Melissa McKay is an advocate for unconference events and discusses the simple rules that maximize their value: whoever attends are the right people, timing is flexible, accepting what happens, location doesn't matter, and sessions end naturally. She summarizes an unconference as allowing people who care about a topic to self-organize discussions without traditional meeting controls. The document then provides links to various unconference events organized by McKay.
WTF is a Microservice - Rafael Schloming, DatawireAmbassador Labs
Rafael Schloming, Chief Architect at Datawire and AMQP spec author breaks down an understanding of microservices into People, Processes, and Technology, and when adopting microservices recommends starting with People first, rather than starting with Technology.
.NET Fest 2019. Eran Stiller. 6 Lessons I Learned on My Journey from Monolith...NETFest
For the past couple of years it seems that Microservices is all the rage. We want to use Microservices, we want to decompose into Microservices and we want Microservices to be a part of our world. While modern tools and platforms such as Docker, Kubernetes, Service Mesh and the public cloud help in implementing and maintaining such systems, the reality is that many fail even before the first line of code was written. This can happen for many reasons; Perhaps you chose a Microservices architecture for the wrong reasons? Maybe the organization wasn't ready for it? Or just possibly - the proposed architecture didn't embrace the true meaning of Microservices?
As the CTO of a software services company I get tackle these questions a lot. Join me in this session as I provide my perspective on transitioning from Monolith to Microservices through lessons learned in the real world, while architecting and implementing multiple Microservices based software systems at various customers.
How do effective large-scale service ecosystems work? Keynote Presentation at Istanbul Tech Talks 2018
How to Design Services
* Systems of record
* Interface specification
* Interface backward / forward compatibility
Service Ecosystems
* Layered services
* "Standardization" through encouragement
* Vendor-customer relationships between teams
Operating and Deploying Services
* Data Migration
* Automated Pipelines
* Incremental Deployment
* Feature Flags
You have successfully developed and deployed your microservices architecture, but you find that managing communication between your services and containers is becoming more complex and clumsy as you scale. This talk will begin with a definition of "service mesh" and what potential roles it can play in your microservices architecture.
We'll explore the pros and cons of the following popular service mesh implementations: Istio, Linkerd, Conduit. I'll touch on the differences in the ease of implementation, integration with existing monitoring solutions, traffic flow, and service-to-service authentication. After this talk, you will be able to make an informed decision on the best service mesh architecture to implement in your environment.
The working architecture of node js applications open tech week javascript ...Viktor Turskyi
We launched more than 60 projects, developed a web application architecture that is suitable for projects of completely different sizes. In the talk, I'll analyze this architecture, will consider the question what to choose “monolith or microservices”, will show the main architectural mistakes that developers make.
The working architecture of NodeJS applications, Виктор ТурскийSigma Software
The document discusses the working architecture of NodeJs applications. It begins by introducing the speaker Viktor Turskyi and his experience. It then discusses why architecture is important and shares their battle-tested approach. The presentation addresses whether to use monolith or microservices architectures, and recommends starting with a monolith in most cases. It also discusses domain models, services, and controllers. The presentation provides an example of a service class and user registration process to demonstrate the architecture in practice.
Scaling and Orchestrating Microservices with OSGi - N Bartlettmfrancis
This document discusses how OSGi services can be used to implement microservices and enable their orchestration and scaling. It describes how OSGi services have supported capabilities like runtime assembly, software components, and continuous delivery since before the term "microservices" was coined. The document argues that OSGi services align with many characteristics of microservices, like independent deployability, but with OSGi additionally enforcing encapsulation where discipline is needed with other approaches. It also discusses how OSGi remote services and discovery allow services to be scaled horizontally across processes and machines while enabling dynamic availability and pluggability. The document demonstrates these concepts with an OSGi-based microservices orchestration platform.
Ledingkart Meetup #1: Monolithic to microservices in actionMukesh Singh
This document summarizes a talk about moving from a monolithic architecture to microservices. It discusses what microservices are, examples of large companies that adopted microservices like Amazon and Netflix, and the monolithic problems at Lendingkart. It then describes how Lendingkart broke up its monolith into multiple microservices for different functions. Some challenges of microservices like distributed tracing and increased operations overhead are also outlined. Best practices for adopting microservices like incremental adoption and clear interfaces are also provided.
WTF is a Microservice - Rafael Schloming, DatawireAmbassador Labs
Rafael Schloming, Chief Architect at Datawire and AMQP spec author breaks down an understanding of microservices into People, Processes, and Technology, and when adopting microservices recommends starting with People first, rather than starting with Technology.
