Overview of the paper "Cloud Types for Eventual Consistency" by Burckhardt et al. presented at Oregon State University for "Software Evolution for Mobility" class on Oct 10th 2013. Presentation time: 20 min
EMA - Measuring the User Experience in the CloudCorrelsense
Cloud computing brings with it many benefits, especially lower IT costs and increased flexibility. However, the dynamic, hybrid nature of Cloud environments require enterprises to re-think their existing IT management processes and tools. Applications that perform poorly and fail to meet service levels — whether on premise or in the Cloud — can cause users to churn and revenues to drop.
Join EMA Research Director Julie Craig and Correlsense CEO Oren Elias for this Webinar that will highlight ways to measure how end users experience your business applications, as well as identify which approaches are likely candidates for a long-term strategy.
Attendees will learn:
How end-user response times are impacted by components and new changes that are introduced in the IT environment
The 3 tips for managing Cloud-based applications
The "secret sauce" for reliable end user monitoring, based on customer case studies that will be presented
CloudVelocity provides a technology called One Hybrid Cloud that automates the migration of applications between hybrid cloud environments and from enterprise data centers to public clouds. It uses automated discovery to package applications and their dependencies together for migration, which can reduce migration time from hours or days to just minutes. While it addresses some challenges like hypervisor dependencies, CloudVelocity does not currently manage infrastructure services like DNS that may require manual configuration for cloud bursting scenarios.
The document discusses how end user computing is undergoing massive transformation due to new trends like consumerization of IT, bring your own device (BYOD), and the rise of mobile applications and platforms. IT now has to manage a more diverse end user landscape of personal and corporate devices, applications, and data. The VMware Horizon suite aims to enable this transformation by simplifying desktops and applications into centralized services that can be delivered and managed securely across any device. Key Horizon products discussed include Horizon View, Horizon Mirage, and Horizon Workspace.
There are three main types of clouds - stratus, cirrus, and cumulus - which form in different ways and can be used to predict weather. Stratus clouds form in layers when warm air rises over cooler air, and can produce rain or snow. Cumulus clouds have flat bottoms and puffy tops, and usually indicate fair weather but sometimes rain. Cumulonimbus clouds are large thunderheads that bring thunderstorms and occasionally hail. Cirrus clouds form high in the sky and usually mean good weather is coming, though they may also signal an upcoming change.
The document provides a status report on supplies and equipment for various bases and units in Iraq. It lists the requisitioned and on-hand amounts for different categories (C1, C2, C3) of supplies and equipment for bases including Balad, Kalsu, Mosul, Tallil as well as for regions including USD-North, USD-Central, USD-West, USD-South and other unspecified locations.
Clouds can affect the weather. Cirrus clouds bring good weather without precipitation, while stratus clouds mean worsening weather and look like a blanket. Cumulus clouds usually bring good weather without precipitation and are puffy. Nimbus clouds mean stormy weather and bad weather, with storms and precipitation likely. Clouds can be remembered with nimbus starting with N for not good, cirrus and cumulus starting with C for correct, and stratus reminding one of stress and being worse.
Laith Shakir Jassim is seeking a position as an English-Arabic translator and interpreter. He has over 10 years of experience translating between English and Arabic in various roles including working with the US Army, Iraqi railway companies, power plants, and schools. He is skilled in oral and written translation as well as project management. Laith holds a Bachelor's Degree in English from Tikrit University and is proficient in Microsoft Office, Windows, and Adobe Acrobat.
EMA - Measuring the User Experience in the CloudCorrelsense
Cloud computing brings with it many benefits, especially lower IT costs and increased flexibility. However, the dynamic, hybrid nature of Cloud environments require enterprises to re-think their existing IT management processes and tools. Applications that perform poorly and fail to meet service levels — whether on premise or in the Cloud — can cause users to churn and revenues to drop.
Join EMA Research Director Julie Craig and Correlsense CEO Oren Elias for this Webinar that will highlight ways to measure how end users experience your business applications, as well as identify which approaches are likely candidates for a long-term strategy.
Attendees will learn:
How end-user response times are impacted by components and new changes that are introduced in the IT environment
The 3 tips for managing Cloud-based applications
The "secret sauce" for reliable end user monitoring, based on customer case studies that will be presented
CloudVelocity provides a technology called One Hybrid Cloud that automates the migration of applications between hybrid cloud environments and from enterprise data centers to public clouds. It uses automated discovery to package applications and their dependencies together for migration, which can reduce migration time from hours or days to just minutes. While it addresses some challenges like hypervisor dependencies, CloudVelocity does not currently manage infrastructure services like DNS that may require manual configuration for cloud bursting scenarios.
The document discusses how end user computing is undergoing massive transformation due to new trends like consumerization of IT, bring your own device (BYOD), and the rise of mobile applications and platforms. IT now has to manage a more diverse end user landscape of personal and corporate devices, applications, and data. The VMware Horizon suite aims to enable this transformation by simplifying desktops and applications into centralized services that can be delivered and managed securely across any device. Key Horizon products discussed include Horizon View, Horizon Mirage, and Horizon Workspace.
