Wikimedia architecture. Ryan Lane Wikimedia Foundation Inc.
|
|
|
- Gordon Houston
- 10 years ago
- Views:
Transcription
1 Wikimedia architecture Ryan Lane Wikimedia Foundation Inc.
2 Intro Our technical operations Global architecture Application servers Storage Caching Load balancing Content Delivery Network (CDN) The site architecture you can edit Community involvement Topics
3 Top fve worldwide sites Company Users Revenue Employees Server count 920 million $23 billion 20,600 1,000, million $58 billion 93,000 50, million 13,900 50, million $300 million 1,200 30, million $20 million $6 billion
4 Our operations Currently managed by ~6 ops engineers Historically ad-hoc, fre fghting mode Technical staff spread out globally Always someone awake...but no on-call Working to engage community operations contributors
5 Operations communication Most communication public on IRC Documentation in a wiki ( Sensitive communication via private lists and resource trackers
6 Architecture: LAMP...
7 ...on steroids.
8
9 The Wiki software All Wikimedia projects run on a MediaWiki platform Designed primarily for Wikimedia sites Open Source PHP software (GPL) Very scalable, very good localization
10 MediaWiki optimization We optimize by... caching expensive operations focusing on the hot spots in the code (profling!) If a MediaWiki feature is too expensive, it doesn't get enabled
11 MediaWiki caching Caches everywhere Most of this data is cached in Memcached, a distributed object cache
12 MediaWiki profling
13
14 Core databases One master, many replicated slaves Separate database per wiki Load balanced reads to slaves, write operations to master Separate big, popular wikis from smaller wikis (sharding)
15
16 Media storage Current solution is not scalable Replacing with an open source distributed fle system Likely OpenStack Swift
17 Thumbnail generation stat() on each request is too expensive, so assume every fle exists If a thumbnail doesn t exist, ask the application servers to render it
18
19 Squid caching Caching reverse HTTP proxy Serves most of our traffc Split into two groups Hit rates: 95% for Text, 98% for Media, since the use of CARP
20 CARP
21 Squid cache invalidation Wiki pages are edited at an unpredictable rate Users should always see current revision Invalidation through expiry times not acceptable Purge implemented using multicast UDP based HTCP protocol
22 Varnish Caching 2-3 times more effcient than Squid Will eventually replace the Squid architecture Currently used for delivering static content such as javascript and css fles (bits)
23
24 Load Balancing: LVS-DR Linux Virtual Server The load balancer divides incoming traffc over the real servers Return traffc goes directly! Direct Routing mode All real servers share the same IP address
25
26 Content Distribution Network (CDN) 2 clusters on 2 different continents: Primary cluster in Tampa, Florida Secondary caching-only cluster in Amsterdam Adding a new primary datacenter in Virginia
27
28 Geographic Load Balancing Most users use DNS resolver close to them Using PowerDNS with a Geobackend Map IP address of resolver to a country code Deliver CNAME of close datacenter entry based on country
29 The Site Architecture You Can Edit Membase? Swift Mobile? Varnish
30 Test/Dev Architecture
31 Basic use case Ops makes initial default project Clone of production cluster Used for most test/dev New projects mirror community or foundation initiatives Devs build architecture in new project Project moved to production cluster Devs request merge for puppet changes via gerrit Project instances moved to default project and tested
32 How to engage the community Discuss Commit Participate
33 How to engage the community Document Communicate changes
34 Our philosophy Engage early Release early, release often Scratch your own itch
35 Coding for WMF: Security Security is important. Really. People rely on developers to write secure code, so: An insecure extension in SVN... An insecure extension on Wikipedia...
36 Common vulnerabilities to avoid SQL injection Cross site scripting (XSS) Cross site request forgery (CSRF) Register Globals
37 General notes on security Don't trust anyone Sanitize all input Write code that is demonstrably secure Best of all: try to break and hack your own code
38 Coding for WMF: Scalability and performance Wikimedia sites are huge th 5 most visited web presence Code must be: Performant Scalable
