AWS Identity and Access Management Using IAM API Version 2010-05-08 AWS Identity and Access Management Using IAM

Total Page:16

File Type:pdf, Size:1020Kb

AWS Identity and Access Management Using IAM API Version 2010-05-08 AWS Identity and Access Management Using IAM AWS Identity and Access Management Using IAM API Version 2010-05-08 AWS Identity and Access Management Using IAM AWS Identity and Access Management: Using IAM Copyright © 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks of Amazon Web Services, Inc.: Amazon, Amazon Web Services Design, AWS, Amazon CloudFront, AWS CloudTrail, AWS CodeDeploy, Amazon Cognito, Amazon DevPay, DynamoDB, ElastiCache, Amazon EC2, Amazon Elastic Compute Cloud, Amazon Glacier, Amazon Kinesis, Kindle, Kindle Fire, AWS Marketplace Design, Mechanical Turk, Amazon Redshift, Amazon Route 53, Amazon S3, Amazon VPC, and Amazon WorkDocs. In addition, Amazon.com graphics, logos, page headers, button icons, scripts, and service names are trademarks, or trade dress of Amazon in the U.S. and/or other countries. Amazon©s trademarks and trade dress may not be used in connection with any product or service that is not Amazon©s, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. AWS services or capabilities described in AWS Documentation may vary by region/location. Click Getting Started with Amazon AWS to see specific differences applicable to the China (Beijing) Region. AWS Identity and Access Management Using IAM Table of Contents What Is IAM? ................................................................................................................................ 1 Video Introduction to IAM ........................................................................................................ 1 Pricing of IAM ....................................................................................................................... 2 Features of IAM .................................................................................................................... 2 Supported AWS Products ....................................................................................................... 2 Migration to IAM .................................................................................................................... 2 No Change to Basic AWS Account Functions ..................................................................... 3 Security Credentials ............................................................................................................... 3 How Do I Get Credentials? .............................................................................................. 3 IAM and Consolidated Billing ................................................................................................... 4 IAM Concepts ....................................................................................................................... 5 Concepts Related to AWS Account Entities ........................................................................ 5 Concepts Related to Permissions ..................................................................................... 6 Accessing IAM ...................................................................................................................... 7 About IAM Entities ................................................................................................................. 8 IAM Identifiers .............................................................................................................. 8 Limitations on IAM Entities ............................................................................................ 13 Getting Set Up ............................................................................................................................ 16 Using IAM to Give Users Access to Your AWS Resources ........................................................... 16 Do I Need to Sign Up for IAM? ............................................................................................... 17 Additional Resources ........................................................................................................... 17 Getting Started ............................................................................................................................ 19 Creating an Administrators Group Using the Console ................................................................. 20 Creating an Administrators Group Using the AWS CLI ................................................................ 21 Creating a Group ......................................................................................................... 21 Attaching a Policy to the Group ...................................................................................... 22 How Users Sign In to Your Account ......................................................................................... 23 Where to Go Next ................................................................................................................ 24 Learn More About IAM ................................................................................................. 24 Learn About Policies and Permissions ............................................................................. 24 Other Ways to Access IAM ............................................................................................ 24 IAM Resources ........................................................................................................... 25 Best Practices and Use Cases ....................................................................................................... 26 Best Practices ..................................................................................................................... 26 Lock away your AWS account access keys ....................................................................... 26 Create individual IAM users ........................................................................................... 27 Use groups to assign permissions to IAM users ................................................................ 27 Grant least privilege ..................................................................................................... 28 Configure a strong password policy for your users ............................................................. 28 Enable MFA for privileged users ..................................................................................... 28 Use roles for applications that run on Amazon EC2 instances .............................................. 29 Delegate by using roles instead of by sharing credentials .................................................... 29 Rotate credentials regularly ........................................................................................... 29 Remove unnecessary credentials ................................................................................... 29 Use policy conditions for extra security ............................................................................ 30 Keep a history of activity in your AWS account .................................................................. 30 Video presentation about IAM best practices .................................................................... 30 Business Use Cases ............................................................................................................ 30 Initial Setup of Example Corp. ........................................................................................ 31 Use Case for IAM with Amazon EC2 ............................................................................... 31 Use Case for IAM with Amazon S3 ................................................................................. 32 IAM and the AWS Management Console ......................................................................................... 34 The AWS Management Console Sign-in Page .......................................................................... 34 Using AWS Account Credentials to Sign In to the AWS Management Console ........................ 35 Controlling User Access to the AWS Management Console ......................................................... 35 API Version 2010-05-08 iii AWS Identity and Access Management Using IAM Your AWS Account ID and Its Alias ......................................................................................... 36 Finding Your AWS Account ID ........................................................................................ 36 About Account Aliases .................................................................................................. 36 Creating, Deleting, and Listing an AWS Account Alias ........................................................ 37 MFA Devices and Your IAM-Enabled Sign-in Page ..................................................................... 38 Users and Groups ........................................................................................................................ 39 Users ................................................................................................................................ 39 IAM Users Aren©t Necessarily People .............................................................................. 40 Scenarios for Creating IAM Users ................................................................................... 40 IAM User Tasks ..........................................................................................................
