SlideShare uma empresa Scribd logo
1 de 9
Escalabilidad Asier Marqués blackslot.com betabeers 31/01/2011
Definición ,[object Object]
Escalado vertical vs horizontal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Optimizar sistema ,[object Object],[object Object],[object Object],[object Object],[object Object]
Optimizar sistema ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encontrar cuellos de botella ,[object Object],[object Object],backend xdebug frontend firebug
Herramientas para monitorizar ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Distribuciones recomendadas ,[object Object],[object Object],[object Object],[object Object],[object Object]
Recursos ,[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017TriNimbus
 
Plan de pruebas de software
Plan de pruebas de softwarePlan de pruebas de software
Plan de pruebas de softwareEdgardo Rojas
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and AnalysisPrashant Chopra
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
Seguridad En Sistemas Distribuidos
Seguridad En Sistemas DistribuidosSeguridad En Sistemas Distribuidos
Seguridad En Sistemas DistribuidosHECTOR JAVIER
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentationConfiz
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing RomSoft SRL
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solutionhearme limited company
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Bossrbrockway
 
System hacking
System hackingSystem hacking
System hackingCAS
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Mohammed Adam
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingYvonne Marambanyika
 
vulnerable and outdated components.pptx
vulnerable and outdated components.pptxvulnerable and outdated components.pptx
vulnerable and outdated components.pptxwaleejhaider1
 
Linux privilege escalation
Linux privilege escalationLinux privilege escalation
Linux privilege escalationSongchaiDuangpan
 
Security testing
Security testingSecurity testing
Security testingbaskar p
 

Mais procurados (20)

Buffer overflow
Buffer overflowBuffer overflow
Buffer overflow
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
Plan de pruebas de software
Plan de pruebas de softwarePlan de pruebas de software
Plan de pruebas de software
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Pentesting
PentestingPentesting
Pentesting
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Seguridad En Sistemas Distribuidos
Seguridad En Sistemas DistribuidosSeguridad En Sistemas Distribuidos
Seguridad En Sistemas Distribuidos
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentation
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
What is pentest
What is pentestWhat is pentest
What is pentest
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
 
Tolerancia..
Tolerancia..Tolerancia..
Tolerancia..
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
System hacking
System hackingSystem hacking
System hacking
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
vulnerable and outdated components.pptx
vulnerable and outdated components.pptxvulnerable and outdated components.pptx
vulnerable and outdated components.pptx
 
Linux privilege escalation
Linux privilege escalationLinux privilege escalation
Linux privilege escalation
 
Security testing
Security testingSecurity testing
Security testing
 

Semelhante a Escalabilidad

Kit de videovigilancia para pequeños Negocios
Kit de videovigilancia para pequeños NegociosKit de videovigilancia para pequeños Negocios
Kit de videovigilancia para pequeños NegociosTRENDnet
 
La nube de internet.
La nube de internet.La nube de internet.
La nube de internet.gomezajj
 
Synology México
Synology MéxicoSynology México
Synology MéxicoTRENDnet
 
Tabla de 5 SGBD_Dorado Jarero Miguel Angel_Base de Datos 2.pdf
Tabla de 5 SGBD_Dorado Jarero Miguel Angel_Base de Datos 2.pdfTabla de 5 SGBD_Dorado Jarero Miguel Angel_Base de Datos 2.pdf
Tabla de 5 SGBD_Dorado Jarero Miguel Angel_Base de Datos 2.pdfMIGUELANGELDORADOJAR
 
2. Revision de Tecnologias Web.pdf
2. Revision de Tecnologias Web.pdf2. Revision de Tecnologias Web.pdf
2. Revision de Tecnologias Web.pdfCarlosDavidMontellan
 
Optimización de aplicaciones web con base de datos NoSQL In-Memory
Optimización de aplicaciones web con base de datos NoSQL In-MemoryOptimización de aplicaciones web con base de datos NoSQL In-Memory
Optimización de aplicaciones web con base de datos NoSQL In-MemoryGonzalo Chacaltana
 
Curso en Linea de Synology 2014.
Curso en Linea de Synology 2014.Curso en Linea de Synology 2014.
Curso en Linea de Synology 2014.TRENDnet
 
