SlideShare uma empresa Scribd logo
1 de 36
SERVICE PRODUCTION

Walter Liu

2012/06/11




                              Confidential | Copyright 2012 Trend
             1   12/24/2012
                                            Micro Inc.
About me
• Architect in Core Tech WRS
  • Trend Micro 2007~ Now
• Chief Technical Director in Netgame Dep.
  • Softstar Inc. Taiwan 1998~2007
• Expertise:
  • Backend service development and operation
It’s coming ……
The beginning




             Confidential | Copyright 2012 Trend   4
12/24/2012                 Micro Inc.
Assault - Error 12 !!!




             Confidential | Copyright 2012 Trend   5
12/24/2012                 Micro Inc.
The nightmare Error 37
Out of stock in Taiwan D3 packages
     • D3 packages are out of stock in largest 3 convenient
       stores in Taiwan and all game shops.
     • Some people shared they finally got packages in Jibei
       island.
     • Many people shared they pursued after trucks of
       convenient stores to get the packages.




             Confidential | Copyright 2012 Trend   7
12/24/2012                 Micro Inc.
Out of Stock of Taiwan Game Card




             Confidential | Copyright 2012 Trend   8
12/24/2012                 Micro Inc.
Blizzard Korean lower priority of
Taiwan IP




                                    Korean IP




                                    Taiwan IP
Questions?
What’s the most important
             things to users?



              Confidential | Copyright 2012 Trend   11
12/24/2012                  Micro Inc.
What mistakes Blizzard
             make in this D3 service
             production?


              Confidential | Copyright 2012 Trend   1
12/24/2012                  Micro Inc.              2
Why Quantity Estimation?
    Cost Effective


 What if it is wrong?
Scalability & Elasticity
Fail in Scalability
                          Performance
   1200

   1000

    800

    600

    400

    200

      0
          0   1   2   3     4   5   6   7   8   9   10   11
EPIC Fail in Scalability
                      Performance
   1200

   1000

    800

    600

    400

    200

      0
          0   1   2   3   4   5   6   7   8   9   10
Ideal Horizontal Scalability
                          Performance
   2500

   2000

   1500

   1000

    500

      0
          0   1   2   3     4   5   6   7   8   9   10   11
Elasticity - Unpredictable Traffic
Elasticity - Cloud Solution
Elasticity – Others
• Elastic Application Architecture.
• Several flexible hardware providers.
• Flexible ISPs and pricing.
• ……
Customer Service and Social
     Communication
     • Bz is doing pretty bad.
       • FB Event: Closed-beta account in Taiwan.
       • Build the image to help their users. Like,
             • No explanation about incidents.




               Confidential | Copyright 2012 Trend
                                                     VS.
                                                      2
12/24/2012                   Micro Inc.               1
Incident happens
    - Especially your service goes production.
Avengers Assemble !!!
Fast and Responsive Organization

                     Teams




       Effective
                             Awareness
     Communication
Fast and Responsive Process
• Incident management
• Problem management
Some other practices
• Interlock with related teams at beginning/middle.
   • Customer service prepares resources for burst incoming
     calls/tickets.
   • Customer service prepares training for the new service/product/
   • Data Center team gives out advices and plan for your project.
• Recruit a Service Manager
  • Fail case: something that not belong to any team.
  • Have someone responsible for whole service.
• Update/patch/change SOP
  • Fail case: Service changed, but your CS don’t know about it. Your
    customers are confused when they call your CS.
  • Fail case: Service changed and caused some trouble, but your
    service manager said he didn’t decide/say it.
Not related to these Diablo 3 failures, but
     important to any system
     • Availability
     • Security
     • Easy to administrate
       • System Health/Statistics Monitoring
       • Easy Deployment
       • Easy Configure
     • Risk Management




             Confidential | Copyright 2012 Trend   2
12/24/2012                 Micro Inc.              7
工商服務時間
     • Web Reputation Service
       • Parental Control and Productivity Control
             • 像是Hinet色情守門員,防毒軟體的孩童防護鎖
             • 或者公司不希望員工上班看色情、賭博等網站
        • Web Threat Protection
             • 防止惡意網頁如病毒/木馬下載、釣魚網站等等。