Recommended publications
  • Real-Time Backend Architecture Using Node.Js, Express and Google Cloud
    Anh Vu Real-time backend architecture using Node.js, Express and Google Cloud Platform Metropolia University of Applied Sciences Bachelor of Information Technology Information Technology Bachelor’s Thesis 5 January 2021 Abstract Anh Vu Author Real-time backend using NodeJS, Express and Google Cloud Title Platform NumBer of Pages 47 pages Date 5 January 2021 Degree Bachelor of Engineering Degree Programme Information Technology Professional Major MoBile Solutions Instructors Petri Vesikivi, Head of MoBile Solutions Real-time applications, which assure the latency within the defined time limit, are becoming more popular due to the growth of Software as a service trend. Before the evolution of cloud computing, the only solution was to use native WebSockets which are difficult to set up and develop. Recently, Google Cloud Platform provides a developer-friendly, fast and responsive platform to make the process of developing real-time applications seamless. The purpose of the thesis was to demonstrate and Build a scalaBle, high-available and reliaBle Backend architecture using Node.js and Google Cloud Platform. The thesis consists of a theoretical background including Node.js, monolithic and microservices architecture, serverless architecture and real-time dataBase, which provide basic understanding of different architectures and technical solutions. The advantages and disadvantages of the architecture were also clearly analyzed and evaluated. Furthermore, a minimum viable product for a taxi booking app was created to demonstrate the architecture usage in a real use case. To summarize, the thesis aimed to provide the insights of real-time Backend architecture using Node.js and Google Cloud Platform. Moreover, the benefits of using this technology stacks were carefully examined in a case study.
    [Show full text]
  • Brief Industry Trends Report 2H 2008
    ISSN 1985 - 7535 Brief Industry Trends Report 2H 2008 Malaysian Communications and Multimedia Commission (SKMM), 2009 The information or material in this publication is protected under copyright and save where otherwise stated, may be reproduced for non commercial use provided it is reproduced accurately and not used in a misleading context. Where any material is reproduced, SKMM as the source of the material must be identified and the copyright status acknowledged. The permission to reproduce does not extend to any information or material the copyright of which belongs to any other person, organisation or third party. Authorisation or permission to reproduce such information or material must be obtained from the copyright holders concerned. This work is based on sources believed to be reliable, but SKMM does not warrant the accuracy or completeness of any information for any purpose and cannot accept responsibility for any error or omission. Published by: Malaysian Communications and Multimedia Commission Off Persiaran Multimedia 63000 Cyberjaya, Selangor Darul Ehsan Tel: +60 3 86 88 80 00 Fax: +60 3 86 88 10 06 Toll Free: 1- 800-888-030 http://www.skmm.gov.my CONTENTS FOREWORD 2 SUMMARY HIGHLIGHTS 3 C&M MARKET CAPITALISATION AND PERFORMANCE Feeling the Effects of Global Financial Crisis 4 C&M Market Capitalisation Plummeted Significantly 6 Individual C&M Companies Contribution to Bursa Malaysia 7 C&M Companies Share Price Movements 7 C&M Amongst Other Heavyweights 8 Local C&M versus Overseas by Market Capitalisation in US Dollar 9 GOOGLE
    [Show full text]
  • Google Enterprise for Manufacturing: Become a Connected Manufacturer
    Google Enterprise for Manufacturing: Become a Connected Manufacturer By Doug Bartholomew Over the past two decades, manufac- productivity and email; mapping software turing enterprises have installed numerous for visualizing geographic business data; a types of systems to help run their businesses. cloud-based infrastructure for software devel- These include enterprise resource planning, opment, computing, data storage and query; customer relationship management, manu- and a comprehensive search capability that facturing execution systems, Web portals, leads the industry. groupware, email, search, mapping software, Google Enterprise enables manufacturers to and on and on. work together more easily; visualize their busi- Yet, some of the most basic functions—such ness data; build, store, and scale applications as enabling employees around the globe to and websites on Google’s cloud; and find the communicate