This document summarizes Gojek's product launches and growth over time. It describes their transformations from a monolithic backend architecture to a microservices architecture using technologies like Kafka, Redis, and gRPC to improve scalability and resilience. It shows how these architectural changes helped reduce response times and increase throughput as Gojek's orders and users grew exponentially.
Synthetic Monitoring Deep Dive - AppSphere16AppDynamics
Learn how to monitor end-to-end workflows from every corner of the world. Hear the basics of AppDynamics Synthetic Monitoring and its integration in the AppDynamics Unified Monitoring Platform. Dive into scripting and how it allows monitoring of complex end-to-end workflows via a set of real-world examples describing best practices and tips to write better scripts and avoid common pitfalls.
Key takeaways:
o What AppDynamics Synthetic Monitoring can do today, and where the technology is going
o See how Synthetic Monitoring complements Real User Monitoring and APM
o Overview of the best tools available to help you build scripts quickly and reliably
o Tips for handling complex websites, avoiding common pitfalls, and leveraging synthetic monitoring to run WebDriver scripts
For more information, go to: www.appdynamics.com
Competitive Research for Uber Eats- Digital MarketingSbPatan
This is a presentation on the digital strategy of Uber eats and how it can improve it and some suggestions. This is a group presentation made by other two people.
Synthetic Monitoring Deep Dive - AppSphere16AppDynamics
Learn how to monitor end-to-end workflows from every corner of the world. Hear the basics of AppDynamics Synthetic Monitoring and its integration in the AppDynamics Unified Monitoring Platform. Dive into scripting and how it allows monitoring of complex end-to-end workflows via a set of real-world examples describing best practices and tips to write better scripts and avoid common pitfalls.
Key takeaways:
o What AppDynamics Synthetic Monitoring can do today, and where the technology is going
o See how Synthetic Monitoring complements Real User Monitoring and APM
o Overview of the best tools available to help you build scripts quickly and reliably
o Tips for handling complex websites, avoiding common pitfalls, and leveraging synthetic monitoring to run WebDriver scripts
For more information, go to: www.appdynamics.com
Competitive Research for Uber Eats- Digital MarketingSbPatan
This is a presentation on the digital strategy of Uber eats and how it can improve it and some suggestions. This is a group presentation made by other two people.
How can you do a migration on SAP PI/PO? How do you eliminate risks and make it as fast as possible?
It is some of the things that will be shared in the 7 step approach to an SAP PI Migration whether it is an upgrade or a conversion.
The 10 most interesting slides that helped our SaaS company raise 9 millionGoCanvas
Have you ever wondered what goes into a pitch deck? Or what slides matter? Here are the 10 slides that seemed to resonate most with VCs we met with our our journey to raising our latest $9 million in funding. Be sure to check the notes for explanations of each slide.
Detect Fraud Successfully with GrabDefence! | Muqi Li, GrabHostedbyConfluent
Grab’s Trust, Identity and Safety team detects fraud by deploying data science, analytics, and engineering platform to search for anomalous and suspicious transactions, or by identifying high-risk individuals who are likely to commit fraud. The team builds tools for managing data feeds, creates SDK for engineering integration, and builds rules engines and consoles for fraud detection. An example of fraudulent behavior could be that of an individual who pretends to be both the driver and passenger, and makes cashless payments to get promotions.
Recently, the team launched GrabDefence as a SaaS service to start helping external clients in Southeast Asia to combat fraud in their business. Billions of fraud and safety detections are performed daily as there are millions of transactions happening every day and thus storing and querying the data of a database in real-time is not feasible. So come listen to us how we use Apache Kafka to detect fraud successfully!
Case Study : How CleverTap helped BookMyShow increase User RetentionCleverTap
Read this case study to understand the challenges faced by apps like BookMyShow & how CleverTap provides solutions via its Behavioral Analytics & Engagement platform.
Airbnb Original PowerPoint Pitch PresentationGraphi Tales
This is a PowerPoint reproduction of an early AirBnB pitch deck via Business Insider: @http://www.businessinsider.com/airbnb-a-13-billion-dollar-startups-first-ever-pitch-deck-2011-9
This presentation runs you through why we decided to create a new architecture and how we managed to rewrite and launch Uber’s Rider app with this new architecture in record time. We’ll talk through the core principles of the new architecture and why we think it’s a perfect fit for creating reliable, highly maintainable mobile applications, especially when you’re working at scale and have a large mobile team.
How can you do a migration on SAP PI/PO? How do you eliminate risks and make it as fast as possible?
It is some of the things that will be shared in the 7 step approach to an SAP PI Migration whether it is an upgrade or a conversion.