     • Advanced Persistent Threat
       • 鎖定特定目標
       • 假冒信件或者其他
       • 低調且緩慢
       • 客製化惡意元件
       • 安裝遠端控制工具
       • 傳送情資
              Confidential | Copyright 2012 Trend   2
12/24/2012                  Micro Inc.              8
WRS – Parental Control
WRS – Web Threat Protection
Funny Diablo 3 sales on Taobao, China




             Confidential | Copyright 2012 Trend   3
12/24/2012                 Micro Inc.              1
Thank You!
Risk Management
     • Identify Critical Failure
     • Develop a feasible plan to stabilize customer’s
       satisfaction.
        • Workaround.
        • Rollback.




             Confidential | Copyright 2012 Trend   3
12/24/2012                 Micro Inc.              3
Quantity Estimation
     • Goal: Cost Effective Quantity Estimation
       • For estimating
       • For wrong estimation
     • What if the estimation is not correct?
       • Too few
       • Too many




             Confidential | Copyright 2012 Trend   3
12/24/2012                 Micro Inc.              4
Scalability & Elasticity
     • Scalability
       • Is your application horizontal scalable?
     • Elasticity
       • Speed of commissioning / decommissioning
       • Max amount of resource can be brought in
       • Granularity of usage accounting
     • Develop the plan for high traffic.




             Confidential | Copyright 2012 Trend   3
12/24/2012                 Micro Inc.              5
Dare to fail
• Fail is inevitable for fast changing application.
  (Web, service)
• Fast changing
• Create dare-to-fail process and environment
  • Facebook
  • Backup plan
  • Rollback plan

Mais conteúdo relacionado

Mais procurados

VDI Simplified: Desktops in the Cloud
VDI Simplified: Desktops in the CloudVDI Simplified: Desktops in the Cloud
VDI Simplified: Desktops in the CloudDesktone
 
Whitepaer VDI and DaaS -- June 2015
Whitepaer VDI and DaaS -- June 2015Whitepaer VDI and DaaS -- June 2015
Whitepaer VDI and DaaS -- June 2015Greg Spence
 
Vmware view vdi for americana's business case
Vmware view vdi for americana's business caseVmware view vdi for americana's business case
Vmware view vdi for americana's business caseTripleValue
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesDell World
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforceDell World
 
Disaster recovery shouldn’t run on late nights and coffee alone
Disaster recovery shouldn’t run on late nights and coffee aloneDisaster recovery shouldn’t run on late nights and coffee alone
Disaster recovery shouldn’t run on late nights and coffee aloneJosh Mazgelis
 
Virtual Desktop Success in Healthcare
Virtual Desktop Success in HealthcareVirtual Desktop Success in Healthcare
Virtual Desktop Success in HealthcareeG Innovations
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsAruj Thirawat
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentationsolarisyourep
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012Warpcare
 
The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...Dell World
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus KeynoteStephen Rose
 
Eagle Bank Success Story
Eagle Bank Success StoryEagle Bank Success Story
Eagle Bank Success StoryImprivata
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planningAureusIT
 
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server AuditingHow the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server AuditingNetwrix Corporation
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...Dell World
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityLumension
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - finalAndrew White
 

Mais procurados (20)

VDI Simplified: Desktops in the Cloud
VDI Simplified: Desktops in the CloudVDI Simplified: Desktops in the Cloud
VDI Simplified: Desktops in the Cloud
 
Whitepaer VDI and DaaS -- June 2015
Whitepaer VDI and DaaS -- June 2015Whitepaer VDI and DaaS -- June 2015
Whitepaer VDI and DaaS -- June 2015
 
Vmware view vdi for americana's business case
Vmware view vdi for americana's business caseVmware view vdi for americana's business case
Vmware view vdi for americana's business case
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspaces
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
Disaster recovery shouldn’t run on late nights and coffee alone
Disaster recovery shouldn’t run on late nights and coffee aloneDisaster recovery shouldn’t run on late nights and coffee alone
Disaster recovery shouldn’t run on late nights and coffee alone
 
VDI Cost benefit analysis
VDI Cost benefit analysisVDI Cost benefit analysis
VDI Cost benefit analysis
 
Virtual Desktop Success in Healthcare
Virtual Desktop Success in HealthcareVirtual Desktop Success in Healthcare
Virtual Desktop Success in Healthcare
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012
 
