Catch Me If You Can - Cloud Foundry Summit Europe 2016
Outrunning Environmental Adversity with Intelligence at all layers of the OSI Model. Keith Strini, Merlin Glynn, Sean Keery
The document discusses characterizing an existing internetwork before designing enhancements. It provides details on mapping the logical and physical structure, addressing, wiring, constraints, and health of the network. Key aspects include characterizing protocols, bandwidth utilization, response times, and checking router/switch/firewall status to understand where the network is and where it can be improved. Understanding the existing infrastructure helps ensure new design goals are realistic and identifies where new equipment should be placed.
PacketCloud: an Open Platform for Elastic In-network Services. yeung2000
This document proposes PacketCloud, an open platform for hosting elastic in-network services. PacketCloud uses cloudlets located at ISP network edges to provide virtual instances for third-party services. These services can be user-requested or transparently intercept traffic. A prototype demonstrates services like encryption achieving over 500Mbps on one node and over 10Gbps across 20 nodes in a cloudlet with minimal delay. The platform aims to efficiently share network resources while providing economic rewards for ISPs and third parties.
This document discusses building a cloud-based software as a service application for photo sharing. It outlines research methods to identify relevant literature on topics like SaaS, load balancing, and image privacy. It also discusses adopting cloud computing for its ease of use, security, and cost benefits. Key challenges addressed include resolving network loading through policies controlling load distribution and location. Privacy is ensured by blurring tagged individuals until consent is received. The research aims to analyze application architecture and infrastructure to reduce issues and build strong features.
Networks allow devices like hosts, servers, PCs, and MACs to connect and communicate via networking components like switches and routers. They enable applications for email, databases, unified communications, file/web services, and network storage on devices like NAS and SAN systems. Applications are categorized as batch, interactive, or real-time depending on factors like bandwidth needs, response times, and latency tolerances. Key considerations for networks include availability, scalability, reliability, security, speed and cost.
This document summarizes Ethernet communication standards and protocols. It discusses how Ethernet enables connectivity and resource sharing between computers and network devices. It provides a timeline of major IEEE Ethernet standards from 10 Mbps to 100 Gbps and describes Ethernet frame formats, the OSI model, MAC addressing, CSMA/CD access method, and the three types of network communication: unicast, broadcast, and multicast.
The document discusses host-to-host communications and the OSI reference model. It describes how the OSI model standardized interfaces to promote interoperability. It then explains each of the seven layers of the OSI model in detail, including their functions, protocols, and example hardware. It discusses why layering is useful and the processes of encapsulation and decapsulation.
Network in Computer Application in BusinessNethan P
A network consists of devices called nodes that are connected by communication links. Most networks use distributed processing, where the task is divided among multiple computers rather than one large computer. A network must meet criteria like performance, reliability, and security. Performance is measured by factors like transit time, response time, throughput, and delay. Reliability looks at frequency of failures and recovery time. Security involves protecting data from unauthorized access and damage. Networks can have either point-to-point connections between two devices or multipoint connections where more than two devices share a single link.
This document discusses the importance of following a formal network design process. It outlines the typical phases of such a process, with a focus on requirements gathering. Requirements gathering is described as the most crucial phase, as it provides the target for the network design. Good requirements are user-centered, detailed, and specific. The deliverable of the requirements gathering phase is a Requirements Specification Document that formally documents the network needs.
The document discusses characterizing an existing internetwork before designing enhancements. It provides details on mapping the logical and physical structure, addressing, wiring, constraints, and health of the network. Key aspects include characterizing protocols, bandwidth utilization, response times, and checking router/switch/firewall status to understand where the network is and where it can be improved. Understanding the existing infrastructure helps ensure new design goals are realistic and identifies where new equipment should be placed.
PacketCloud: an Open Platform for Elastic In-network Services. yeung2000
This document proposes PacketCloud, an open platform for hosting elastic in-network services. PacketCloud uses cloudlets located at ISP network edges to provide virtual instances for third-party services. These services can be user-requested or transparently intercept traffic. A prototype demonstrates services like encryption achieving over 500Mbps on one node and over 10Gbps across 20 nodes in a cloudlet with minimal delay. The platform aims to efficiently share network resources while providing economic rewards for ISPs and third parties.
