A fast paced review of blockchain technology, applications, architectural characteristics and programming, using Ethereum as the main example.
Presented at the JAX London 2017 conference.
A talk given at IEEE Software Experts Summit, October 2015 in Beijing, exploring how software architecture is likely to change in the future as a result of software defined platforms and on-demand analytics, and the implications of this.
Serverless Computing for the Inquiring MindEoin Woods
Overview of "serverless" computing including interactive exercise for thinking through its implications. Presented at the SPA2017 conference (www.spaconference.org).
A talk given at IEEE Software Experts Summit, October 2015 in Beijing, exploring how software architecture is likely to change in the future as a result of software defined platforms and on-demand analytics, and the implications of this.
Serverless Computing for the Inquiring MindEoin Woods
Overview of "serverless" computing including interactive exercise for thinking through its implications. Presented at the SPA2017 conference (www.spaconference.org).
Kaseya Connect 2012 - Deploying Apps With Software Deployment And UpdateKaseya
Managing and deploying custom and 3rd party applications has never been easier. This technical session will review the various methods and best practices for configuring proper software deployment profiles through this powerful new integrated module.
Presented By: Kirk Feathers, Sr. Product Specialist, & Ben Lavalley, Sr. Product Marketing Manager & Thai N. Huynh and Kash'ka Fain, 501cTech
A presentation on how project managers should consider cybersecurity in their project delivery activities. Delivered at the PMI-SOC Cybersecurity workshop on September 26th, 2015, in Toronto.
Slides from a webinar that I and Dell Virtualization Evangelist Hassan Fahimi gave in March 2016. We provide a complete overview of OpenStack and Foglight for OpenStack.
Evolving toward Microservices - O’Reilly SACON KeynoteChristopher Grant
O’Reilly Software Architecture Conference Keynote 4/2016
Evolving toward Microservices
How HomeDepot.com made the switch
Video published at: https://www.oreilly.com/ideas/evolving-toward-microservices-how-home-depot-made-the-transition
This presentation distills the best industry guidance into a hands-on approach to designing application architectures. Along the way, we'll examine the key decisions that must be made when choosing our architectural styles and designing our layers and show how those decisions turn into real shippable code on a project.
Open Source and Standards Communities Coming Together to Solve Real World Pro...All Things Open
Presented by: Adam Newman
Presented at the All Things Open 2021
Raleigh, NC, USA
Raleigh Convention Center
Abstract: This talk will examine the intersection of technology development for the benefit of humanity via standards development communities’ intersection with open source communities to develop solutions that improve lives using the SA OPEN Platform with IEEE ISTO.
Architecting Applications the Microsoft WayClint Edmonson
This presentation distills the best guidance from the Microsoft Patterns & Practices group to provide a hands-on approach to designing application architectures. Along the way, we’ll examine the key decisions that must be made when choosing our architectural styles and designing our layers and show how those decisions turn into a real shippable code on a project.
A large company employing thousands of software developers worldwide faces many challenges to consistently manage its processes for using and releasing software under Free Software licenses. Open source knowledge and expertise often varies dramatically across business verticals, as does understanding of how open source communities function. The underlying compliance requirements of Free Software licenses, however, are the same for every organization, regardless of size. What can companies do to ensure certain degrees of cohesion and competency are reflected across their diverse open source offerings?
This presentation will present some of my experiences with developing and refining corporate-wide practices that are designed to be transparent, repeatable, and scalable. The lessons learned can be applicable to any entity dealing with Free Software.
NDC Minnesota 2019 - Fundamentals of Azure IoTJustin Grammens
The Internet of Things is not only changing the way that we live, but the way that companies do business. Microsoft is spending billions of dollars on their IoT infrastructure to help support companies with the next generation of the Internet. A generation that involves not only laptops, desktops and smartphones connected on the Internet, but remote assets such as equipment, appliances and products. Learn about the MXChip Kit from Microsoft and how it plugs into the Azure IoT infrastructure so as product, designers we can further understand what's possible when we start connecting our industrial equipment and products.