The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Eagle Bank Success Story
Eagle Bank Success StoryEagle Bank Success Story
Eagle Bank Success Story
 
Business Disaster Recovery by Clients First
Business Disaster Recovery by Clients FirstBusiness Disaster Recovery by Clients First
Business Disaster Recovery by Clients First
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
 
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server AuditingHow the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater Insanity
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
 

Semelhante a Service production from d3 pitfall viewpoint

Using Graphs to Take Down Fraudsters in Real Time
Using Graphs to Take Down Fraudsters in Real TimeUsing Graphs to Take Down Fraudsters in Real Time
Using Graphs to Take Down Fraudsters in Real TimeNeo4j
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211hdmchughgmailcom
 
Bring Your Own Device at Cambridgeshire County Council
Bring Your Own Device at Cambridgeshire County CouncilBring Your Own Device at Cambridgeshire County Council
Bring Your Own Device at Cambridgeshire County CouncilBCS East Anglia
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsBluelock
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Infor i Business Cloud
Infor i Business CloudInfor i Business Cloud
Infor i Business CloudInforsystemi
 
Meeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand WorldMeeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand WorldHostway|HOSTING
 
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...Unidesk Corporation
 
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...Janine Anthony Bowen, Esq.
 
NetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
NetIDEAS Inc. - Enabling Global Design Teams with hosted WindchillNetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
NetIDEAS Inc. - Enabling Global Design Teams with hosted WindchillJeff Kiesel
 
Transitioning a Full Enterprise to Cloud in 10 Months - Cloud Expo
Transitioning a Full Enterprise to Cloud in 10 Months - Cloud ExpoTransitioning a Full Enterprise to Cloud in 10 Months - Cloud Expo
Transitioning a Full Enterprise to Cloud in 10 Months - Cloud Exposjdeluca
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
 
Smarter Test Automation for Web & Mobile Apps
Smarter Test Automation for Web & Mobile AppsSmarter Test Automation for Web & Mobile Apps
Smarter Test Automation for Web & Mobile AppsKeao Caindec
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Virtual Data : Eliminating the data constraint in Application Development
Virtual Data :  Eliminating the data constraint in Application DevelopmentVirtual Data :  Eliminating the data constraint in Application Development
Virtual Data : Eliminating the data constraint in Application DevelopmentKyle Hailey
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013Bill Burns
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 

Semelhante a Service production from d3 pitfall viewpoint (20)

Using Graphs to Take Down Fraudsters in Real Time
Using Graphs to Take Down Fraudsters in Real TimeUsing Graphs to Take Down Fraudsters in Real Time
Using Graphs to Take Down Fraudsters in Real Time
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211
 
Bring Your Own Device at Cambridgeshire County Council
Bring Your Own Device at Cambridgeshire County CouncilBring Your Own Device at Cambridgeshire County Council
Bring Your Own Device at Cambridgeshire County Council
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Infor i Business Cloud
Infor i Business CloudInfor i Business Cloud
Infor i Business Cloud
 
Meeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand WorldMeeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand World
 
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...
 
Workshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environmentWorkshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environment
 
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
 
NetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
NetIDEAS Inc. - Enabling Global Design Teams with hosted WindchillNetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
NetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
 
Transitioning a Full Enterprise to Cloud in 10 Months - Cloud Expo
Transitioning a Full Enterprise to Cloud in 10 Months - Cloud ExpoTransitioning a Full Enterprise to Cloud in 10 Months - Cloud Expo
Transitioning a Full Enterprise to Cloud in 10 Months - Cloud Expo
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 
Smarter Test Automation for Web & Mobile Apps
Smarter Test Automation for Web & Mobile AppsSmarter Test Automation for Web & Mobile Apps
Smarter Test Automation for Web & Mobile Apps
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Virtual Data : Eliminating the data constraint in Application Development
Virtual Data :  Eliminating the data constraint in Application DevelopmentVirtual Data :  Eliminating the data constraint in Application Development
Virtual Data : Eliminating the data constraint in Application Development
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 

Mais de Walter Liu

Generative AI 在手機遊戲發行上的應用介紹.pdf
Generative AI 在手機遊戲發行上的應用介紹.pdfGenerative AI 在手機遊戲發行上的應用介紹.pdf
Generative AI 在手機遊戲發行上的應用介紹.pdfWalter Liu
 