This document discusses building a cloud-based software as a service application for photo sharing. It outlines research methods to identify relevant literature on topics like SaaS, load balancing, and image privacy. It also discusses adopting cloud computing for its ease of use, security, and cost benefits. Key challenges addressed include resolving network loading through policies controlling load distribution and location. Privacy is ensured by blurring tagged individuals until consent is received. The research aims to analyze application architecture and infrastructure to reduce issues and build strong features.
Networks allow devices like hosts, servers, PCs, and MACs to connect and communicate via networking components like switches and routers. They enable applications for email, databases, unified communications, file/web services, and network storage on devices like NAS and SAN systems. Applications are categorized as batch, interactive, or real-time depending on factors like bandwidth needs, response times, and latency tolerances. Key considerations for networks include availability, scalability, reliability, security, speed and cost.
This document summarizes Ethernet communication standards and protocols. It discusses how Ethernet enables connectivity and resource sharing between computers and network devices. It provides a timeline of major IEEE Ethernet standards from 10 Mbps to 100 Gbps and describes Ethernet frame formats, the OSI model, MAC addressing, CSMA/CD access method, and the three types of network communication: unicast, broadcast, and multicast.
The document discusses host-to-host communications and the OSI reference model. It describes how the OSI model standardized interfaces to promote interoperability. It then explains each of the seven layers of the OSI model in detail, including their functions, protocols, and example hardware. It discusses why layering is useful and the processes of encapsulation and decapsulation.
Network in Computer Application in BusinessNethan P
A network consists of devices called nodes that are connected by communication links. Most networks use distributed processing, where the task is divided among multiple computers rather than one large computer. A network must meet criteria like performance, reliability, and security. Performance is measured by factors like transit time, response time, throughput, and delay. Reliability looks at frequency of failures and recovery time. Security involves protecting data from unauthorized access and damage. Networks can have either point-to-point connections between two devices or multipoint connections where more than two devices share a single link.
This document discusses the importance of following a formal network design process. It outlines the typical phases of such a process, with a focus on requirements gathering. Requirements gathering is described as the most crucial phase, as it provides the target for the network design. Good requirements are user-centered, detailed, and specific. The deliverable of the requirements gathering phase is a Requirements Specification Document that formally documents the network needs.
This document summarizes four case studies about scaling content through cross-collaboration at different organizations. The first case study describes optimizing product pages by manually adding cross-links between related pages, which led to increases in traffic, conversions, and rankings. The second case study involved consulting with a company's video team to optimize existing videos. The third case studied integrated an SEO team into a new CMS development project. The final case study described an SEO team providing recommendations for a new page concept at a client's request. Key lessons highlighted include starting small, teaching others, being part of teams, and fighting for SEO priorities during projects.
My qualification is B-Tech pass. I have 16 years experience including years gulf experience. My Cv is Approved from Ministry of Transportation and Ministry of housing.
This document compares golf and sex, noting similarities in how they can both be enjoyed throughout life, provide exercise and stress relief, and be more fun with a partner. It discusses how practicing is important to maintain skill in both golf and sex. Various benefits of golf and sex are listed, such as social aspects, setting your own pace, and achieving moments of exhilaration. The document also covers topics like arousal, sexual response cycles, age-related changes to sex drive, and treatments for sexual issues.
IHS Markit provides maritime and trade solutions utilizing the world's largest maritime database built on over 250 years of industry experience. Their solutions rely on proprietary knowledge and experience to help customers understand complex global supply chains, identify new opportunities, and safeguard security by managing technology, regulations, market risks, and geopolitical threats. IHS Markit combines core datasets, customized research, advanced analytics, and industry events to provide valuable insights.
The Marine Board provides a pan-European platform
for its member organisations to develop common priorities,
to advance marine research, and to bridge the
gap between science and policy in order to meet future
marine science challenges and opportunities.
The Marine Board was established in 1995 to facilitate
enhanced cooperation between European marine science
organisations (both research institutes and research
funding agencies) towards the development of a common
vision on the research priorities and strategies for
marine science in Europe. In 2012, the Marine Board
represents 34 Member Organisations from 20 countries.