The 10 most interesting slides that helped our SaaS company raise 9 millionGoCanvas
Have you ever wondered what goes into a pitch deck? Or what slides matter? Here are the 10 slides that seemed to resonate most with VCs we met with our our journey to raising our latest $9 million in funding. Be sure to check the notes for explanations of each slide.
Detect Fraud Successfully with GrabDefence! | Muqi Li, GrabHostedbyConfluent
Grab’s Trust, Identity and Safety team detects fraud by deploying data science, analytics, and engineering platform to search for anomalous and suspicious transactions, or by identifying high-risk individuals who are likely to commit fraud. The team builds tools for managing data feeds, creates SDK for engineering integration, and builds rules engines and consoles for fraud detection. An example of fraudulent behavior could be that of an individual who pretends to be both the driver and passenger, and makes cashless payments to get promotions.
Recently, the team launched GrabDefence as a SaaS service to start helping external clients in Southeast Asia to combat fraud in their business. Billions of fraud and safety detections are performed daily as there are millions of transactions happening every day and thus storing and querying the data of a database in real-time is not feasible. So come listen to us how we use Apache Kafka to detect fraud successfully!
Case Study : How CleverTap helped BookMyShow increase User RetentionCleverTap
Read this case study to understand the challenges faced by apps like BookMyShow & how CleverTap provides solutions via its Behavioral Analytics & Engagement platform.
Airbnb Original PowerPoint Pitch PresentationGraphi Tales
This is a PowerPoint reproduction of an early AirBnB pitch deck via Business Insider: @http://www.businessinsider.com/airbnb-a-13-billion-dollar-startups-first-ever-pitch-deck-2011-9
This presentation runs you through why we decided to create a new architecture and how we managed to rewrite and launch Uber’s Rider app with this new architecture in record time. We’ll talk through the core principles of the new architecture and why we think it’s a perfect fit for creating reliable, highly maintainable mobile applications, especially when you’re working at scale and have a large mobile team.
Lyft has built an internal platform to allow the backend to go from a single monolithic service to more than a hundred microservices. Several key components of the platform are available on GitHub. The talk will cover the following projects:
- envoy: L7 edge and mesh proxy, enabling transparent networking for microservice architectures
- discovery: track infrastructure topology in an eventually consistent manner
- ratelimit: protect your systems from bad actors
- confidant: store secrets encrypted at rest in DynamoDB
Taxi Startup Presentation for Taxi CompanyEugene Suslo
TaxiStartup brings taxi and limo companies in to the world of mobile booking apps, web booking, analytics and dispatch automation.
Uber, Lyft, Hailo and others are taking over the market, yet have only about 5% of it. We give taxi and limo companies (the rest 95% of the market) a simple and powerful tool to fight back.
"Building Data Foundations and Analytics Tools Across The Product" by Crystal...Tech in Asia ID
Crystal is a data nerd, self-taught programmer, and avid non-fiction reader.
Having joined GO-JEK over two years ago, she has first-hand experience of the many challenges involved with scaling data-driven teams at Indonesia’s first unicorn startup. She currently leads the strategy and vision of the Business Intelligence team’s internal products and data culture across the company. Her team aims to produce actionable insights for all of the different verticals on the GO-JEK platform.
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
Just Add Reality: Managing Logistics with the Uber Developer PlatformApigee | Google Cloud
Watch the full recording here: https://youtu.be/DrWR1YjEPos
Learn how businesses are using Uber to convert digital engagement into real-world action:
Join Chris Messina, Uber's developer experience lead, to learn how Uber:
- enable your users to request a ride in any context with the Rides Request API
- reach your customers while they’re on the go with the Trip Experiences API
- power your on-demand delivery needs with the UberRUSH API
We’ll take you on a tour of all three APIs and share examples of how partners have used Uber’s technology to drive innovation in their own businesses.
Geospatial Indexing at Scale: The 15 Million QPS Redis Architecture Powering ...Daniel Hochman
Talk given at RedisConf 17 on June 1, 2017 by Daniel Hochman. A video will be published by the conference organizers.
Abstract:
Built-in GEO commands in Redis provide a solid foundation for location-based applications. The scale of Lyft requires a completely different approach to the problem. Learn how to push beyond your constraints to build a highly available, high throughput, horizontally scalable Redis architecture. The techniques presented in this case study are broadly applicable to scaling any type of application powered by Redis. The talk will cover data modeling, open-source solutions, reliability engineering, and Lyft platform.