There are three main types of clouds - stratus, cirrus, and cumulus - which form in different ways and can be used to predict weather. Stratus clouds form in layers when warm air rises over cooler air, and can produce rain or snow. Cumulus clouds have flat bottoms and puffy tops, and usually indicate fair weather but sometimes rain. Cumulonimbus clouds are large thunderheads that bring thunderstorms and occasionally hail. Cirrus clouds form high in the sky and usually mean good weather is coming, though they may also signal an upcoming change.
The document provides a status report on supplies and equipment for various bases and units in Iraq. It lists the requisitioned and on-hand amounts for different categories (C1, C2, C3) of supplies and equipment for bases including Balad, Kalsu, Mosul, Tallil as well as for regions including USD-North, USD-Central, USD-West, USD-South and other unspecified locations.
Clouds can affect the weather. Cirrus clouds bring good weather without precipitation, while stratus clouds mean worsening weather and look like a blanket. Cumulus clouds usually bring good weather without precipitation and are puffy. Nimbus clouds mean stormy weather and bad weather, with storms and precipitation likely. Clouds can be remembered with nimbus starting with N for not good, cirrus and cumulus starting with C for correct, and stratus reminding one of stress and being worse.
Laith Shakir Jassim is seeking a position as an English-Arabic translator and interpreter. He has over 10 years of experience translating between English and Arabic in various roles including working with the US Army, Iraqi railway companies, power plants, and schools. He is skilled in oral and written translation as well as project management. Laith holds a Bachelor's Degree in English from Tikrit University and is proficient in Microsoft Office, Windows, and Adobe Acrobat.
Clouds form through condensation and reflect weather patterns. They are made of water in liquid or ice form and affect temperatures by blocking sunlight. Clouds are classified by their height and shape into cirrus, cumulus, stratis, and vertical clouds. Cirrus clouds are wispy and high altitude while cumulus are puffy and can develop vertically. Stratis are low, flat clouds while vertical clouds are tall and can produce severe weather.
Weather assciated with different types cloudsnermine_ghis
Clouds can indicate different weather conditions. Cumulus clouds suggest fair weather while cirrus clouds signal an upcoming weather change. Dark stratus clouds forecast precipitation. Measuring rainfall is important for farmers, with rain gauges used for thousands of years to collect data on precipitation amounts each year.
The document discusses different climate types and how climate and weather affect people. It describes three main climate types - tropical, temperate, and polar - based on temperature and rainfall patterns. It then discusses how climate influences housing design and what crops can grow in an area. Weather can impact daily activities, electricity generation from wind power, and food/water supplies, as well as cause loss of lives and property damage during extreme events like hurricanes.
Cirrus clouds are very wispy and high up around 20,000 feet. They are usually white and not associated with rain. Cumulus clouds are the puffy clouds seen around 3,000 feet up on sunny days. Cumulonimbus clouds produce thunderstorms, lightning, tornadoes and bad weather around 1,000 feet up. They can flatten at the top into an anvil shape. Stratus clouds cover the whole sky in a fog-like formation up to 6,000 feet and sometimes produce light drizzle or sprinkles while appearing grey.
There are three main types of clouds: cirrus clouds, which are thin and wispy ice crystal clouds found very high in the sky; cumulus clouds, which are puffy cotton-like clouds that can signal either fair weather or rain depending on whether they are white or dark; and stratus clouds, which are the lowest, flat clouds that are often dark and can signal rain or fog if close to the ground.
This document discusses different types of clouds and how they form. It begins by describing high clouds like cirrus and contrails, then mid-level clouds such as cumulus and cumulonimbus. It explains that cumulonimbus clouds form on hot days and can produce hail. Lower level clouds like stratus and altocumulus are also mentioned. The document concludes by explaining the water cycle and how clouds transport water from one place to another through evaporation and condensation.
The document defines and describes the 10 major types of clouds, including cirrus, cirrocumulus, cumulonimbus, altocumulus, altostratus, cumulus, stratus, stratocumulus, cirro, and nimbostratus. Each cloud type is given a brief description of its appearance such as thin and wispy, small and puffy, or tall and fluffy. Latin and Greek roots are also provided to explain the meaning behind parts of cloud names.
IT 8003 Cloud ComputingFor this activi.docxvrickens
IT 8003 Cloud Computing
For this activity you need to divide your class in groups
1
Group Activity 1 “SuperTAX Software”
2
SuperTax Overview
Did you know President Abraham Lincoln, one of America's most beloved leaders, also instituted one of its least liked obligations - the income tax? In this brief history of taxes, see the historical events which shaped income taxes in the United States today.
SuperTax is an American tax preparation software package developed in the mid-1980s.
SuperTax Corporation is headquartered in Mountain View, California.
2
Group Activity 1 “SuperTAX Software”
3
SuperTax Information
Desktop Software.
Support MS Windows and Mac OS.
Software method: CD/DVD media format.
Different versions:
SuperTAX Basic, Deluxe, Premier, and Home & Business.
Used by millions of users and organizations.
Group Activity 1 “SuperTAX Software”
4
SuperTAX Project
SuperTAX has hired your group as a consultant to move their Desktop Software to a Traditional IT Hosted Software, available Online.
Group Activity 1 “SuperTAX Software”
5
For Discussion:
Find the challenges that your team will encounter attempting to move SuperTAX Software to the new platform.
