The document discusses two main issues in cloud computing: resource allocation and overload management in shared clusters. It proposes a decentralized resource allocation planning approach where each node decides its own resource allocation through market-based coordination. The goal is to maximize the total utility of application requests by prioritizing applications through different utility values.
Auto-Scaling to Minimize Cost and Meet Application Deadlines in Cloud Workflowsmingtemp
http://www.cs.virginia.edu/~mm5bw/papers/WorkflowAutoScaling.pdf
The presentation for SC 2011
http://dl.acm.org/citation.cfm?id=2063449
www.mingmao.org
Overview of the European digitzal agenda, Anna nietyksza, EEEC, European Econ...OW2
Mrs. Nietyksza will present an overview of the European digital agenda for the coming years and cover topics such as cloud computing, social networks and place of the open source in the future european innovations.
Auto-Scaling to Minimize Cost and Meet Application Deadlines in Cloud Workflowsmingtemp
http://www.cs.virginia.edu/~mm5bw/papers/WorkflowAutoScaling.pdf
The presentation for SC 2011
http://dl.acm.org/citation.cfm?id=2063449
www.mingmao.org
Overview of the European digitzal agenda, Anna nietyksza, EEEC, European Econ...OW2
Mrs. Nietyksza will present an overview of the European digital agenda for the coming years and cover topics such as cloud computing, social networks and place of the open source in the future european innovations.
Over the last several years, financial institutions have spent billions of dollars and resources securing a perimeter defense system consisting of intrusion detection, intrusion prevention, firewalls, user authentication, and other layers of security all built to secure their financial systems. Due to the exponential increase in internal and external information security incidents, these investments are necessary to protect an institution’s reputation and revenue. In addition, the federal government is using regulatory means to ensure the banks
take responsibility for potential losses.
Of equal or even greater threat, however, are the social aspects of the Internet that cannot
be controlled. For example, financial institutions need to be aware of the reputational risk that is inherent on the Internet. Each institution needs to do more than reactively protect its data; it must also proactively safeguard its reputation online, where references to its corporate name alone can number in the millions. An institution must also guard against infringements against its logo, its trademarks or other graphic representations. This risk, outside the firewall, is the other side of the coin.
Participating in AppHub, the European Open Source MarketplaceOW2
AppHub is the European Open Source marketplace. AppHub identifies and positions software components within the Open Cloud Directory to help users find and implement the software outcomes of your projects more easily. Open source software is a powerful enabler for collaborative innovation. However, making the source available does not automatically attract contributors or grant immediate market access. AppHub is designed to provide an distribution channel that addresses these issues, making it easier for open source projects to connect with their potential markets. Essentially, AppHub brings the market to you. This presentation will provide an overview of AppHub and help OW2 project leaders understand how they can participate in, and benefit from, the AppHub marketplace.
TDC 2012 - Métricas de código na arquiteturaLeandro Daniel
Através das métricas de código podemos conhecer a complexidade, tamanho, quantidade de métodos, nível de coesão, grau de acoplamento entre classes, dentre inúmeras outras possibilidades. Esta apresentação demonstrou a utilidade das métricas de software para arquitetos.
LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.OW2
LemonLDAP::NG is a FOSS for WebSSO, access management and identity federation developed since 2005. Its community is active and regurlarly proposes new versions. This software provides many functionalities: * Multi-domain SSO * Configuration and session management * Form replay * Protocols support : LDAP, CAS, OpenID, SAML, Radius * Authentication methods chaining * Applications portal * Password management * Notifications * Connection history management * Put an application in maintenance state * Inserting a menu on protected applications LemonLDAP::NG can be used as a gateway between many authentifcation protocoles, for example : * Provide identity trough SAML after an LDAP authentication * Provide identity trough CAS after an OpenID authentication * Provide identity trough OpenID after a Twitter authentication LemonLDAP::NG is a efficient mean to link Saas applications to internal applications, all relying on the authentication of the enterprise directory.