39
40 Coding for WMF: Scalability and performance Cache Profle Optimize Ask for advice!
41 Coding for WMF: Concurrency Assume a clustered architecture, always Your code will run concurrently It can result in strange bugs
42 Closing notes We rely heavily on open source Always looking for effciencies Looking for more effcient management tools Looking for more contributors
43 Questions, comments? Ryan Lane IRC: Freenode, Nick: Ryan_Lane, Channels: #wikimediatech, #wikimedia-operations, #mediawiki, #openstack
44 Communication resources Mailing lists Important lists: mediawiki-l: A MediaWiki support list wikitech-l: A MediaWiki developer's list mediawiki-api: A MediaWIki developer's list for the API IRC channels (on freenode) #mediawiki: A MediaWiki support channel
45 Developer resources - developer hub Developer hub: lists resources, guidelines, and code documentation How to become a MediaWiki hacker: introduction into how to do MediaWiki development Security for developers: essential security documentation
46 Developer resources Coding conventions: conventions required for all Wikimedia run software Localisation: resources to write code that can be easily localised Code review guide: how your code will be reviewed before inclusion
Wikimedia Architecture Doing More With Less. Asher Feldman <[email protected]> Ryan Lane <[email protected]> Wikimedia Foundation Inc.
Wikimedia Architecture Doing More With Less Asher Feldman Ryan Lane Wikimedia Foundation Inc. Overview Intro Scale at WMF How We Work Architecture Dive Top Five
Wikimedia architecture. Mark Bergsma <[email protected]> Wikimedia Foundation Inc.
Mark Bergsma Wikimedia Foundation Inc. Overview Intro Global architecture Content Delivery Network (CDN) Application servers Persistent storage Focus on architecture, not so much on
Wikimedia Infrastructure. Roan Kattouw
Wikimedia Infrastructure Roan Kattouw WikiWhat? Encyclopedia Wiki software Volunteer-run GPL No staff editors Volunteer and staff devs 3rd party users Movement WP + sister projects Non-profit foundation
Common Server Setups For Your Web Application - Part II
Common Server Setups For Your Web Application - Part II Introduction When deciding which server architecture to use for your environment, there are many factors to consider, such as performance, scalability,
Scalability of web applications. CSCI 470: Web Science Keith Vertanen
Scalability of web applications CSCI 470: Web Science Keith Vertanen Scalability questions Overview What's important in order to build scalable web sites? High availability vs. load balancing Approaches
BASICS OF SCALING: LOAD BALANCERS
BASICS OF SCALING: LOAD BALANCERS Lately, I ve been doing a lot of work on systems that require a high degree of scalability to handle large traffic spikes. This has led to a lot of questions from friends
5 Mistakes to Avoid on Your Drupal Website
5 Mistakes to Avoid on Your Drupal Website Table of Contents Introduction.... 3 Architecture: Content.... 4 Architecture: Display... 5 Architecture: Site or Functionality.... 6 Security.... 8 Performance...
High Availability Solutions for the MariaDB and MySQL Database
High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment
The importance of Drupal Cache. Luis F. Ribeiro Ci&T Inc. 2013
The importance of Drupal Cache Luis F. Ribeiro Ci&T Inc. 2013 Introduction Caio Ciao Luppi Software Architect at Ci&T Inc. More than 4 years of experience with Drupal Development Experience with Application
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
CS312 Solutions #6. March 13, 2015
CS312 Solutions #6 March 13, 2015 Solutions 1. (1pt) Define in detail what a load balancer is and what problem it s trying to solve. Give at least two examples of where using a load balancer might be useful,
How To Understand And Understand The Security Of A Web Browser (For Web Users)
Security vulnerabilities: should they be early detected? - [email protected] Alessandro Garcia [email protected] OPUS Research Group Agenda 1. Background; 2.Motivation; 3.Research Questions;
Are You Ready for the Holiday Rush?
