Presentation hold during Cloud Computing Conference 2011 in Noordwijkerhout, Netherlands 2011. This is presentation is about missing cost estimation models in cloud computing and presents firsts considerations how to overcome this.
Cloud Economics in Training and SimulationNane Kratzke
This slide presents a use case how to adopt IaaS cloud computing in higher education. It is shown that virtual labs can provide a more than 25 times cost advantage compared to classical dedicated on-premise in-house labs.
Cloud Economics in Training and SimulationNane Kratzke
This slide presents a use case how to adopt IaaS cloud computing in higher education. It is shown that virtual labs can provide a more than 25 times cost advantage compared to classical dedicated on-premise in-house labs.
In 2014, more than 75 vendors self-identified as DCIM providers, including many with individual point solutions or proprietary monitoring hardware. When Gartner began defining DCIM as an integrated solutions suite, the list quickly shrank to less than two dozen. So what are the “must-haves” necessary to be considered a serious player in the DCIM arena?
View this presentation to find out.
Understanding the Value of the Cloud - Centare Lunch & Learn - June 2, 2011Eric D. Boyd
Cloud computing is one of the most important shifts in computing since PC/Client-Server from the 90s. In this presentation we will reminisce about the major milestones in computing history, look at where we are now, and dream about what the future will look like with the introduction of the cloud. Next, we will examine the challenges of the traditional data center and dig into the benefits and value provided by leveraging the cloud. Finally, we will discuss how you can identify opportunities in your organization that are a good fit for the cloud and explore strategies for getting started.
Data Center Operational Efficiency RoundtableHerb Hernandez
Presentation from April 19 webinar: Data Center Operational Efficiency Best Practices Video Roundtable. Featuring speakers from IBM, IDC and The NFL. http://bit.ly/LjNaHL
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...Compuware APM
Virtualization, Cloud Computing and Outsourcing promise significant cost savings and enhanced business agility. Implemented correctly these initiatives can cut hardware and software costs, improve web application performance and quality, and positively impact business results. Learn how these 5 key business and technology trends are enabling companies to reduce costs AND ensure web application performance:
1. Virtualization
2. Outsourced Hosting & Management of Applications
3. Cloud Computing
4. Real-user Monitoring
5. ‘SaaS’ification of IT Management Software
“Nevales UTM provides speedy performance. The most
important quality of Nevales UTM is its remarkable 'Pay As
You Use' service. The Nevales solution is running very well
and has changed our perception about UTM solutions”.
Mr. Amrut Barde - Vice President MIS
Insights on How to Run a Credit Union: Blending new technologies with traditi...NAFCU Services Corporation
Hear from five thought leaders as they discuss the opportunities and obstacles facing the financial services industry today as it moves firmly into the digital age.Chris Swecker of Swecker Enterprises covers the current state of fraud in banking and explains how data can be used to mitigate it; Jim Goodnight, SAS CEO, explains how a high-performance banking technology framework can provide the next answer to key business questions; Jim Davis, Senior Vice President and Chief Marketing Officer of SAS, shares his insights on why understanding customers' needs will be critical to thriving in the current economic climate; Nobel Laureate Myron Scholes and Alastair Sim, Senior Director of Global Marketing at SAS, address past risk management techniques and how they should evolve. Learn more at http://www.nafcu.org/sas
In 2014, more than 75 vendors self-identified as DCIM providers, including many with individual point solutions or proprietary monitoring hardware. When Gartner began defining DCIM as an integrated solutions suite, the list quickly shrank to less than two dozen. So what are the “must-haves” necessary to be considered a serious player in the DCIM arena?
View this presentation to find out.
Understanding the Value of the Cloud - Centare Lunch & Learn - June 2, 2011Eric D. Boyd
Cloud computing is one of the most important shifts in computing since PC/Client-Server from the 90s. In this presentation we will reminisce about the major milestones in computing history, look at where we are now, and dream about what the future will look like with the introduction of the cloud. Next, we will examine the challenges of the traditional data center and dig into the benefits and value provided by leveraging the cloud. Finally, we will discuss how you can identify opportunities in your organization that are a good fit for the cloud and explore strategies for getting started.
Data Center Operational Efficiency RoundtableHerb Hernandez
Presentation from April 19 webinar: Data Center Operational Efficiency Best Practices Video Roundtable. Featuring speakers from IBM, IDC and The NFL. http://bit.ly/LjNaHL
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...Compuware APM
Virtualization, Cloud Computing and Outsourcing promise significant cost savings and enhanced business agility. Implemented correctly these initiatives can cut hardware and software costs, improve web application performance and quality, and positively impact business results. Learn how these 5 key business and technology trends are enabling companies to reduce costs AND ensure web application performance:
1. Virtualization
2. Outsourced Hosting & Management of Applications
3. Cloud Computing
4. Real-user Monitoring
5. ‘SaaS’ification of IT Management Software
“Nevales UTM provides speedy performance. The most
important quality of Nevales UTM is its remarkable 'Pay As
You Use' service. The Nevales solution is running very well
and has changed our perception about UTM solutions”.