Visita al Palacio de Gobierno del Ecuador en la ciudad de Quito el dia 28 de septiembre del 2010 a dos dias de la insurgencia de la Tropa de la Policia del Ecuador.
Pedro Camino
American Tortoise Rescue The Clock Is Tickingtellem
Stop the importation of non-native aquatic turtles and frogs into California. Other states have done it, and so must we. Presentation made by American Tortoise Rescue to the California Fish & Game Commission March 3, 2010.
Software is eating the world and open source licenses are eating software. This leads to the presence of OSS in nearly all the electronic systems we interact with daily, such as communication devices, cars, trains, healthcare systems, entertainment environments. This entails that the quality of the OSS components we use and produce is getting progressively as important as the quality of the air we breathe. One of the OW2 key missions is to continously design and implement a roadmap for enabling quality and trustworhy open source software, through a dedicated platform named SQuAT. This talk will present the status and the future of this platform, its underlying models and tools, and how you can use it for assessing and improving the quality of your project.
Cloud Computing, SOA and Web 2.0, an inevitable convergenceDavid Karam
This presentation talks about software and hardware design oriented towards embracing the cloud. The main point is that a service oriented architecture is the chief enabler to leverage cloud technologies on both the software and the hardware levels.
Cloud Computing, SOA and Web 2.0, an inevitable convergenceDavid Karam
This presentation talks about software and hardware design oriented towards embracing the cloud. The main point is that a service oriented architecture is the chief enabler to leverage cloud technologies on both the software and the hardware levels.
Over the last several years, financial institutions have spent billions of dollars and resources securing a perimeter defense system consisting of intrusion detection, intrusion prevention, firewalls, user authentication, and other layers of security all built to secure their financial systems. Due to the exponential increase in internal and external information security incidents, these investments are necessary to protect an institution’s reputation and revenue. In addition, the federal government is using regulatory means to ensure the banks
take responsibility for potential losses.
Of equal or even greater threat, however, are the social aspects of the Internet that cannot
be controlled. For example, financial institutions need to be aware of the reputational risk that is inherent on the Internet. Each institution needs to do more than reactively protect its data; it must also proactively safeguard its reputation online, where references to its corporate name alone can number in the millions. An institution must also guard against infringements against its logo, its trademarks or other graphic representations. This risk, outside the firewall, is the other side of the coin.
Participating in AppHub, the European Open Source MarketplaceOW2
AppHub is the European Open Source marketplace. AppHub identifies and positions software components within the Open Cloud Directory to help users find and implement the software outcomes of your projects more easily. Open source software is a powerful enabler for collaborative innovation. However, making the source available does not automatically attract contributors or grant immediate market access. AppHub is designed to provide an distribution channel that addresses these issues, making it easier for open source projects to connect with their potential markets. Essentially, AppHub brings the market to you. This presentation will provide an overview of AppHub and help OW2 project leaders understand how they can participate in, and benefit from, the AppHub marketplace.
TDC 2012 - Métricas de código na arquiteturaLeandro Daniel
Através das métricas de código podemos conhecer a complexidade, tamanho, quantidade de métodos, nível de coesão, grau de acoplamento entre classes, dentre inúmeras outras possibilidades. Esta apresentação demonstrou a utilidade das métricas de software para arquitetos.
LemonLDAP::NG - the New Generation WebSSO !, David Coutadeur, Linagora.OW2
LemonLDAP::NG is a FOSS for WebSSO, access management and identity federation developed since 2005. Its community is active and regurlarly proposes new versions. This software provides many functionalities: * Multi-domain SSO * Configuration and session management * Form replay * Protocols support : LDAP, CAS, OpenID, SAML, Radius * Authentication methods chaining * Applications portal * Password management * Notifications * Connection history management * Put an application in maintenance state * Inserting a menu on protected applications LemonLDAP::NG can be used as a gateway between many authentifcation protocoles, for example : * Provide identity trough SAML after an LDAP authentication * Provide identity trough CAS after an OpenID authentication * Provide identity trough OpenID after a Twitter authentication LemonLDAP::NG is a efficient mean to link Saas applications to internal applications, all relying on the authentication of the enterprise directory.
