracle, the client is the just one with access and the system control code is in a different server with independent memory which makes "secure disconnection zones." With this, dangers can't get into the cloud. It proceeds to state that AWS can see client information and the client can see AWS's code, both which are ill-conceived notions. Clients shouldn't approach cloud control code and AWS shouldn't have information get to.

Pat's Take: Ellison is likely alluding to the way that in AWS's past engineering, when it utilized the Xen hypervisor, AWS had framework code running in the principle framework. Prophet's first-gen cloud worked like this as well. This is hypothetically more helpless than when virtualization code is kept running off the primary framework, as AWS does in its later Nitro engineering, and Oracle does on its second-age cloud. I don't accept there's anything here.

5/Oracle Claim: AWS Cloud Databases are not serverless or flexible.

Ellison's statement: "A great many people don't utilize DynamoDB. A great many people use Aurora, Redshift, RDS and a lot of the others. None of those are serverless and none of those are flexible. You need to scale up? Bring the framework down. The framework isn't running? Despite everything you need to pay for it. No servers are running? Really awful. You need to pick a shape. 10 centers and what happens when the application quits running? You pay for it. AWS Redshift not serverless. Amazon you need to scale up or down? That is vacation. Amazon, you fix? More personal time. With respect to of Oracle: We're discussing fundamental register. Fundamental stockpiling. Serverless when not running. Progressively scale itself up in various centers and measure of memory while it is running. That is what we're doing. No personal time. Scales up while it's running. Shouldn't something be said about capacity? Pick your beginning measure of capacity. As you need more stockpiling it will naturally scale up while it is running. No vacation." You can discover this at 43:40 in the session here.

Pat's Summary: AWS DynamoDB is a serverless, practically constrained database that not many clients use, rather picking to utilize Aurora or Redshift which are neither serverless or versatile. Along these lines, with Aurora or Redshift, you need to close down the database to physically scale up or down and pay for bigger designs than you need.

Pat's Take: Three AWS databases (Amazon Aurora, Amazon DynamoDB, Amazon Neptune) are serverless and versatile. AWS says that in excess of a hundred thousand clients use DynamoDB including Lyft, Airbnb, Samsung, Toyota, and Capital One to help strategic outstanding burdens. Amazon Aurora is serverless and flexible, offering highlights, for example, read imitations, serverless, and worldwide databases for single locale and cross-area failover. AWS says occasion failover regularly takes under 30 seconds. I'd like to see a type of Oracle and AWS cloud execution and unwavering quality "shoot-out".

6/Oracle Claim: Oracle has a bigger impression than AWS.

Ellison's statement: "We have 16 hyperscale locales around the globe today. All the Oracle areas run all the Oracle administrations. Every one of (our) administrations are accessible in the majority of the mists and that is our strategy. Amazon doesn't do that. Amazon has a few administrations some spot, a few administrations somewhere else... When we meet one year from now, we'll have a larger number of districts than AWS." You can discover this at 57:25 in the session here.

Pat's Summary: The contention says that the strategy at Oracle is that administrations are accessible in all districts, which Amazon doesn't do as it has a few administrations in certain locales. As of one year from now, Oracle said it will have more areas (36) than AWS (25). It proceeds to state that endeavor clients overall require topographically disseminated districts for genuine business coherence, catastrophe assurance, and local consistence necessities and that numerous accessibility spaces inside an area won't address this issue.

Pat's Take: I trust Oracle is contrasting apples and oranges here in view of the varying meaning of a "Locale". AWS has 69 Availability Zones (AZ's) in 22 Regions, and not at all like Oracle, every AZ has a datacenter. I trust AWS's AZ engineering is remarkable as it gives versatility (scaling and calamity) in a scale that Oracle doesn't have. Likewise of note is that Oracle included Azure and Azure datacenters under development in its examination, sort of like if AWS somehow happened to join forces with GCP and add GCP's ability to its own figures. Prophet isn't even in the best 10 of IaaS players where AWS is positioned #1.

