Common Pitfalls of Deploying Applications in the Cloud

Due to the relatively painless way of spinning up servers in the cloud, business units of large companies are flocking to AWS and other cloud providers to deploy their applications instead of using internal IT. This is expected and even advantageous because the speed of deployment in the cloud is usually unmatched by internal IT. However, there are many things to consider and pitfalls to avoid in order to establish a robust and secure application.

I recently performed an assessment of an application in the cloud implemented by a business unit with limited IT knowledge. Here are some of my findings:

  1. Business units have the impression that AWS takes care of security of the application. While AWS takes care of security of the cloud (which means security from the physical level up to the hypervisor level), the customer is still responsible for the security in the cloud (including OS security, encryption, customer data protection, etc.). For instance, the customer is still responsible for OS hardening (implementing secure password policy, turning off unneeded services, locking down ssh root access, enabling selinux, etc.) and monthly security patching.
  2. These servers in the cloud also lack the integration with enterprise internal tools to properly monitor and administer the servers. Usually enterprises have developed mature tools for these purposes. Without integrating with these tools, they are usually blind to what’s going on with their servers, especially the very important task of monitoring their security.
  3. These servers do not have periodic auditing. For instance, although Security Groups have been setup properly in the beginning, they have to be audited and revisited every so often so that ports that are no longer needed can be disabled/removed from the Security Groups.
  4. There is no central allocation of IP addresses. IP addresses may overlap once their own VPC is connected to other VPCs and the enterprise internal network.
  5. One of the most commonly neglected task after spinning up servers is to configure their backup and retention. For companies that are regulated, it is extremely important to adhere to their backup and retention policy.
  6. Because of the business unit’s limited knowledge of IT infrastructure, fault tolerance and reliability may not be properly set up. For instance, they may only use one availability zone instead of using two or more.
  7. Business units may not be optimizing the cost of their deployment in the cloud. There are many ways to accomplish this, such as using tiered storage (for instance, using Glacier to archive data instead of S3), powering down servers when not in use, bidding for resources for less time sensitive tasks, etc.

Business units should be cautious, and should consider consulting internal IT before deploying in the cloud to ensure a reliable, secure, and cost-effective applications.

Understanding “Serverless” Applications

“Serverless” architecture is a hot topic in the IT world, especially after AWS released their Lambda service. But many people are confused with the term “serverless.” The term is paradoxical because applications running on the “serverless” architecture are still using services that are powered by servers on the back end. The term is meant to be catchy and provocative, but what it really means is that, as a developer or as a company providing an app or services, you don’t need to provision, monitor, patch and manage any server. You can focus on building and maintaining your application and leave the server administration tasks to the cloud provider. This also means that you don’t have to worry about capacity planning. With the vast resources available on the cloud, your application scales with usage. In addition, availability, fault-tolerance and infrastructure security are already built-in.

Whereas on the traditional “always on” server sitting behind an application, you have to pay for its 24/7 operations, on a serverless architecture, you only pay for the time your application is running and you never have to pay for server idle time.

In this model, your application is only invoked if there is a trigger, such as changes in data state, requests from end user, changes in resource state, etc. Your program (or function that is written in node.js, Python, Java or C# programming languages) will then perform the task, and provide the output or service.

The obvious benefits of this model are reduced cost and reduced complexity. However, there are also drawbacks such as vendor control, vendor lock-in, multi tenancy concerns, and security issues.

As the “serverless” architecture becomes mainstream, more and more companies and developers will use this model to provide services.

AWS Certified Solutions Architect

I recently passed the AWS Certified Solutions Architect – Associate exam. This certification allows me to prove my knowledge of the cloud and be able to help companies who are using or will be using AWS cloud services as their cloud provider. For more information about AWS Certification, please visit the official site here:

Initially used by developers and start-up companies, AWS has grown into a solid and robust cloud services provider. Big enterprises are realizing the value of AWS and more and more companies are extending their data centers to the cloud. For most companies, traditional on premises infrastructure may not be sufficient anymore as business users demand more from IT, including faster and scalable IT services.

Getting AWS-certified requires hard work. You need to read the book, enroll in a training class (if possible), do practice tests and get hands-on experience in AWS. In addition, you should also have a working knowledge of networking, virtualization, database, storage, servers, scripting / programming and software applications. IT professionals should invest their skills in the cloud or run the risk of being obsolete.