Visita al Palacio de Gobierno del Ecuador en la ciudad de Quito el dia 28 de septiembre del 2010 a dos dias de la insurgencia de la Tropa de la Policia del Ecuador.
Pedro Camino
American Tortoise Rescue The Clock Is Tickingtellem
Stop the importation of non-native aquatic turtles and frogs into California. Other states have done it, and so must we. Presentation made by American Tortoise Rescue to the California Fish & Game Commission March 3, 2010.
Software is eating the world and open source licenses are eating software. This leads to the presence of OSS in nearly all the electronic systems we interact with daily, such as communication devices, cars, trains, healthcare systems, entertainment environments. This entails that the quality of the OSS components we use and produce is getting progressively as important as the quality of the air we breathe. One of the OW2 key missions is to continously design and implement a roadmap for enabling quality and trustworhy open source software, through a dedicated platform named SQuAT. This talk will present the status and the future of this platform, its underlying models and tools, and how you can use it for assessing and improving the quality of your project.
Cloud Computing, SOA and Web 2.0, an inevitable convergenceDavid Karam
This presentation talks about software and hardware design oriented towards embracing the cloud. The main point is that a service oriented architecture is the chief enabler to leverage cloud technologies on both the software and the hardware levels.
Cloud Computing, SOA and Web 2.0, an inevitable convergenceDavid Karam
This presentation talks about software and hardware design oriented towards embracing the cloud. The main point is that a service oriented architecture is the chief enabler to leverage cloud technologies on both the software and the hardware levels.
OpenCloudware: the Cloud application lifecycle management platform, OW2con'12...OW2
The OpenCloudware collaborative R&D project aims at building an open software engineering platform, for the collaborative development of distributed applications to be deployed on multiple Cloud infrastructures. It will be available through a self-service portal. We target virtualized multi-tier applications such as JavaEE - OSGi. The results of OpenCloudware contain a set of software components to manage the lifecycle of such applications, from modelling (Think), developing and building images (Build), to a multi-IaaS compliant PaaS platform (Run) for their deployment, orchestration, performance testing, self-management (elasticity, green IT optimisation) and provisioning. Applications can be deployed potentially on multiple IaaS (supporting either one IaaS at a time, or hybrid scenarios). The OpenCloudware project is coordinated by France Telecom Orange, funded by the french Fonds National pour la Société Numérique (FSN) and endorsed by competitiveness clusters Minalogic, Systematic and SCS.
This is Lenovo's presentation at FETC 2013.
The mega-trends of bring-your-own-device (BYOD) and the consumerization of IT go directly against the desire to limit security exposure and keep TCO low. In this session, Rich discusses approaches to meeting both needs plus drill down on how and where cloud computing can ultimately, resolve these seemingly mutually exclusive goals and streamline the enablement of BYOD.
Presenter: Rich Cheston, Chief Technical Architect, Distinguished Engineer and Master Inventor, Lenovo
www.lenovo.com/eduevents
Parallel and Distributed Computing: BOINC Grid Implementation PaperRodrigo Neves
Parallel and Distributed Computing: BOINC Grid Implementation Paper done while on the Parallel and Distributed System course of the Masters Degree on Electronics and Telecomunication Engeneering from University of Algarve
Trabalho de Sistemas Paralelos e Distribuidos : "Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo Neves, Nuno Mestre, Francisco Machado e João Lopes
You have questions about cloud technology and how it can help your business; We have answers. This slideshow is from our recent lunch and learns that we held in Denver, San Antonio and Houston. For more info check out www.bcsprosoft.com.
Application Performance Management in the Clouds - Lessons LearnedMichael Kopp
We face the challenge of monitoring and managing performance in clouds every other day. Not only is application performance management different in a cloud, but all clouds are not equal either. This lessons learned session will show how to do APM in several different Clouds (Azure, EC2, VMware private Clouds) and how it differs from more traditional environments. The session will also cover performance monitoring, troubleshooting and tuning in environments where resources are virtually infinite, but application performance is not.