The marine Board provides the essential components for
transferring knowledge for leadership in marine research
in Europe. Adopting a strategic role, the Marine Board
serves its member organisations by providing a forum
within which marine research policy advice to national
agencies and to the European Commission is developed,
with the objective of promoting the establishment of the
European Marine Research Area.
The document summarizes the FemiLift laser vaginal rejuvenation procedure. It uses fractional CO2 laser ablation to stimulate collagen remodeling and restore elasticity to vaginal tissue damaged by aging, childbirth, and menopause. This non-surgical treatment aims to improve symptoms like dryness, pain, and incontinence. It involves 3 treatment sessions spaced one month apart, followed by annual maintenance sessions. Clinical studies show the procedure significantly improves vaginal rejuvenation and tightening for most patients, and stress urinary incontinence symptoms for many.
Event Hacks: 7 beginner tips for emcee scriptsPeatix
Get names right, have a timekeeper to stay on schedule, and highlight speakers' achievements to make them look good. Rehearse once, get familiar with the venue, and use an outline instead of a full script. Most importantly, be confident in your role as the storyteller who brings the audience along for the experience.
The Suburban Hotel in Coralville, IA is upgrading & converting to a Mainstay Suites (both Choice Brand Hotels)
Take a look at our vision & what our end product will look like.
This document lists contact information for IBM representatives in India and worldwide who specialize in areas like z/OS Connect, ADDI, DevOps, and marketing for enterprise systems. It includes 8 contacts total, providing their names, email addresses, and areas of specialization like Solution Architect for z/OS Connect, Program Director for DevOps, and WW Tech Sales Leader for ADDI.
Frank Piller: Open Innovation & Customer Co-CreationFrank Piller
The document discusses co-creation of value with customers and companies. It provides an introduction to open innovation and value co-creation, frameworks and structures in the field, and insights from recent research. It also presents a competence-based framework for the capabilities required to co-create value. Additionally, it addresses two problems that make new product development difficult: the stickiness of need information possessed by customers, and the issue of local search bias that reduces problem solving effectiveness when problem solvers rely only on their own knowledge.
Social media has had a massive impact on events fundraising, both from a supporter and charity perspective. Many event participants use it as their primary route for asking for donations, so this shows how social media can help them raise more and get their sponsors involved, including data on which social media channels perform best. It also looks at how social media can support recruitment and supporter care from a charity’s point of view.
The Content Marketer’s A to-Z Guide to Google AnalyticsBarry Feldman
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Making meditation a part of a daily routine, even if just 10-15 minutes per day, can offer improvements to mood, focus, and overall feelings of well-being over time.
1) The document outlines the program for a seminar, including introductions by MCs Brian and Maneca, the national anthem, opening remarks, introduction of the guest speaker Carmella Salonga, the seminar proper, snacks, awarding of certificates, closing remarks, and the CvSU hymn.
2) Various participants like Marvin Vasquez, Marivic Gallanosa, and Don Kristopher Noble will give opening remarks, introduce the speaker, and provide closing remarks respectively.
3) Brian and Maneca thank all attendees for participating in the seminar and making it a successful event.
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliMarta Pacyga
This document discusses DDoS attacks, including the types of attacks, their impact on victims, and best practices for network operators. It covers TCP exhaustion attacks, volumetric attacks, reflective amplification attacks that exploit protocols like DNS and NTP, and application layer attacks. These attacks can directly impact content providers and indirectly impact service providers and cloud providers. The document recommends network operators deploy anti-spoofing, scan for and mitigate abusable services, and utilize carrier DDoS protection services to help prevent collateral damage from attacks.
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPROIDEA
This document discusses DDoS attacks, including what they are, how they work, their impact, and best practices for prevention. It covers different types of attacks like TCP exhaustion, volumetric, and reflective amplification attacks. Reflective amplification attacks are of particular concern due to their large size, affecting millions of users. The document recommends network operators deploy anti-spoofing measures, identify and remove exposed services, and consider cloud-based DDoS mitigation services to help prevent collateral damage from large attacks.