Prepared a presentation for the class.
On your Group you will need to define positions.
For example:
Project Manager, Senior Project Network, Senior Project Engineer, etc.
Group Activity 1 “SuperTAX Software”
6
Infrastructure
Software Development
Software Testing
Marketing & Business Model
Project Management
CHALLENGES
Group Activity 1 “SuperTAX Software”
7
Infrastructure
No more test in a single machine. (CD/DVD format model)
Test in a production cluster. (20, 30 users?)
A larger cluster can bring problems. (1000’s of users)
Testing must be done for different clients (mobile, desktops, OS)
Small performance bottleneck. Slow performance.
CHALLENGES
Group Activity 1 “SuperTAX Software”
8
Marketing & Business Model
One time fixed cost vs. subscription model
Before a CD was sold, now a subscription model.
Maintenance and replacement of cooling, power, and server is required
CHALLENGES
Group Activity 1 “SuperTAX Software”
9
Project Management
Project can take many months to years for Software Development cycle.
What model is appropriate for Hosted application. (Agile vs. waterfall)
Ability to try new features faster.
CHALLENGES
RUNNING HEAD: INTERSESSION 5 FINAL PROJECT PROJECTION 1
INTERSESSION 5 FINAL PROJECT PROJECTION 5
INTERSESSION 5 FINAL PROJECT PROJECTION
Shalini Kantamneni
Ottawa University
Intersession 5 Final Project Projection
The Design Process
This process involves the formulation of a model to be used in deriving a comprehensive cloud application. In this case, the model-view-controller design pattern will be used. This type of design pattern partitions the logic of the application into three distinct domains that are to be interconnected to provide a working cloud application (Jailia et al., 2016). ...
"Going Offline", one of the hottest mobile app trendsDerek Baron
One of the hottest trends in mobile is "going offline", yet organizations are faced with a tripling of time and cost when adding offline functionality to a business app. According to Forrester Research, the ability to work offline is "the most important and difficult mobile feature...and will be a consideration for nearly every modern application".
Reactive programming is an asynchronous programming paradigm, concerned with streams of information and the propagation of changes. This differs from imperative programming, where that paradigm uses statements to change a program’s state. Reactive Architecture is nothing more than the combination of reactive programming and software architectures. Also known as reactive systems, the goal is to make the system responsive, resilient, elastic, and message-driven.
Melbourne Virtual MuleSoft Meetup April 2022Daniel Soffner
This document summarizes a Melbourne Virtual MuleSoft Meetup that took place on April 28th, 2022. The meetup agenda included welcome updates, a presentation on universal API management and Flex Gateway by Carlos Rodriguez Iturria of MuleSoft, and a session on integration lifecycle automation using Anypoint Platform by Shefreen Kunhimohamed of NJC Labs. The meetup concluded with a trivia game for prizes. Attendees were encouraged to provide feedback and suggest topics for future Melbourne MuleSoft Meetups.
stackArmor MicroSummit
Securing the AWS Environment by McAfee:
Larry Kovalsky will cover topics relevant to securing the AWS hosting environment for compliance and security focused customers. He will cover the topics described below.
Endpoint Focused : McAfee Public Cloud Security Suite – Workload Discovery, Visibility, and Comprehensive Threat Protection for AWS
Network Focused : McAfee Virtual Network Security Platform – Network intrusion prevention featuring advanced signature-less detection techniques and true East/West IPS/prevention capabilities within AWS.
Data Focus : Pervasive Data Protection Suite – Visibility, Encryption, Data Loss Prevention, Web/Cloud Access Service Broker (CASB) protection. Follow the data between on-prem and AWS.
Migrating to cloud-native_app_architectures_pivotalkkdlavak3
The document discusses migrating application architectures to cloud-native designs. It begins by explaining the rise of cloud-native architectures, noting their ability to enable speed of innovation, always-available services, web scale, and mobile-centric experiences. Key motivations for adopting cloud-native architectures include enabling speed, safety, scale, and supporting mobile and client diversity. The document then defines characteristics of cloud-native architectures, highlighting twelve-factor applications and their emphasis on horizontal scaling, loose deployment coupling, and configuration via environment variables.
This document discusses the benefits of migrating to cloud-native application architectures. It provides speed, safety, and scale. Cloud-native architectures allow for rapid provisioning of resources and deployment of code changes. They promote safety through visibility into failures, isolation of failures to individual components, fault tolerance to prevent cascading failures, and automated recovery from failures. This enables developing and releasing code quickly while maintaining system stability.
This document discusses the benefits of migrating to cloud-native application architectures. It provides speed, safety, and scale. Cloud-native architectures allow for rapid provisioning of resources and deployment of code changes. They promote safety through visibility into failures, isolation of failures to individual components, fault tolerance to prevent cascading failures, and automated recovery from failures. This enables developing and releasing code quickly while maintaining system stability.
This document discusses the benefits of migrating to cloud-native application architectures. It provides speed, safety, and scale. Cloud-native architectures allow for rapid provisioning of resources and deployment of code changes. They promote safety through visibility into failures, isolation of failures to individual components, fault tolerance to prevent cascading failures, and automated recovery from failures. This enables developing and releasing code quickly while maintaining system stability.