Similar to Starting for the Cloud, OW2 Conference Nov10 (20)
OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in RomaOW2
This presentation is given by Stefano Pampaloni at the RIOS Open Source Week, Nov. 2022 in Roma.
Abstract: Established in 2007 as a non-profit organisation, OW2 is an independent community dedicated to promoting open source software for information systems and fostering their business ecosystems. OW2 federates 50+ organizations and 2500+ IT professionals worldwide. OW2 hosts 50+ technology Projects. RIOS is an Italian network of companies established in 2015 aiming to improve open source adoption and to build sustainable businesses around it
OW2 and RIOS are working together to foster collaboration between European open-source stakeholders.
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...OW2
The Good Governance Initiative (GGI) proposes a methodological framework to assess open-source awareness, compliance and governance in any kind of organizations, helping them to structure and improve the use of FOSS towards an OSPO. The GGI was initiated by OW2 and is developed by the OSPO Alliance. This presentation will give an overview of the initiative, its organization, roadmap, first achievements and next steps.
GLPi v.10, les fonctionnalités principales et l'offre cloudOW2
Presentation de la solution open source GLPi lors de la session "Open cloud by OW2" dans la conférence Cloud Datacenter + infra des 29 et 30 juin 2022 à Paris.
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...OW2
Presentation de la solution open source Centreon lors de la session "Open Cloud by OW2" à la conférence Cloud Datacenter+Infra des 29 et 30 juin à Paris.
FusionIAM : la gestion des identités et des accés open sourceOW2
La solution FusionIAM est présentée dans la session "Open Cloud by OW2", organisée lors de la conférence Cloud Datacenter + Infra les 29 et 30 juin 2022 à Paris.
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...OW2
Connaissez-vous OW2 ? Aventure commencée en 1999 à Grenoble sur la base d'un consortium industriel dédié au middleware open source, devenu association sans but lucratif d'échelle européenne en 2006 sous le nom d'OW2, nous agissons pour la diffusion du libre dans le monde professionnel depuis plus de 20 ans.
OW2 compte des adhérents de toute taille : 2.600 individuels en adhésion gratuite, et 30 institutionnels, de la TPE unipersonnelle à Orange, Microsoft ou Huawei, de l'Inria ou le Fraunhofer Fokus à la Gendarmerie Nationale ou la ville de Paris.
Nos projets sont plus célèbres que nous : ASM, Centreon, Lutece, PrestaShop, Sympa ou Rocket.Chat vous diront peut-être quelque chose ?
Philosophiquement, OW2 se trouve quelque part entre Eclipse et Apache : culture technique, infrastructure d'hébergement et d'assistance pour les projets, sur la ligne de crête entre l'esprit du libre et les contraintes du business, nous sommes un acteur de l'économie sociale, persuadé que l'open source est central dans une transformation sociétale nécessaire qui ne pourra se faire sans l'adhésion du monde industriel et académique.
A un tournant de notre histoire, nous investissons le créneau de la qualité industrielle des projets avec notre méthodologie "Market readiness Levels", et la gouvernance de l'open-source comme membre fondateur de l'OSPO Alliance (ospo.zone) et éditeur du guide méthodologique "OSS Good Governance handbook".
Ne nous y trompons pas : OW2 est un acteur éminemment politique, porteur d'une vision fondée sur la transformation du monde professionnel et de ses valeurs par le code et la coopération. Et cette présentation, avec un survol de notre histoire, adhérents, initiatives et projets, est également l'occasion d'en débattre.
This presentation by Cedric Thomas (OW2 CEO) details three OW2 initiatives to engage with mainstream open source software users, including the H2020 ReachOut project, Market Readiness and Good Governance.