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scaleMichael Kehoe
LinkedIn has evolved from serving live traffic out of one data center to four data centers spread geographically. Serving live traffic from four data centers at the same time has taken the company from a disaster recovery model to a disaster avoidance model, where an unhealthy data center can be taken out of rotation and its traffic redistributed to the healthy data centers within minutes, with virtually no visible impact to users.
As LinkedIn transitioned from big monolithic applications to microservices, it was difficult to determine capacity constraints of individual services to handle extra load during disaster scenarios. Stress testing individual services using artificial load in a complex microservices architecture wasn’t sufficient to provide enough confidence in data center’s capacity. To solve this problem, LinkedIn leverages live traffic to stress services site-wide by shifting traffic to simulate a disaster load.
Michael Kehoe and Anil Mallapur discuss how LinkedIn uses traffic shifts to mitigate user impact by migrating live traffic between its data centers and stress test site-wide services for improved capacity handling and member experience.
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
The Technology adoptions in the Cloud are overwhelming . The global shift towards the Cloud is also overwhelming! It is important to build the stronger walls of Security around the Cloud.......
The document discusses updates from the Bio-IT World Expo in April 2015 regarding research computing at the Broad Institute. It provides three key takeaways: 1) Federating environments to public clouds will become standard practice; 2) Understanding data lifecycles and storing non-latency sensitive data in object stores is important; 3) Issues of consent, privacy, and data ownership remain challenging and require collaboration on standards. It then provides context about the Broad Institute and an overview of their high performance computing environment and initiatives to incorporate private and public clouds.
Cloud Computing: Architecture, IT Security and Operational PerspectivesMegan Eskey
A 2010 presentation on NASA Nebula that makes no reference to OpenStack (or pinet) dated a month after OpenStack was released to the public as open source. There is no link between Nebula and OpenStack.
This document summarizes four case studies about scaling content through cross-collaboration at different organizations. The first case study describes optimizing product pages by manually adding cross-links between related pages, which led to increases in traffic, conversions, and rankings. The second case study involved consulting with a company's video team to optimize existing videos. The third case studied integrated an SEO team into a new CMS development project. The final case study described an SEO team providing recommendations for a new page concept at a client's request. Key lessons highlighted include starting small, teaching others, being part of teams, and fighting for SEO priorities during projects.
My qualification is B-Tech pass. I have 16 years experience including years gulf experience. My Cv is Approved from Ministry of Transportation and Ministry of housing.
This document compares golf and sex, noting similarities in how they can both be enjoyed throughout life, provide exercise and stress relief, and be more fun with a partner. It discusses how practicing is important to maintain skill in both golf and sex. Various benefits of golf and sex are listed, such as social aspects, setting your own pace, and achieving moments of exhilaration. The document also covers topics like arousal, sexual response cycles, age-related changes to sex drive, and treatments for sexual issues.
IHS Markit provides maritime and trade solutions utilizing the world's largest maritime database built on over 250 years of industry experience. Their solutions rely on proprietary knowledge and experience to help customers understand complex global supply chains, identify new opportunities, and safeguard security by managing technology, regulations, market risks, and geopolitical threats. IHS Markit combines core datasets, customized research, advanced analytics, and industry events to provide valuable insights.
The Marine Board provides a pan-European platform
for its member organisations to develop common priorities,
to advance marine research, and to bridge the
gap between science and policy in order to meet future
marine science challenges and opportunities.
The Marine Board was established in 1995 to facilitate
enhanced cooperation between European marine science
organisations (both research institutes and research
funding agencies) towards the development of a common
vision on the research priorities and strategies for
marine science in Europe. In 2012, the Marine Board
represents 34 Member Organisations from 20 countries.
The marine Board provides the essential components for
transferring knowledge for leadership in marine research
in Europe. Adopting a strategic role, the Marine Board
serves its member organisations by providing a forum
within which marine research policy advice to national
agencies and to the European Commission is developed,
with the objective of promoting the establishment of the
European Marine Research Area.
The document summarizes the FemiLift laser vaginal rejuvenation procedure. It uses fractional CO2 laser ablation to stimulate collagen remodeling and restore elasticity to vaginal tissue damaged by aging, childbirth, and menopause. This non-surgical treatment aims to improve symptoms like dryness, pain, and incontinence. It involves 3 treatment sessions spaced one month apart, followed by annual maintenance sessions. Clinical studies show the procedure significantly improves vaginal rejuvenation and tightening for most patients, and stress urinary incontinence symptoms for many.