International Conference on Advances in Computing, Communicati.docxvrickens
This document discusses virtualization in cloud computing. It begins with an abstract that introduces cloud computing and virtualization and how organizations are implementing these technologies to reduce costs. The document then discusses how virtualization is the basis for delivering infrastructure as a service in cloud computing by separating hardware constraints. It provides examples of major cloud computing service providers like Google, Amazon, and Microsoft and compares their various services. Finally, it discusses techniques for virtual machine placement in data centers and some examples of virtual labs.
Configurability for Cloud-Native Applications: Observability and ControlCognizant
The billowing multi-cloud, with loosely coupled services, requires better observability of live configuration changes and management tools. Here’s how to address these challenges.
RightScale User Conference NYC 2011 -
Uri Budnik, Director ISV Partner Program - RightScale
Cloud is the most nebulous and abused term in information technology today. It describes multiple, disparate service models and has been retroactively applied to countless legacy technologies in attempts to keep them current. In this session, we'll discuss the cloud technology landscape and where RightScale fits in to drive agility, cost, and time savings above cloud infrastructure. RightScale has been investing heavily for the past four years to make cloud infrastructure easy to leverage. This session will clarify elements that are straightforward, what continues to be difficult, and the impact on your schedule and budget.
The document summarizes an IoT meetup hosted by the Adelaide MuleSoft Meetup Group. The agenda included introductions, a discussion on building vs running integration microservices, a Kahoot quiz on IoT, and a demonstration of an IoT use case using Raspberry Pi and Arduino boards. The use case involved connecting sensors to detect temperature and other factors, integrating the data using APIs, and triggering processes in various systems for maintenance and safety in an energy company setting. The meetup concluded with notices on sharing information and providing feedback.
Clouds form through condensation and reflect weather patterns. They are made of water in liquid or ice form and affect temperatures by blocking sunlight. Clouds are classified by their height and shape into cirrus, cumulus, stratis, and vertical clouds. Cirrus clouds are wispy and high altitude while cumulus are puffy and can develop vertically. Stratis are low, flat clouds while vertical clouds are tall and can produce severe weather.
Weather assciated with different types cloudsnermine_ghis
Clouds can indicate different weather conditions. Cumulus clouds suggest fair weather while cirrus clouds signal an upcoming weather change. Dark stratus clouds forecast precipitation. Measuring rainfall is important for farmers, with rain gauges used for thousands of years to collect data on precipitation amounts each year.
The document discusses different climate types and how climate and weather affect people. It describes three main climate types - tropical, temperate, and polar - based on temperature and rainfall patterns. It then discusses how climate influences housing design and what crops can grow in an area. Weather can impact daily activities, electricity generation from wind power, and food/water supplies, as well as cause loss of lives and property damage during extreme events like hurricanes.
Cirrus clouds are very wispy and high up around 20,000 feet. They are usually white and not associated with rain. Cumulus clouds are the puffy clouds seen around 3,000 feet up on sunny days. Cumulonimbus clouds produce thunderstorms, lightning, tornadoes and bad weather around 1,000 feet up. They can flatten at the top into an anvil shape. Stratus clouds cover the whole sky in a fog-like formation up to 6,000 feet and sometimes produce light drizzle or sprinkles while appearing grey.
There are three main types of clouds: cirrus clouds, which are thin and wispy ice crystal clouds found very high in the sky; cumulus clouds, which are puffy cotton-like clouds that can signal either fair weather or rain depending on whether they are white or dark; and stratus clouds, which are the lowest, flat clouds that are often dark and can signal rain or fog if close to the ground.
This document discusses different types of clouds and how they form. It begins by describing high clouds like cirrus and contrails, then mid-level clouds such as cumulus and cumulonimbus. It explains that cumulonimbus clouds form on hot days and can produce hail. Lower level clouds like stratus and altocumulus are also mentioned. The document concludes by explaining the water cycle and how clouds transport water from one place to another through evaporation and condensation.
The document defines and describes the 10 major types of clouds, including cirrus, cirrocumulus, cumulonimbus, altocumulus, altostratus, cumulus, stratus, stratocumulus, cirro, and nimbostratus. Each cloud type is given a brief description of its appearance such as thin and wispy, small and puffy, or tall and fluffy. Latin and Greek roots are also provided to explain the meaning behind parts of cloud names.
IT 8003 Cloud ComputingFor this activi.docxvrickens
IT 8003 Cloud Computing
For this activity you need to divide your class in groups
1
Group Activity 1 “SuperTAX Software”
2
SuperTax Overview
Did you know President Abraham Lincoln, one of America's most beloved leaders, also instituted one of its least liked obligations - the income tax? In this brief history of taxes, see the historical events which shaped income taxes in the United States today.
SuperTax is an American tax preparation software package developed in the mid-1980s.
SuperTax Corporation is headquartered in Mountain View, California.
2
Group Activity 1 “SuperTAX Software”
3
SuperTax Information
Desktop Software.
Support MS Windows and Mac OS.
Software method: CD/DVD media format.
Different versions:
SuperTAX Basic, Deluxe, Premier, and Home & Business.