Are You Ready for the Holiday Rush? Five Survival Tips Written by Joseph Palumbo, Cloud Usability Team Leader Are You Ready for the Holiday Rush? Five Survival Tips Cover Table of Contents 1. Vertical
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
How Comcast Built An Open Source Content Delivery Network National Engineering & Technical Operations
How Comcast Built An Open Source Content Delivery Network National Engineering & Technical Operations Jan van Doorn Distinguished Engineer VSS CDN Engineering 1 What is a CDN? 2 Content Router get customer
The old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network)
The old Software in the Network: What Happened and Where to Go Prof. Eric A. Brewer UC Berkeley Inktomi Corporation Local networks with local names and switches IP creates global namespace and links the
Large-Scale Web Applications
Large-Scale Web Applications Mendel Rosenblum Web Application Architecture Web Browser Web Server / Application server Storage System HTTP Internet CS142 Lecture Notes - Intro LAN 2 Large-Scale: Scale-Out
Adding scalability to legacy PHP web applications. Overview. Mario Valdez-Ramirez
Adding scalability to legacy PHP web applications Overview Mario Valdez-Ramirez The scalability problems of legacy applications Usually were not designed with scalability in mind. Usually have monolithic
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
Comparison of the Frontier Distributed Database Caching System with NoSQL Databases
Comparison of the Frontier Distributed Database Caching System with NoSQL Databases Dave Dykstra [email protected] Fermilab is operated by the Fermi Research Alliance, LLC under contract No. DE-AC02-07CH11359
Building Scalable Web Sites: Tidbits from the sites that made it work. Gabe Rudy
: Tidbits from the sites that made it work Gabe Rudy What Is This About Scalable is hot Web startups tend to die or grow... really big Youtube Founded 02/2005. Acquired by Google 11/2006 03/2006 30 million
Getting Started with AWS. Hosting a Static Website
Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks
DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING
PolyServe High-Availability Server Clustering for E-Business 918 Parker Street Berkeley, California 94710 (510) 665-2929 wwwpolyservecom Number 990903 WHITE PAPER DNS ROUND ROBIN HIGH-AVAILABILITY LOAD
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
Oracle Application Express MS Access on Steroids
Oracle Application Express MS Access on Steroids Jules Lane Principal Consultant Tactical Database Development options Spreadsheets Encourage data duplication and inconsistency, clog
always available Cloud
North Trade Building Noorderlaan 133/8 B-2030 Antwerp T +32 (0) 3 275 01 60 F +32 (0) 3 275 01 69 Kinepolis.com: always available and reachable in the Cloud Since November 2011, the Kinepolis.com infrastructure
WHY RECOMMEND SITEGROUND WORDPRESS HOSTING?
WHY RECOMMEND SITEGROUND WORDPRESS HOSTING? WordPress users face the challenge to choose between the hosting service of traditional hosts and managed WordPress companies. The traditional hosts are affordable
Disaster Recovery White Paper
Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase
Lecture 8b: Proxy Server Load Balancing
Internet and Intranet Protocols and Applications Lecture 8b: Proxy Server Load Balancing March, 2004 Arthur Goldberg Computer Science Department New York University [email protected] Load Balancing Problem:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
Designing, Scoping, and Configuring Scalable Drupal Infrastructure. Presented 2009-05-30 by David Strauss
Designing, Scoping, and Configuring Scalable Drupal Infrastructure Presented 2009-05-30 by David Strauss Understanding Load Distribution Predicting peak traffic Traffic over the day can be highly irregular.
Intro to Load-Balancing Tomcat with httpd and mod_jk
Intro to Load-Balancing Tomcat with httpd and mod_jk Christopher Schultz Chief Technology Officer Total Child Health, Inc. * Slides available on the Linux Foundation / ApacheCon2015 web site and at http://people.apache.org/~schultz/apachecon
ZingMe Practice For Building Scalable PHP Website. By Chau Nguyen Nhat Thanh ZingMe Technical Manager Web Technical - VNG
ZingMe Practice For Building Scalable PHP Website By Chau Nguyen Nhat Thanh ZingMe Technical Manager Web Technical - VNG Agenda About ZingMe Scaling PHP application Scalability definition Scaling up vs
Accelerating Wordpress for Pagerank and Profit
Slide No. 1 Accelerating Wordpress for Pagerank and Profit Practical tips and tricks to increase the speed of your site, improve conversions and climb the search rankings By: Allan Jude November 2011 Vice
ExamPDF. Higher Quality,Better service!
ExamPDF Higher Quality,Better service! Q&A Exam : 1Y0-A21 Title : Basic Administration for Citrix NetScaler 9.2 Version : Demo 1 / 5 1.Scenario: An administrator is working with a Citrix consultant to
Apache Traffic Server Extensible Host Resolution
Apache Traffic Server Extensible Host Resolution at ApacheCon NA 2014 Speaker Alan M. Carroll, Apache Member, PMC Started working on Traffic Server in summer 2010. Implemented Transparency, IPv6, range
Server Architecture for High- Performance Drupal
Server Architecture for High- Performance Drupal Robert Ristroph [email protected] @robgr http://www.drupalcampphoenix.com /high-performance-serverarchitecture Outline What is performance? Scaling?