Event Hacks: 7 beginner tips for emcee scriptsPeatix
Get names right, have a timekeeper to stay on schedule, and highlight speakers' achievements to make them look good. Rehearse once, get familiar with the venue, and use an outline instead of a full script. Most importantly, be confident in your role as the storyteller who brings the audience along for the experience.
The Suburban Hotel in Coralville, IA is upgrading & converting to a Mainstay Suites (both Choice Brand Hotels)
Take a look at our vision & what our end product will look like.
This document lists contact information for IBM representatives in India and worldwide who specialize in areas like z/OS Connect, ADDI, DevOps, and marketing for enterprise systems. It includes 8 contacts total, providing their names, email addresses, and areas of specialization like Solution Architect for z/OS Connect, Program Director for DevOps, and WW Tech Sales Leader for ADDI.
Frank Piller: Open Innovation & Customer Co-CreationFrank Piller
The document discusses co-creation of value with customers and companies. It provides an introduction to open innovation and value co-creation, frameworks and structures in the field, and insights from recent research. It also presents a competence-based framework for the capabilities required to co-create value. Additionally, it addresses two problems that make new product development difficult: the stickiness of need information possessed by customers, and the issue of local search bias that reduces problem solving effectiveness when problem solvers rely only on their own knowledge.
Social media has had a massive impact on events fundraising, both from a supporter and charity perspective. Many event participants use it as their primary route for asking for donations, so this shows how social media can help them raise more and get their sponsors involved, including data on which social media channels perform best. It also looks at how social media can support recruitment and supporter care from a charity’s point of view.
The Content Marketer’s A to-Z Guide to Google AnalyticsBarry Feldman
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Making meditation a part of a daily routine, even if just 10-15 minutes per day, can offer improvements to mood, focus, and overall feelings of well-being over time.
1) The document outlines the program for a seminar, including introductions by MCs Brian and Maneca, the national anthem, opening remarks, introduction of the guest speaker Carmella Salonga, the seminar proper, snacks, awarding of certificates, closing remarks, and the CvSU hymn.
2) Various participants like Marvin Vasquez, Marivic Gallanosa, and Don Kristopher Noble will give opening remarks, introduce the speaker, and provide closing remarks respectively.
3) Brian and Maneca thank all attendees for participating in the seminar and making it a successful event.
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliMarta Pacyga
This document discusses DDoS attacks, including the types of attacks, their impact on victims, and best practices for network operators. It covers TCP exhaustion attacks, volumetric attacks, reflective amplification attacks that exploit protocols like DNS and NTP, and application layer attacks. These attacks can directly impact content providers and indirectly impact service providers and cloud providers. The document recommends network operators deploy anti-spoofing, scan for and mitigate abusable services, and utilize carrier DDoS protection services to help prevent collateral damage from attacks.
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPROIDEA
This document discusses DDoS attacks, including what they are, how they work, their impact, and best practices for prevention. It covers different types of attacks like TCP exhaustion, volumetric, and reflective amplification attacks. Reflective amplification attacks are of particular concern due to their large size, affecting millions of users. The document recommends network operators deploy anti-spoofing measures, identify and remove exposed services, and consider cloud-based DDoS mitigation services to help prevent collateral damage from large attacks.
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scaleMichael Kehoe
LinkedIn has evolved from serving live traffic out of one data center to four data centers spread geographically. Serving live traffic from four data centers at the same time has taken the company from a disaster recovery model to a disaster avoidance model, where an unhealthy data center can be taken out of rotation and its traffic redistributed to the healthy data centers within minutes, with virtually no visible impact to users.
As LinkedIn transitioned from big monolithic applications to microservices, it was difficult to determine capacity constraints of individual services to handle extra load during disaster scenarios. Stress testing individual services using artificial load in a complex microservices architecture wasn’t sufficient to provide enough confidence in data center’s capacity. To solve this problem, LinkedIn leverages live traffic to stress services site-wide by shifting traffic to simulate a disaster load.