Mr. Amrut Barde - Vice President MIS
Insights on How to Run a Credit Union: Blending new technologies with traditi...NAFCU Services Corporation
Hear from five thought leaders as they discuss the opportunities and obstacles facing the financial services industry today as it moves firmly into the digital age.Chris Swecker of Swecker Enterprises covers the current state of fraud in banking and explains how data can be used to mitigate it; Jim Goodnight, SAS CEO, explains how a high-performance banking technology framework can provide the next answer to key business questions; Jim Davis, Senior Vice President and Chief Marketing Officer of SAS, shares his insights on why understanding customers' needs will be critical to thriving in the current economic climate; Nobel Laureate Myron Scholes and Alastair Sim, Senior Director of Global Marketing at SAS, address past risk management techniques and how they should evolve. Learn more at http://www.nafcu.org/sas
What's Trending in NATO Commercial Technologies and GamesJay Gendron
Nearly ten years ago, the training and modeling and simulations (M&S) communities teamed up to tackle a burgeoning issue – the use of commercial technologies and games in NATO. The challenge came from the cultural change inherent in the domain. Small businesses were the leaders in the game space, yet they were perceived as risks among acquisition authorities. The proponents pushed forward by forming a Modeling and Simulation Group workshop series called “Exploiting Commercial Technologies and Games for Use in NATO” to bridge the cultural gaps. Over ten years, twelve workshops have convened. Successes have been achieved and predictions made five years ago have been attained. This report provides (a) findings such as trends and possible explanations for factors contributing to attainment of workshop predications; (b) trends within technology, industry, and government with respect to commercial technologies and games for education and training; and (c) recommendations for consideration in planning future MSG commercial technology and games workshops.
Small Team Training Delivery Service: Mastery in Times of AusterityJay Gendron
Computer-based instruction – a proven approach – must adapt to fulfill the growing needs of military and interagency training. This future vision requires innovative toolsets to help bridge the gap between academic, individual instruction and large-scale, mission rehearsals. Given the constrained training budgets of today and tomorrow, one must innovate to enable team training.
This paper provides analysis for the existing military training structure and offers insights into how it can be adapted to be lightweight, agile, and more cost efficient at training small teams in preparation for existing large scale exercises. This approach fosters mastery by providing the training audience autonomy of time and team – enabling small team training at a time and place of their choosing. Our innovation’s simplicity has demonstrated the powerful capability of a distributed and immersive application. The paper closes with lessons learned gathered from exercises conducted between 2010 through the present.
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...CloudOps Summit
CloudOps Summit 2012, Frankfurt, 20.9.2012 Track 2 - Build and Run
by Nigel Sanctuary, VP Propositions at Kognitio (www.kognitio.com)
http://cloudops.de/sprecher/#nigelsanctuary
Find the video of this talk at http://youtu.be/wQrHQNOMlKc
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...Stuart Charlton
Stuart Charlton's presentation at the 2008 Sys-Con Cloud Computing Expo in San Jose, CA
Revised for the 2009 Sys-Con Cloud Computing Expo in New York City
Presentation that discusses how to prepare the enterprise to move to the cloud through consolidation, optimization, automation, and orchestration (Jim Lepianka).
Slides for the JavaOne 2012 session on Java batch for Cost Optimized Efficiency. This session talks about the importance of Java Batch in Enterprise computing and provides a reference architecture, overview of the JSR 352 and the WebSphere Batch solutions.
De-Risk Data Center Projects With Cisco ServicesCisco Canada
This presentation will discuss Cisco Advanced Services, why to use Cisco Advanced Services and where Cisco Advanced Services can add value to your business.
Similar to Overcoming Cost Intransparency of Cloud Computing (20)
Smart like a Fox: How clever students trick dumb programming assignment asses...Nane Kratzke
This case study reports on two first-semester programming courses with more than 190 students. Both courses made use of automated assessments. We observed how students trick these systems by analysing the version history of suspect submissions. By analysing more than 3300 submissions, we revealed four astonishingly simple tricks (overfitting, evasion) and cheat-patterns (redirection, and injection) that students used to trick automated programming assignment assessment systems (APAAS). Although not the main focus of this study, it discusses and proposes corresponding counter-measures where appropriate.
Nevertheless, the primary intent of this paper is to raise problem awareness and to identify and systematise observable problem patterns in a more formal approach. The identified immaturity of existing APAAS solutions might have implications for courses that rely deeply on automation like MOOCs. Therefore, we conclude to look at APAAS solutions much more from a security point of view (code injection). Moreover, we identify the need to evolve existing unit testing frameworks into more evaluation-oriented teaching solutions that provide better trick and cheat detection capabilities and differentiated grading support.