Infrastructure as code using Kubernetes
Infrastructure as code using KubernetesInfrastructure as code using Kubernetes
Infrastructure as code using KubernetesWalter Liu
 
手機遊戲數位行銷工具淺談
手機遊戲數位行銷工具淺談手機遊戲數位行銷工具淺談
手機遊戲數位行銷工具淺談Walter Liu
 
關於第三方追蹤廣告再行銷的那些事兒
關於第三方追蹤廣告再行銷的那些事兒關於第三方追蹤廣告再行銷的那些事兒
關於第三方追蹤廣告再行銷的那些事兒Walter Liu
 
Kubernetes Workshop
Kubernetes WorkshopKubernetes Workshop
Kubernetes WorkshopWalter Liu
 
Using Kubernetes to deploy Django in GCP
Using Kubernetes to deploy Django in GCPUsing Kubernetes to deploy Django in GCP
Using Kubernetes to deploy Django in GCPWalter Liu
 
Game DDOS Prevention
Game DDOS PreventionGame DDOS Prevention
Game DDOS PreventionWalter Liu
 
Airflow - a data flow engine
Airflow - a data flow engineAirflow - a data flow engine
Airflow - a data flow engineWalter Liu
 
Super Fast Gevent Introduction
Super Fast Gevent IntroductionSuper Fast Gevent Introduction
Super Fast Gevent IntroductionWalter Liu
 
HTTP/2 to web dev
HTTP/2 to web devHTTP/2 to web dev
HTTP/2 to web devWalter Liu
 
HTTP/2 Introduction
HTTP/2 IntroductionHTTP/2 Introduction
HTTP/2 IntroductionWalter Liu
 
Consul - service discovery and others
Consul - service discovery and othersConsul - service discovery and others
Consul - service discovery and othersWalter Liu
 
Docker introduction
Docker introductionDocker introduction
Docker introductionWalter Liu
 
WRS GIT Branching Model - draft
WRS GIT Branching Model - draftWRS GIT Branching Model - draft
WRS GIT Branching Model - draftWalter Liu
 
Salty OPS – Saltstack Introduction
Salty OPS – Saltstack IntroductionSalty OPS – Saltstack Introduction
Salty OPS – Saltstack IntroductionWalter Liu
 
Django deployment and rpm+yum
Django deployment and rpm+yumDjango deployment and rpm+yum
Django deployment and rpm+yumWalter Liu
 
Game Localization in Python
Game Localization in PythonGame Localization in Python
Game Localization in PythonWalter Liu
 
Celery in the Django
Celery in the DjangoCelery in the Django
Celery in the DjangoWalter Liu
 

Mais de Walter Liu (18)

Generative AI 在手機遊戲發行上的應用介紹.pdf
Generative AI 在手機遊戲發行上的應用介紹.pdfGenerative AI 在手機遊戲發行上的應用介紹.pdf
Generative AI 在手機遊戲發行上的應用介紹.pdf
 
Infrastructure as code using Kubernetes
Infrastructure as code using KubernetesInfrastructure as code using Kubernetes
Infrastructure as code using Kubernetes
 
手機遊戲數位行銷工具淺談
手機遊戲數位行銷工具淺談手機遊戲數位行銷工具淺談
手機遊戲數位行銷工具淺談
 
關於第三方追蹤廣告再行銷的那些事兒
關於第三方追蹤廣告再行銷的那些事兒關於第三方追蹤廣告再行銷的那些事兒
關於第三方追蹤廣告再行銷的那些事兒
 
Kubernetes Workshop
Kubernetes WorkshopKubernetes Workshop
Kubernetes Workshop
 
Using Kubernetes to deploy Django in GCP
Using Kubernetes to deploy Django in GCPUsing Kubernetes to deploy Django in GCP
Using Kubernetes to deploy Django in GCP
 
Game DDOS Prevention
Game DDOS PreventionGame DDOS Prevention
Game DDOS Prevention
 
Airflow - a data flow engine
Airflow - a data flow engineAirflow - a data flow engine
Airflow - a data flow engine
 