Michael Kehoe and Anil Mallapur discuss how LinkedIn uses traffic shifts to mitigate user impact by migrating live traffic between its data centers and stress test site-wide services for improved capacity handling and member experience.
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
The Technology adoptions in the Cloud are overwhelming . The global shift towards the Cloud is also overwhelming! It is important to build the stronger walls of Security around the Cloud.......
The document discusses updates from the Bio-IT World Expo in April 2015 regarding research computing at the Broad Institute. It provides three key takeaways: 1) Federating environments to public clouds will become standard practice; 2) Understanding data lifecycles and storing non-latency sensitive data in object stores is important; 3) Issues of consent, privacy, and data ownership remain challenging and require collaboration on standards. It then provides context about the Broad Institute and an overview of their high performance computing environment and initiatives to incorporate private and public clouds.
Cloud Computing: Architecture, IT Security and Operational PerspectivesMegan Eskey
A 2010 presentation on NASA Nebula that makes no reference to OpenStack (or pinet) dated a month after OpenStack was released to the public as open source. There is no link between Nebula and OpenStack.
This document summarizes a presentation about cloud computing at NASA. It includes an agenda that covers introductions, definitions of cloud computing, benefits of cloud for NASA, how NASA is implementing cloud, and how NASA secures cloud. For implementing cloud, NASA's Nebula platform is described as being open, transparent, and scalable. It uses automation, testing, and monitoring. For security, the presentation outlines isolation, networking, firewalls, access controls and intrusion detection used in Nebula. The vision is for security as a service through continuous monitoring on a security service bus.
This document provides an overview of how to implement modern applications on DC/OS architecture quickly. It begins with introductions of the speaker and defines concepts like microservices, modern applications, and what DC/OS is. Then it explains the principles of microservices and characteristics of modern applications. The document compares DC/OS, Docker, Kubernetes and OpenStack. It also illustrates how to implement modern applications on DC/OS and why DC/OS is different. The document will share best practices and case studies.
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxLeahRachael
This document provides an overview of network architecture and protocols. It discusses Ethernet, including its history, components, addressing, frames, and media access control. It also covers token ring, AppleTalk, ARCNET, the layered network protocol model (with HTTP as an example), and network operating system architectures like peer-to-peer and client-server. Segmentation strategies like firewalls and software-defined networking are introduced to improve performance and security.
The document discusses the key sections involved in designing a network: requirements analysis, architecture, design, and growth planning. It provides details on analyzing user, application, device, and network requirements. The sections also explain considerations for topology, equipment choice, and connectivity when structuring a network. Security and managing growth/capacity are important factors that need addressed throughout the network's development.
- James Blessing is the Deputy Director of Network Architecture at Future Services. He discussed Ciena's MCP network management software, the need for automation of network provisioning through APIs, and the JiscMail NETWORK-AUTOMATION mailing list as a resource.
- The document then covered topics like Netpath services, layer 2 and 3 VPNs, network function virtualization, IPv6 adoption, the Janet end-to-end performance initiative, science DMZ principles, network performance monitoring with perfSONAR, and working with the GÉANT project.
This document summarizes a presentation on analyzing network traffic characteristics of data centers. Some key findings include:
- 75% of traffic stays within a single rack, showing applications are not uniformly placed;
- Half of all packets are small (<200B), indicating keep-alive traffic is important for applications;
- At most 25% of core network links are highly utilized, suggesting better routing could reduce utilization;
- Assumptions about needing more bandwidth between network switches (bisection) or that traffic is unpredictable may not always hold true.
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
New Threats, New Approaches in Modern Data CentersIben Rodriguez
New Threats, New Approaches in Modern Data Centers - A Presentation by NPS at CENIC conference 11:00 am - 12:00 pm, Wednesday, March 22, 2017 – in San Diego, California
The standard approach to securing data centers has historically emphasized strong perimeter protection to keep threats on the outside of the network. However, this model is ineffective for handling new types of threats—including advanced persistent threats, insider threats, and coordinated attacks. A better model for data center security is needed: one that assumes threats can be anywhere and probably are everywhere and then, through automation, acts accordingly. Using micro-segmentation, fine-grained network controls enable unit-level trust, and flexible security policies can be applied all the way down to a network interface. In this joint presentation between customer, partner, and VMware, the fundamental tenants of micro-segmentation will be discussed. Presenters will describe how the Naval Postgraduate School has incorporated these principles into the architecture and design of a multi-tenant Cybersecurity Lab environment to deliver security training to national and international government personnel.