Cassandra on Mesos Across Multiple Datacenters at Uber (Abhishek Verma) | C* ...DataStax
Traditionally, machines were statically partitioned across the different services at Uber. In an effort to increase the machine utilization, Uber has recently started transitioning most of its services, including the storage services, to run on top of Mesos. This presentation will describe the initial experience building and operating a framework for running Cassandra on top of Mesos running across multiple datacenters at Uber. This framework automates several Cassandra operations such as node repairs, addition of new nodes and backup/restore. It improves efficiency by co-locating CPU-intensive services as well as multiple Cassandra nodes on the same Mesos agent. It handles failure and restart of Mesos agents by using persistent volumes and dynamic reservations. This talk includes statistics about the number of Cassandra clusters in production, time taken to start a new cluster, add a new node, detect a node failure; and the observed Cassandra query throughput and latency.
About the Speaker
Abhishek Verma Software Engineer, Uber
Dr. Abhishek Verma is currently working on running Cassandra on top of Mesos at Uber. Prior to this, he worked on BorgMaster at Google and was the first author of the Borg paper published in Eurosys 2015. He received an MS in 2010 and a PhD in 2012 in Computer Science from the University of Illinois at Urbana-Champaign, during which he authored more than 20 publications in conferences, journals and books and presented tens of talks.
Nginx Conference 2016 - Learnings and State of the IndustryBenjamin Scholler
In this presentation, I talk in brief about what I learned by going to the 2016 Nginx Conference. There was a wide range of talks covering a huge amount of topics. In this presentation, I cover points on Nginx functionality, best practices for APIs, API Gateways, microservices, and things to come in the near future.
The good, the bad, the ugly side of step functionsMohsiur Rahman
The following is a talk about when and why you should and shouldn't use step functions with real world examples at two different companies by Mohsiur Rahman at Serverless Meetup in Philadelphia.
Youtube Link : https://youtu.be/XrCOQ24RSTM
Social Media Links
LinkedIn : https://www.linkedin.com/in/mohsiur/
GitHub : https://github.com/mohsiur
Medium : https://medium.com/@mohsiurr
Serverless in production, an experience report (London DevOps)Yan Cui
AWS Lambda has changed the way we deploy and run software, but this new serverless paradigm has created new challenges to old problems - how do you test a cloud-hosted function locally? How do you monitor them? What about logging and config management? And how do we start migrating from existing architectures? In this talk Yan and Domas will discuss solutions to these challenges by drawing from real-world experience running Lambda in production and migrating from an existing monolithic architecture.
In this session Jon will pick up from last year’s popular talk and show strategies for mapping BizTalk Server and Services V1.0 integration solutions to the new BizTalk Microservices architecture. With lots of demos and real-world example you will get a great understanding of how you can move to and embrace this incredible new architecture without starting from scratch.
Dubbo and Weidian's practice on micro-service architectureHuxing Zhang
Weidian is a social-based e-commerce platform that helps people with dreams to start a business easier. It is also committed to providing consumers with a useful, fun and attitude-oriented shopping platform. Since started from 2014, it has reached 170 millions app downloads in total, and millions of average DAU.
This slides introduces how Weidian's architecture is migrating from monolithic application to Dubbo's based micro-service architecture.
Building a Modern Microservices Architecture at Gilt: The EssentialsC4Media
Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/1OvXF7o.
Yoni Goldberg discusses the many advantages that microservices can offer or has offered to the Gilt engineering team, as well as the challenges and how Gilt’s engineers have gone about resolving these challenges. Yoni also provides a deep-dive exploration of Gilt’s Ops strategy (Docker + AWS), approach to building APIs, monitoring practices, and datastore strategies. Filmed at qconlondon.com.
Since 2010, Lead Software Engineer Yoni Goldberg has led the engineering behind several critical projects at Gilt--including personalization, the Gilt Insider loyalty program, SEO/optimization, and other customer-facing initiatives.
SAP TechEd 2016 Barcelona TEC123 Session PresentationCore To Edge
Very first SAP HANA adaptations in Turkey started with some pilot sidecar scenarios for SAP BW, continued with few SAP BW on HANA and SAP BPC on HANA projects as a new implementation. Some large enterprises decided to move to SAP BW on HANA from their classical SAP BW environment in recent years. All new SAP implementations mostly starts with SAP HANA and SAP ASE (Critial and core systems on HANA, rest on ASE). And also we now started to hear that some customers started to move to SAP Suite on HANA.
But what we’ve achieved is still the 1st (and will always be) and sole in Turkey.
Last year, we’ve migrated EVE Shop‘s SAP ERP systems running on SAP HANA to SAP’s new generation business suite SAP S/4HANA in 3 months.
Scaling Gilt: from Monolithic Ruby Application to Distributed Scala Micro-Ser...C4Media
Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/10fVilQ.