.NET Fest 2019. Eran Stiller. 6 Lessons I Learned on My Journey from Monolith...NETFest
For the past couple of years it seems that Microservices is all the rage. We want to use Microservices, we want to decompose into Microservices and we want Microservices to be a part of our world. While modern tools and platforms such as Docker, Kubernetes, Service Mesh and the public cloud help in implementing and maintaining such systems, the reality is that many fail even before the first line of code was written. This can happen for many reasons; Perhaps you chose a Microservices architecture for the wrong reasons? Maybe the organization wasn't ready for it? Or just possibly - the proposed architecture didn't embrace the true meaning of Microservices?
As the CTO of a software services company I get tackle these questions a lot. Join me in this session as I provide my perspective on transitioning from Monolith to Microservices through lessons learned in the real world, while architecting and implementing multiple Microservices based software systems at various customers.
How do effective large-scale service ecosystems work? Keynote Presentation at Istanbul Tech Talks 2018
How to Design Services
* Systems of record
* Interface specification
* Interface backward / forward compatibility
Service Ecosystems
* Layered services
* "Standardization" through encouragement
* Vendor-customer relationships between teams
Operating and Deploying Services
* Data Migration
* Automated Pipelines
* Incremental Deployment
* Feature Flags
You have successfully developed and deployed your microservices architecture, but you find that managing communication between your services and containers is becoming more complex and clumsy as you scale. This talk will begin with a definition of "service mesh" and what potential roles it can play in your microservices architecture.
We'll explore the pros and cons of the following popular service mesh implementations: Istio, Linkerd, Conduit. I'll touch on the differences in the ease of implementation, integration with existing monitoring solutions, traffic flow, and service-to-service authentication. After this talk, you will be able to make an informed decision on the best service mesh architecture to implement in your environment.
The working architecture of node js applications open tech week javascript ...Viktor Turskyi
We launched more than 60 projects, developed a web application architecture that is suitable for projects of completely different sizes. In the talk, I'll analyze this architecture, will consider the question what to choose “monolith or microservices”, will show the main architectural mistakes that developers make.
The working architecture of NodeJS applications, Виктор ТурскийSigma Software
The document discusses the working architecture of NodeJs applications. It begins by introducing the speaker Viktor Turskyi and his experience. It then discusses why architecture is important and shares their battle-tested approach. The presentation addresses whether to use monolith or microservices architectures, and recommends starting with a monolith in most cases. It also discusses domain models, services, and controllers. The presentation provides an example of a service class and user registration process to demonstrate the architecture in practice.
Scaling and Orchestrating Microservices with OSGi - N Bartlettmfrancis
This document discusses how OSGi services can be used to implement microservices and enable their orchestration and scaling. It describes how OSGi services have supported capabilities like runtime assembly, software components, and continuous delivery since before the term "microservices" was coined. The document argues that OSGi services align with many characteristics of microservices, like independent deployability, but with OSGi additionally enforcing encapsulation where discipline is needed with other approaches. It also discusses how OSGi remote services and discovery allow services to be scaled horizontally across processes and machines while enabling dynamic availability and pluggability. The document demonstrates these concepts with an OSGi-based microservices orchestration platform.
Ledingkart Meetup #1: Monolithic to microservices in actionMukesh Singh
This document summarizes a talk about moving from a monolithic architecture to microservices. It discusses what microservices are, examples of large companies that adopted microservices like Amazon and Netflix, and the monolithic problems at Lendingkart. It then describes how Lendingkart broke up its monolith into multiple microservices for different functions. Some challenges of microservices like distributed tracing and increased operations overhead are also outlined. Best practices for adopting microservices like incremental adoption and clear interfaces are also provided.
Do You Need a Service Mesh? @ London Devops, January 2019Matt Turner
Service meshes are cool, but are they useful? We'll explore what a service mesh is and what they can do for your microservices. Are the claims of observability, resiliency, and WAF features real? Are they useful during development, production, or both? Using pictures and demos, we'll find out!
What is a Service Mesh and what can it do for your MicroservicesMatt Turner
e’ll explore what a service mesh is and what it can do for your microservices. Are the claims of observability, resiliency, and WAF features real? Are they useful during development, production, or both? Using pictures and demos, we’ll find out!