Edgar Mendoza, IT Specialist, Information Technology and Communications Services (ITACS) Naval Postgraduate School
Eldor Magat, Computer Specialist, ITACS, Naval Postgraduate School
Mike Monahan, Network Engineer, ITACS, Naval Postgraduate School
Iben Rodriguez, Brocade Resident SDN Delivery Consultant, ITACS, Naval Postgraduate School
Brian Recore, NSX Systems Engineer, VMware, Inc.
https://youtu.be/mYBbIbfKkGU?t=1h7m16s
Copied from the program with corrections - https://adobeindd.com/view/publications/b9fbbdf0-60f1-41dc-8654-3d2141b0bf54/nh4h/publication-web-resources/pdf/Conference_Agenda_2017_v1.pdf
Big Data Analytics and Advanced Computer Networking ScenariosStenio Fernandes
The document discusses big data analytics and advanced computer networking scenarios, including research challenges and opportunities. It covers technical background on measurements and analysis in computer networks. It also discusses new networking architectures like Software-Defined Networking (SDN), Information-Centric Networking (ICN), and network visualization. Tools and techniques for high-performance network traffic analysis using visual analytics are also covered. The document provides an agenda for applied research opportunities in computer networking between CIn/UFPE and Dalhousie University.
This presentation was delivered at the 2nd International Conference on Recent Trends in Information Technology and Computer Science in Mumbai. The paper deals with security issues in Cloud Computing, its mitigation and proposes a secure cloud mechanism with an implementation of the single-sign on mechanism on the Ubuntu Enterprise Cloud
Investigation, Design and Implementation of a SecureFiras Alsayied
1) The document outlines a network design project for the University of Tripoli that involves designing the network infrastructure and implementing security policies and protocols.
2) The design includes VLANs, firewalls, VPN access, and wireless access across multiple engineering departments.
3) The implementation phase focuses on secure configuration of network devices, access control lists, firewall rules, encrypted management access, and a captive portal for wireless users.
Similar to Catch Me If You Can - Cloud Foundry Summit Europe 2016 (20)
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Catch Me If You Can - Cloud Foundry Summit Europe 2016
1. Catch Me If You Can
Outrunning Environmental Adversity with Intelligence
at all layers of the OSI Model
2. Introductions
• Merlin Glynn mglynn@pivotal.io
• Sean Keery skeery@pivotal.io
• Keith Strini kstrini@pivotal.io
• Special Shout out to Raymond Lee
(BDS Team)
3. What if we could improve performance
& respond to environmental adversity?
APT - A set of stealthy and continuous computer hacking processes,
often orchestrated by human(s) targeting a specific entity.
DDOS – an attempt to make a machine or network resource
unavailable to its intended users, such as to temporarily or
indefinitely interrupt or suspend services of a host connected to the
Internet
Spectrum of cyber vulnerability from DDOS to APT
Quality of service
The overall performance of a computer network, particularly
the performance seen by the users of the network. To
quantitatively measure quality of service, several related
aspects of the network service are often considered, such as
error rates, bit rate, throughput, transmission delay,
availability, jitter, etc.
4. • Bosh
• CF
• SDN
DSL
Agents:
Actual State
Strategy:
Desired
State
Dynamic
Analysis
Environment
Models
Goals
(SLA)
Predictions
(Metrics)