Super Fast Gevent Introduction
Super Fast Gevent IntroductionSuper Fast Gevent Introduction
Super Fast Gevent Introduction
 
HTTP/2 to web dev
HTTP/2 to web devHTTP/2 to web dev
HTTP/2 to web dev
 
HTTP/2 Introduction
HTTP/2 IntroductionHTTP/2 Introduction
HTTP/2 Introduction
 
Consul - service discovery and others
Consul - service discovery and othersConsul - service discovery and others
Consul - service discovery and others
 
Docker introduction
Docker introductionDocker introduction
Docker introduction
 
WRS GIT Branching Model - draft
WRS GIT Branching Model - draftWRS GIT Branching Model - draft
WRS GIT Branching Model - draft
 
Salty OPS – Saltstack Introduction
Salty OPS – Saltstack IntroductionSalty OPS – Saltstack Introduction
Salty OPS – Saltstack Introduction
 
Django deployment and rpm+yum
Django deployment and rpm+yumDjango deployment and rpm+yum
Django deployment and rpm+yum
 
Game Localization in Python
Game Localization in PythonGame Localization in Python
Game Localization in Python
 
Celery in the Django
Celery in the DjangoCelery in the Django
Celery in the Django
 

Último

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Service production from d3 pitfall viewpoint

  • 1. SERVICE PRODUCTION Walter Liu 2012/06/11 Confidential | Copyright 2012 Trend 1 12/24/2012 Micro Inc.
  • 2. About me • Architect in Core Tech WRS • Trend Micro 2007~ Now • Chief Technical Director in Netgame Dep. • Softstar Inc. Taiwan 1998~2007 • Expertise: • Backend service development and operation
  • 4. The beginning Confidential | Copyright 2012 Trend 4 12/24/2012 Micro Inc.
  • 5. Assault - Error 12 !!! Confidential | Copyright 2012 Trend 5 12/24/2012 Micro Inc.
  • 7. Out of stock in Taiwan D3 packages • D3 packages are out of stock in largest 3 convenient stores in Taiwan and all game shops. • Some people shared they finally got packages in Jibei island. • Many people shared they pursued after trucks of convenient stores to get the packages. Confidential | Copyright 2012 Trend 7 12/24/2012 Micro Inc.
  • 8. Out of Stock of Taiwan Game Card Confidential | Copyright 2012 Trend 8 12/24/2012 Micro Inc.
  • 9. Blizzard Korean lower priority of Taiwan IP Korean IP Taiwan IP
  • 11. What’s the most important things to users? Confidential | Copyright 2012 Trend 11 12/24/2012 Micro Inc.
  • 12. What mistakes Blizzard make in this D3 service production? Confidential | Copyright 2012 Trend 1 12/24/2012 Micro Inc. 2
  • 13. Why Quantity Estimation? Cost Effective What if it is wrong?
  • 15. Fail in Scalability Performance 1200 1000 800 600 400 200 0 0 1 2 3 4 5 6 7 8 9 10 11
  • 16. EPIC Fail in Scalability Performance 1200 1000 800 600 400 200 0 0 1 2 3 4 5 6 7 8 9 10
  • 17. Ideal Horizontal Scalability Performance 2500 2000 1500 1000 500 0 0 1 2 3 4 5 6 7 8 9 10 11
  • 19. Elasticity - Cloud Solution
  • 20. Elasticity – Others • Elastic Application Architecture. • Several flexible hardware providers. • Flexible ISPs and pricing. • ……
  • 21. Customer Service and Social Communication • Bz is doing pretty bad. • FB Event: Closed-beta account in Taiwan. • Build the image to help their users. Like, • No explanation about incidents. Confidential | Copyright 2012 Trend VS. 2 12/24/2012 Micro Inc. 1
  • 22. Incident happens - Especially your service goes production.
  • 24. Fast and Responsive Organization Teams Effective Awareness Communication
  • 25. Fast and Responsive Process • Incident management • Problem management
  • 26. Some other practices • Interlock with related teams at beginning/middle. • Customer service prepares resources for burst incoming calls/tickets. • Customer service prepares training for the new service/product/ • Data Center team gives out advices and plan for your project. • Recruit a Service Manager • Fail case: something that not belong to any team. • Have someone responsible for whole service. • Update/patch/change SOP • Fail case: Service changed, but your CS don’t know about it. Your customers are confused when they call your CS. • Fail case: Service changed and caused some trouble, but your service manager said he didn’t decide/say it.
  • 27. Not related to these Diablo 3 failures, but important to any system • Availability • Security • Easy to administrate • System Health/Statistics Monitoring • Easy Deployment • Easy Configure • Risk Management Confidential | Copyright 2012 Trend 2 12/24/2012 Micro Inc. 7
  • 28. 工商服務時間 • Web Reputation Service • Parental Control and Productivity Control • 像是Hinet色情守門員,防毒軟體的孩童防護鎖 • 或者公司不希望員工上班看色情、賭博等網站 • Web Threat Protection • 防止惡意網頁如病毒/木馬下載、釣魚網站等等。 • Advanced Persistent Threat • 鎖定特定目標 • 假冒信件或者其他 • 低調且緩慢 • 客製化惡意元件 • 安裝遠端控制工具 • 傳送情資 Confidential | Copyright 2012 Trend 2 12/24/2012 Micro Inc. 8
  • 29. WRS – Parental Control
  • 30. WRS – Web Threat Protection
  • 31. Funny Diablo 3 sales on Taobao, China Confidential | Copyright 2012 Trend 3 12/24/2012 Micro Inc. 1
  • 33. Risk Management • Identify Critical Failure • Develop a feasible plan to stabilize customer’s satisfaction. • Workaround. • Rollback. Confidential | Copyright 2012 Trend 3 12/24/2012 Micro Inc. 3
  • 34. Quantity Estimation • Goal: Cost Effective Quantity Estimation • For estimating • For wrong estimation • What if the estimation is not correct? • Too few • Too many Confidential | Copyright 2012 Trend 3 12/24/2012 Micro Inc. 4
  • 35. Scalability & Elasticity • Scalability • Is your application horizontal scalable? • Elasticity • Speed of commissioning / decommissioning • Max amount of resource can be brought in • Granularity of usage accounting • Develop the plan for high traffic. Confidential | Copyright 2012 Trend 3 12/24/2012 Micro Inc. 5
  • 36. Dare to fail • Fail is inevitable for fast changing application. (Web, service) • Fast changing • Create dare-to-fail process and environment • Facebook • Backup plan • Rollback plan