This session will also briefly cover how a service mesh works, giving us a mental model with which to explore and evaluate after the talk. Matt will show a simple installation and demo, giving us all the knowledge to go home and try for ourself.
1) The document discusses a presentation about Go and microservices given by Andrea Di Persio, a backend engineer at SoundCloud.
2) It covers an introduction to Go as a programming language, how SoundCloud uses Go and microservices in their infrastructure and applications, and how SoundCloud implements microservices using Go.
3) Some benefits of using Go and microservices at SoundCloud include isolated services that are easier to reason about and deploy independently while still being able to experiment and take ownership of specific domains.
Viktor Turskyi "Effective NodeJS Application Development"Fwdays
For 15 years in development, I managed to take part in the creation of a large number of various projects. I have already made a number of talks on the working architecture of Web applications, but this is only part of the efficient development puzzle. We will consider the whole process from the start of the project to its launch in production. I’ll tell you how we approach the ideas of the “12 Factor App”, how we use the docker, discuss environment deployment issues, security issues, testing issues, discuss the nuances of SDLC and much more.
WSO2Con USA 2015: Jump-Starting Middleware ServicesWSO2
In this presentation we will take a look at the NYU’s year long journey into design and implementation of middleware services. We will take a use case — Profile service, and walk through the challenges that we faced and small wins we had during our journey. Profile service provided an implementable use case for NYU while providing the technology team an opportunity to work with many products within WSO2. We will showcase the service that we built utilizing WSO2 and integration(s) with incumbent Identity management systems.
Not my problem - Delegating responsibility to infrastructureYshay Yaacobi
Slides for for my talk, appeared on Code-Europe Poznan 12.06.2018
(https://www.codeeurope.pl/en/speakers/yshay-yaacobi)
https://github.com/yshayy/not-my-problem-talk
https://github.com/Yshayy/not-my-problem-talk/blob/master/slides/demo.md
Network Automation Journey, A systems engineer NetOps perspectiveWalid Shaari
Network devices play a crucial role; they are not just in the Data Center. It's the Wifi, VOIP, WAN and recently underlays and overlays. Network teams are essential for operations. It's about time we highlight to the configuration management community the importance of Network teams and include them in our discussions. This talk describes the personal experience of systems engineer on how to kickstart a network team into automation. Most importantly, how and where to start, challenges faced, and progress made. The network team in question uses multi-vendor network devices in a large traditional enterprise.
NetDevOps, we do not hear that term as frequent as we should. Every time we hear about automation, or configuration management, it is usually the application, if not, it is the systems that host the applications. How about the network systems and devices that interconnect and protects our services? This talk aims to describe the journey a systems engineer had as part of an automation assignment with the network management team. Building from lessons learned and challenges faced with system automation, how one can kickstart an automation project and gain small wins quickly. Where and how to start the journey? What to avoid? What to prioritise? How to overcome the lack of network skills for the automation engineer and lack of automation and Linux/Unix skills for network engineers. What challenges were faced and how to overcome them? What fights to give up? Where do I see network automation and configuration management as a systems engineer? What are the status quo and future expectations?
Open Source Secret Sauce - Lugor Sep 2011Ted Husted
The document discusses the "Open Source Secret Sauce" - how open source projects are able to create compelling software through a volunteer model. It explains that open source projects use portals, repositories, issue trackers, mailing lists, and automated builds (PRIMA) to coordinate work. The Apache Software Foundation is provided as a successful example, with its meritocratic process allowing developers to do work and make decisions through consensus-based voting. The opportunity for open source is that it can produce successful software to solve problems like failed commercial projects.
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...Javier García Magna
Good technical practices you can follow with (micro)services but can be applied to almost anything: discovery (microphone/consul), security, resilience (polly), composition, ssecurity (jwt/oauth2)... And then an example with a CQRS application, and how docker can be used in Windows 2016. Lastly a brief summary of what Service Fabric is and its programming models.
Many companies are looking for "DevOps'' in many forms, but what kind of skills or experiences are actually needed? I’ll debunk some of the myths surrounding what recruiters or internet lurkers might tell you and find out if you might actually have an aptitude for Site Reliability or Infrastructure Engineering. If so, what might be good knowledge areas to get started with? And if learning leads to an interview, what might that look like?
Interconnection Automation For All - Extended - MPS 2023Chris Grundemann
Matt "Grizz" Griswold and Chris Grundemann are both IX founders, internetworking experts, and automation proponents. With over 4 decades of combined experience they are now turning to sharing what they've learned about automating BGP and interconnection through a set of open source tools, along with support and services for those that need it.