DSL
Library
Learning
What this Continuous Improvement
over Environmental Adversity looks
like..…
responses
DSLDSL
DSLDSLDSL
Realize
<<no-outage>>
<<predictive>>
<<reliable>>
6. Use Cases for Demo
• DDOS -> Recognize foreign IP/Add ACL via NSX Rest API
• QoS -> Detect network throughput deficiency/Add 1 .. N routes
• APT -> Recognize foreign IP+Load/Alert Forensics Team
Spin up new CF foundation/subnet/data subnet access
Add new route
Remove forensic route
Shutdown data subnet access from forensic foundation
Goal: uninterrupted production traffic/UX
• DDIL -> Detect network throughput/Identify best cell net throughput
Move highest priority workloads to cell
Add additional service chaining IAW compliancy outlines to
edge
Add 1..n routes
7. Where do we go from here ….
• Ways to evaluate each
deployment
• Utilize the inherent abilities of
the distributed architecture
• Machine learning where each
distributed component
maintains state, manages itself
8. In Conclusion…Why Now?
• The cyber vulnerability problem is
imminent
• The operations, networking and
development teams are finally
becoming cohesive units
• The capacity to process, interpret
and act upon petascale data on any
IaaS
• All of this is can already be built into
the very core of the foundation now
– (Diego abstractions, SDN API, Predictive
and ML, Streams, Bosh-Enaml).
Bullet -> Reactive to Proactive
Detecting and analyzing the running behavior
Predicting the effect different strategic actions would have on the distributed system when real problems are detected.
Bullet -> Intermittency is too fast
How often data should be observed
The criticality of which data should be sent through intermittent connections.
Bullet -> Difficult to exploit opportunities
Manual Bosh management of virtualized resources in a server cluster across any IaaS.
The overall effect of degraded communications affecting degraded performance in managing the system
The more intermittent the communication, the greater the effect on Bosh’s management performance
Bullet -> Co-deploying
Co-deploying analytics and the analytics platform within the foundation.
System metrics via the fire hose transmits this data from the foundation
Interpret those metrics and then select strategies defined in foundation relevant DSLs that provides courses of action (COAs) on how the network it rides on, should adapt to changes.
Bullet -> Bosh Adds SDN Components
Allow Bosh to add new SDN components dynamically through a process of discovery Bosh continuously would monitor.
New components would need to be added to allow Bosh to dynamically reconfigure by providing metadata about those individual components.
As the degraded performance was detected and the ability to interact with the degrading foundation fell below desired thresholds, Bosh would execute strategies to heal, adapt, optimize, and defend the system against similarly future degradations.
Bullet-> Liberating the control plane from the data plane, SDN enables the foundation to truly adapt (at almost all layers of the OSI model) to changing environment and threat circumstances.
“Continuous Advantage” makes it difficult to cause substantial damage without launching a full assault against the infrastructure.
To take advantage of this inherent resiliency, we must evolve the ability to take advantage of the dynamic possibilities of SDN into the next phase, coupling it with Predictive Analytics and ML to fully optimize and self-protect the enterprises we are in charge of running.
Bullet -> Evaluate the deployment
Determine violations of constraints that were defined for the specific foundation.
If anomalies are detected or SLAs violated, programmatically adapt the architecture.
DSL based strategies matched and evaluated to determine the best approach to solving the SLA or mitigating the anomaly.
Choose the strategy to execute that effects changes to the foundation.
System metrics via the fire hose transmits this data from the foundation
Interpret those metrics and then select strategies defined in foundation relevant DSLs that provides courses of action (COAs) on how the network it rides on, should adapt to changes.
Bullet -> Utilize the distributed architecture
Each distributed component would have a state in which it could manage itself
Once connectivity was restored, report a total system health back to Bosh.
No matter how disconnected the systems become, the foundation would still be able to function.
The challenge is the limitation on globally optimizing the foundation to holistically address performance degradation.
Bullet -> Machine Learning
Size and complexity of Cloud Foundry enterprises are beginning to outstrip the ability of humans to understand and control the maintenance
The speed required for effective network optimization is ever increasing. In particular this degradation of performance by predicting the future communication states of the system.
To address the effects of degraded communications, metrics could be queried against real time analytics to predict the future state of the system.
The predicted constraints could then reason on future state values. In this way, Bosh can anticipate events that would require adaptation and issue commands before they are needed.
This pre-emptive strategy would allow the foundation to operate in degraded environments by issuing adaptive strategies in communication windows before they are needed.
Such learning approaches can also be applied to make decisions based upon currently monitored states and can be used to detect anomalous operation such as hidden APTs, among other capabilities.