AWS Cloud Architecture Best Practices

AWS services have many capabilities.  When migrating existing applications to the cloud or creating new applications for the cloud, it is important to know these AWS capabilities in order to architect the most resilient, efficient, and scalable solution for your applications.

Cloud architecture and on-premise architecture differs in so many ways.  In the cloud, you treat the infrastructure as a configurable and flexible software as opposed to hardware. You need to have a different mindset when architecting in the cloud because the cloud has a different way of solving problems.

You have to consider the following design principles in AWS cloud:

  1. Design for failure by implementing redundancy everywhere.  Components fail all the time.  Even whole site fail sometimes.  For example, if you implement redundancy of your web/application servers in different availability zones, your application will be more resilient when one availability zone fails.
  2. Implement scalability.  One of the advantages of using the cloud vs on-premise is the ability to grow and shrink the resources you need depending on the demand.  AWS supports scaling your resources vertically and horizontally, even automating it by using auto-scaling.
  3. Use AWS storage service that fits your use case.  AWS has several storage services with different properties, cost and functionality.  Amazon S3 is used for web applications that need large-scale storage capacity and performance.  It is also used  for backup and disaster recovery.  Amazon Glacier is used for data archiving and long-term backup.  Amazon EBS is a block storage used for mission-critical applications. Amazon EFS (Elastic File System) is used for SMB or NFS shares.
  4. Choose the right database solution. Match technology to the workload: Amazon RDS is for relational databases. Amazon DynamoDB is for NoSQL databases and Amazon Redshift is for data warehousing.
  5. Use caching to improve end user experience.  Caching minimizes redundant data retrieval operations making future requests faster.   Amazon CloudFront is a content delivery network that caches your website via edge devices located around the world. Amazon ElastiCache is for caching data for mission-critical database applications.
  6. Implement defense-in-depth security.  This means building security at every layer.  Referencing the AWS “Shared Security” model, AWS is in-charge of securing the cloud infrastructure (including physical layer and hypervisor layer) while the costumer is in-charge of the majority of the layers from the operating system up to the application layer.  This means customer is still responsible for patching the OS and making the application as secure as possible.  AWS provides security tools that will make your application secure such as IAM, security groups, network ACL’s, CloudTrail, etc.
  7. Utilize parallel processing.  For instance, multi-thread requests by using concurrent threads instead of sequential requests.  Another example is to deploy multiple web or application servers behind load balancers so that requests can be processed by multiple servers at once.
  8. Decouple your applications. IT systems should be designed in a way that reduces inter-dependencies, so that a change or failure in one component does not cascade to other components.  Let the components interact with each other only through standard APIs.
  9.  Automate your environment. Remove manual process to improve system’s stability and consistency.  AWS offers many automation tools to ensure that your infrastructure can respond quickly to changes.
  10. Optimize for cost.  Ensure that your resources are sized appropriately (they can scale in and out based on need),  and that you are taking advantage of different pricing options.

Sources: AWS Certified Solutions Architect Official Study Guide; Global Knowledge Architecting on AWS 5.1 Student Guide

The 38th Manila International Book Fair

The 38th Manila International Book Fair will be held on September 13-17, 2017 from 10:00 AM to 8:00 PM at the SMX Convention Center Manila, Mall of Asia Complex, Philippines

Our books will be available at Fastbooks Educational Supply Incbooth nos. 434 to 437 and 440 to 443 between aisle B & C.

1. 21st Century Literatures from the Philippines and the World

2. Contemporary Philippine Arts from the Regions

3. Business Ethics and Social Responsibility

4. Fundamentals of Accountancy, Business, and Management 1

5. Fundamentals of Accountancy, Business, and Management 2

6. Food and Beverage Services

7. Reading Rizal

8. Principles of Marketing

9. Creative Writing

10. Creative Non-Fiction

11. Practical Research 1

12. Practical Research 2

New Book – Practical Research 1: Basics of Qualitative Research

Grade Level: Grade 11
Semester: 2nd Semester
Track: Applied Track
Authors: Garcia, et al.
ISBN: 978-6218070127
Year Published: 2017
Language: English
No. of pages: 400
Size: 7 x 10 inches
Publisher: Fastbooks Educational Supply, Inc.

About the book:

This book aims to develop critical thinking and problem-solving skills through qualitative research.