This talk will share what they have learned both from personal experience as well as through dozens of recent interviews with IX operators and interconnection engineers over the past several months. Including common challenges, productive methodologies, and best practices.
The highlight of the talk will be announcing and describing two open source automation tools built to make interconnection and BGP easier for everyone. One is ixCtl, which is built to automate the most common and problematic tasks involved in running an internet exchange point, particularly configuring and managing secure route servers. The other is PeerCtl, which is built to automate the most common and problematic tasks involved in interconnecting an AS; from bilateral and multilateral peering to PNI and also transit connections.
Code for both (along with several other tools) is available on GitHub: https://github.com/fullctl.
Speaker: Chris Grundemann
Speaker: Matt Griswold
"The working architecture of NodeJs applications" Viktor TurskyiJulia Cherniak
I've seen a lot of NodeJs applications. I see a lot of misunderstandings around architectural patterns. 99% of NodeJS tutorials do not cover this topic and limited to "hello world" apps. How to build a really large application? How to think about architectural layers? What is wrong with the majority of JS frameworks? How does GraphQL influence my architecture? I will answer all of these questions.
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential_e
Can we spend less on IT, work less, but accomplish more?
Join us at The Ritz to discover how Exponential-e’s innovative hybrid services combine the best of traditional IT competencies, with world leading connectivity, Cloud and communication services - and make the impossible, possible.
Our CEO, Lee Wade, will be amongst a selection of key speakers, who will share their views on how innovations in Cloud services can be combined with advanced networking technology and service provider experience to deliver the real benefits businesses have been seeking.
We'll seek to explain how you can spend less on IT, work less and still accomplish more. We'll demonstrate why your Cloud is only as good as your network, and how you can transition to the Cloud efficiently and securely.
Seems too good to be true? Come and see for yourself.
View our Cloud video and more on YouTube: https://www.youtube.com/user/Exponentialltd
From Monoliths to Services: Paying Your Technical DebtTechWell
This document discusses transitioning from monolithic applications to microservices and serverless architectures. It begins by defining technical debt and explaining how microservices can help pay it down incrementally. It then covers different architectural styles like monoliths and microservices. The rest of the document discusses moving to cloud infrastructure, breaking apart monolithic applications into independent services, communication between services, leveraging third-party services, and security considerations for microservices.
'Effective node.js development' by Viktor Turskyi at OdessaJS'2020OdessaJS Conf
How to develop NodeJS apps effectively? I will tell you all details and share his personal experience on the whole process: from the very start and up to the production stage.
You will also learn more about Docker, SDLC and 12 Factor App. Save the date!
NewsCred Dhaka hosted an interactive session on MircroServices. The main focus of the event was to provide a platform for people to share their experiences, understand the architecture and hear about the challenges and benefits of continuous deployment.
Presenters: Asif Rahman (CTO), Brian Schmitz (Director of Engineering), Rana Khandakar (Lead Software Engineer), Ashrafuzzaman Jitu (Engineering Manager), and Zahiduzzaman Setu (Senior Software Engineer), as they share their experiences with MicroServices and in the process find out if it is right for you.
These are my summarized notes from all the microservices session I attended at QCon 2015. These sessions had tons of learning around how to scale microservices and avoid common pitfalls
The document summarizes a Hyperledger meetup event in Coral Gables, Florida. It includes:
- An agenda for the event with introductions, presentations on Hyperledger and local blockchain groups, and startup pitches.
- Details on the panelists which include representatives from Hyperledger, KPMG, local blockchain companies and a law firm.
- Information on three startups that will be pitching: 8base, Bushido Lab, and Coinplan.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Do You Need a Service Mesh? @ London Devops, January 2019Matt Turner
Service meshes are cool, but are they useful? We'll explore what a service mesh is and what they can do for your microservices. Are the claims of observability, resiliency, and WAF features real? Are they useful during development, production, or both? Using pictures and demos, we'll find out!
What is a Service Mesh and what can it do for your MicroservicesMatt Turner
e’ll explore what a service mesh is and what it can do for your microservices. Are the claims of observability, resiliency, and WAF features real? Are they useful during development, production, or both? Using pictures and demos, we’ll find out!
This session will also briefly cover how a service mesh works, giving us a mental model with which to explore and evaluate after the talk. Matt will show a simple installation and demo, giving us all the knowledge to go home and try for ourself.