Used by millions of users and organizations.
Group Activity 1 “SuperTAX Software”
4
SuperTAX Project
SuperTAX has hired your group as a consultant to move their Desktop Software to a Traditional IT Hosted Software, available Online.
Group Activity 1 “SuperTAX Software”
5
For Discussion:
Find the challenges that your team will encounter attempting to move SuperTAX Software to the new platform.
Prepared a presentation for the class.
On your Group you will need to define positions.
For example:
Project Manager, Senior Project Network, Senior Project Engineer, etc.
Group Activity 1 “SuperTAX Software”
6
Infrastructure
Software Development
Software Testing
Marketing & Business Model
Project Management
CHALLENGES
Group Activity 1 “SuperTAX Software”
7
Infrastructure
No more test in a single machine. (CD/DVD format model)
Test in a production cluster. (20, 30 users?)
A larger cluster can bring problems. (1000’s of users)
Testing must be done for different clients (mobile, desktops, OS)
Small performance bottleneck. Slow performance.
CHALLENGES
Group Activity 1 “SuperTAX Software”
8
Marketing & Business Model
One time fixed cost vs. subscription model
Before a CD was sold, now a subscription model.
Maintenance and replacement of cooling, power, and server is required
CHALLENGES
Group Activity 1 “SuperTAX Software”
9
Project Management
Project can take many months to years for Software Development cycle.
What model is appropriate for Hosted application. (Agile vs. waterfall)
Ability to try new features faster.
CHALLENGES
RUNNING HEAD: INTERSESSION 5 FINAL PROJECT PROJECTION 1
INTERSESSION 5 FINAL PROJECT PROJECTION 5
INTERSESSION 5 FINAL PROJECT PROJECTION
Shalini Kantamneni
Ottawa University
Intersession 5 Final Project Projection
The Design Process
This process involves the formulation of a model to be used in deriving a comprehensive cloud application. In this case, the model-view-controller design pattern will be used. This type of design pattern partitions the logic of the application into three distinct domains that are to be interconnected to provide a working cloud application (Jailia et al., 2016). ...
"Going Offline", one of the hottest mobile app trendsDerek Baron
One of the hottest trends in mobile is "going offline", yet organizations are faced with a tripling of time and cost when adding offline functionality to a business app. According to Forrester Research, the ability to work offline is "the most important and difficult mobile feature...and will be a consideration for nearly every modern application".
Reactive programming is an asynchronous programming paradigm, concerned with streams of information and the propagation of changes. This differs from imperative programming, where that paradigm uses statements to change a program’s state. Reactive Architecture is nothing more than the combination of reactive programming and software architectures. Also known as reactive systems, the goal is to make the system responsive, resilient, elastic, and message-driven.
Melbourne Virtual MuleSoft Meetup April 2022Daniel Soffner
This document summarizes a Melbourne Virtual MuleSoft Meetup that took place on April 28th, 2022. The meetup agenda included welcome updates, a presentation on universal API management and Flex Gateway by Carlos Rodriguez Iturria of MuleSoft, and a session on integration lifecycle automation using Anypoint Platform by Shefreen Kunhimohamed of NJC Labs. The meetup concluded with a trivia game for prizes. Attendees were encouraged to provide feedback and suggest topics for future Melbourne MuleSoft Meetups.
stackArmor MicroSummit
Securing the AWS Environment by McAfee:
Larry Kovalsky will cover topics relevant to securing the AWS hosting environment for compliance and security focused customers. He will cover the topics described below.
Endpoint Focused : McAfee Public Cloud Security Suite – Workload Discovery, Visibility, and Comprehensive Threat Protection for AWS
Network Focused : McAfee Virtual Network Security Platform – Network intrusion prevention featuring advanced signature-less detection techniques and true East/West IPS/prevention capabilities within AWS.
Data Focus : Pervasive Data Protection Suite – Visibility, Encryption, Data Loss Prevention, Web/Cloud Access Service Broker (CASB) protection. Follow the data between on-prem and AWS.
Migrating to cloud-native_app_architectures_pivotalkkdlavak3
The document discusses migrating application architectures to cloud-native designs. It begins by explaining the rise of cloud-native architectures, noting their ability to enable speed of innovation, always-available services, web scale, and mobile-centric experiences. Key motivations for adopting cloud-native architectures include enabling speed, safety, scale, and supporting mobile and client diversity. The document then defines characteristics of cloud-native architectures, highlighting twelve-factor applications and their emphasis on horizontal scaling, loose deployment coupling, and configuration via environment variables.
This document discusses the benefits of migrating to cloud-native application architectures. It provides speed, safety, and scale. Cloud-native architectures allow for rapid provisioning of resources and deployment of code changes. They promote safety through visibility into failures, isolation of failures to individual components, fault tolerance to prevent cascading failures, and automated recovery from failures. This enables developing and releasing code quickly while maintaining system stability.
This document discusses the benefits of migrating to cloud-native application architectures. It provides speed, safety, and scale. Cloud-native architectures allow for rapid provisioning of resources and deployment of code changes. They promote safety through visibility into failures, isolation of failures to individual components, fault tolerance to prevent cascading failures, and automated recovery from failures. This enables developing and releasing code quickly while maintaining system stability.
