This keynote talk covered research and insights from the speaker’s last 7 years of research on two topics of relevance to the RSDA workshop. The first part was about behavioural data analytics for reliability and dependability purposes, i.e., with a focus on sequences of events, rather than static structures or the presence of certain events in a log. Specifically, the approach of using Process Mining techniques to gain insights into traces of logged events was presented.
The second part of the talk was centred around a summary of insights into security, dependability, and reliability aspects of blockchain applications. With the introduction of smart contracts, blockchain technology has become a general-purpose code execution framework, and architects and developers need to understand the specific implications on security and dependability when building applications on blockchain.
Blockchain: Background and Data61 Research OverviewIngo Weber
My keynote slides at the Korean National Blockchain Conference, giving an overview of our research in Software Architecture, Model-Driven Engineering, Dependability / Availability, and Business Process Execution in the context of Blockchain.
Software Architecture and Model-Driven Engineering for BlockchainIngo Weber
This talk was given at the August SydEthereum meetup, and gives an overview of our Blockchain research (Data61, CSIRO). The focus is on Software Architecture and Model-Driven Engineering. In addition to some approaches and tooling, it mentions some of the empirical work on availability of write transactions on Ethereum.
Blockchain and Services – Exploring the LinksIngo Weber
In this keynote talk, given at the ASSRI Symposium 2018, I explore four different facets of the relationship between Blockchain and Services.
First, application-level service interfaces for interaction with Blockchain-based applications enable easy integration with existing infrastructure. Second, service composition can be achieved through smart contracts, and enable different approaches to orchestrations and choreographies. Third, Blockchain-aaS offerings cover infrastructure operation, but can go beyond that. And finally, microservice principles can be applied to smart contract design.
Analysing Data from Blockchains - Keynote @ SOCCA 2020Ingo Weber
Keynote at the Symposium on Cryptocurrency Analysis (SOCCA 2020). Content:
In order to analyse how concrete blockchain systems as well as blockchain applications are used, data must be extracted from these systems. Due to various complexities inherent in blockchain, the question how to interpret such data is non-trivial. Such interpretation should often be shared among parties, e.g., if they collaborate via a blockchain. To this end, we devised an approach codify the interpretation of blockchain data, to extract data from blockchains accordingly, and to output it in suitable formats -- see https://arxiv.org/abs/2001.10281.
In addition, application developers and users of blockchain applications may want to estimate the cost of using or op- erating a blockchain application. In the keynote, I will also discuss our cost estimation method.
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Ingo Weber
Software Architecture and Business Process Management research by the AAP team, Data61, CSIRO (Sydney Australia):
1. Architectural concerns of developing applications around Blockchain
2. Model-driven development for blockchain smart contracts
3. Business process execution on blockchain (details on one case of 2.)
Confidential Computing - Analysing Data Without Seeing DataMaximilian Ott
How can people collaborate over data analysis without disclosing their data to each other? This seminar will cover an end-to-end solution to this problem, including privacy preserving entity resolution and the application of partial homomorphic encryption and Rademacher observations to private linear classification tasks.
In particular we will show that it is possible to learn from data, while keeping the data confidential, both with and without the entity resolution step. We will give a brief overview of potential applications and give some practical examples of how these approaches can be used.
Blockchain: Background and Data61 Research OverviewIngo Weber
My keynote slides at the Korean National Blockchain Conference, giving an overview of our research in Software Architecture, Model-Driven Engineering, Dependability / Availability, and Business Process Execution in the context of Blockchain.
Software Architecture and Model-Driven Engineering for BlockchainIngo Weber
This talk was given at the August SydEthereum meetup, and gives an overview of our Blockchain research (Data61, CSIRO). The focus is on Software Architecture and Model-Driven Engineering. In addition to some approaches and tooling, it mentions some of the empirical work on availability of write transactions on Ethereum.
Blockchain and Services – Exploring the LinksIngo Weber
In this keynote talk, given at the ASSRI Symposium 2018, I explore four different facets of the relationship between Blockchain and Services.
First, application-level service interfaces for interaction with Blockchain-based applications enable easy integration with existing infrastructure. Second, service composition can be achieved through smart contracts, and enable different approaches to orchestrations and choreographies. Third, Blockchain-aaS offerings cover infrastructure operation, but can go beyond that. And finally, microservice principles can be applied to smart contract design.
Analysing Data from Blockchains - Keynote @ SOCCA 2020Ingo Weber
Keynote at the Symposium on Cryptocurrency Analysis (SOCCA 2020). Content:
In order to analyse how concrete blockchain systems as well as blockchain applications are used, data must be extracted from these systems. Due to various complexities inherent in blockchain, the question how to interpret such data is non-trivial. Such interpretation should often be shared among parties, e.g., if they collaborate via a blockchain. To this end, we devised an approach codify the interpretation of blockchain data, to extract data from blockchains accordingly, and to output it in suitable formats -- see https://arxiv.org/abs/2001.10281.