and collaborate securely and information they need when they need it. reliably from any location—continue to pose challenges for manufacturers. Similarly, the WORK BETTER TOGETHER ability to search an ERP system for sales leads, More than 5 million businesses depend on or to create a geographic view of customer Google Apps for Business to help employees concentration in a specific region, should be collaborate and be more productive, wher- easy for most business users, but often requires ever and whenever they work. With hosted an IT specialist. documents including text, spreadsheets and For manufacturers struggling with the presentations, Web-based video access and complexity and cost of these systems, Google easy site-building tools, Google Apps makes Enterprise offers a simple, yet elegant, suite information accessible from just about any of applications and tools designed to make browser or smartphone.
    [Show full text]
  • Visitbyroad.Com Creates Australia's Most Comprehensive Online Tourism Platform with Google Maps & Google Search Appliance
    Case Study | Google Maps API and Google Search Appliance Visitbyroad.com creates Australia’s most comprehensive online tourism platform with Google Maps & Google Search Appliance Company With the tagline ”Enjoy the Journey,” Visitbyroad, which began operations in 2013, is arguably Australia’s best online trip-planning website. Users can search, create, save, edit, and share personalised itineraries via At a Glance Twitter, Facebook, print, or emailed PDFs that include dynamic, map- What they wanted to do based planning, photos, and the quickest route-driving directions. • Create Australia’s most comprehensive They can customise their own journeys, including attractions, events, online tourism platform • Unite supply with demand for operators business listings, daily deals, and accommodations available along the way. and tourists on the road Unlike other sites, Visitbyroad does not charge for booking; instead, the • Provide users with a high functionality, goal is to become the website of choice for those who want to make user friendly, map-based digital every journey a memorable experience. travel platform • Use the world’s leading search and Challenge mapping technology provider to Co-founders Randall Walker and Peter Hale have more than 50 years of ensure market-leading capabilities combined experience in regional tourism, and conducted two years of • Run the business efficiently research before embarking on Visitbyroad. They found that the most What they did common feedback from people arriving at a destination for a short stay was • Partnered with DMSBT to integrate Google that they did not understand all that was available to see and do in the area. Maps API and the Google Search Appliance If they had, they may have stayed longer or enjoyed the experience more.
    [Show full text]
  • Google's Management Change and the Enterprise
    STEPHEN E ARNOLD APRIL 20, 2011 Google’s Management Change and the Enterprise Google completed its management shift in April 2011 with several bold moves. The story of founder Larry Page’s move to the pilot’s seat appeared in most news, financial, and consumer communication channels. American business executives have a status similar to that accorded film and rock and roll stars. An aspect of the changes implemented in his first week on the job as the top Googler included some surprising, and potentially far reaching shifts in the $30 billion search and advertising giant. First, a number of executive shifts took place. Jonathan Rosenberg, the senior vice president of product management, left the company on the day Mr. Page officially assumed Mr. Schmidt’s duties. Mr. Rosenberg, a bright and engaging professional, was not a technologist’s technologist. I would characterize Mr. Rosenberg as a manager and a sales professional. The rumor that Mr. Rosenberg and Mr. Schmidt would write a book about their experiences at Google surfaced and then disappeared. The ideas was intriguing and reinforced the Charlie Sheen-magnetism senior business executives engender in the post-crash US. The echo from the door snicking shut had not faded when Mr. Page announced a shift in the top management of the company. For example, Sundar Pichai http://www.thechromesource.com/sundar-pichai- chrome-and-chrome-os-vp-being-courted-by-twitter/ (who has been at Google since 2004 and was allegedly recruited by Twitter) took over Chrome, Google’s Web browser and possible mobile device operating system alternative to Android.