1) The document discusses a presentation about Go and microservices given by Andrea Di Persio, a backend engineer at SoundCloud.
2) It covers an introduction to Go as a programming language, how SoundCloud uses Go and microservices in their infrastructure and applications, and how SoundCloud implements microservices using Go.
3) Some benefits of using Go and microservices at SoundCloud include isolated services that are easier to reason about and deploy independently while still being able to experiment and take ownership of specific domains.
Viktor Turskyi "Effective NodeJS Application Development"Fwdays
For 15 years in development, I managed to take part in the creation of a large number of various projects. I have already made a number of talks on the working architecture of Web applications, but this is only part of the efficient development puzzle. We will consider the whole process from the start of the project to its launch in production. I’ll tell you how we approach the ideas of the “12 Factor App”, how we use the docker, discuss environment deployment issues, security issues, testing issues, discuss the nuances of SDLC and much more.
WSO2Con USA 2015: Jump-Starting Middleware ServicesWSO2
In this presentation we will take a look at the NYU’s year long journey into design and implementation of middleware services. We will take a use case — Profile service, and walk through the challenges that we faced and small wins we had during our journey. Profile service provided an implementable use case for NYU while providing the technology team an opportunity to work with many products within WSO2. We will showcase the service that we built utilizing WSO2 and integration(s) with incumbent Identity management systems.
Not my problem - Delegating responsibility to infrastructureYshay Yaacobi
Slides for for my talk, appeared on Code-Europe Poznan 12.06.2018
(https://www.codeeurope.pl/en/speakers/yshay-yaacobi)
https://github.com/yshayy/not-my-problem-talk
https://github.com/Yshayy/not-my-problem-talk/blob/master/slides/demo.md
Network Automation Journey, A systems engineer NetOps perspectiveWalid Shaari
Network devices play a crucial role; they are not just in the Data Center. It's the Wifi, VOIP, WAN and recently underlays and overlays. Network teams are essential for operations. It's about time we highlight to the configuration management community the importance of Network teams and include them in our discussions. This talk describes the personal experience of systems engineer on how to kickstart a network team into automation. Most importantly, how and where to start, challenges faced, and progress made. The network team in question uses multi-vendor network devices in a large traditional enterprise.
NetDevOps, we do not hear that term as frequent as we should. Every time we hear about automation, or configuration management, it is usually the application, if not, it is the systems that host the applications. How about the network systems and devices that interconnect and protects our services? This talk aims to describe the journey a systems engineer had as part of an automation assignment with the network management team. Building from lessons learned and challenges faced with system automation, how one can kickstart an automation project and gain small wins quickly. Where and how to start the journey? What to avoid? What to prioritise? How to overcome the lack of network skills for the automation engineer and lack of automation and Linux/Unix skills for network engineers. What challenges were faced and how to overcome them? What fights to give up? Where do I see network automation and configuration management as a systems engineer? What are the status quo and future expectations?
Open Source Secret Sauce - Lugor Sep 2011Ted Husted
The document discusses the "Open Source Secret Sauce" - how open source projects are able to create compelling software through a volunteer model. It explains that open source projects use portals, repositories, issue trackers, mailing lists, and automated builds (PRIMA) to coordinate work. The Apache Software Foundation is provided as a successful example, with its meritocratic process allowing developers to do work and make decisions through consensus-based voting. The opportunity for open source is that it can produce successful software to solve problems like failed commercial projects.
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...Javier García Magna
Good technical practices you can follow with (micro)services but can be applied to almost anything: discovery (microphone/consul), security, resilience (polly), composition, ssecurity (jwt/oauth2)... And then an example with a CQRS application, and how docker can be used in Windows 2016. Lastly a brief summary of what Service Fabric is and its programming models.
Many companies are looking for "DevOps'' in many forms, but what kind of skills or experiences are actually needed? I’ll debunk some of the myths surrounding what recruiters or internet lurkers might tell you and find out if you might actually have an aptitude for Site Reliability or Infrastructure Engineering. If so, what might be good knowledge areas to get started with? And if learning leads to an interview, what might that look like?
Interconnection Automation For All - Extended - MPS 2023Chris Grundemann
Matt "Grizz" Griswold and Chris Grundemann are both IX founders, internetworking experts, and automation proponents. With over 4 decades of combined experience they are now turning to sharing what they've learned about automating BGP and interconnection through a set of open source tools, along with support and services for those that need it.