This document discusses the benefits of migrating to cloud-native application architectures. It provides speed, safety, and scale. Cloud-native architectures allow for rapid provisioning of resources and deployment of code changes. They promote safety through visibility into failures, isolation of failures to individual components, fault tolerance to prevent cascading failures, and automated recovery from failures. This enables developing and releasing code quickly while maintaining system stability.
International Conference on Advances in Computing, Communicati.docxvrickens
This document discusses virtualization in cloud computing. It begins with an abstract that introduces cloud computing and virtualization and how organizations are implementing these technologies to reduce costs. The document then discusses how virtualization is the basis for delivering infrastructure as a service in cloud computing by separating hardware constraints. It provides examples of major cloud computing service providers like Google, Amazon, and Microsoft and compares their various services. Finally, it discusses techniques for virtual machine placement in data centers and some examples of virtual labs.
Configurability for Cloud-Native Applications: Observability and ControlCognizant
The billowing multi-cloud, with loosely coupled services, requires better observability of live configuration changes and management tools. Here’s how to address these challenges.
RightScale User Conference NYC 2011 -
Uri Budnik, Director ISV Partner Program - RightScale
Cloud is the most nebulous and abused term in information technology today. It describes multiple, disparate service models and has been retroactively applied to countless legacy technologies in attempts to keep them current. In this session, we'll discuss the cloud technology landscape and where RightScale fits in to drive agility, cost, and time savings above cloud infrastructure. RightScale has been investing heavily for the past four years to make cloud infrastructure easy to leverage. This session will clarify elements that are straightforward, what continues to be difficult, and the impact on your schedule and budget.
The document summarizes an IoT meetup hosted by the Adelaide MuleSoft Meetup Group. The agenda included introductions, a discussion on building vs running integration microservices, a Kahoot quiz on IoT, and a demonstration of an IoT use case using Raspberry Pi and Arduino boards. The use case involved connecting sensors to detect temperature and other factors, integrating the data using APIs, and triggering processes in various systems for maintenance and safety in an energy company setting. The meetup concluded with notices on sharing information and providing feedback.
The document discusses microservices and their advantages over monolithic architectures. Microservices allow for greater evolvability, scalability, and resilience compared to monoliths. They also improve composability but introduce additional complexity in areas like cross-cutting concerns, service communication, and explicit dependencies between services. The document provides advice on determining service boundaries using domain-driven design principles and on gradually transitioning teams and applications to microservices at a sustainable pace that balances productivity, operability, and architectural fitness.
RightScale Webinar: Cloud is the most nebulous and abused term in information technology today. It describes multiple, disparate service models and has been retroactively applied to countless legacy technologies in attempts to keep them current. In this webinar, we'll discuss the cloud technology landscape and where RightScale fits in to drive agility, cost, and time savings above cloud infrastructure. RightScale has been investing heavily for the past four years to make cloud infrastructure easy to leverage. This webinar will clarify elements that are straightforward, what continues to be difficult, and the impact on your schedule and budget.
Linuxcon 2011 Crash Course in Open Source Cloud ComputingMark Hinkle
Presentation on the tools needed to deploy and manage IaaS or compute clouds using free and open source software.
Changelog:
Added Open Source PaaS
Automated Toolchains Diagram
Open Cloud Initiative (OCI)
Additional Resources
Opportunities and Challenges for Running Scientific Workflows on the Cloud lyingcom
This document discusses opportunities and challenges for running scientific workflows on cloud computing platforms. It begins by introducing cloud computing and scientific workflows. It then describes three main opportunities: 1) increased scale to address larger problems, 2) on-demand resource allocation for improved efficiency, and 3) more flexibility to optimize performance and cost. Several challenges are also outlined, including architectural integration issues, data management difficulties, and the need for cloud-compatible workflow languages and services. The document concludes by proposing research directions to address these challenges and better support scientific workflows in cloud environments.
DZone’s 2016 Guide To Building And Deploying Applications In The CloudSingaram Subramanian
How can you take advantage of the granularity,
elasticity, and pre-baked-ness of modern cloud services?
And, on the flip side, as your applications expand
outside blade-boxes and even beyond individual
data centers, how do you design (and troubleshoot)
applications that treat network links like secondgeneration
buses, that won’t hang if a service a
continent (and an SLA) away just isn’t working, and that
store sensitive data on machines whose geolocation and
hardware configuration you don’t even know?
Ohio LinuxFest: Crash Course in Open Source Cloud ComputingMark Hinkle
This document summarizes Mark R. Hinkle's presentation on open source cloud computing. The presentation provides an overview of cloud computing concepts and models. It then discusses various open source tools that can be used to build public and private clouds, including hypervisors, virtual machine formats, storage solutions, APIs, configuration management, monitoring, and automation/orchestration tools. The presentation aims to demonstrate how open source software can be combined to create cloud computing platforms and manage cloud infrastructure.