In addition, application developers and users of blockchain applications may want to estimate the cost of using or op- erating a blockchain application. In the keynote, I will also discuss our cost estimation method.
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Ingo Weber
Software Architecture and Business Process Management research by the AAP team, Data61, CSIRO (Sydney Australia):
1. Architectural concerns of developing applications around Blockchain
2. Model-driven development for blockchain smart contracts
3. Business process execution on blockchain (details on one case of 2.)
Confidential Computing - Analysing Data Without Seeing DataMaximilian Ott
How can people collaborate over data analysis without disclosing their data to each other? This seminar will cover an end-to-end solution to this problem, including privacy preserving entity resolution and the application of partial homomorphic encryption and Rademacher observations to private linear classification tasks.
In particular we will show that it is possible to learn from data, while keeping the data confidential, both with and without the entity resolution step. We will give a brief overview of potential applications and give some practical examples of how these approaches can be used.
Software Architecture and Model-driven Engineering for Blockchain ApplicationsIngo Weber
My keynote slides from the Second International Symposium on Foundations and Applications of Blockchain 2019 (FAB '19) and a talk I gave the day before at Google. In this talk, I'm giving an overview of our research in Software Architecture, Model-Driven Engineering, Dependability / Availability, and Business Process Execution in the context of Blockchain. It's a summary of our book: X. Xu, I. Weber, M. Staples, Architecture for Blockchain Applications, Springer 2019
Credit goes to Christopher B Ferris @christo4ferris who put together this presentation which covers the latest developments of Hyperledger Fabric made available in Fabric 1.1 and 1.2 and what can be expected next.
Introduction to Blockchain Governance ModelsGokul Alex
The presentation on the history and emergence of distributed consensus and the contemporary aspects of Blockchain Governance presented for the Global FinTech and Blockchain Forum organised by Pyramid Learning Platforms.
Webinar: Building end to-end solutions with Kaleido on AWS Kaleido
How to build complete blockchain solutions for the modern enterprise. We’ll show you:
* What components are required to rapidly build rich decentralized apps (DApps) integrated with the blockchain via convenient and reliable REST APIs.
* How on-chain events emitted by your Smart Contracts can be reliably connected to AWS Lambda functions, synchronized into AWS RDS based rich query databases, and streamed over AWS Kinesis to analytics.
* How your private data hosted in S3 buckets can be pinned to on-chain transactions using hashes and transferred across your business network with compression, end-to-end encryption Kafka based reliable delivery.
Includes common pitfalls to avoid and how you can accelerate innovation using pre-integrated enterprise tools and decentralized technologies. See what a true enterprise solution looks like and how to build it with an end-to-end demo highlighting a real-world use case.
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
Blockchain Application Design and Development, and the Case of Programmable M...Ingo Weber
Slides from my CLOSER 2021 keynote ( https://www.insticc.org/node/TechnicalProgram/closer/2021/presentationDetails/1390 )
Blockchain has emerged as a decentralized platform for managing digital assets and executing 'smart contracts', i.e., user-defined code. While blockchain's suitability for a given use case should always be scrutinized, it does have the potential to disrupt many of the connection points between individuals, companies, and government entities. In this keynote talk, I will provide an overview of what architects and developers need to know in order to build blockchain-based applications, and how it relates to the cloud and software services. Among others, I will cover blockchain-as-a-service concepts, as well as architectural concerns and model-driven engineering for blockchain applications, the latter also in relation to collaborative business processes. To highlight some of the challenges, I will discuss insights from a project on "programmable money", i.e., blockchain-based money for conditional payments where the money itself checks whether it can be spent in a certain way at the point of payment. Finally, I will touch on insights into current adoption of blockchain.
The term blockchain can elicit reactions from blank stare (from the majority of the general public) to evangelical fervour (from over-enthusiastic early adopters). The best known example of blockchain technology in action is the leading cryptocurrency Bitcoin, but there are many more use cases - think of blockchain as the 'operating system'.
Presentation from Grace Hopper Celebration 2016. Topic: Blockchain and Internet of Things (IoT) in the IBM Bluemix platform includes Demo. Speakers: Valerie Lampkin, Sumabala Nair and Carole Corley
Advanced Blockchain Technologies on Privacy & Scalability (All Things Open) Kaleido
(View presentation in full-screen mode for compatibility)
2019 is shaping up to be the pivotal point of broad adoption of blockchain technologies, thanks to the large amount of projects in the enterprise space. Among the top concerns of blockchain projects in the private sector and government alike are privacy and scalability. This talk will cover various technologies such as identity masking, data isolation, zero-knowledge proof, homomorphic encryption that helps keep private data protected from unintended parties, and technologies for improving scalability such as state/payment channels, sharding, and novel consensus algorithms.