 Chapter 1 – Nature of Inquiry and Research

  1. What Is Research?
  2. The Importance of Research in Daily Life
  3. The Characteristics, Processes, and Ethics of Research
  4. Quantitative and Qualitative Research
  5. The Kinds of Research Across Fields

Chapter 2 – Qualitative Research and Its Importance in Daily Life

  1. What is Qualitative Research?
  2. Characteristics of Qualitative Research
  3. Approaches in Qualitative Research
  4. Methods in Qualitative Research
  5. Strengths and Weaknesses of Qualitative Research
  6. Importance of Qualitative Research Across Fields
  7. Generic Outline of a Written Qualitative Research Paper

Chapter 3 – Identifying the Inquiry and Stating the Problem

  1. Range of Research Topics in the Area of Inquiry
  2. How to Design a Research that is Useful in Daily Life
  3. The Research Title
  4. The Background of Research
  5. The Research Questions
  6. The Scope and Delimitation of Study
  7. Benefit and Beneficiaries/ Significance of Study
  8. The Statement of the Problem

Chapter 4 – Learning from Others and Reviewing the Literature

  1. Criteria in Selecting, Citing, and Synthesizing Related Literature
  2. Ethical Standards in Writing Related Literature
  3. The Definition of Terms as Used in the Study

Chapter 5 – Understanding Data and Ways to Systematically Collect Data

  1. What are the Qualitative Research Designs?
  2. Description of Sample
  3. Instrument Development
  4. Data Collection and Analysis Procedures
  5. Guidelines in Writing Research Methodology

Chapter 6 – Finding Answers Through Data Collection

  1. Data Collection Methods
  2. Examples of Data Collection Methods

Chapter 7 – Analyzing the Meaning of the Data and Drawing Conclusions

  1. What is Qualitative Data Analysis?
  2. 2. Ethnographic Data Analysis
  3. Grounded Theory Data Analysis
  4. Phenomenological Data Analysis
  5. Constant Comparative Method Analysis
  6. Language-Based Data Analysis
  7. Coding
  8. Computer-Aided Analysis
  9. How to Analyze Qualitative Data
  10. Summary of Analyzing Qualitative Data
  11. Examples of Data Analysis in Qualitative Research

 Chapter 8 – Reporting and Sharing the Findings

  1. Summary of Findings, Conclusions & Recommendations
  2. Techniques in Listing References
  3. Process of Report Writing
  4. Selection Criteria and Process of Best Design

Online Textbook Support is available.


For orders, please contact: 

Fastbooks Educational Supply, Inc.

Telefax (02) 7431547; Tel (02) 5162585

e-mail 1

e-mail 2

JADE BOOKSTORES in Manila, Iloilo, and Davao.


Address: 526 – 528 United Nations Ave, Ermita, Manila, 1000 Metro Manila, Philippines

Phone: +63 2 525 0464


Address: JM Basa St, Iloilo City Proper, Iloilo City, Iloilo, Philippines

Phone: +63 33 337 3937


Address: CM Recto Ave, Poblacion District, Davao City, Davao del Sur, Philippines

Phone: +63 2244687



Address: Barlin St. Corner P. Burgos, Naga City, Camarines Sur, Philippines

 Phone: +63 54 473 0555


Address: 215 Peñaranda St., Barangay Oro Site, Legazpi City, 4500, Philippines

Phone: +63 52 480 7094


Address: Ziga Avenue, 4511 City of Tabaco, Albay, Philippines

Phone: +63 52 487 4996


Address: Magsaysay Street, Sorsogon City, Sorsogon, Philippines

Phone:  +63 56 421 5230



Just about Books: Practical Research 1: Basics of Qualitative Resear…: Grade Level: Grade 11 Semester: 2nd Semester Track: Applied Track Authors: Garcia, et al. ISBN: 978-6218070127 Year Published: 2017…

New Book: Organization and Management

Organization and Management

Authors: Violeta Jerusalem, Marjueve Palencia, Jonas Palencia

ISBN: 978-6218070103
Year Published: 2017
Language: English
No. of pages: 256
Size: 7×10 in

About the book:

This book deals with the basic concepts, principles, and processes related to business organization, and the functional areas of management. Emphasis is given to the study of management functions like planning, organizing, staffing, leading, controlling, and the roles of these functions in entrepreneurship.


Chapter 1: Nature and Concept of Management
Chapter 2: The Firm and Its Environment
Chapter 3: Planning
Chapter 4: Organizing
Chapter 5: Staffing
Chapter 6: Leading
Chapter 7: Controlling
Chapter 8: Introduction to the Different Functional Areas of Management
Chapter 9: Special Topics in Management

Please contact me if your school is interested to review this textbook for possible adoption.