Notas do Editor

  1. 經過10年漫長的等待,男人的小三,女人的公敵終於來到地球,準備毀滅世界。工程師除了上班努力的寫code,下班也要努力的拯救世界。
  2. 在座的各位知道Diablo的舉個手?在座的有在玩的舉手一下?
  3. 能夠使用他們想用的服務能夠使用大部份主要的功能
  4. 供應鏈 Supply Chain 出包數量預估錯誤 (both on 實體包以及玩家數量)服務 Infrastructure 的彈性不足在台灣的客戶服務與社群,如何應對外部的聲音的能力很差
  5. Goal: Cost Effective Quantity EstimationFor estimatingFor wrong estimationWhat if the estimation is not correct?Too fewToo many
  6. closed-beta account in Taiwan event: 半年前開始用施捨的方式的愚蠢行銷,台灣拿到的D3 封測帳號 都是在FB上用搶的,貼一張圖 讓一堆人去回數字 然後挑一個數字 給CB帳號,結果美洲那時候測試直接發10萬個帳號。跟台灣政府的施政差不多
  7. Awareness: exampleRO 洗錢, don’t hire/recruit who don’t care your users.Effective Communication: War room, MSN meeting room, etc.Team: Every talents, include related people in your team.
  8. 鎖定特定目標: 針對特定政府或企業客製化惡意元件:少量,沒在外面流通,所以很多防毒公司抓不到。傳送情資:加密後傳送,所以很多data leak prevention的方案抓不到。
  9. Error 12 時,緊急讓使用者都具有close beta的資格,他們就有辦法進去玩。
  10. There is no best way for quantity estimation. All depends.
  11. Elasticity exampleHave a flexible hardware providers.Use cloud solution.Good Scalability: 系統可以同時容納數十萬人,問題卻不是很多。Bad Elasticity: 沒有辦法快速依據需求快速增加或者減少系統所需的資源,而造成許多玩家一直重複的重試Error37