Towards a sustainable solution to open source sustainability, OW2online20, Ju...OW2
A few years ago, Heartbleed epitomized a massive open source sustainability problem for critical parts of the internet infrastructure. The bug, which affected the popular OpenSSL cryptographic software library, notably compromised the confidentiality of 4.5 million US patient records and cost the industry an estimated $500M. It was soon revealed that the root cause of the issue was that OpenSSL was precariously understaffed. Open source sustainability became a major theme overnight. Stories of maintainer burn-out made the headlines. And tentative solutions started to emerge, most of them donation-based. In this talk we’ll explore a number of existing strategies to fund open source and make it more sustainable, from patronage to dedicated ad networks. And we’ll defend the idea that the best path to open source sustainability is to help companies understand the tangible business value they can get from contributing to open source.
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...OW2
Presentation of the advanced optimization concepts for cloud computing application using open source Melodic/Morphemic platform. It will cover application architecture polymorphing and proactive adaptation based on forecasted applications needs.
Open Source governance and the Eclipse Foundation, OW2online, June 2020OW2
Presentation by Gael Blondelle, Managing Director at Eclipse Foundation.
Abstract:
In this talk, we will cover two complementary topics: The different Eclipse projects related to Open Source governance, like Eclipse SW360, SW360 Antenna, and Eclipse Steady, as well as the opportunity to leverage SW360 as the core of a larger Open Source governance initiative.
The Eclipse IP Process that has been applied to hundreds of Eclipse projects for more than 15 years and is going through a modernization process that involves both simplification from the developer point of view, and openness to new source of trusted data like Clearly Defined.
Open source contribution policies, OW2online, June 2020OW2
Open source contribution policies are long, boring, overlooked documents, that generally suck. They're designed to protect the company at all costs. But in the process, end up hurting engineering productivity, and morale. Sometimes they even unknowingly put corporate IP at risk.
But that's not inevitable.
It's possible to write open source contribution policies that make engineers lives easier, boost morale and productivity, reduce attrition, and attract new talent. And it's possible to do so while reducing the company's IP risk, not increasing it.
In this talk, we'll look at the general structure of contribution policies, examples in the wild, and tactics to make them suck less.
We'll also look at how to turn these policies into self-service software, preventing the tedious email back and forth between engineering and legal in most cases and making open source contribution a breeze. Presentation by Tobbie Langel, UnLockOpen.
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...OW2
Presentation by Jose Manrique, CEO at Bitergia.
Abstract: 2020 has started intense for many countries. It's been just a few months, but the things we have lived make us feel like it's been years. Covid-19 pandemic has hit everywhere and forced many people to work from home. If you were lucky enough to be in one of these modern companies that have adopted digital transformation years ago, would that be a problem? Many people have thought it wasn't, but it has really been. And what about the rest of the software developers involved in companies not ready for remote work at all?
It's been said that nothing has boosted more companies' digital transformation than covid-19. But, are their managers ready for such change? Managing software development at scale is not an easy task, and this pandemic has disrupted the way projects are being developed in many companies.
During this talk, I would like to share lessons learned from open source development at scale that might help companies to adapt to these changes. But more specifically, lessons about how software development analytics help managers to understand collaborative remote work.
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020OW2
Presentation by Olivier Fendt, Senior Manager Open Source Software at Siemens.
Abstract: The well-known OpenChain project launched in Sept 2019 a Tooling Group. The objective of this group is to realize a turn-key Open Source toolchain for Open Source Compliance, which is / can be easily integrated in the software development CI/CD pipelines. The Tooling Group uses open source principles to accomplish this, creating a meritocracy producing real world solutions for real world challenges, and sharing these results with all interested parties. The presentation gives an overview of the Tooling group its objectives, the areas of focus, the current state and future plans.
Open Source Compliance at Orange, OW2online, June 2020OW2
Presentation by Nicolas Toussaint, Software Architect, Orange.
Abstract: Orange and Orange Business Services have turned to full open source solutions to tackle the complex problem of respecting the open source legal compliance constraints.
This talk presents the journey undertaken the past few years to build and improve the existing tooling and processes to make compliance validation possible, as well as allow overseeing progresses.