Publisher and distributor: Fastbook Educational Supply, Inc.,1227 Instruccion, Brgy 514, Sampaloc, Manila, Philippines; Tel +(02) 516 2585; Email

Protecting Your Company Against Ransomware Attacks

Ransomware attacks are the latest security breach incidents grabbing the headlines these days. Last month, major companies including Britain’s National Health Services, Spain’s Telefónica, and FedEx were victims of the WannaCry ransomware attacks. Ransomware infects your computer by encrypting your important documents, and the attackers then ask for ransom to decrypt your data in order to become usable again.

Ransomware attack operations have become more sophisticated, in some cases functioning with a full helpdesk support.

While the latest Operating System patches and anti-malware programs can defend these attacks to a point, they are usually reactive and ineffective. For instance, the WannyCry malware relied heavily on social engineering (phishing) to spread, and relying on end users to open malicious email or to click on malicious websites.

The best defense for ransomware attacks is a good data protection strategy in the area of backup and disaster recovery. When ransomware hits, you can simply remove the infected encrypted files, and restore the good copies. It’s surprising to know that a lot of companies and end users do not properly backup their data. There are tons of backup software and services in the cloud to backup data. A periodic disaster recovery test is also necessary to make sure you can restore data when needed.

A sound backup and disaster recovery plan will help mitigate attacks against ransomware.

New Book: Principles of Marketing

Principles of Marketing

Authors: Emmanuel F. Ligaya, Violeta Jerusalem, Marjueve Palencia, Jonas Palencia

ISBN: 978-6219560962
Year Published: 2017
Language: English
No. of pages: 256
Size: 7×10 in

About this book:

This book deals with the principles and practices in marketing goods and services. It focuses on the development of integrated marketing programs, including the use of social media, that will help grow businesses. This book is for Grade 11 or 12.


Chapter 1: Marketing Principles and Strategies
Chapter 2: Customer Relationship: Customer Service
Chapter 3: Market Opportunity Analysis and Consumer Analysis
Chapter 4: Developing the Marketing Mix
Chapter 5: Managing the Marketing Effort (The Marketing Process)
Chapter 6: Workshop and Presentation of Marketing Plan

Please contact me if your school is interested to review this textbook for possible adoption.

Publisher and distributor: Fastbook Educational Supply, Inc.,1227 Instruccion, Brgy 514, Sampaloc, Manila, Philippines; Tel +(02) 516 2585; Email

New Book: Business Ethics and Social Responsibility

We have released the textbook “Business Ethics and Social Responsibility – Concepts, Principles, and Practices of Ethical Standards

Authors: Violeta Jerusalem, Marjueve Palencia, Jonas Palencia

ISBN: 978-6219560900
Year Published: 2017
Language: English
No. of pages: 304
Size: 7×10 in

About this book:

The book deals with the fundamental concepts, principles, and practices of ethical standards in the business environment.  It combines the theoretical foundations of setting up business enterprises with the conduct of entrepreneurial activities in the context of one’s accountability and social responsibility. This book is for Grade Level 12.


Introduction – Business Ethics and Social Responsibility

Unit 1 – The Role of Business in Social and Economic Development
Chapter 1 – Nature and Forms of Business Organizations
Chapter 2 – Purposes on Establishing Business Enterprises
Chapter 3 – Core Principles in Business Operations
Chapter 4 – Common Practices in Business

Unit 2- Foundations of the Principles of Business Ethics
Chapter 5 – The Classical Philosophies and the Implications on Business Principles and Practices
Chapter 6 – The Impact of Belief Systems in the Business Setting
Chapter 7 – The Filipino Value System and its Effects on Business

Unit 3 – Social Responsibility of Entrepreneurs
Chapter 8 – The Responsibilities and Accountabilities of Entrepreneurs
Chapter 9 – Major Ethical Issues in Entrepreneurship
Chapter 10 – Models and Frameworks of Social Responsibility in the Practice of Sound Business

Unit 4 – Business Beyond Profit Motivation
Chapter 11 – The Importance of Doing Business Beyond Profit Motivation
Chapter 12 – The Notion of Social Enterprises
Chapter 13 – Action Plan to Practice Business Ethics and Social Responsibility

Please contact me if your school is interested to review this textbook for possible adoption.

Publisher: Fastbook Educational Supply, Inc.,1227 Instruccion, Brgy 514, Sampaloc, Manila, Philippines; Tel +(02) 516 2585; Email