Webinar presented live on May 17, 2017
Hyperledger is an open source collaborative effort created to advance cross-industry blockchain technologies. It is a global collaboration, hosted by The Linux Foundation, including leaders in finance, banking, IoT, supply chain, manufacturing and technology.
In this webinar, Dan O'Prey, CMO at Digital Asset and Chair of the Hyperledger Marketing Committee, and IBM’s Chris Ferris, chair of the Hyperledger Technical Steering Committee, will provide an overview of Hyperledger. They will discuss the basics of distributed ledger technologies, business use cases for blockchain, and how to get involved with Hyperledger projects.
To view a video recording, visit: http://www.cloud-council.org/webinars/the-hyperledger-project-advancing-blockchain-technology-for-business.htm
Block chain is probably one of the technologies that has the potential to disrupt several business models. We are looking at Graph Analytics of temporal Graphs can help us see how a block chain ledger, network and an account changes over time.
Software Architecture and Model-driven Engineering for Blockchain ApplicationsIngo Weber
My keynote slides from the Second International Symposium on Foundations and Applications of Blockchain 2019 (FAB '19) and a talk I gave the day before at Google. In this talk, I'm giving an overview of our research in Software Architecture, Model-Driven Engineering, Dependability / Availability, and Business Process Execution in the context of Blockchain. It's a summary of our book: X. Xu, I. Weber, M. Staples, Architecture for Blockchain Applications, Springer 2019
Credit goes to Christopher B Ferris @christo4ferris who put together this presentation which covers the latest developments of Hyperledger Fabric made available in Fabric 1.1 and 1.2 and what can be expected next.
Introduction to Blockchain Governance ModelsGokul Alex
The presentation on the history and emergence of distributed consensus and the contemporary aspects of Blockchain Governance presented for the Global FinTech and Blockchain Forum organised by Pyramid Learning Platforms.
Webinar: Building end to-end solutions with Kaleido on AWS Kaleido
How to build complete blockchain solutions for the modern enterprise. We’ll show you:
* What components are required to rapidly build rich decentralized apps (DApps) integrated with the blockchain via convenient and reliable REST APIs.
* How on-chain events emitted by your Smart Contracts can be reliably connected to AWS Lambda functions, synchronized into AWS RDS based rich query databases, and streamed over AWS Kinesis to analytics.
* How your private data hosted in S3 buckets can be pinned to on-chain transactions using hashes and transferred across your business network with compression, end-to-end encryption Kafka based reliable delivery.
Includes common pitfalls to avoid and how you can accelerate innovation using pre-integrated enterprise tools and decentralized technologies. See what a true enterprise solution looks like and how to build it with an end-to-end demo highlighting a real-world use case.
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
Blockchain Application Design and Development, and the Case of Programmable M...Ingo Weber
Slides from my CLOSER 2021 keynote ( https://www.insticc.org/node/TechnicalProgram/closer/2021/presentationDetails/1390 )
Blockchain has emerged as a decentralized platform for managing digital assets and executing 'smart contracts', i.e., user-defined code. While blockchain's suitability for a given use case should always be scrutinized, it does have the potential to disrupt many of the connection points between individuals, companies, and government entities. In this keynote talk, I will provide an overview of what architects and developers need to know in order to build blockchain-based applications, and how it relates to the cloud and software services. Among others, I will cover blockchain-as-a-service concepts, as well as architectural concerns and model-driven engineering for blockchain applications, the latter also in relation to collaborative business processes. To highlight some of the challenges, I will discuss insights from a project on "programmable money", i.e., blockchain-based money for conditional payments where the money itself checks whether it can be spent in a certain way at the point of payment. Finally, I will touch on insights into current adoption of blockchain.
The term blockchain can elicit reactions from blank stare (from the majority of the general public) to evangelical fervour (from over-enthusiastic early adopters). The best known example of blockchain technology in action is the leading cryptocurrency Bitcoin, but there are many more use cases - think of blockchain as the 'operating system'.
Presentation from Grace Hopper Celebration 2016. Topic: Blockchain and Internet of Things (IoT) in the IBM Bluemix platform includes Demo. Speakers: Valerie Lampkin, Sumabala Nair and Carole Corley
Advanced Blockchain Technologies on Privacy & Scalability (All Things Open) Kaleido
(View presentation in full-screen mode for compatibility)
2019 is shaping up to be the pivotal point of broad adoption of blockchain technologies, thanks to the large amount of projects in the enterprise space. Among the top concerns of blockchain projects in the private sector and government alike are privacy and scalability. This talk will cover various technologies such as identity masking, data isolation, zero-knowledge proof, homomorphic encryption that helps keep private data protected from unintended parties, and technologies for improving scalability such as state/payment channels, sharding, and novel consensus algorithms.