Yoni Goldberg describes some of the technological innovations that have helped Gilt to reach its current size, and highlight some of the core challenges that the company's engineering team continues to face. He also discusses what every tech team needs to consider and address before heading down the path of building a first-class micro-services architecture. Filmed at qconnewyork.com.
Since joining Gilt at 2010 as a platform engineer, Yoni Goldberg has been leading a variety of personalization efforts and other customer-facing initiatives--including the Gilt Insider loyalty program, the post-purchase experience, and SEO/optimization efforts. Prior to joining Gilt, Yoni worked at Google, where he wrote his master's thesis on Fusion Tables.
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdfKamal Acharya
Our vision is to make ONLINE CAR SERVICING SYSTEM is needed for the country as technology grows fast in the world. The purpose is to develop this project to provide a better solution to the problems that the customers faces. This website will provide customers to reserve their car services from their home or from office. Customer feels hard to send their car for the service, either they need to reserve using mail system or walk in to send their car for service.
At the end of these project, a prototype of justified system will develop which will provide a solution for the identify problem to improve the organizations revenue and performance. This system will be web based system where it is able to conduct an overall process of online registration and bookings too. The data will be stored in keep as privacy for each customer who has register.
Comment créer, optimiser et monétiser vos contenus ?Kaliop-slide
Kaliop et eZ Systems ont animé une « Pause Digitale » 100% dédiée à la presse et aux médias. Le thème de la matinée : Comment créer, optimiser et monétiser vos contenus
Retrouvez dans les slides une partie de la présentation sur les nouveaux enjeux de fabrication des sites medias.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
4. Product Releases
2011: go-ride, go-send, go-shop (all phone order)
January 2015: app release with go-ride, go-send, go-shop
April 2015: go-food
September 2015: go-mart
Okt 2015: go-box, go-massage, go-clean, go-glam, go-busway
Desember 2015: go-tix
Januari 2016: go-kilat (e-commerce partnership, not on app)
April 2016: go-car
5. 11,000,000 downloads in 15 months
0
3000000
6000000
9000000
12000000
January February March April May June July August MARCH
cumulative total app downloads
9. The growth of Order
350
700
1,050
1,400
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4 5 6
number of order requestmultipliers
10. CONWAY’S LAW
Any Organization that designs a system (defined
broadly) will produce a design whose structure is a copy
of the organization’s communication structure
12. Issue :
• Bugs
• Unexpected Load growth
• Long process time which resulted with server crash during peak
Challenge :
- Small tech team (5 devs: for mobile apps (cust&driver), portals (3 different portals),
backend) vs 4 (or more) divisions
- Keep server alive in unexpected high loads
- So many features (and products) need to be released to keep business running
14. Transform 1
Plus :
At least we’re still alive Minus:
Long process time
DB bottleneck
15. Transform 2
Disk
proxy
service C
core backend
core backend
service C
service B
core backend
core backend
service B
service A
core backend
service A
service A
redis
queue
16. Transform 2
Plus :
- Splitting functionalities to services
makes code more efficient (at least
for new services)
- Queue enables core backend to
push and forget for one way
communication
- Process time reduced
- Enable throttling in queue workers
Minus:
• Process time still long enough for
incoming traffic since it only split
non-transactional functionalities
• DB bottleneck
17. Transform 3 Disk
proxy
service C
core backend
core backend
service C
redis queue
service B
core backend
core backend
service B
Disk
service A
core backend
service A
service A
Disk
rest api
service D
core backend
core backend
service D
Disk
rest api
redis cache
service E
core backend
core backend
service E
Disk
18. Transform 3
Plus :
- Split some transaction processes
to another services: load splitted,
process time reduced
- Redis cache: reduce db bottleneck
- Each service owns their own db:
reduce db bottleneck
Minus:
• API calls in a flow of more than 2
services cause cascading failures
19. Transform
4 Disk
proxy
service C
core backend
core backend
service C
kafka queue
service B
core backend
core backend
service B
Disk
service A
core backend
service A
service A
Diskservice D
core backend
core backend
service D
Disk
inline redis
cache
service E
core backend
core backend
service E
Disk
service F
core backend
service A
service F
Disk
grpc (http/2)
20. Transform 4
Plus :
- Asynchronous communication
between services via kafka: reduce
api calls between services, reduces
cascade failures
- Shared redis (inline) cache: reduce
db queries, reduce api calls
between services, reduce cascade
failures
- grpc (uses http/2) should reduce
network time
Minus:
?
21. Stack :
• Java: Spring MVC and Spark
• Go
• Jruby on Rails
• AngularJS
• MySQL
• PostgreSQL
• MongoDB
• Elasticsearch
• Redis
• Kafka
• RabbitMQ