An Open Source NoSQL solution for Internet Access Logs Analysis
An Open Source NoSQL solution for Internet Access Logs Analysis A practical case of why, what and how to use a NoSQL Database Management System instead of a relational one José Manuel Ciges Regueiro
Serving 4 million page requests an hour with Magento Enterprise
1 Serving 4 million page requests an hour with Magento Enterprise Introduction In order to better understand Magento Enterprise s capacity to serve the needs of some of our larger clients, Session Digital
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
FileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application
FileRunner Security Overview An overview of the security protocols associated with the FileRunner file delivery application Overview Sohonet FileRunner is a secure high-speed transfer application that
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect [email protected] Validating if the workload generated by the load generating tools is applied
Drupal Performance Tuning
Drupal Performance Tuning By Jeremy Zerr Website: http://www.jeremyzerr.com @jrzerr http://www.linkedin.com/in/jrzerr Overview Basics of Web App Systems Architecture General Web
FAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
Cloud Computing. With MySQL and Pentaho Data Integration. Matt Casters Chief Data Integration at Pentaho Kettle project founder
Cloud Computing With MySQL and Pentaho Data Integration Matt Casters Chief Data Integration at Pentaho Kettle project founder 1-2 Agenda Introduction to Kettle Introduction Use-cases + load demo Performance
E-commerce is also about
Magento server & environment optimization Get very fast page rendering, even under heavy load! E-commerce is also about NBS System 2011, all right reserved Managed Hosting & Security www.nbs-system.com
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Big data blue print for cloud architecture
Big data blue print for cloud architecture -COGNIZANT Image Area Prabhu Inbarajan Srinivasan Thiruvengadathan Muralicharan Gurumoorthy Praveen Codur 2012, Cognizant Next 30 minutes Big Data / Cloud challenges
Techniques for Scaling Components of Web Application
, March 12-14, 2014, Hong Kong Techniques for Scaling Components of Web Application Ademola Adenubi, Olanrewaju Lewis, Bolanle Abimbola Abstract Every organisation is exploring the enormous benefits of
Learning Management Redefined. Acadox Infrastructure & Architecture
Learning Management Redefined Acadox Infrastructure & Architecture w w w. a c a d o x. c o m Outline Overview Application Servers Databases Storage Network Content Delivery Network (CDN) & Caching Queuing
Framework as a master tool in modern web development
Framework as a master tool in modern web development PETR DO, VOJTECH ONDRYHAL Communication and Information Systems Department University of Defence Kounicova 65, Brno, 662 10 CZECH REPUBLIC [email protected],
Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)
1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication
Hack Yourself First. Troy Hunt @troyhunt troyhunt.com [email protected]
Hack Yourself First Troy Hunt @troyhunt troyhunt.com [email protected] We re gonna turn you into lean, mean hacking machines! Because if we don t, these kids are going to hack you Jake Davies, 19 (and
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Alan Clark. [email protected]. OpenStack. The Foundation for Open Source Cloud
Alan Clark [email protected] OpenStack The Foundation for Open Source Cloud 2 Alan Clark No single person, company or line of code Mission Design tenets Project principles Industry backing Release record
Indirection. science can be solved by adding another level of indirection" -- Butler Lampson. "Every problem in computer
Indirection Indirection: rather than reference an entity directly, reference it ( indirectly ) via another entity, which in turn can or will access the original entity A x B "Every problem in computer
Hardened Plone. Making Your Plone Site Even More Secure. Presented by: Nathan Van Gheem
Hardened Plone Making Your Plone Site Even More Secure Presented by: Nathan Van Gheem Plone Security Flexible and granular ACL/roles-based security model of Zope All input in Plone is validated Plone does
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
PowerDNS Introduction
PowerDNS Introduction OX Summit 2015 All presentations will be on: https://www.powerdns.com/oxsummit PowerDNS History Founded in 1999 to provide database driven DNS + geographical load balancing between
Scaling Pinterest. Yash Nelapati Ascii Artist. Pinterest Engineering. Saturday, August 31, 13
Scaling Pinterest Yash Nelapati Ascii Artist Pinterest is... An online pinboard to organize and share what inspires you. Growth March 2010 Page views per day Mar 2010 Jan 2011 Jan 2012 May 2012 Growth
Magento & Zend Benchmarks Version 1.2, 1.3 (with & without Flat Catalogs)
Magento & Zend Benchmarks Version 1.2, 1.3 (with & without Flat Catalogs) 1. Foreword Magento is a PHP/Zend application which intensively uses the CPU. Since version 1.1.6, each new version includes some
API documentation - 1 -
API documentation - 1 - Table of Contents 1. Introduction 1.1. What is an API 2. API Functions 2.1. Purge list of files 2.1.1 Description 2.1.2 Implementation 2.2. Purge of whole cache (all files on all
(An) Optimal Drupal 7 Module Configuration for Site Performance JOE PRICE
(An) Optimal Drupal 7 Module Configuration for Site Performance JOE PRICE Intro I m a performance junkie. My top three non-drupal performance tools are Apache Bench, Google PageSpeed Insights, and NewRelic.