The do's and dont's of cloud computing - StatPro Cloud Summit 2012StatPro Group
Neil Smyth (@Neil_StatPro), Technology and Marketing Director at StatPro covers the do’s and don’t’s of cloud computing. Neil provides a comparison of traditional hosting versus SaaS and cloud computing, including an interesting look at how one compares to a housing estate and the other to a hotel. He then moves on to providing top tips on selecting a cloud computing vendor, including the key things to look out for such as infrastructure, security, scalability and the business model.
What happens when a security researcher finds a hole in your code? Do have a clear policy to submit this kind of findings? Most not. Responsible Disclosure is something every company should manage, and Bug Bounties Programs help to improve the security as well as be in contact with the hacker community. During the talk we will see how a Responsible Disclosure Program or a BugBounty Program works, and how the company should focus and not forget about other mitigations and counter mesures related to security
GitHub Gone Wrong - Lessons learned from organic open sourceAll Things Open
Presented by: Charles Eckel
Presented at the All Things Open 2021
Raleigh, NC, USA
Raleigh Convention Center
Abstract: Creating a GitHub organization with public repos is free, fast, and easy. This fosters a wild west of GitHub usage within corporations that is as confusing and troubling as it is liberating and empowering. We explore how GitHub has been used organically throughout Cisco and efforts to establish best practices that enable efficient open source collaboration that is responsible and sustainable.
Blockchain Application Design and Development, and the Case of Programmable M...Ingo Weber
Slides from my CLOSER 2021 keynote ( https://www.insticc.org/node/TechnicalProgram/closer/2021/presentationDetails/1390 )
Blockchain has emerged as a decentralized platform for managing digital assets and executing 'smart contracts', i.e., user-defined code. While blockchain's suitability for a given use case should always be scrutinized, it does have the potential to disrupt many of the connection points between individuals, companies, and government entities. In this keynote talk, I will provide an overview of what architects and developers need to know in order to build blockchain-based applications, and how it relates to the cloud and software services. Among others, I will cover blockchain-as-a-service concepts, as well as architectural concerns and model-driven engineering for blockchain applications, the latter also in relation to collaborative business processes. To highlight some of the challenges, I will discuss insights from a project on "programmable money", i.e., blockchain-based money for conditional payments where the money itself checks whether it can be spent in a certain way at the point of payment. Finally, I will touch on insights into current adoption of blockchain.
Kaseya Connect 2012 - Deploying Apps With Software Deployment And UpdateKaseya
Managing and deploying custom and 3rd party applications has never been easier. This technical session will review the various methods and best practices for configuring proper software deployment profiles through this powerful new integrated module.
Presented By: Kirk Feathers, Sr. Product Specialist, & Ben Lavalley, Sr. Product Marketing Manager & Thai N. Huynh and Kash'ka Fain, 501cTech
A presentation on how project managers should consider cybersecurity in their project delivery activities. Delivered at the PMI-SOC Cybersecurity workshop on September 26th, 2015, in Toronto.
Slides from a webinar that I and Dell Virtualization Evangelist Hassan Fahimi gave in March 2016. We provide a complete overview of OpenStack and Foglight for OpenStack.
Evolving toward Microservices - O’Reilly SACON KeynoteChristopher Grant
O’Reilly Software Architecture Conference Keynote 4/2016
Evolving toward Microservices
How HomeDepot.com made the switch
Video published at: https://www.oreilly.com/ideas/evolving-toward-microservices-how-home-depot-made-the-transition
This presentation distills the best industry guidance into a hands-on approach to designing application architectures. Along the way, we'll examine the key decisions that must be made when choosing our architectural styles and designing our layers and show how those decisions turn into real shippable code on a project.
Open Source and Standards Communities Coming Together to Solve Real World Pro...All Things Open
Presented by: Adam Newman
Presented at the All Things Open 2021
Raleigh, NC, USA
Raleigh Convention Center
Abstract: This talk will examine the intersection of technology development for the benefit of humanity via standards development communities’ intersection with open source communities to develop solutions that improve lives using the SA OPEN Platform with IEEE ISTO.