    [Show full text]
  • The Visual Arts EVA 2012 Florence 9 – 11 May 2012
    Proceedings e report 88 Electronic Imaging & the Visual Arts EVA 2012 Florence 9 – 11 May 2012 edited by Vito Cappellini Firenze University Press 2012 Electronic Imaging & the Visual Arts : EVA 2012 Florence / edited by Vito Cappellini. – Firenze : Firenze University Press, 2012. (Proceedings e report ; 88) http://digital.casalini.it/9788866551300 ISBN 978-88-6655-127-0 (print) ISBN 978-88-6655-130-0 (online) Peer Review Process All publications are submitted to an external refereeing process under the responsibility of the FUP Editorial Board and the Scientific Committees of the individual series. The works published in the FUP catalogue are evaluated and approved by the Editorial Board of the publishing house. For a more detailed description of the refereeing process we refer to the official documents published on the website and in the online catalogue of the FUP (http://www.fupress.com). Firenze University Press Editorial Board G. Nigro (Coordinatore), M.T. Bartoli, M. Boddi, F. Cambi, R. Casalbuoni, C. Ciappei, R. Del Punta, A. Dolfi, V. Fargion, S. Ferrone, M. Garzaniti, P. Guarnieri, G. Mari, M. Marini, M. Verga, A. Zorzi. © 2012 Firenze University Press Università degli Studi di Firenze Firenze University Press Borgo Albizi, 28, 50122 Firenze, Italy http://www.fupress.com/ Printed in Italy PROGRAM Electronic Imaging the Visual Arts ‘The Foremost European Electronic Imaging Events in the Visual Arts’ Forum for Users, Suppliers & Researchers The key aim of this Event is to provide a forum for the user, supplier and scientific research communities to meet and exchange experiences, ideas and plans in the wide area of Culture & Technology.
    [Show full text]
  • Vendor Contract
    d/W^sEKZ'ZDEd ĞƚǁĞĞŶ t'ŽǀĞƌŶŵĞŶƚ͕>>ĂŶĚ d,/EdZ>K>WhZ,^/E'^z^dD;d/W^Ϳ &Žƌ Z&Wϭϴ1102 Internet & Network Security 'ĞŶĞƌĂů/ŶĨŽƌŵĂƚŝŽŶ dŚĞsĞŶĚŽƌŐƌĞĞŵĞŶƚ;͞ŐƌĞĞŵĞŶƚ͟ͿŵĂĚĞĂŶĚĞŶƚĞƌĞĚŝŶƚŽďLJĂŶĚďĞƚǁĞĞŶdŚĞ/ŶƚĞƌůŽĐĂů WƵƌĐŚĂƐŝŶŐ^LJƐƚĞŵ;ŚĞƌĞŝŶĂĨƚĞƌƌĞĨĞƌƌĞĚƚŽĂƐ͞d/W^͟ƌĞƐƉĞĐƚĨƵůůLJͿĂŐŽǀĞƌŶŵĞŶƚĐŽŽƉĞƌĂƚŝǀĞ ƉƵƌĐŚĂƐŝŶŐƉƌŽŐƌĂŵĂƵƚŚŽƌŝnjĞĚďLJƚŚĞZĞŐŝŽŶϴĚƵĐĂƚŝŽŶ^ĞƌǀŝĐĞĞŶƚĞƌ͕ŚĂǀŝŶŐŝƚƐƉƌŝŶĐŝƉĂůƉůĂĐĞ ŽĨďƵƐŝŶĞƐƐĂƚϰϴϰϱh^,ǁLJϮϳϭEŽƌƚŚ͕WŝƚƚƐďƵƌŐ͕dĞdžĂƐϳϱϲϴϲ͘dŚŝƐŐƌĞĞŵĞŶƚĐŽŶƐŝƐƚƐŽĨƚŚĞ ƉƌŽǀŝƐŝŽŶƐƐĞƚĨŽƌƚŚďĞůŽǁ͕ŝŶĐůƵĚŝŶŐƉƌŽǀŝƐŝŽŶƐŽĨĂůůƚƚĂĐŚŵĞŶƚƐƌĞĨĞƌĞŶĐĞĚŚĞƌĞŝŶ͘/ŶƚŚĞĞǀĞŶƚŽĨ ĂĐŽŶĨůŝĐƚďĞƚǁĞĞŶƚŚĞƉƌŽǀŝƐŝŽŶƐƐĞƚĨŽƌƚŚďĞůŽǁĂŶĚƚŚŽƐĞĐŽŶƚĂŝŶĞĚŝŶĂŶLJƚƚĂĐŚŵĞŶƚ͕ƚŚĞ ƉƌŽǀŝƐŝŽŶƐƐĞƚĨŽƌƚŚƐŚĂůůĐŽŶƚƌŽů͘ dŚĞǀĞŶĚŽƌŐƌĞĞŵĞŶƚƐŚĂůůŝŶĐůƵĚĞĂŶĚŝŶĐŽƌƉŽƌĂƚĞďLJƌĞĨĞƌĞŶĐĞƚŚŝƐŐƌĞĞŵĞŶƚ͕ƚŚĞƚĞƌŵƐĂŶĚ ĐŽŶĚŝƚŝŽŶƐ͕ƐƉĞĐŝĂůƚĞƌŵƐĂŶĚĐŽŶĚŝƚŝŽŶƐ͕ĂŶLJĂŐƌĞĞĚƵƉŽŶĂŵĞŶĚŵĞŶƚƐ͕ĂƐǁĞůůĂƐĂůůŽĨƚŚĞƐĞĐƚŝŽŶƐ ŽĨƚŚĞƐŽůŝĐŝƚĂƚŝŽŶĂƐƉŽƐƚĞĚ͕ŝŶĐůƵĚŝŶŐĂŶLJĂĚĚĞŶĚĂĂŶĚƚŚĞĂǁĂƌĚĞĚǀĞŶĚŽƌ͛ƐƉƌŽƉŽƐĂů͘͘KƚŚĞƌ ĚŽĐƵŵĞŶƚƐƚŽďĞŝŶĐůƵĚĞĚĂƌĞƚŚĞĂǁĂƌĚĞĚǀĞŶĚŽƌ͛ƐƉƌŽƉŽƐĂůƐ͕ƚĂƐŬŽƌĚĞƌƐ͕ƉƵƌĐŚĂƐĞŽƌĚĞƌƐĂŶĚĂŶLJ ĂĚũƵƐƚŵĞŶƚƐǁŚŝĐŚŚĂǀĞďĞĞŶŝƐƐƵĞĚ͘/ĨĚĞǀŝĂƚŝŽŶƐĂƌĞƐƵďŵŝƚƚĞĚƚŽd/W^ďLJƚŚĞƉƌŽƉŽƐŝŶŐǀĞŶĚŽƌĂƐ ƉƌŽǀŝĚĞĚďLJĂŶĚǁŝƚŚŝŶƚŚĞƐŽůŝĐŝƚĂƚŝŽŶƉƌŽĐĞƐƐ͕ƚŚŝƐŐƌĞĞŵĞŶƚŵĂLJďĞĂŵĞŶĚĞĚƚŽŝŶĐŽƌƉŽƌĂƚĞĂŶLJ ĂŐƌĞĞĚĚĞǀŝĂƚŝŽŶƐ͘ dŚĞĨŽůůŽǁŝŶŐƉĂŐĞƐǁŝůůĐŽŶƐƚŝƚƵƚĞƚŚĞŐƌĞĞŵĞŶƚďĞƚǁĞĞŶƚŚĞƐƵĐĐĞƐƐĨƵůǀĞŶĚŽƌƐ;ƐͿĂŶĚd/W^͘ ŝĚĚĞƌƐƐŚĂůůƐƚĂƚĞ͕ŝŶĂƐĞƉĂƌĂƚĞǁƌŝƚŝŶŐ͕ĂŶĚŝŶĐůƵĚĞǁŝƚŚƚŚĞŝƌƉƌŽƉŽƐĂůƌĞƐƉŽŶƐĞ͕ĂŶLJƌĞƋƵŝƌĞĚ ĞdžĐĞƉƚŝŽŶƐŽƌĚĞǀŝĂƚŝŽŶƐĨƌŽŵƚŚĞƐĞƚĞƌŵƐ͕ĐŽŶĚŝƚŝŽŶƐ͕ĂŶĚƐƉĞĐŝĨŝĐĂƚŝŽŶƐ͘/ĨĂŐƌĞĞĚƚŽďLJd/W^͕ƚŚĞLJ ǁŝůůďĞŝŶĐŽƌƉŽƌĂƚĞĚŝŶƚŽƚŚĞĨŝŶĂůŐƌĞĞŵĞŶƚ͘ WƵƌĐŚĂƐĞKƌĚĞƌ͕ŐƌĞĞŵĞŶƚŽƌŽŶƚƌĂĐƚŝƐƚŚĞd/W^DĞŵďĞƌ͛ƐĂƉƉƌŽǀĂůƉƌŽǀŝĚŝŶŐƚŚĞ ĂƵƚŚŽƌŝƚLJƚŽƉƌŽĐĞĞĚǁŝƚŚƚŚĞŶĞŐŽƚŝĂƚĞĚĚĞůŝǀĞƌLJŽƌĚĞƌƵŶĚĞƌƚŚĞŐƌĞĞŵĞŶƚ͘^ƉĞĐŝĂůƚĞƌŵƐ
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 8,005,720 B2 King Et Al
    USO08005720B2 (12) United States Patent (10) Patent No.: US 8,005,720 B2 King et al. (45) Date of Patent: *Aug. 23, 2011 (54) APPLYING SCANNED INFORMATION TO No. 11/097,089, filed on Apr. 1, 2005, and a IDENTIFY CONTENT continuation-in-part of application No. 1 1/097.835, filed on Apr. 1, 2005, now Pat. No. 7,831,912, and a (75) Inventors: Martin T. King, Vashon Island, WA (Continued) (US); Dale L. Grover, Ann Arbor, MI (US); Clifford A. Kushler, Lynnwood, (51) Int. Cl. WA (US); James Q. Stafford-Fraser, G06Q 30/00 (2006.01) Cambridge (GB) (52) U.S. Cl. ............... 705/26.1: 705/26: 705/27; 707/3; r ar. 707/4; 707/5; 707/E17.008; 382/305: 715/205 (73) Assignee: Google Inc., Mountain View, CA (US) (58) Field of Classification Search .................... 705/26, 705/27, 26.1: 707/345 E17.008: 382/305 (*) Notice: Subject to any disclaimer, the term of this s s s is a-s 715/205 past llists2, yed under 35 See application file for complete search history. This patent is Subject to a terminal dis- (56) References Cited claimer. U.S. PATENT DOCUMENTS (21) Appl. No.: 11/208,461 3,899,687 A 8, 1975 Jones (Continued) (22) Filed: Aug. 18, 2005 FOREIGN PATENT DOCUMENTS (65) Prior Publication Data EP O424803 5, 1991 US 2006/01 1990O A1 Jun. 8, 2006 (Continued) Related U.S. Application Data OTHER PUBLICATIONS (63) Continuation-in-part of application No. 11/004,637, U.S. Appl. No. 10/676,881, Lee et al.