Wrapping up

Prophet invested an unbelievable measure of energy discussing AWS in its OpenWorld 2019 keynotes. I don't trust Oracle put forth the defense on its egotistic cases against AWS, however I encourage you to watch the Oracle keynote here and the AWS re:Invent 2018 keynote here.

Sunday, September 22, 2019

AWS says servers secure after Malindo Air information rupture

Amazon Web Services (AWS) Singapore says all servers containing information of Malindo Air clients are verified "with no further vulnerabilities", and no installment subtleties spilled. This affirmation pursues a revealed security break that bargained individual information of 21 million travelers including that of Malindo's sister organization, Lion Air.

Criminological and information advisors additionally had been named to evaluate the general information security foundation, concentrating on traveler information insurance over all stages, said Malindo Air in an announcement Thursday. Also, it said healing measures including the notice of budgetary foundations, the police, and other applicable specialists had been built up.

The aircraft helped clients to be careful to remember suspicious or spontaneous calls just as email messages requesting confirmation of their own information.

The Malaysian bearer's declaration pursued a past explanation affirming that information of its clients that were facilitated on AWS' cloud stage may have been undermined. The cloud merchant, close by Malindo Air's web based business seller GoQuo, had started examining the break.

An AWS representative sent ZDNet this announcement in regards to the episode: "While we can't dive into insights about a client issue, it is essential to explain that AWS administrations and framework filled in as planned and were not traded off at all. Neither the utilization of cloud administrations nor the geographic area of the information had any bearing on the issue."

At the point when inquired as to why at that point was the information pail unbound, since it said its foundation "functioned as planned", the representative declined to remark, refering to it was not able talk about insights about a client issue.

What's more, in spite of its notice of the server area, the US cloud merchant additionally wouldn't affirm where the AWS servers containing Malindo Air's information dwelled or whether the carrier had given explicit directions on where its information ought to be put away. AWS additionally declined to remark on how the security episode was cured.

On its part, Malindo Air said it had set up "sufficient measures" that conformed to Malaysia's Personal Data Protection Act to guarantee its client information were not traded off. The aircraft included that it didn't store any installment subtleties of on its servers and were agreeable with the Payment Card Industry (PCI) Data Security Standard (DSS).

Individuals from Malindo Air's long standing customer program were additionally encouraged to change their passwords on the off chance that they had utilized comparative passwords on other online administrations.

The security rupture became known when Kaspersky Lab a week ago drove a tip to its cloud clients in Thailand, alarming them to exercise alert when overseeing approaching email and instant messages and calls. The Russian cybersecurity merchant said individual subtleties having a place with travelers of Lion Group's Malindo Air and Lion Air had been posted in online discussions and put at a bargain on the dull web.

The rupture allegedly was because of an unbound AWS information basin.


Check Point Software Technologies' Asia-Pacific head of cloud security, Michael Petit, said in a note: "Information put away in cloud administrations like AWS S3 pails are just as secure as their security arrangement settings. Cloud administrations are helpful, however require appropriate design for the most ideal security inside the bounds of such innovations.

"Organizations may have hundreds, thousands or even a large number of S3 pails or comparable cloud information stockpiling on other contending stages. With such multifaceted nature of information stockpiling in the cloud, it is basic for organizations to diligently review and address misconfigurations, as cloud administrations may likewise change their settings at times," Petit noted. "This is a fundamentally relentless and tedious procedure for organizations."

As indicated by Check Point, individual information bargained in the rupture incorporated the traveler's date of birth, international ID number, and versatile number.

Tuesday, September 10, 2019

Amazon Stock Is Facing Margin Pressure in AWS

For as far back as few quarters, Amazon has been announcing improvement in the working edge of AWS alongside quick income development, which aided in quicker development of all inclusive working pay. The fast improvement in working salary of AWS helped Amazon post better generally speaking pay and EPS.