Webinar presented live on May 17, 2017
Hyperledger is an open source collaborative effort created to advance cross-industry blockchain technologies. It is a global collaboration, hosted by The Linux Foundation, including leaders in finance, banking, IoT, supply chain, manufacturing and technology.
In this webinar, Dan O'Prey, CMO at Digital Asset and Chair of the Hyperledger Marketing Committee, and IBM’s Chris Ferris, chair of the Hyperledger Technical Steering Committee, will provide an overview of Hyperledger. They will discuss the basics of distributed ledger technologies, business use cases for blockchain, and how to get involved with Hyperledger projects.
To view a video recording, visit: http://www.cloud-council.org/webinars/the-hyperledger-project-advancing-blockchain-technology-for-business.htm
Block chain is probably one of the technologies that has the potential to disrupt several business models. We are looking at Graph Analytics of temporal Graphs can help us see how a block chain ledger, network and an account changes over time.
Over 5 unique webinar sessions, we’ll share everything you need to know about transitioning to Office 365 and SharePoint Online. These webinars will feature actionable strategy, exemplified by real-world case studies, and practical game plans to help you develop a clear strategy for managing GxP content in the cloud.
The Compliance Playbook Webinar Series is geared towards those looking to migrate from file shares and other legacy EDMS systems - to becoming more agile with Office 365.
We'll take you through:
- Why are Life Sciences Organizations moving to Office 365
- Strategies for Conducting Vendor Assessments of Cloud Vendors
Validation in Office 365: Tools for Acceleration
- Validation in Office 365: Continuous Validation
- Maintaining Oversight for Complete Governance in Office 365
SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 4: Monitoring
Paper 3: Combined Error Propagation Analysis and Runtime Event Detection in Process-driven Systems
This presentation is row of demos that introduce how to use Application Insights, how it works and how to build your own application telemetry on top of it. Two surprise demos show audience some case studies how to use Application Insights to plan hosting of global web site and how to support sales and logistics departments in real-time.
Building a Real-Time Security Application Using Log Data and Machine Learning...Sri Ambati
Building a Real-Time Security Application Using Log Data and Machine Learning- Karthik Aaravabhoomi
- Powered by the open source machine learning software H2O.ai. Contributors welcome at: https://github.com/h2oai
- To view videos on H2O open source machine learning software, go to: https://www.youtube.com/user/0xdata
The adoption of container native and cloud native development practices presents new operational challenges. Today’s microservice environments are polyglot, distributed, container-based, highly-scalable, and ephemeral. To understand your system, you need to be able to follow the life of a request across numerous components distributed in multiple environments. Without the proper tools it can feel impossible to determine a root cause of an issue. This requires a new approach to operations. We will review a series of open source observability tools for logging, monitoring, and tracing to help developers achieve operational excellence for running container-based workloads.
In this session, we will help you use existing and recently launched services to automate configuration governance so that security is embedded in the development process. We outline four easy steps (Control, Monitor, Fix, and Audit) and demonstrate how different services can be used to meet your governance needs.
Elasticity and security are enabling enterprises to move highly regulated workloads to the AWS Cloud. However, given the sensitivity around this protected customer data, what newly released services can be implemented to remain secure and compliant? Find out in this session for Chief Security, Risk and Compliance Officers.
Speaker: Dave Walker, Security Solutions Architect, Amazon Web Services
Automatisierte Kontrolle und Transparenz in der AWS Cloud – Autopilot für Com...AWS Germany
Vortrag "Automatisierte Kontrolle und Transparenz in der AWS Cloud – Autopilot für Compliance Ihrer Cloud Ressourcen" von Philipp Behre beim AWS Cloud Web Day für Mittelstand und Großunternehmen. Alle Videos und Präsentationen finden Sie hier: http://amzn.to/1VUJZsT
Neev uses a scrum based Agile Development methodology, a proven Extended Delivery Center model of engagement - all designed to ensure high quality, timely deliverables.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteGoogle
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
👉👉 Click Here To Get More Info 👇👇
https://sumonreview.com/ai-pilot-review/
AI Pilot Review: Key Features
✅Deploy AI expert bots in Any Niche With Just A Click
✅With one keyword, generate complete funnels, websites, landing pages, and more.
✅More than 85 AI features are included in the AI pilot.
✅No setup or configuration; use your voice (like Siri) to do whatever you want.
✅You Can Use AI Pilot To Create your version of AI Pilot And Charge People For It…
✅ZERO Manual Work With AI Pilot. Never write, Design, Or Code Again.
✅ZERO Limits On Features Or Usages
✅Use Our AI-powered Traffic To Get Hundreds Of Customers
✅No Complicated Setup: Get Up And Running In 2 Minutes
✅99.99% Up-Time Guaranteed
✅30 Days Money-Back Guarantee
✅ZERO Upfront Cost
See My Other Reviews Article:
(1) TubeTrivia AI Review: https://sumonreview.com/tubetrivia-ai-review
(2) SocioWave Review: https://sumonreview.com/sociowave-review
(3) AI Partner & Profit Review: https://sumonreview.com/ai-partner-profit-review
(4) AI Ebook Suite Review: https://sumonreview.com/ai-ebook-suite-review
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
3. Book
DevOps: A Software Architect’s Perspective
3
Len Bass, Ingo Weber, Liming Zhu.