Incapsula vs. CloudFlare
Incapsula vs. CloudFlare Security Review & Comparison Philip Tibom, Sweden 10/15/2012 Introduction CloudFlare and Incapsula are two different Cloud-based website security and acceleration services. They
In Memory Accelerator for MongoDB
In Memory Accelerator for MongoDB Yakov Zhdanov, Director R&D GridGain Systems GridGain: In Memory Computing Leader 5 years in production 100s of customers & users Starts every 10 secs worldwide Over 15,000,000
Dynamic Load Balancing and Node Migration in a Continuous Media Network
Dynamic Load Balancing and Node Migration in a Continuous Media Network Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Draft: April 9, 2001 Abstract This report examines current technologies
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
WINDOWS AZURE DATA MANAGEMENT
David Chappell October 2012 WINDOWS AZURE DATA MANAGEMENT CHOOSING THE RIGHT TECHNOLOGY Sponsored by Microsoft Corporation Copyright 2012 Chappell & Associates Contents Windows Azure Data Management: A
Implementing Reverse Proxy Using Squid. Prepared By Visolve Squid Team
Implementing Reverse Proxy Using Squid Prepared By Visolve Squid Team Introduction What is Reverse Proxy Cache About Squid How Reverse Proxy Cache work Configuring Squid as Reverse Proxy Configuring Squid
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS
Hacking Web Apps Detecting and Preventing Web Application Security Problems Mike Shema Technical Editor Jorge Blanco Alcover AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
Hadoop IST 734 SS CHUNG
Hadoop IST 734 SS CHUNG Introduction What is Big Data?? Bulk Amount Unstructured Lots of Applications which need to handle huge amount of data (in terms of 500+ TB per day) If a regular machine need to
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass Table of Contents SUMMARY 3 VULNERABILITY DETAILS 3 TECHNICAL DETAILS 4 LEGAL NOTICES 7 Active Content Filtering Bypass Advisory
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826 5222 F: +1 (519) 826 5228 Netsweeper Whitepaper Deploying Netsweeper Internet Content
Scaling DBMail with MySQL
Scaling DBMail with MySQL Guido A.J. Stevens 2007 NFG Net Facilities Group All rights reserved http://www.dbmail.eu [email protected] T +31.43.3618933 F +31.43.3561655 Scaling DBMail DBMail is a fast, scalable,
Getting Started with AWS. Hosting a Static Website
Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
opensuse.org Build Service
opensuse.org Build Service Maintain one source for all Linux platforms Putting cross development support into OBS Martin Mohring 5e Datasoft GmbH [email protected] How to join such a FOSS project
LARGE SCALE INTERNET SERVICES
1 LARGE SCALE INTERNET SERVICES 2110414 Large Scale Computing Systems Natawut Nupairoj, Ph.D. Outline 2 Overview Background Knowledge Architectural Case Studies Real-World Case Study 3 Overview Overview
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ
CTIS 256 Web Technologies II Week # 1 Serkan GENÇ Introduction Aim: to be able to develop web-based applications using PHP (programming language) and mysql(dbms). Internet is a huge network structure connecting
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
Content Delivery Networks (CDN) Dr. Yingwu Zhu
Content Delivery Networks (CDN) Dr. Yingwu Zhu Web Cache Architecure Local ISP cache cdn Reverse Reverse Proxy Reverse Proxy Reverse Proxy Proxy L4 Switch Content Content Content Server Content Server