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020OW2
Presentation by Boris Baldassari, Consultant, Castalia Solutions.
Abstract: While Open Source Software has become mainstream, the understanding of its key principles, from ethics and collaboration to governance and community management, is gaining more interest and attention. There is a comprehensive volume of studies and reports backing up our individual and collective experience, yet we still cannot reliably measure these characteristics, and even less clearly define or assess them.
In an attempt to build up confidence and foster maturity in this area, this talk will look at the various existing models and metrics related to OSS compliance and governance, and build upon them to propose methods and tools for their evaluation and analysis. We will discuss the requirements and essential questions to ask, offer guidelines for implementation and suggest efficient ways to present results.
Intelligent package management with FASTEN, OW2online, June 2020OW2
Presentation by Amir Mir, TUDelft.
As recent events, such as the leftpad incident and the Equifax data breach, have demonstrated, dependencies on networks of external libraries can introduce projects to significant operational and compliance risks as well as difficult to assess security implications. FASTEN introduces fine-grained, method-level, tracking of dependencies on top of existing dependency management networks. In our talk, we will present how FASTEN works on top of the Rust/Cargo and Java/Maven ecosystems.
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020OW2
The DECODER project simplifies software library and component reuse, while ensuring that they will behave as expected by the developer. The DECODER central database (PKM) stores code-related artifacts and establish bindings between them, notably by generating formal specification from informal requirements or semi-formal models from source code. Presentation by Virgile Prevosto, CEA List.
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...OW2
Presentation by Hui Song, Senior Scientist, SINTEF. We would like to share our research journey towards enabling DevOps for IoT applications, and how Open Source makes the journey feasible and fun.
DevOps is widely adopted for developing cloud applications, which supports developers in continuously placing software changes directly to production. As companies are including IoT and Edge devices into their IT infrastructures, supporting DevOps for IoT is a must. However, IoT challenges some fundamental assumptions behind DevOps, such as the homogeneous infrastructure and centralized governance, and therefore, breaking-through research is needed. Funded by H2020, 30 people from 12 partners crossing academia and industry gathered to solve these fundamental challenges, which results in full-stack open source tools for automatic deployment, learning-based operation and security monitoring of IoT applications, and risk management of the development process. The tools are evaluated on industrial use cases in intelligent transportation, smart building, and eHealth.
The mass open source tools and communities around IoT development provides the sound foundation for this design research and the opportunities for the further exploitation of the results. In particular, we are proud of spinning off a start-up to commercialize the risk management services in the open source + SaaS model.
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...OW2
Artificial Intelligence is now smarter than ever, showing human-like abilities at complex tasks such as images classification or natural language processing.
But despite its recent advances, it's still not a silver bullet. This talk will present a few challenges in the research and development of artificial intelligence that slow down its progress and adoption. In particular, problems around fairness, the training of models and how to share them will be introduced as well as possible Free Software solutions. Presentation by Vincent Lequertier, PhD Student, Lyon UNiverversity.
Cacti and Big Data at Orange France, OW2online, June 2020OW2
We propose a walkthrough of current utilization of Open Source Software in capacity planning for the Orange network infrastructure.
The objective of our project is to have a platform that helps engineers to carefully plan the resources available to them as well as to correlate different incidents within remote parts of the infrastructure.
In order to achieve this we started using Cacti with the Spine collector which worked great, but Orange France is a very large company with many entities, each with its own governance, and so we began to see some limitations.
There was a need to centralize some information from different parts in Orange France as well as to integrate the equipment capacity and load values into BigData Orange.
In order to achieve this we developed the “Puits de donneés” platform completely based on Open Source Software.
The visualization and statistical analysis part is handled by Grafana while the ETL runs on Apache Software Foundation products like NiFi, Zookeeper and Ambari with a storage solution from MariaDB for which we did extensive performance tuning and customization due to the large amounts of data.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath New York Community Day in-person eventDianaGray10
UiPath Community Day is a unique gathering designed to foster collaboration, learning, and networking with automation enthusiasts. Whether you're an automation developer, business analyst, IT professional, solution architect, CoE lead, practitioner or a student/educator excited about the prospects of artificial intelligence and automation technologies in the United States, then the UiPath Community Day is definitely the place you want to be.