The board has not referenced a particular explanations behind a log jam in AWS development in this quarter. More slow development of 37% in income and 24% in working salary could be a regular issue. Microsoft's (NASDAQ:MSFT) Azure likewise posted lower development numbers contrasted with past quarters. Amazon relies upon pay from AWS to make interests in different sections.

Is It A Macroeconomic Issue?

The year-over-year working pay development numbers for as far back as few quarters in AWS were promising. Prior to the last quarter, the development rates in working salary from Q1 2018 to Q1 2019 were 67%, 84%, 75%, 57%, and 51% individually. The income development for these quarters were 48%, 49%, 46%, 46%, and 42%. We can unmistakably observe that the working pay was developing a lot quicker than income development for these quarters because of progress in edges.

Notwithstanding, in the most recent quarter, the income development was 37% while working pay development was just 24%. This demonstrates a gigantic decrease in working edge while the income development is getting pressed.

This does not betoken well for the bullish assessment for Amazon stock. It stays to be checked whether this is a regular issue. Microsoft's Azure additionally posted a more slow development pace of 64% contrasted with past quarters.

One reason could be a general monetary lull as the exchange war defers more noteworthy ventures by organizations in their cloud framework.

The more slow development of working salary contrasted with income development by AWS shows valuing weight in the market. AWS had a trailing year income of over $30 billion with a working salary of $8.6 billion. It is additionally conceivable that AWS is beginning to see the impact of a huge base where it is hard to indicate steady development paces of a couple of quarters back.

Effect On Overall Business for AMZN Stock

Amazon has expanded its interests in different fragments like delivery, video substance and equipment by utilizing AWS as a money bovine. Subsequently, Amazon's development in different fragments will rely upon a solid exhibition in AWS.

Amazon's administration as of late reported a gigantic interest in structure its very own transportation stage which will permit one-day conveyance. This requires progressing speculation throughout the following couple of years. Also, Amazon is expanding the interest in video spilling as it fights with Netflix (NASDAQ:NFLX) and other new players entering this field. The video and music cost in the ongoing quarter was $1.8 billion which is about 85% of the working pay of AWS.

Amazon has additionally had the option to continue high misfortunes in a few worldwide markets like India in view of the solid working salary from AWS.

Every one of these sections — like video spilling, global markets, new benefits and quicker conveyance — should help the organization in improving its development runway. Be that as it may, without the succulent edges and benefits of AWS, it is hard to support misfortunes in these fragments.

Future Valuation of Amazon Stock

Amazon detailed a year-over-year plunge in working edge for the whole organization in the most recent quarter. This was after a long haul pattern of consistent improvement in working edge. The administration referenced that it was a result of heavier interests in delivery foundation in the last quarter.

Be that as it may, I accept a greater supporter of the decrease in working edge was AWS.

Amazon detailed 4.86% working edge contrasted with 5.64% in the year-back quarter. The $5.22 EPS in this quarter was superior to the year-prior quarter because of quicker income development.

The trailing year EPS for Amazon is $24 while the EPS gauges for two monetary years ahead is near $50. This would require gigantic improvement in working edge as the income development is giving indications of settling in adolescents. A major lump of extra working pay would need to originate from AWS as the majority of different fragments are in the early development stage. Henceforth, in the event that we see another quarter or two of more slow income development and working edge development inside AWS, it could prompt a development of bearish supposition towards Amazon stock.

Regardless I accept that Amazon is a decent purchase and-hold alternative, however it is imperative to watch out for the future pattern inside AWS.

Financial specialist Takeaway

Amazon revealed a generally more slow development of 37% in its AWS fragment in the most recent quarter. Be that as it may, the more significant measurement was the monstrous lull in working pay development which came at just 24% contrasted with 84% in the year-prior quarter. Purplish blue, the main opponent of AWS, is likewise revealing a stoppage in development rates.

It's significant for speculators to intently watch the future working salary pattern inside AWS to measure the edge development plausibility inside the organization.