DevOps: A Software Architect’s
Perspective.
Addison Wesley, June 2015
http://dx.doi.org/10.1007/978-0-134-04984-7
4. • Gartner predicts:
• “… 80% of outages impacting mission-critical services will be caused by people and
process issues, and more than 50% of those outages will be caused by change /
configuration / release integration and hand-off issues.”
• The case of Knight Capital – from Wikipedia:
• The Knight Capital Group, the largest trader in U.S. equities on NYSE and NASDAQ,
made a trading error lost $460 million, which basically bankrupted them
• This took 45 minutes and was an upgrade error
• Confirmed by empirical studies
• Big data analytics application (Yuan, OSDI14) and cloud application (Gunawi, SoCC14)
performance issues are largely caused by operational protocols
Motivation: Dependability of Cloud
Operations
4
5. • Significantly shorter release cycles
• Continuous delivery/deployment: from months / scheduled downtime to hours / any time
• Etsy.com: 25 full deployments per day at 10 commits per deploy
• Baseline-based anomaly detection no longer works!
• Continuous changes
• Multiple sporadic operations at all times
• Scaling in/out, snapshot, migration, reconfiguration, (rolling) upgrade, cron-jobs, backup, recovery…
• Cloud uncertainty
• Limited visibility/monitoring, indirect control, small-scale failures are the norm
Challenges: Continuous Changes &
Uncertainty
5
6. A previous study found:
• Around 50% of application failures are not identifiable by
scanning logs for keywords / events that explicitly denote the
occurrence of failures [Pecchia, ISSRE 2012]
Using logs for error detection?
6
7. • Increasing dependability during Operation time e.g., through:
• More accurate performance monitoring
• Faster error detection
• Fast or autonomous healing (quick fix)
• Root cause diagnosis
• Guided or autonomous recovery
• Incorporating change-related knowledge into system management
• Knowledge about sporadic operation in Process-Oriented Dependability (POD): error detection and
diagnosis using process model & context
Our Approach – High-level View
7
8. POD: Process-Oriented Dependability
[insert hero image][insert hero image]
Start rolling upgrade task
Update launch
configuration
Sort instances
Status info
Rolling upgrade task
completed
Remove and deregister
old instance from ELB
New instance ready and
registered with ELB
Terminate old instance
Wait for ASG to start new
instance
Process Model
Conformance
Checking
Service
Assertion
Evaluation
Service
POD-Detection
Log line
Alert POD-
Diagnosis
Operation
tools
Log
agent
POD-
RecoveryAlert
MetricsMonitoring
Tools
Cause
Process Context
Discover
Log lines
POD-
Discovery
POD-Viz
Offline: training Online: error detection / diagnosis / recovery
8
11. Sporadic Operation Example:
Rolling Upgrade
Rolling upgrade: upgrade software on many virtual
machines without downtime or significant additional
cost
Example:
- 100 servers running in the cloud with version 1
software
- Upgrade 10 servers at a time to version 2 software
Potentially takes a long time to complete with errors
during the operation / other interfering operations
14
Start rolling upgrade task
Update launch
configuration
Sort instances
Status info
Rolling upgrade task
completed
Remove and deregister
old instance from ELB
New instance ready and
registered with ELB
Terminate old instance
Wait for ASG to start new
instance
12. System Monitoring During Rolling Upgrade
Standard anomaly detection raises lots of alerts
→ Operators switch it off during sporadic operations or
ignore the alerts
• Not a good idea if done 25x a day
15
14. POD-Detection: finding errors & anomalies
[insert hero image][insert hero image]
Start rolling upgrade task
Update launch
configuration
Sort instances
Status info
Rolling upgrade task
completed
Remove and deregister
old instance from ELB
New instance ready and
registered with ELB
Terminate old instance
Wait for ASG to start new
instance
Process Model
Conformance
Checking
Service
Assertion
Evaluation
Service
POD-Detection
Log line
Alert POD-
Diagnosis
Operation
tools
Log
agent
POD-
RecoveryAlert
MetricsMonitoring
Tools
Cause
Process Context
Discover
Log lines
POD-
Discover
POD-Viz
Log agent forwards log lines as they appear.
Monitoring metrics and Cloud APIs can be accessed
live.