Architecting Applications the Microsoft WayClint Edmonson
This presentation distills the best guidance from the Microsoft Patterns & Practices group to provide a hands-on approach to designing application architectures. Along the way, we’ll examine the key decisions that must be made when choosing our architectural styles and designing our layers and show how those decisions turn into a real shippable code on a project.
A large company employing thousands of software developers worldwide faces many challenges to consistently manage its processes for using and releasing software under Free Software licenses. Open source knowledge and expertise often varies dramatically across business verticals, as does understanding of how open source communities function. The underlying compliance requirements of Free Software licenses, however, are the same for every organization, regardless of size. What can companies do to ensure certain degrees of cohesion and competency are reflected across their diverse open source offerings?
This presentation will present some of my experiences with developing and refining corporate-wide practices that are designed to be transparent, repeatable, and scalable. The lessons learned can be applicable to any entity dealing with Free Software.
NDC Minnesota 2019 - Fundamentals of Azure IoTJustin Grammens
The Internet of Things is not only changing the way that we live, but the way that companies do business. Microsoft is spending billions of dollars on their IoT infrastructure to help support companies with the next generation of the Internet. A generation that involves not only laptops, desktops and smartphones connected on the Internet, but remote assets such as equipment, appliances and products. Learn about the MXChip Kit from Microsoft and how it plugs into the Azure IoT infrastructure so as product, designers we can further understand what's possible when we start connecting our industrial equipment and products.
The do's and dont's of cloud computing - StatPro Cloud Summit 2012StatPro Group
Neil Smyth (@Neil_StatPro), Technology and Marketing Director at StatPro covers the do’s and don’t’s of cloud computing. Neil provides a comparison of traditional hosting versus SaaS and cloud computing, including an interesting look at how one compares to a housing estate and the other to a hotel. He then moves on to providing top tips on selecting a cloud computing vendor, including the key things to look out for such as infrastructure, security, scalability and the business model.
What happens when a security researcher finds a hole in your code? Do have a clear policy to submit this kind of findings? Most not. Responsible Disclosure is something every company should manage, and Bug Bounties Programs help to improve the security as well as be in contact with the hacker community. During the talk we will see how a Responsible Disclosure Program or a BugBounty Program works, and how the company should focus and not forget about other mitigations and counter mesures related to security
GitHub Gone Wrong - Lessons learned from organic open sourceAll Things Open
Presented by: Charles Eckel
Presented at the All Things Open 2021
Raleigh, NC, USA
Raleigh Convention Center
Abstract: Creating a GitHub organization with public repos is free, fast, and easy. This fosters a wild west of GitHub usage within corporations that is as confusing and troubling as it is liberating and empowering. We explore how GitHub has been used organically throughout Cisco and efforts to establish best practices that enable efficient open source collaboration that is responsible and sustainable.
Blockchain Application Design and Development, and the Case of Programmable M...Ingo Weber
Slides from my CLOSER 2021 keynote ( https://www.insticc.org/node/TechnicalProgram/closer/2021/presentationDetails/1390 )
Blockchain has emerged as a decentralized platform for managing digital assets and executing 'smart contracts', i.e., user-defined code. While blockchain's suitability for a given use case should always be scrutinized, it does have the potential to disrupt many of the connection points between individuals, companies, and government entities. In this keynote talk, I will provide an overview of what architects and developers need to know in order to build blockchain-based applications, and how it relates to the cloud and software services. Among others, I will cover blockchain-as-a-service concepts, as well as architectural concerns and model-driven engineering for blockchain applications, the latter also in relation to collaborative business processes. To highlight some of the challenges, I will discuss insights from a project on "programmable money", i.e., blockchain-based money for conditional payments where the money itself checks whether it can be spent in a certain way at the point of payment. Finally, I will touch on insights into current adoption of blockchain.
Introduction to Blockchain Governance ModelsGokul Alex
The presentation on the history and emergence of distributed consensus and the contemporary aspects of Blockchain Governance presented for the Global FinTech and Blockchain Forum organised by Pyramid Learning Platforms.
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
In this keynote, delivered at the Blockchain Forum of BPM 2019, I summarized and reflected on research on BPM and blockchain over the last four years, including model-driven engineering, process execution, and analysis and process mining. I also covered selected use cases and applications, as well as recent insights on adoption. The keynote closed with a discussion of open research questions.