As of this composition, Rohit Chhatwal did not hold a situation in any of the previously mentioned protections.

Sunday, September 1, 2019

VMware Everywhere—But AWS Still Key

As VMware revealed a far reaching cross breed cloud system this week at VMworld 2019, informing around explicit cloud organizations, especially Amazon Web Services, took a rearward sitting arrangement.

Since the on-premises virtualization pioneer's first raid into the open cloud in 2017 (not including the dead vCloud Air), VMware Cloud has nearly been synonymous with AWS, said Venu Thomas, CTO of New York-based Presidio, a powerhouse accomplice in VMware's channel.

Apparently, that relationship is as yet propelling full throttle. In any case, at the meeting that simply enveloped with San Francisco, not at all like in every one of the two years earlier, there weren't many direct specifies when all is said in done sessions about the co-built AWS arrangement or, so far as that is concerned, later hyper-scale accomplices Microsoft and Google.

Rather, "multi-cloud" was the trick for those connections, and VMware Hybrid Cloud Platform another offering advertised for its rationalism in broadening VMware innovation over all cutting edge foundation.

"They've taken all these various items that they've had, and they've packaged them into this item called the Hybrid Cloud Platform," Thomas told CRN.

That next degree of development in the organization's crossover aspirations, acknowledged by additionally working with Microsoft, Google and IBM, just as parent Dell Technologies, conveys remarkable cross-cloud portability by dispensing with the application refactoring process.

"We have a ton of clients refactoring their outstanding tasks at hand either back to on-prem or to another cloud," Thomas said. "What's more, I imagine that is the reason they would prefer not to blabber about AWS—on the grounds that they may pull remaining burdens off of AWS."

While the organization with Amazon kicked off something new, VMware has taken real walks in the years since in locally incorporating vSphere over various cloud goliaths, and now has completely grasped holders and Kubernetes through its Tanzu activity to convey multi-cloud convenientce.

The going with move in informing, be that as it may, shouldn't be translated as a de-accentuation of VMware Cloud on AWS, as prove by right around 200 breakout sessions during the time concentrated on each aspect of actualizing the joint innovation, Paul Delory, look into executive for server farm and cloud tasks at Gartner, told CRN.

"It's just regular that they'd tell the half and half cloud/multi-cloud story, instead of concentrating on one cloud specifically," Delory said.

Be that as it may, the Amazon partnership stays key to VMware's half breed methodology—highlighted in more breakout sessions than Kubernetes and regularly coming up in discussions with VMware officials and item administrators, Delory said.

"AWS is our key and favored accomplice in cloud," VMware representative Michael Thacker told CRN, taking note of the joint administration is prevailing in the market and now accessible in 16 AWS areas around the globe.

Rather than concentrating on VMware Cloud on AWS at VMworld, "VMware featured VMware Cloud itself and the intrigue of having a uniform, steady stage that has the additional advantage of compactness to various open cloud suppliers," Hetal Patel, senior VMware specialized lead for New Jersey-based Effectual, told CRN.

In any case, the joint AWS-VMware arrangement supplier still observes AWS as the leader segment of that advertising.

"VMware Cloud on AWS is VMware's most-all encompassing cloud arrangement that can possibly utilize adjoining AWS center administrations," Patel said. "Purplish blue, and Google are simply starting to exploit the exercises gained from VMware and AWS building endeavors."

As register develops, and VMware further embraces containerization, VMware carefully advanced its methodology to offer more prominent remaining task at hand versatility, he told CRN.

"Offering VMware Cloud on different stages tends to the assorted variety of administrations that are spread over various open cloud suppliers," Patel said.

With VMware Hybrid Cloud Platform, VMware has situated Cloud Foundation as its endeavor, multi-cloud working framework, said Presidio's Thomas.

"The greatest takeaway is that VMware is thinking of a bound together stage that stretches crosswise over working frameworks, applications, observing and investigation and security," Thomas stated, "And that is the thing that this entire crossover cloud stage is."