Two error detection services:
• Assertion Evaluation
• Conformance Checking
17
15. POD-Detection: assertion evaluation
[insert hero image][insert hero image]
Start rolling upgrade task
Update launch
configuration
Sort instances
Status info
Rolling upgrade task
completed
Remove and deregister
old instance from ELB
New instance ready and
registered with ELB
Terminate old instance
Wait for ASG to start new
instance
Process Model
Conformance
Checking
Service
Assertion
Evaluation
Service
POD-Detection
Log line
Alert POD-
Diagnosis
Operation
tools
Log
agent
POD-
RecoveryAlert
MetricsMonitoring
Tools
Cause
Process Context
Discover
Log lines
POD-
Discover
POD-Viz
18
16. • Assertions check if the actual state at some point is the expected
state
• Coded against Cloud APIs – can find out the true state of resources directly
• Originally, assertions were coded manually based on our
understanding of the operations
• Low level assertion
• Instance i is terminated successfully
• High level assertion
• There are n instances running version x
Creating Assertions
19
17. Assertion Evaluation: how it works
Log line:
• Remove ...
• Terminate ...
• Wait ...
• New instance ...
Assertions:
• i has been de-registered from
ELB
• i has been removed from ASG
• i successfully terminated• i‘ successfully launched and is
registered with ELB
20
18. To identify and leverage the correlation between state of resources
with changes in cloud resources metrics in order to:
• Identify the logs that are handling changes in resources
• Predict the expected behavior of changes in system.
• Exploit above outcome for runtime anomaly detection
➔ ISSRE Best Paper Award
Automatic Assertion Derivation
21
20. • Identify the main factors affecting a resource
• Identify the log events that have the most important influence on
changing the state of a system resource.
• Metric selection: which of the 100s of metrics are relevant?
• Extract a prediction formula
• Derived a formula that could be used to estimate the value of a
variable that associated to a system’s resource with an acceptable
range of error
• Derive assertion specification based on above
Correlation between Logs and Resources
23
21. POD-Detection: conformance checking
[insert hero image][insert hero image]
Start rolling upgrade task
Update launch
configuration
Sort instances
Status info
Rolling upgrade task
completed
Remove and deregister
old instance from ELB
New instance ready and
registered with ELB
Terminate old instance
Wait for ASG to start new
instance
Process Model
Conformance
Checking
Service
Assertion
Evaluation
Service
POD-Detection
Log line
Alert POD-
Diagnosis
Operation
tools
Log
agent
POD-
RecoveryAlert
MetricsMonitoring
Tools
Cause
Process Context
Discover
Log lines
POD-
Discover
POD-Viz
24
22. • From logs to models
• Example:
Log:
• (a,b,c,d)
• (a,c,b,d)
• (a,e,d)
Process Mining Basics:
Process Discovery
Model:
25
23. • Compare: log vs. model
• Base criterion: fitness
• “Does the log fit the model and vice versa?”
Process Mining Basics:
Conformance Checking
?
26
24. • 3 levels of CC:
• Basic CC
• Detecting numerical invariants
• Detecting timing anomalies
• Any errors / anomalies detected: raise alert
• All results visualized through POD-Viz
Conformance Checking (CC) approach
Retrieve log
data
Basic
conformance
checking
Detect num.
invariant
violations
Detect
timing
anomalies
Visualize
results
(POD-Viz)
27
25. Basic CC: how it works
Log lines:
• Remove ...
• Terminate ...
• Wait ...
• Terminate ...???
Raise alert
Error count +1
28
26. Basic conformance checking: outcomes
• Conformance checking can detect the following types of errors:
• Unknown / error log line: a log line that corresponds to a known error, or is
simply unknown.
• Unfit: a log line corresponds to a known activity, but said activity should not
happen in the current execution state of the process instance.
• All other log lines are deemed fit
• Goal: 100% fit, else raise alert
• Learn from false alerts → improve classification and/or model
29
27. Advanced CC 2: timing anomalies
• Offline:
• Build precise timing profiles for activities
• Derive anomaly intervals from timing profiles for y% most unlikely timing
• Import into CC for timing anomaly checking
• Online:
• CC checks timing & raises alerts
31
X
28. • Non-intrusive, near real time error detection
• API-based assertion evaluation uses AWS services so it takes some overhead – in the order of sec
• Conformance checking is very fast, ~10ms
• Log-metric correlation accuracy may increase over time – best trade-off for AWS we found 1 min
TW
• API-based assertion evaluation detects previously discovered / known errors
(regression)
• Conformance checking detects any error that causes non-conformance, numerical
invariant violation, or timing anomalies
• Previously discovered or not
• Per subprocess instance, highly precise
• Behavioral log analysis, taken to a new level
• Log-metric correlation is based on historic data
• No labels needed, but needs # of no-failure cases >> # of failure cases
Error Detection Discussion
32
29. Recent study: process mining for error
detection in presence of noise
https://doi.org/10.1016/j.knosys.2019.105054
• Applying POD for application monitoring
• Core idea: low-effort application of POD to application logs for error detection
• “Blindly” learn process models
• At runtime: check if behavior conforms to the models
• Test impact of uncertainty of logs, e.g., missing events and residual noise
33
30. Recent study: process mining for error
detection in presence of noise
• Evaluation on 55,462 execution traces from three independent real-life
applications: Apache Web Server, Open DDS, and MySQL DBMS
• Comparative evaluation with expert system (baseline)
• Main findings:
• All failures detected by the expert system are detected also by conformance checking
• Conformance checking infers
many additional failures that
are missed by the expert system
• Correct executions of an
application might not conform
to its normative model
• Noise in process models
contributes to improved
precision of conformance
checking, mostly with an
acceptable loss of recall
34
32. Book:
Architecture for Blockchain Applications
Xiwei Xu, Ingo Weber, Mark Staples.