An introduction to blockchains, a session handled by Adri Jovin J J, Department of Information Technology, Sri Ramakrishna Institute of Technology. This gives a basic outline of the blockchains.
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain
InitVerse Blockchain,Blockchain is an information technology for decentralized data storage, data sharing, and data exchange, which does not need to be controlled by a central organization or individual.
Block chains and crypto currencies - introductionInitio
Objectives and knowledge sharing
• What is blockchain? Why should we care?
• Cryptography: Shared secrets and the Blockchain
• Protocols: What’s in those blocks ?!
• Ethereum
• Bitcoin
• Hyperledger
This is a presentation I delivered in Feb 2019 regarding my book "Blockchain Guida all'Ecosistema" https://amzn.to/2EejKKn (ebook) https://amzn.to/2EbELW7 (paperback).
API Vulnerabilties and What to Do About ThemEoin Woods
In this talk we will review the current security landscape, particularly as it relates to API-based applications, and explore the OWASP API Security Top 10 vulnerabilities in order to understand the top security threats to our APIs, which ones we might have missed in our systems, and what practical mitigations we can use to address them when we get back to work.
Today’s mainstream acceptance of Agile+DevOps as the preferred way of working once again raises questions of what architecture work is and who does it. It simultaneously challenges much of our previously accepted wisdom, preferring architecture to be a “shared commons” across the development organisation, while demanding a sophisticated level of software architecture practice to deliver on the promises of Agile+DevOps.
One way of describing this situation is the need to “democratise” software architecture so it becomes a shared responsibility rather than a centralised impediment to rapid delivery. In this talk we’ll examine the challenges of software architecture in today’s modern distributed teams and ask how we might make the architecture of their systems a shared responsibility to allow them to achieve the software architecture that they need at the speed that they need it.
Secure by Design - Security Design Principles for the Working ArchitectEoin Woods
As our world becomes digital, the systems we build must be secure by design. The security community has developed a well-understood set of principles used to build systems that are secure (or at least securable) by design, but this topic often isn’t included in the training of software developers. And when the principles are explained, they are often shrouded in the jargon of the security engineering community, so mainstream developers struggle to understand and apply them.
This talk explains why secure design matters and introduces 10 of the most important proven principles for designing secure systems, distilled from the wisdom of the security engineering community.
Models, Sketches and Everything In BetweenEoin Woods
ust the mention of the word “modeling” brings back horrible memories of analysis paralysis for many software developers. As a result of the conventional wisdom around Agile development that modeling is usually waste, countless software teams have completely abandoned modeling their systems. The problem is that there is a lot of design information that isn’t in the code, and without any models this information can get lost. Over time, the team ends up with a “big ball of mud.”
In this talk we explain what modeling brings to the development process and its value in different situations, discussing the different levels of formality available, from models to sketches and everything in between. Along the way, we share real-world advice on how a little well-chosen modeling can help avoid chaos.
Using Software Architecture Principles in PracticeEoin Woods
Architects have to balance providing clear guidance for important decisions with the need to let people get on and build their aspects of the system without interference. In this talk Eoin Woods explores how architecture principles can help achieve this by making constraints and priorities clear without being unnecessarily prescriptive about how they are to be implemented.
Presented at O'Reilly Software Architecture Conference in London during October 2016.
Secure by Design - Security Design Principles for the Rest of UsEoin Woods
Security is an ever more important topic for system designers. As our world becomes digital, today’s safely-hidden back office system is tomorrow’s public API, open to anyone on the Internet with a hacking tool and time on their hands. So the days of hoping that security is someone else’s problem are over.
The security community has developed a well understood set of principles used to build systems that are secure (or at least securable) by design, but this topic often isn’t included in the training of software developers, assuming that it’s only relevant to security specialists.
In this talk, we will briefly discuss why security needs to be addressed as part of architecture work and then introduce a set of proven principles for the architecture of secure systems, explaining each in the context of mainstream system design, rather than in the specialised language of security engineering.
This version of the talk was presented at GOTO London in October 2016.
