Главная
Study mode:
on
1
Introduction
2
Kunals background
3
Why Im here
4
Computing Philosophy
5
Moores Law
6
Grids
7
Cloud Computing
8
Why AWS
9
Security Philosophy
10
Content and Context
11
Parsing
12
DNS
13
Private clouds
14
Load balancing
15
Networking needs
16
EC2 Instances
17
Smart Cache
18
SQS
19
Deployment
20
Learnings
21
Testing
22
Performance
23
Deployments
24
Hulkster
Description:
Explore a comprehensive conference talk on implementing a large-scale identity theft prevention solution using cloud technology. Dive into the architecture of a distributed platform built on AWS infrastructure, designed to generate, validate, and manage cryptographic tokens. Learn about the polyglot stack, custom caching and queuing technologies, and the utilization of AWS services such as SQS, DynamoDB, RDS, and EC2. Discover strategies for improving resiliency and business continuity, including A/Z and region failover. Gain insights into computing philosophy, Moore's Law, cloud computing, security principles, and practical aspects of deployment, testing, and performance optimization.

Implementing a Large Scale Identity Theft Prevention Solution Using the Cloud

LASCON
Add to list
0:00 / 0:00