Architecture for Blockchain Applications.
Springer, 2019.
http://dx.doi.org/10.1007/978-3-030-03035-3
36
33. Blockchain 2nd gen – Smart Contracts
37
• 1st gen blockchains: transactions are financial transfers
• From 2nd gen: blockchains can do that, and
store/transact any kind of data
• Blockchains can deploy and execute programs: Smart Contracts
• User-defined code, deployed on and executed by whole
network
• Can enact decisions on complex business conditions
• Can hold and transfer assets, managed by the contract itself
• Ethereum: pay per assembler-level instruction
34. Decentralised Applications and Smart
Contracts Defined
• Smart contracts
• …are programs deployed as data and executed in transactions on the blockchain
• Blockchain can be a computational platform (more than a simple distributed database)
• Code is deterministic and immutable once deployed
• Can invoke other smart contracts
• Can hold and transfer digital assets
• Decentralized applications or dapps
• Main functionality is implemented through smart contracts
• Backend is executed in a decentralized environment
• Frontend can be hosted as a web site on a centralized server
• Interact with its backend through an API
• Could use decentralized data storage such as IPFS
• “State of the dapps” is a directory recorded on blockchain:
https://www.stateofthedapps.com/
38
35. Blockchain-based Application
• A blockchain-based application (or just blockchain application)
makes significant use of blockchain
• dapps are an example, but the concept is far broader
• significant portions of such applications can be based on traditional systems.
• Globally, many financial services companies, enterprises, startups,
and governments are exploring suitable applications
• Areas include supply chain, electronic health records, voting, energy
supply, ownership management, and protecting critical civil
infrastructure
• By now, almost all industry sectors have explored blockchain use
39
37. We (Will) Rely on Blockchain-Based Systems
• Smart contract bugs: DAO ($60M); Parity ($280M)
• Cryptographic key loss
• Hacking: Mt Gox ($450M), Bitfinex ($72M), total Jan-Sep 2018 ($927M);
UK rubbish tip ($146M); guns e.g. NYC ($1.8M)
• Huge future economic value (the main point!)
• e.g. supply chain, asset registries, settlement, energy, …
• Security-critical and Safety-critical use cases
• e.g. e-health records, food safety, pharma supply chain,
IoT management, cybersecurity, law enforcement, …
38. Dependability and Security Attributes
Source: “Basic concepts and taxonomy of dependable and secure computing”
https://www.nasa.gov/pdf/636745main_day_3-algirdas_avizienis.pdf
Dependability Security
Confidentiality
Maintainability
Integrity
Safety
Availability
Reliability
42
39. Non-Functional Trade-Offs
• Compared to conventional databases & script engines,
blockchains have:
(-) Confidentiality, Privacy
(+) Integrity, Non-repudiation
(+ read/ - write) Availability
(-) Modifiability
(-) Throughput / Scalability / Big Data
(+ read/ - write) Latency
Security: combination of
CIA properties
41. ISO/IEC 25010:2011
Security Characteristics
• Integrity
• degree to which a system, product or component prevents unauthorized access to,
or modification of, computer programs or data
• Confidentiality
• degree to which a product or system ensures that data are accessible only to those
authorized to have access
• Non-repudiation
• degree to which actions or events can be proven to have taken place, so that the
events or actions cannot be repudiated later
• Accountability
• degree to which the actions of an entity can be traced uniquely to the entity
• Authenticity
• degree to which the identity of a subject or resource can be proved to be the one
claimed
(ISO/IEC 5010:2011 treats Availability as a “Reliability” characteristic)
Only good
writes & deletes
Only good reads
Undeniable
You did it!
Not fake
42. Integrity for Blockchain Platforms
• Clark-Wilson perspective on blockchain integrity
• Blockchain ledger is the system state and the audit log
• Blocks and their transactions are the “Constrained Data Items”
• Initial state: genesis block is well-formed & cross-checked by all miners
• Mining and cross-checking other miners’ blocks is the “Transformation Procedure”
• Miners’ block validation checks are the “Integrity Validation Procedure”
• Authorisation is checked using signatures from public-key cryptography
• No authentication on public blockchains! Often important on private blockchains
• No separation of duty enforced?