Software Architecture as Systems DissolveEoin Woods
The way we build systems is changing. From our history of monolithic systems, then distributed systems, to Internet connected systems, we are now entering the era of cloud-hosted, microservice based, pay-for-usage system development. What does the history of software architecture tell us about the challenges of this new environment? And how does our approach to software architecture need to evolve in order to meet them?
Software architecture has been a mainstream discipline since the 1990s and in that time has become a recognised, widely researched and often valued part of the software engineering process. However architecture approaches must reflect the technologies and priorities of the systems we are building and in this regard its future has never looked more uncertain or more exciting. From our history of monolithic compile time architecture, to many tiered distributed systems, to Internet connected services, we are now entering the era of cloud-hosted, microservice-based, pay-for-usage systems development. In this new world the boundaries of “my” system are no longer so clear and our systems are dissolving into complex webs of independently owned and evolved services, with nothing more in common than a shared credit card for billing and an agreement on the format of network requests. What can the history of software architecture tell us about the likely challenges in this environment? And how must it develop in order to meet them?
This version of the talk was presented at GOTO London in October 2016.
Security is now important to all of us, not just people who work at Facebook. Most developers think about security in terms of security technologies that they want to apply to their systems, and then ask how secure the system is. From a secure systems perspective, this is the wrong way around. To build a secure system, you need to start from the things that need to be protected and the threats to those resources.
In this session, Eoin dives into the fundamentals of system security to introduce the topics we need to understand in order to decide how to secure our systems.
Getting Your System to Production and Keeping it ThereEoin Woods
It can be dispiriting to find that a well-designed system that has been carefully implemented runs into problems as soon as it hits production, but such things do happen. This session explores why this happens and discusses why good software development practice is important but ultimately isn't sufficient to create a reliable and effective enterprise system. We'll discuss what being "production ready" really means in order to allow us to understand the principles, patterns and practices that we need to be aware of and apply in order to get our systems into production safely and keep them there.
Talk given at London Java Community on 1st December 2016.
Common WebApp Vulnerabilities and What to Do About ThemEoin Woods
With more and more services becoming internet-facing, web application security is now a problem for most of us. In response to this, the OWASP security community have been working for years to catalogue, understand and prioritise common web application vulnerabilities, published as the “OWASP Top 10 List”.
In this session, Eoin will review the OWASP Top 10 list to understand the vulnerabilities and dig into the implementation details of some of the more important of them to identify practical mitigations for them in our own applications.
A recent concept borrowed from Lean thinking is that of the “last responsible moment” for a decision to be made. The idea is a simple one, in that having more information should result in a better decision. However, these moments often seem to loom up earlier than we would like them to. In this session, Eoin will review the idea of the last responsible moment and how that point is identified. We will then identify some design tactics we can use to defer the last responsible moment, illustrating each with some practical examples.
Software Engineering, Software Consulting, Tech Lead, Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Transaction, Spring MVC, OpenShift Cloud Platform, Kafka, REST, SOAP, LLD & HLD.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
GraphSummit Paris - The art of the possible with Graph TechnologyNeo4j
Sudhir Hasbe, Chief Product Officer, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteGoogle
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
👉👉 Click Here To Get More Info 👇👇
https://sumonreview.com/ai-pilot-review/
AI Pilot Review: Key Features
✅Deploy AI expert bots in Any Niche With Just A Click
✅With one keyword, generate complete funnels, websites, landing pages, and more.
✅More than 85 AI features are included in the AI pilot.
✅No setup or configuration; use your voice (like Siri) to do whatever you want.
✅You Can Use AI Pilot To Create your version of AI Pilot And Charge People For It…
✅ZERO Manual Work With AI Pilot. Never write, Design, Or Code Again.