Similar to CS519 - Cloud Types for Eventual Consistency (20)
CS589 paper presentation - What is in unison? A formal specification and refe...Sergii Shmarkatiuk
Overview of the paper "What's in Unison? A Formal Specication and Reference Implementation of a File Synchronizer" by Benjamin C. Pierce Jerome Vouillon presented at Oregon State University for "Domain Specific Languages" class on May 20th 2014. Presentation time: 20 min
Overview of the paper "Visual Software Evolution Reconstruction" by Marco D'Ambros and Michele Lanza presented at Oregon State University for "Information Visualization" class on May 12th 2014. Presentation time: 15 min
The document proposes a formalized approach to software version numbering to address current problems. It analyzes why automatic document section numbering cannot be directly applied to software history. The proposed solution extends the section numbering approach formally, allowing version numbers to include arbitrary sets in addition to natural numbers. This addresses issues like inconsistent practices and ambiguous versioning that undermine automation and software quality.
Continuous integration (CI) is a software engineering practice where developers frequently integrate their work, leading to multiple integrations per day. This approach reduces integration problems and allows teams to develop cohesive software more rapidly. The presentation discusses what CI is, why teams need it, prerequisites like version control and automated testing, typical workflows, tools, and benefits like reduced risks and improved code quality. It also examines problems teams face in implementing CI effectively and potential areas of future research like making CI tools more adaptive and addressing scalability issues.
CS519 - Cloud Twin: Native Execution of Android Applications on the Windows P...Sergii Shmarkatiuk
Overview of the paper "Cloud Twin: Native Execution of Android Applications on the Windows Phone" by Holder et al. presented at Oregon State University for "Software Evolution for Mobility" class on Nov 18th 2013. Presentation time: 5 min
CS 584 - Aligning development tools with the way programmers think about code...Sergii Shmarkatiuk
This presentation reviews a proposed visual tool for generating source code transformations based on the edit-by-example principle. The tool aims to address limitations of existing approaches like regular expressions, IDE search/replace, and AST-based tools by allowing programmers to intuitively create custom transformations through direct manipulation of code representations. An initial prototype was implemented and evaluated via a user study, which provided insights for future iterations. The tool combines textual and graphical elements to naturally fit programmers' mental models of code structure.
This document provides an overview and training plan for merge management. It describes problems that can emerge during merge operations in version control systems and how to mitigate risks and avoid problems related to merging. The training plan includes introductions to concepts like merging, branches, conflicts and how to manage merging. It provides details on common tools and operations involved in merging like diff, patch, branch and how three-way merging works. It also gives examples and demonstrations of merging in practice.
This document provides an overview of continuous integration training goals and plans. The goals are to demonstrate that modern projects cannot succeed without continuous integration and to establish a connection between continuous integration practices and CMMI product integration processes. The training plan covers topics such as what continuous integration is, why it is needed, prerequisites, workflows, tools, and relationships to CMMI processes. It also discusses continuous integration tools and classifications.
The document discusses build and deployment management. It covers why builds and deployments need to be managed, different build types, build phases, and popular build tools like Ant, Maven, Make, and MSBuild. Managing builds is important for large, complex applications to ensure the build process is complete, repeatable, informative, schedulable, and portable. The key difference between a build and deployment is that a build creates installation artifacts while deployment installs the application.
This document provides an introduction to version control. It discusses what version control is, the history and evolution of version control systems, different types of version control systems classified by their repository model and concurrency model, and practical considerations for starting to use version control. Key topics covered include centralized and distributed version control, lock-modify-unlock and merge models, and domain vocabulary for common version control tasks and workflows.
1.2 introduction to scm - what does version number tell usSergii Shmarkatiuk
This document discusses configuration management and version numbers. It explains that a build takes source code and converts it into artifacts that can run on end-user workstations. Builds are needed to add functionality, improve performance, or implement other requirements. Managing builds is important as applications grow more complex with multiple variants incorporating different property values like version, build type, OS, localization, platform, and maturity. Variants represent the output of a build with a specific set of property values. The version number can incorporate all variant properties to uniquely identify each variant.
1.1 introduction to scm - xp and cm are chicken-and-eggSergii Shmarkatiuk
This document discusses the relationship between eXtreme Programming (XP) practices and Software Configuration Management (SCM) tools. It argues that XP practices and SCM tools have a chicken-and-egg type relationship, where neither can truly exist without the other due to their interdependent nature. SCM tools provide version control, build management, and other functions that are essential for evolution of the software product, while XP practices like pair programming, refactoring, and continuous integration describe common development methods. Together, XP practices and SCM tools form the core software engineering practices for effective development.
This document outlines a series of software configuration management trainings covering topics such as introduction to SCM, version control, build and deployment management, continuous integration, agile SCM, and merge management. The trainings will utilize formats like seminars, webinars, workshops, and conferences. Attendees include software engineers, testers, and project managers. The content is organized into 6 modules with examples and demos. Attendance and active participation are required to receive a score. The trainings will be presented in English by lecturer Sergii Shmarkatiuk.
The document discusses agile software configuration management and the connection between agile methodologies and configuration management practices. It presents streamlined diagrams showing how version control, branching, and releases are handled in agile software development. Branching strategies become more complex as the scope expands and parallel development of multiple versions is needed, requiring different branch types including long-running release branches.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
6. 6
MOTIVATION: WHY MOBILE APPS
COMMUNICATE?