This talk will share what they have learned both from personal experience as well as through dozens of recent interviews with IX operators and interconnection engineers over the past several months. Including common challenges, productive methodologies, and best practices.
The highlight of the talk will be announcing and describing two open source automation tools built to make interconnection and BGP easier for everyone. One is ixCtl, which is built to automate the most common and problematic tasks involved in running an internet exchange point, particularly configuring and managing secure route servers. The other is PeerCtl, which is built to automate the most common and problematic tasks involved in interconnecting an AS; from bilateral and multilateral peering to PNI and also transit connections.
Code for both (along with several other tools) is available on GitHub: https://github.com/fullctl.
Speaker: Chris Grundemann
Speaker: Matt Griswold
"The working architecture of NodeJs applications" Viktor TurskyiJulia Cherniak
I've seen a lot of NodeJs applications. I see a lot of misunderstandings around architectural patterns. 99% of NodeJS tutorials do not cover this topic and limited to "hello world" apps. How to build a really large application? How to think about architectural layers? What is wrong with the majority of JS frameworks? How does GraphQL influence my architecture? I will answer all of these questions.
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential_e
Can we spend less on IT, work less, but accomplish more?
Join us at The Ritz to discover how Exponential-e’s innovative hybrid services combine the best of traditional IT competencies, with world leading connectivity, Cloud and communication services - and make the impossible, possible.
Our CEO, Lee Wade, will be amongst a selection of key speakers, who will share their views on how innovations in Cloud services can be combined with advanced networking technology and service provider experience to deliver the real benefits businesses have been seeking.
We'll seek to explain how you can spend less on IT, work less and still accomplish more. We'll demonstrate why your Cloud is only as good as your network, and how you can transition to the Cloud efficiently and securely.
Seems too good to be true? Come and see for yourself.
View our Cloud video and more on YouTube: https://www.youtube.com/user/Exponentialltd
From Monoliths to Services: Paying Your Technical DebtTechWell
This document discusses transitioning from monolithic applications to microservices and serverless architectures. It begins by defining technical debt and explaining how microservices can help pay it down incrementally. It then covers different architectural styles like monoliths and microservices. The rest of the document discusses moving to cloud infrastructure, breaking apart monolithic applications into independent services, communication between services, leveraging third-party services, and security considerations for microservices.
'Effective node.js development' by Viktor Turskyi at OdessaJS'2020OdessaJS Conf
How to develop NodeJS apps effectively? I will tell you all details and share his personal experience on the whole process: from the very start and up to the production stage.
You will also learn more about Docker, SDLC and 12 Factor App. Save the date!
NewsCred Dhaka hosted an interactive session on MircroServices. The main focus of the event was to provide a platform for people to share their experiences, understand the architecture and hear about the challenges and benefits of continuous deployment.
Presenters: Asif Rahman (CTO), Brian Schmitz (Director of Engineering), Rana Khandakar (Lead Software Engineer), Ashrafuzzaman Jitu (Engineering Manager), and Zahiduzzaman Setu (Senior Software Engineer), as they share their experiences with MicroServices and in the process find out if it is right for you.
These are my summarized notes from all the microservices session I attended at QCon 2015. These sessions had tons of learning around how to scale microservices and avoid common pitfalls
The document summarizes a Hyperledger meetup event in Coral Gables, Florida. It includes:
- An agenda for the event with introductions, presentations on Hyperledger and local blockchain groups, and startup pitches.
- Details on the panelists which include representatives from Hyperledger, KPMG, local blockchain companies and a law firm.
- Information on three startups that will be pitching: 8base, Bushido Lab, and Coinplan.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
1. Melissa McKay
● Mom
● Developer/Team Lead
● Emerging Speaker
● Self appointed UNConference
Advocate and Promoter:
JCrete (http://www.jcrete.org/)
JOnsen (http://jonsen.jp/)
JSpirit (https://jspirit.org)
JAlba (https://jalba.scot)
LavaOne/UnVoxxed Hawaii (https://voxxeddays.com/hawaii/)
2. Simple Rules
To maximize what you can get out of the unconference, simple rules apply. Wikipedia summarizes them nicely:
1. Whoever shows up are the right people
…reminds participants that they don’t need the CEO and 100 people to get something done, you need people who care.
And, absent the direction or control exerted in a traditional meeting, that’s who shows up in the various breakout sessions
of an Open Space meeting.
2. Whenever it starts is the right time
…reminds participants that spirit and creativity do not run on the clock.
3. Whatever happens is the only thing that could have
…reminds participants that once something has happened, it’s done—and no amount of fretting, complaining or otherwise
rehashing can change that. Move on.
4. Wherever it happens is the right place
…reminds participants that space is opening everywhere all the time. Please be conscious and aware.
5. When it’s over, it’s over
…reminds participants that we never know how long it will take to resolve an issue, once raised, but that whenever the
issue or work or conversation is finished, move on to the next thing. Don’t keep rehashing just because there’s 30 minutes
left in the session. Do the work, not the time.
http://www.jcrete.org/what-is-an-unconference_/
3. Bringing it all together...
An evaluation of service mesh solutions
@melissajmckay
4. What am I going to
get out of this?
● I can talk to someone else about a
service mesh
● I can understand someone who talks
to me about a service mesh
● I know whether or not a service mesh
is something I would get value from
● I know where to get a service mesh
● I am aware of some differences
between service mesh offerings
5. How did I get here?
Some history...
● A mis-behaving service
● Missing SLAs
X 100 X 1000/endpoint /endpoint
6. How did I get here?
Some history...
● A mis-behaving service
● Missing SLAs
● Replicating the service under a load balancer did NOT solve the problem!
X 100 X 1000/endpoint /endpoint
7. How did I get here?
Some history...
● A mis-behaving service
● Missing SLAs
● Replicating the service under a load balancer did NOT solve the problem!
● Analyzed, determined issue & did some research on best way to solve...
X 100 X 1000/endpoint /endpoint
12. How is it different?
https://dzone.com/articles/api-gateway-vs-service-mesh
“They can both handle service discovery, request routing, authentication, rate limiting, and monitoring, but there are
differences in architectures and intentions. A service mesh's primary purpose is to manage internal service-to-service
communication, while an API Gateway is primarily meant for external client-to-service communication.”
13. How is it different? What IS
this?
https://dzone.com/articles/api-gateway-vs-service-mesh
“They can both handle service discovery, request routing, authentication, rate limiting, and monitoring, but there are
differences in architectures and intentions. A service mesh's primary purpose is to manage internal service-to-service
communication, while an API Gateway is primarily meant for external client-to-service communication.”
14. A service mesh is a dedicated infrastructure layer
that controls service-to-service communication
over a network.
https://searchitoperations.techtarget.com/definition/service-mesh - Margaret Rouse,
Alex Gillis, WhatIs.com (January, 2019)
15. A service mesh is a configurable, low‑latency
infrastructure layer designed to handle a high
volume of network‑based interprocess
communication among application infrastructure
services using application programming interfaces
(APIs).
https://www.nginx.com/blog/what-is-a-service-mesh/ - Floyd Smith & Owen Garrett,
NGINX (April, 2018)
16. tl;dr: A service mesh is a dedicated infrastructure
layer for making service-to-service communication
safe, fast, and reliable.
https://buoyant.io/2017/04/25/whats-a-service-mesh-and-why-do-i-need-one/ -
William Morgan, Buoyant (April, 2017)
17. A service mesh brings security, resiliency, and
visibility to service communications, so developers
don’t have to
https://www.infoworld.com/article/3402260/what-is-a-service-mesh-service-mesh-expl
ained.html - Josh Fruhlinger, InfoWorld (July, 2019)
18. The term service mesh is used to describe the
network of microservices that make up such
applications and the interactions between them.
https://istio.io/docs/concepts/what-is-istio/ - Istio (accessed September, 2019)
19. So what is a service mesh, really?
A service mesh is a separately managed distributed system that
handles common functions required and normally implemented by
services that do not concern the business logic of the service itself.
A real-life metaphor…. human circulatory system?
https://en.wikipedia.org/wiki/Circulatory_system
20. Service Mesh Capabilities… and more coming!
● Service Discovery
● Observability
● Rate Limiting
● Circuit Breaking
● Traffic Shifting
● Load Balancing
● Authorization/Authentication
● Distributed Tracing
… legitimate solutions to all kinds of problems!