Join UiPath leaders, experts from the industry, and the amazing community members and let's connect over expert sessions, demos and use cases around AI in automation as we highlight our technology with a special speaker on Document Understanding.
📌Agenda
3:00 PM Registrations
3:30 PM Welcome note and Introductions | Corina Gheonea (Senior Director of Global UiPath Community)
4:00 PM Introduction to Document Understanding
How to build and deploy Document Understanding process
Where would Document Understanding be used.
Demo
Q&A
4:45 PM Customer/Partner showcase
Accelirate
Intro to Accelirate and history with UiPath
Why are we excited about the new AI features of UiPath?
Customer highlight
a. Document Understanding – BJs Case Study
b. Document Understanding + generative AI
5.30 PM Networking
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Neuro-symbolic is not enough, we need neuro-*semantic*
Starting for the Cloud, OW2 Conference Nov10
1. Starting for the cloud
-- two issuses in cluster:
resource allocation and overload
management
Ziyou Wang, Yan Li, Chao You, Minghui Zhou
Peking University
wangzy06@sei.pku.edu.cn
zhmh@pku.edu.cn
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
3. Cloud Computing: Challenges
The emergence of cloud computing makes it a cost-efficient way
for application providers to lease the computing resources from a
third provider
Benefit: increase resource utilization, improve business agility,
decrease power consumption…
But how to effectively allocate various resources in cloud to
different applications is still an open problem.
When the applications host in the cloud face with overload, which
means the demand on at least one of the cloud’s resources exceeds
the capacity of that resource, what can we do to handle this
situation?
… …
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
4. Shared Cluster
Considering one kind of cloud implementation: the workloads of
different web applications are not correlated, a large-scale cluster,
called shared cluster or data center, is maintained to host a large
number of applications simultaneously
Each application runs on a subset of nodes
Each node may run multiple applications Enterprises
Users
Third parties
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
5. Resource Allocation: a scenario
As the cluster’s resources are no longer occupied by one
application, it requires the cluster to allocate the resources on
demand Applica>on
users
For example
An increaseinstances
Place new of
re-allocate Dispatcher
appworkload
in the dataworkload
A,C’s center
Node
1
Node
16
app
A
app
C
app
A
app
B
Node
150
middleware middleware app
C
app
D
middleware
High-‐throughput
Node
99
low-‐latency
network
app
B
app
A
Other
Repository
middleware nodes
… Apps
Shared
cluster
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
6. Self-adaptive Resource Allocation
Model
Self-‐adap4ve
resource
alloca4on
Requests Resource
alloca>on
Resource
alloca>on
planning
execu>on
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
7. Our Resource Allocation Work
Middleware
Resource
Dispatcher Management
… alloca>on
… Console
planning
messages requests
commands
coopera>on
Middleware
Resource
alloca>on
Communicator
planning VM VM
Local
valuator
customized
… customized
app
a JOnAS app
x JOnAS
Resource
alloca>on
Resource
par>>oner
execu>on App
deployer Virtual
Machine
Monitor
Repository For the resource allocation planning, we propose a
decentralized resource allocation planning approach
• odes decide their own resource allocation
N
• arket-based coordination is adopted to help them
M
make the resource decision
Until now, the approach is evaluated with a serial of
simulated experiments, and is being implemented in
the cluster with JO2nAS
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
8. Resource Allocation Planning
To support application prioritization, applications can be assign
with the different utility values. Accordingly, the goal of resource
management is to maximize the total utility values of the requests
satisfied
Inspired by human market, we model the shared cluster as a
market, where shares of application requests are treated as goods
and nodes as dealers to exchange goods
Basing on local valuation of the goods, each node autonomously
and continuously trades with others in order to find an application
share combination which fits the node’s resource constrains and
maximize its income
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
9. Resource Allocation Planning
When a node wants to sell, more than one node may want to buy.