    [Show full text]
  • Understanding Alphabet and Google, 2017
    This research note is restricted to the personal use of [email protected]. Understanding Alphabet and Google, 2017 Published: 24 February 2017 ID: G00297707 Analyst(s): Tom Austin, David Mitchell Smith, Yefim V. Natis, Isabelle Durand, Ray Valdes, Bettina Tratz-Ryan, Roberta Cozza, Daniel O'Connell, Lydia Leong, Jeffrey Mann, Andrew Frank, Brian Blau, Chris Silva, Mark Hung, Adam Woodyer, Matthew W. Cain, Steve Riley, Martin Reynolds, Whit Andrews, Alexander Linden, David Yockelson, Joe Mariano Google's size, market differentiation, rapid pace of innovation and ambitions can complicate fully understanding the vendor and its fit to current digital business needs. CIOs and IT leaders can use this report to explore in detail selected topics from the Gartner Vendor Rating. Key Findings ■ Two outcomes are apparent more than a year after the creation of the Alphabet-Google structure: Google is beginning to show increased momentum and has made significant investments in its enterprise offerings (most of its 2016 acquisitions were focused on this); and it is applying more discipline in Alphabet's "Other Bets." ■ Google is flourishing despite challenging external market factors: adverse publicity, competitors, government regulators and law enforcement. ■ Google values data, encourages bold investments in long-term horizons, pivots plans based on results in near real time, and reveres user-oriented engineering excellence. ■ Google is fully committed to 100% cloud-based and web-scale infrastructure, massive scaling, the maximum rate of change, and stream-lined business processes for itself and its customers. Recommendations CIOs and IT leaders managing vendor risk and performance should: ■ Plan for a long-term strategic relationship with Google based on an assumption that "what you see is what you get." Major vendor changes to core culture and fundamental operating principles in response to customer requests usually come slowly, if at all.