21. Why isn’t everyone using a service mesh???
“If you’re wondering about service mesh, you don’t need one. Period. If you’ve reached the scale and
microservice maturity level that requires a service mesh, you will be actively — perhaps desperately —
searching for a solution and it will be abundantly obvious that a service mesh is necessary.”
https://thenewstack.io/primer-the-who-what-and-why-of-service-mesh/ - Emily Omier (May, 2019)
“I think we have a tendency to chase the shiny object, in the sense that X company does Y, therefore I
must do Y, even though I don’t have any of X company’s problems.” - Matt Klein
22. Service Mesh Capabilities… and more coming!
● Service Discovery
● Observability
● Rate Limiting
● Circuit Breaking
● Traffic Shifting
● Load Balancing
● Authorization/Authentication
● Distributed Tracing
… legitimate solutions to all kinds of problems!
23. Back up… what problem are we trying to solve?
Matt Klein - Lyft engineer who started Envoy Proxy
Podcast: https://softwareengineeringdaily.com/2017/02/14/service-proxying-with-matt-klein/
24. Biggest Problem?: I vote for Observability
& Reliability
● Large numbers of services
● Diverse/Polyglot
● Different Communication Protocols
● Service/language specific libraries
● No standardization on logging or stats
25. How is a service mesh implemented?
DATA PLANE
This is the part that touches every request in the
system.
Sidecar proxies.
● All service communication (ingress &
egress) routed through proxies
● The proxy acts as a gateway to the service
26. How is a service mesh implemented?
CONTROL PLANE
This is the part that manages the data planes -
providing them with the data and configuration
needed by the system.
UI, CLI or some other interface where an operator
can set configuration settings.
27. I’m ready to try it! Where do I start?
ENVOY: https://www.envoyproxy.io/learn/
LINKERD: https://linkerd.io/2/getting-started/
ISTIO: https://istio.io/docs/setup/install/kubernetes/
28. Prereqs to play
● docker
● docker-compose
● Kubernetes basics
● Helm charts/templates
● Get used to YAML if you aren’t already
Pay attention to versioning, of course!
Definitely up your CPUs to 4 and memory to 8 GiB if you use Docker Desktop.
36. Istio
● Go
● Apache 2.0 license
● Designed for extensibility, but might come
at the cost of complexity
● Modular, pluggable
● Supports HTTP 1.1, HTTP2, gRPC, and TCP
OVER 40 EXAMPLES available to play with
different features!!!
● Backed by Google, RedHat & IBM
● The quick install was easy, but choosing
another type of install or configuration felt
a little like choose your own adventure.
● Documentation is good, but you can find
yourself in a loop if you follow it blind
● There are a TON of online tutorials, etc
ISTIO: https://istio.io/docs/setup/install/kubernetes/
38. Linkerd2
● Go/Rust
● Apache 2.0 license
● Supported by Cloud-Native Computing
Foundation
● Data & Control Plane tightly integrated
(less modular, but smooth)
● VERY easy to install and get it up and
running
● Several examples are available to try out
key features
● Intended for Kubernetes currently
● Supports HTTP 1.1, HTTP2, gRPC, and TCP
● Not as feature rich as Istio, but is a very
active project (weekly edge releases, 6-8
week stable releases)
● Does not have Distributed Tracing YET
(This is in their roadmap for this year for
2.6 & 2.7 this year)
● Excellent documentation
UPDATE: Feature adds in 2.6 (Oct) - Distributed
tracing, traffic shifting (blue/green, canaries),
telemetry, retries, timeouts, proxy auto-injection,
mTLS on by default for all HTTP
LINKERD: https://linkerd.io/2/getting-started/
41. Quick Compare - Istio AND Linkerd2
● Supports Kubernetes
● Apache 2.0 license
● Side Car Pattern Deployment
● Control Plane written in Go
● Supported Protocols - HTTP1.1, HTTP2, gRPC, TCP
● Similar traffic control & monitoring features
● Helm Chart support
42. Quick Compare
ISTIO
● Data plane: Envoy (C++), or others (Nginx)
● mTLS support
● Higher performance overhead
● Pluggable/Modular
Generally more Complex Setup
LINKERD2
● Data plane: Native (Rust)
● Full mTLS support… soon!
● Lower performance overhead
● Opinionated/Tightly Coupled
Generally Simple Setup
43. What next?
EXPLORE OTHERS!
This space is growing fast and getting a lot of attention - one might presume this means there is a definite
need in the market, so it’s definitely worth checking out.
● Hashicorp - Consul Service Mesh
● Google - Anthos Service Mesh
44. Conclusion
Choose a solution that addresses REAL problems you need to solve for your system.
Consider your developers.
Consider your codebase.
Consider the performance cost.
Evaluate MULTIPLE solutions - don’t simply jump on a bandwagon.
The whole idea of a service mesh is pretty cool!