Personal
Publishing
Games
Data
Collection
Collaboration
Sync and
Backup
Transactions
Blog
Facebook Wall
Website
Music
Video
SkyDrive
Surveys
High Scores
Shared Lists
Shared Calendar
Shared Spreadsheet
Real-time
Turn-based
Store
Auction
Matchmaking
Remote
Control
Home Control
Robotics
Media Player
10. MOTIVATION
10
Developers usually have responsibility of
managing different aspects of cloud data
manipulation
Cloud
data
Storage
Synchroni
zation
Caching
Manipulati
on
Conflicts
resolution
13. WHAT IS EVENTUAL CONSISTENCY?
Weak consistency model of storing shared data in a
distributed system that allows clients to perform
updates against any replica at any time.
One of the approaches to the CAP (consistency,
availability, partition tolerance) problem
Guarantee that all updates are eventually delivered
to all replicas, and that they are applied in a
consistent order
Transactional model providing basic requirements
of atomicity and isolation without possibility of
transactions serialization
13
18. HOW TO PROGRAM USING CLOUD
CONCEPTS?
19
Layer
Storage Storage
Compute Compute Compute
Storage Storage
Client
Client
Client
Client
Client
Client
Client
Not physically secure
Unreliable
Cannot detect failures
Potentially many
Cloud Compute
Physically secure, not so many
Not reliable: no persistent state
Can detect failures somewhat
Relatively Expensive
Cloud Storage
Secure
Reliable
Can be very cheap
20. DATA MANAGEMENT MODEL
21
device 1 device 2cloud• Client code:
Declare data types
read/update data
yield (=polite
sync)
flush (=forced
sync)
• Under the hood:
Revision diagram
rules
21. 22
device 1 device 2cloud
IMPLICIT TRANSACTIONS
• At yield
Runtime has permission
to send or receive
updates. Call this
frequently, e.g.
automatically “on
idle”.
• In between yields
Runtime is not allowed
to send or receive
updates
• Implies: all client code
executes in a
(eventually consistent)
transaction
…
…
…
…
…
…
…
yield
yield
yield
yieldyield
yield
yield
yield
22. STRONG CONSISTENCY ON-
DEMAND
flush primitive
blocks until local
state has reached
main revision and
result has come
back to device
Sufficient to
implement strong
consistency
Flush blocks –times
out if server
connection is not
available.
flush
(blocks)
(continue)
24. FORK-JOIN AUTOMATON (FJA)
25
Data set is copied on forking
Data is manipulated in
isolation after fork
When data is joined, changes
are merged.
The merge is fully defined by
the data type declarations.
some types may include custom
merge functions
there is no failure, rollback, or
retry
B
D
CA
fork
fork
fork
join
join
25. PAPER CONTRIBUTIONS
Cloud types definition (CInt, CString, CSet)
Formal description of language constructs (big-step
notation)
Fork-join automaton operations formalization
(create, delete, propagate, fork, join, …)
Formalization of distribution operations (yield-pull,
yield-flush, sync-pull, sync-flush, …)
Formalization of language constructs used by
developers in client applications (new, delete,
entries, all, yield, flush)
26
28. RELATED WORK
CRDT (commutative replicated data types)
Cloud types allow non-commutative operations
No integration with fork-join automaton
Concurrent revisions approach
Necessity of explicit merge (rfork, rjoin, …)
Persistent data types
Do not take into account transactions or distribution
Operational transformations
Very similar to eventual consistency with cloud types, but
difficult to implement
More focused on correctness checks
OLAP/OLTP
Not distributed
Google's Drive's Realtime API, Dropbox Sync API,
Firebase
Complicated, too many things to care of
29
29. QUESTIONS TO DISCUSS
Sergii: Is model of eventual consistency with cloud
types really suitable for users data management?
Sergii: How does eventual consistency with cloud
types ensure that there are no clones entities?
Sergii: How could developers use yield/flush
operations effectively in their code? What is the
typical case/example of flush or yield statement
usage?
Sergii: How does data actually become eventually
consistent? What mechanism does ensure that
data distribution model is correct?
30
30. QUESTIONS TO DISCUSS
Michael: Since the development of cloud types
make the functionality of cloud synchronization
available to the user as a type, how will that affect
tools such as debugging? Will the debugging tools
show the users the revision diagrams and expose
the underling cloud functionality to the users, or will
it hide it from them? Will this cloud functionality
confuse users as to how these types are behaving?
Michael: How scalable is the solution? At what
point will it start to break down because there are
too many users hitting it? Will it start to break down
with 10 users accessing the same data? 1000?
1M? 31
31. FOLLOW-UP RESEARCH SUGGESTIONS
Sergii: Research on how existing types could be
mapped to cloud types
Sergii: Study model limitations (silent conflict
resolution)
Michael: While auto-synchronizing primitive cloud
types are great for certain applications, it would be
interesting to research ways to give users the
power of eventual constancy while still providing a
way for them to have finer grained control over the
data. One use case would be to allow users to
choose which other user's changes they would like
to become constant with, or someone who's
changes they chose to ignore 32
Editor's Notes
a transaction schedule is serializable if its outcome (e.g., the resulting database state) is equal to the outcome of its transactions executed serially, i.e., sequentially without overlapping in time