    [Show full text]
  • List of Search Engines
    A blog network is a group of blogs that are connected to each other in a network. A blog network can either be a group of loosely connected blogs, or a group of blogs that are owned by the same company. The purpose of such a network is usually to promote the other blogs in the same network and therefore increase the advertising revenue generated from online advertising on the blogs.[1] List of search engines From Wikipedia, the free encyclopedia For knowing popular web search engines see, see Most popular Internet search engines. This is a list of search engines, including web search engines, selection-based search engines, metasearch engines, desktop search tools, and web portals and vertical market websites that have a search facility for online databases. Contents 1 By content/topic o 1.1 General o 1.2 P2P search engines o 1.3 Metasearch engines o 1.4 Geographically limited scope o 1.5 Semantic o 1.6 Accountancy o 1.7 Business o 1.8 Computers o 1.9 Enterprise o 1.10 Fashion o 1.11 Food/Recipes o 1.12 Genealogy o 1.13 Mobile/Handheld o 1.14 Job o 1.15 Legal o 1.16 Medical o 1.17 News o 1.18 People o 1.19 Real estate / property o 1.20 Television o 1.21 Video Games 2 By information type o 2.1 Forum o 2.2 Blog o 2.3 Multimedia o 2.4 Source code o 2.5 BitTorrent o 2.6 Email o 2.7 Maps o 2.8 Price o 2.9 Question and answer .
    [Show full text]
  • Create a Created Date Schema in Bigquery
    Create A Created Date Schema In Bigquery Denominative Elmore canoodles funereally. Auxiliary Rudy acquiesce: he unbar his aril adequately and contagiously. Overreaching Randolf excused some scrabble and shacks his syneresis so midnight! Wait polls with exponential backoff. The schema in tests are many cases. Perform various levels of dates in schema definition file somewhere on create date column when you created in an identical data will lead at. You'd may that avoiding two scans of SALES would improve performance However remember most circumstances the draw BY version takes about twice as suite as the lot BY version. You run some SQL queries against that data. The script then creates a partition function, if configured. The order in which clustering is done matters. Developer relations lead at SKB Kontur. We create schema in the dates and their very wide variety of bigquery operation creates a working directory as a few seconds of model you. By using the client libraries. Database services to migrate, please leave it empty. What are partitions in SQL? In our case the join condition is matching dates from the pedestrian table and the bike table. The mother source records need is have a machine image updates to merge correctly. Python community version selection works in schema of bigquery operation on create date column can be created in a new custom schema tab. Once per store the data needs to simplify etl to any data are also a bigquery? Google Analytics 360 users that have that up the automatic BigQuery export will rejoice by this. Whether to automatically infer options and schema for CSV and JSON sources.
    [Show full text]
  • PDF, 300 Pages
    Developing Web Analytics Best Practices for NIH Report Semphonic 16 Digital Drive Suite 220 Novato, CA 94949 www.semphonic.com December 15, 2011 The Needs Assessment for Developing Best Practices for Trans-NIH Web Analytics was funded by the NIH Evaluation Set-Aside Program, (Reference number: 10-4031 OD-OCPL), administered by the Office of Program Evaluation and Performance, DPCPSI, Office of the Director Contents Acknowledgments ......................................................................................................................................... ii Executive Summary .................................................................................................................................. ES.1 Commitment of Senior Management .............................................................................................. ES.2 Organizational Resources and Responsibilities ................................................................................ ES.2 Process for NIH-Wide and IC-Specific Web Analytics Governance .................................................. ES.3 Web Analytics Metrics and Deep-Dive Analysis ............................................................................... ES.4 Web Analytics Solutions, Methods, and Opportunities ................................................................... ES.4 Web Analytics Training, Data Analysis, and Interpretation of Data ................................................ ES.5 More Information ...........................................................................................................................
    [Show full text]