Lotero_Lorenzo_Taller1_BasedeDatos.pdf
Lotero_Lorenzo_Taller1_BasedeDatos.pdfLotero_Lorenzo_Taller1_BasedeDatos.pdf
Lotero_Lorenzo_Taller1_BasedeDatos.pdfLorenzoLoteroGaitan
 
Puntos clave para optimizar Wordpress by Raiola Networks
Puntos clave para optimizar Wordpress by Raiola NetworksPuntos clave para optimizar Wordpress by Raiola Networks
Puntos clave para optimizar Wordpress by Raiola NetworksRaiola Networks
 
Rendimiento en magento
Rendimiento en magentoRendimiento en magento
Rendimiento en magentoOnestic
 

Semelhante a Escalabilidad (20)

Performance en Drupal 7
Performance en Drupal 7Performance en Drupal 7
Performance en Drupal 7
 
[Run Reloaded] IIS 7.5 - El webserver todo terreno (Juan Ladetto + José Luis ...
[Run Reloaded] IIS 7.5 - El webserver todo terreno (Juan Ladetto + José Luis ...[Run Reloaded] IIS 7.5 - El webserver todo terreno (Juan Ladetto + José Luis ...
[Run Reloaded] IIS 7.5 - El webserver todo terreno (Juan Ladetto + José Luis ...
 
Mantenimiento Servidores de-base-de-datos
Mantenimiento Servidores de-base-de-datosMantenimiento Servidores de-base-de-datos
Mantenimiento Servidores de-base-de-datos
 
Kit de videovigilancia para pequeños Negocios
Kit de videovigilancia para pequeños NegociosKit de videovigilancia para pequeños Negocios
Kit de videovigilancia para pequeños Negocios
 
Los 10 mandamientos del WPO
Los 10 mandamientos del WPOLos 10 mandamientos del WPO
Los 10 mandamientos del WPO
 
La Caché
La CachéLa Caché
La Caché
 
La nube de internet.
La nube de internet.La nube de internet.
La nube de internet.
 
392354189-SGBD.pptx
392354189-SGBD.pptx392354189-SGBD.pptx
392354189-SGBD.pptx
 
Taller 2
Taller 2Taller 2
Taller 2
 
Synology México
Synology MéxicoSynology México
Synology México
 
Tabla de 5 SGBD_Dorado Jarero Miguel Angel_Base de Datos 2.pdf
Tabla de 5 SGBD_Dorado Jarero Miguel Angel_Base de Datos 2.pdfTabla de 5 SGBD_Dorado Jarero Miguel Angel_Base de Datos 2.pdf
Tabla de 5 SGBD_Dorado Jarero Miguel Angel_Base de Datos 2.pdf
 
2. Revision de Tecnologias Web.pdf
2. Revision de Tecnologias Web.pdf2. Revision de Tecnologias Web.pdf
2. Revision de Tecnologias Web.pdf
 
Optimización de aplicaciones web con base de datos NoSQL In-Memory
Optimización de aplicaciones web con base de datos NoSQL In-MemoryOptimización de aplicaciones web con base de datos NoSQL In-Memory
Optimización de aplicaciones web con base de datos NoSQL In-Memory
 
Exposicionsqlite1 (1)
Exposicionsqlite1 (1)Exposicionsqlite1 (1)
Exposicionsqlite1 (1)
 
Curso en Linea de Synology 2014.
Curso en Linea de Synology 2014.Curso en Linea de Synology 2014.
Curso en Linea de Synology 2014.
 
Gestores de base de datos
Gestores de base de datosGestores de base de datos
Gestores de base de datos
 
Lotero_Lorenzo_Taller1_BasedeDatos.pdf
Lotero_Lorenzo_Taller1_BasedeDatos.pdfLotero_Lorenzo_Taller1_BasedeDatos.pdf
Lotero_Lorenzo_Taller1_BasedeDatos.pdf
 
Puntos clave para optimizar Wordpress by Raiola Networks
Puntos clave para optimizar Wordpress by Raiola NetworksPuntos clave para optimizar Wordpress by Raiola Networks
Puntos clave para optimizar Wordpress by Raiola Networks
 
Rendimiento en magento
Rendimiento en magentoRendimiento en magento
Rendimiento en magento
 
Cuadro comparativo 2
Cuadro comparativo 2Cuadro comparativo 2
Cuadro comparativo 2
 

Escalabilidad