To make the seller transfer the goods to the appropriate buyers, an
auction mechanism is adopted
4. inform (app C , 30% to n50, 20% to
n65)
Sell C 30%
Dispatcher
Node 1 4. notify 2.2 want C, 35%
N1: … (app C, 70%) 3. sort Node 50
app A app C
N50: … app A app B ...
middleware
N65: …(app C, 10%) middleware 2.1 valuation
N100: … (appC, 50%, 100 req/ 1. multicast Nodes
4 notify s)
app
...
update
Sell C 20% middleware
Node 65 Node 100
N1: … (app C, 20%)
2.1 valuation
N50: … (app C,30%)
app B app C ... app B app D
...
2.2
N65: …(app C, 30%)
middleware middleware
N100: … want C, 20% 2.1 valuation
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
10. Our Resource Allocation Work
Middleware
Resource
Dispatcher Management
… alloca>on
… Console
planning
messages requests
commands
coopera>on
Middleware
Resource
alloca>on
Communicator
planning VM VM
Local
valuator
customized
… customized
app
a JOnAS app
x JOnAS
Resource
alloca>on
Resource
par>>oner
execu>on App
deployer Virtual
Machine
Monitor
Repository
For the resource allocation execution
• ntegrate a VMM into the middleware
I
• utomatically load the app and partition the resource at
A
runtime via VMM
• ustomize JOnAS for the app, and store the customized
C
image in the repository
• roportionally workload dispatching
P
Now, we use Open VZ, a lightweight OS level VMM, as a
case study, and are trying to integrate OpenVZ into the
middleware
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
12. Examples
On September 11th 2001, for instance, the workload on a
popular news web site increased by an order of magnitude in
30 min, with the workload doubling every 7 min in that
period.
April 21th 2010, is the China National Mourning for Yushu
Quake Victims. Theatre and sporting performances are
cancelled, karaoke bars shut and the culture ministry has
ordered suspension of all online music, games, comics, films
and TV shows.
Too many people choose to visit an online shopping site.
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
13. When overload happens?
Overload prevention is a critical goal so that a system can remain
operational in the presence of overload even when the incoming
request rate is several times greater than the system’s capacity.
It is well known that the workload seen by Internet applications
varies over multiple time-scales and often in an unpredictable
fashion.
Unexpected things are always happening:
Featured on national television or in a major newspaper.
Under-provisioning for sales-boosting holidays
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
14. The TaoBao Architecture
Apache + Application Server + MySQL
200+ applications, thousands of components
12k servers
2k~3k java servers
Shop
Search Cart
Product Product Recommendation
Browsing
/46
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
15. The Reality – Manual Service
Degradation
In response to overload:
CNN replaced its front page with simple HTML page that could
be transmitted in a single Ethernet packet .
Taobao turned off a sub system.
All these techniques are implemented manually, though a better
approach would be to degrade service gracefully and automatically
in response to load.
Which point causes overload?
Which resource is the bottleneck?
Which service should be degraded or turned off?
All user be affected or not?
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
16. Automatic Degradation Mechanism
Overload Priority defines the priorities of different services and
degradation actions can be taken.
Overload Detection is responsible for signaling the occurrence of
instable status of the application.
Overload Localization is triggered to locate the bottleneck of resources.
Overload Controller will take appropriate actions to degrade some
unnecessary services to release more resources to support key services.
Mechanism
Overload
Degradation
Overload Priority Overload Controller Service Service Service
Service Service
Overload
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.
18. Considerations
Hard to be transparent to the user ( what can de degraded?
sometimes how?)
Using it alone can contribute to delay overload, but it needs to be
combined with other techniques to be fully effective.
Dynamic resource allocation
Admission control
Service differentiation
… …
OW2 Annual Conference 2010, November 24-25, La Cantine, Paris.
www.ow2.org.