• “Admin changes” are by the mining collective, e.g. hard forks
• Example integrity conditions
• Were transactions against an account address signed by corresponding private key?
• Does the sending address/account have enough cryptocurrency?
• Some platforms support other crypto-assets with different integrity conditions
• Did a miner give themselves the right mining reward?
• Did the execution recorded for a smart contract give the same result I get?
43. Confidentiality
• ISO/IEC 25010:2011: “degree to which a product or system ensures that data
are accessible only to those authorized to have access”
• Blockchain platforms are not good for confidentiality, because mining nodes
cross-check contents of all transactions
• Not just the plain data, also need to be concerned with re-identification
attacks, patterns from transaction analytics, and graph datamining
• Identity of parties?
• Transaction volume?
• Transaction meta-data?
• e.g. characteristic patterns in time-of-day for transactions, geolocation of source IP
addresses of submitted transactions
44. Non-Repudiation
• ISO/IEC 25010:2011: “degree to which actions or events can be proven to
have taken place, so that the events or actions cannot be repudiated later”
• Main support is from blockchain’s immutable ledger
• But be careful of probabilistic immutability in Nakamoto consensus; use the right
number of confirmation blocks for your application’s risk profile
• Some support from public key signatures for transactions
• Just because data is recorded on-chain, doesn’t mean it’s true!
• Someone might have stolen my private key?
• Sender might have fraudulently recorded false data in a transaction
• Blockchain only provides non-repudiation that the transaction happened
• If using hashes on-chain for off-chain data, need to retain original data
45. ISO/IEC 25010:2011
Reliability Characteristics
• Reliability
• degree to which a system, product or component performs specified functions under
specified conditions for a specified period of time
• Availability
• degree to which a system, product or component is operational and accessible when
required for use
• Recoverability
• degree to which, in the event of an interruption or a failure, a product or system can recover
the data directly affected and re-establish the desired state of the system
• Maturity
• degree to which a system, product or component meets needs for reliability under normal
operation
• Fault-Tolerance
• degree to which a system, product or component operates as intended despite the presence
of hardware or software faults
46. Availability
• ISO/IEC 25010:2011: “degree to which a system, product or
component is operational and accessible when required for use”
• A measure could be something like “probability of being able to provide
service at any given time” or “
• Affected by the other reliability characteristics, such as probability of failure,
fault tolerance, time to recovery, etc
• Blockchain platform is highly redundant (many nodes)
• Easy to subscribe to updates to get replicas of the ledger
• An application can run many redundant blockchain nodes locally
→ high read availability
• Write availability is a different story…
47. Availability (SRDS 2017)
• Potential issue: block gas limit (≈size of a block on Ethereum)
• Gas limit is set by miners through “voting”
• The sum of Gas of all transactions in a block must be less than the limit
• Response to DDoS attack: lower block gas limit
48. Availability (SRDS 2017)
• Potential issue: block gas limit (≈size of a block on Ethereum)
• Gas limit is set by miners through “voting”
• The sum of Gas of all transactions in a block must be less than the limit
• Response to DDoS attack: lower block gas limit
• Who would be affected by that?
49. Availability for Blockchain-Based
Applications
• A blockchain-based application has many components
• Even if the blockchain platform works, your other components may fail
• Use normal availability-increasing design strategies for the architecture,
for example…
• Increase quality of each component & connector
• High quality software and hardware (!)
• Eliminate single points of failure/ increase redundancy
• Load balancing/failover monitoring and routing
• Stateless server components
• Blockchain can help enable “stateless” server component (use blockchain to store the
state)
• Detect and recover from failures
• Hot backup/failover servers
50. Maturity (“Reliability”)
• ISO/IEC 25010:2011: “degree to which a system, product or
component meets needs for reliability under normal operation”
• My opinion: not a great name for this…
• Availability is about readiness for correct service
vs.
• Reliability is about continuity of correct service
• Previous discussion about availability for blockchain-based
applications applies here too
51. Process Mining / Analytics
• Process mining can be used to understand how clients and software
interact
• Also for blockchain applications and dapps
• But: understanding log data from blockchain is hard
• Two independent approaches, both presented at BPM 2019, tackle
the problem
• “Mining Blockchain Processes: Extracting Process Mining Data from
Blockchain Applications” → BPM Blockchain Forum 2019, best paper
• Can be used on any blockchain application, designed with process-awareness or not
• “Extracting Event Logs for Process Mining from Data Stored on the
Blockchain” → SPBP Workshop 2019
• Makes the assumption that the blockchain data was generated from executing a process
model
53. Thank you for your attention!
Behavioral Analytics and Blockchain
Applications – a Reliability View
Keynote, RSDA 2019
Prof. Dr. Ingo Weber | Oct. 2019
ingo.weber@tu-berlin.de | linkedin.com/in/ingomweber/ | Twitter: @ingomweber