✅ZERO Limits On Features Or Usages
✅Use Our AI-powered Traffic To Get Hundreds Of Customers
✅No Complicated Setup: Get Up And Running In 2 Minutes
✅99.99% Up-Time Guaranteed
✅30 Days Money-Back Guarantee
✅ZERO Upfront Cost
See My Other Reviews Article:
(1) TubeTrivia AI Review: https://sumonreview.com/tubetrivia-ai-review
(2) SocioWave Review: https://sumonreview.com/sociowave-review
(3) AI Partner & Profit Review: https://sumonreview.com/ai-partner-profit-review
(4) AI Ebook Suite Review: https://sumonreview.com/ai-ebook-suite-review
Atelier - Innover avec l’IA Générative et les graphes de connaissancesNeo4j
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Allez au-delà du battage médiatique autour de l’IA et découvrez des techniques pratiques pour utiliser l’IA de manière responsable à travers les données de votre organisation. Explorez comment utiliser les graphes de connaissances pour augmenter la précision, la transparence et la capacité d’explication dans les systèmes d’IA générative. Vous partirez avec une expérience pratique combinant les relations entre les données et les LLM pour apporter du contexte spécifique à votre domaine et améliorer votre raisonnement.
Amenez votre ordinateur portable et nous vous guiderons sur la mise en place de votre propre pile d’IA générative, en vous fournissant des exemples pratiques et codés pour démarrer en quelques minutes.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
10. What blockchains exist?
A lot of blockchain implementations exist. A small sample of them are:
Bitcoin 2009 Cryptocurrency
Litecoin 2011 Cryptocurrency
Ripple 2012 Blockchain payment and settlement system
Chain 2014 Enterprise blockchain
Ethereum 2015 Blockchain dapp platform
Hyperledger 2015 Linux Foundation open source blockchain projects
R3 Corda 2016 Distributed ledger for the financial industry
Multichain 2017 Enterprise blockchain
10
17. Demo: Explore a blockchain
• The WannaCry ransomware attackers have 3 bitcoin wallets:
• 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
• 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
• 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
• We can use blockchain.info to find out how much they have
collected in ransom so far and where they sent it
• Note: if using the API it returns values in satoshis: there are 10-8 satoshis in a
bitcoin, so multiply by 0.00000001 to get BTC
17
21. Example: Ethereum Solidity Smart Contract
contract Coin {
// The keyword "public" makes those variables readable from outside.
address public minter;
mapping (address => uint) public balances;
// Events allow light clients to react on changes efficiently.
event Sent(address from, address to, uint amount);
// This is the constructor whose code is run only when the contract is created.
function Coin() { minter = msg.sender; }
function mint(address receiver, uint amount) {
if (msg.sender != minter) return;
balances[receiver] += amount;
}
function send(address receiver, uint amount) {
if (balances[msg.sender] < amount) return;
balances[msg.sender] -= amount;
balances[receiver] += amount;
Sent(msg.sender, receiver, amount);
}
} 21
// More details later …
22. Quality Properties of a Distributed Ledger
Useful Qualities
• Append only
• Security (integrity, non-
repudiation, availability)
• High fault-tolerance
• No single point control or trust
• Embedded immutable logic
• Dynamic, evolving ecosystem
Problematic Qualities
• (very) eventual consistency
• computationally expensive
(generally)
• Limited query model
• Lack of privacy
• lack of throughput scalability
(generally – 10s txn/sec)
• Lacking maturity
22
31. Ethereum Solidity
contract Coin {
// The keyword "public" makes those variables readable from outside.
address public minter;
mapping (address => uint) public balances;
// Events allow light clients to react on changes efficiently.
event Sent(address from, address to, uint amount);
// This is the constructor whose code is run only when the contract is created.
function Coin() { minter = msg.sender; }
function mint(address receiver, uint amount) {
if (msg.sender != minter) return;
balances[receiver] += amount;
}
function send(address receiver, uint amount) {
if (balances[msg.sender] < amount) return;
balances[msg.sender] -= amount;
balances[receiver] += amount;
Sent(msg.sender, receiver, amount);
}
}
Contract
Typed state
Event for log
(and callback)
Functions to
operate on
state
31
36. Some Applications
36
Value Transfers: securities clearing, payments
Verifiable Records: property registers, supply chain,
loyalty points
Identity: verifiable digital identity, passports
Verifiable Storage: immutable storage of digital assets
Decentralised Notary: proof of existence of digital asset
Currencies: Bitcoin, Ether, Litecoin, …