#BTW17 on Twitter (Die Bundestagswahl 2017 auf Twitter - war der Ausgang abzu...Nane Kratzke
Es gibt erstaunlich wenig Open Access Twitter-Datensätze . Daher wurden von Juni bis September 2017 Twitter-Interaktionen mit 364 deutschen Politikern des deutschen Bundestags "mitgeschnitten" und als Open Data Datensatz für weitere Analysen aufbereitet. Im Rahmen dessen wurden etwa 120.000 Twitter User erfasst, die gemeinsam über 1.2 Mio. Twitterinteraktionen erzeugt haben. Der Vortrag stellt den Datensatz und seine Erhebungsmethode vor und geht einigen Fragen nach: Z.B. ob es "laute" und "leise" Parteien auf Twitter gibt? Ob und wie sich die politische Nähe von Twitter Nutzern zu Parteien ableiten lässt? Ob sich Twitter als Instrument für die Meinungsforschung eignet und was zu berücksichtigen ist? Und vor allem: War das Wahlergebnis bereits im Vorfeld absehbar?
About being the Tortoise or the Hare? Making Cloud Applications too Fast and ...Nane Kratzke
Cloud applications expose - beside service endpoints - also potential or actual vulnerabilities. And attackers have several advantages on their side. They can select the weapons, the point of time and the point of attack.
Very often cloud application security engineering efforts focus to harden the fortress walls but seldom assume that attacks may be successful. So, cloud applications rely on their defensive walls but seldom attack intruders actively. Biological systems are different. They accept that defensive "walls" can be breached at several layers and therefore make use of an active and adaptive defense system to attack potential intruders - an immune system. This position paper proposes such an immune system inspired approach to ensure that even undetected intruders can be purged out of cloud applications. This makes it much harder for intruders to maintain a presence on victim systems. Evaluation experiments with popular cloud service infrastructures (Amazon Web Services, Google Compute Engine, Azure and OpenStack) showed that this could minimize the undetected acting period of intruders down to minutes.
Serverless Architectures - Where have all the servers gone?Nane Kratzke
Serverless architectures refer to cloud applications that depend substantially on 3rd party services (Backend as a Service, BaaS)
or on custom code that is run in ephemeral deployment units (Function as a Service, FaaS). By moving much behavior to the front end, such architectures reduce the need for ‚always on‘ servers. Therefore, such systems can reduce operational cost and shift operational complexity to BaaS service providers at cost of vendor dependencies and (still) immaturity of supporting services and tools.
This presentation explains the term "Serverless" and how it is changing cloud application architectures. It identifies open issues, benefits and drawbacks, as well as (in-)appropriate use cases for Serverless. It closes with a curated list of Serverless services, standalone platforms and frameworks and provides a list for further reading.
There is no impenetrable system - So, why we are still waiting to get breached?Nane Kratzke
This is some input for a panel discussion about "Security and Safety in Cloud-based Systems and Services" (9th International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2018) in Barcelona, Spain in February 2018).
Although it might be hard to accept. By principle, attackers can establish footholds in our systems whenever they want (zero-day exploits). Cloud application security engineering efforts focus to harden the "fortress walls". Therefore, cloud applications rely on these defensive walls but seldom attack intruders actively. There is the somehow the need for a more reactive component. A component that could be inspired by biological systems. Biological systems consider by design that defensive "walls" can be breached at several layers. So, biological systems provide an additional active defense system to attack potential successful intruders - an immune system. Although several experts find this approach "intriguing", there are follow-up questions arising. What is about exploits that adapt to bio-inspired systems? How to protect the immune system against direct attacks? Are cloud immune systems prone to phenomenons like fever (running hot) or auto-immune diseases (self-attacking)?
Towards a Lightweight Multi-Cloud DSL for Elastic and Transferable Cloud-nati...Nane Kratzke
Cloud-native applications are intentionally designed for the cloud in order to leverage cloud platform features like horizontal scaling and elasticity – benefits coming along with cloud platforms. In addition to classical (and very often static) multi-tier deployment scenarios, cloud-native applications are typically operated on much more complex but elastic infrastructures. Furthermore, there is a trend to use elastic container platforms like Kubernetes, Docker Swarm or Apache Mesos. However, especially multi-cloud use cases are astonishingly complex to handle. In consequence, cloud-native applications are prone to vendor lock-in. Very often TOSCA-based approaches are used to tackle this aspect. But, these application topology defining approaches are limited in supporting multi-cloud adaption of a cloud-native application at runtime. In this paper, we analyzed several approaches to define cloud-native applications being multi-cloud transferable at runtime. We have not found an approach that fully satisfies all of our requirements. Therefore we introduce a solution proposal that separates elastic platform definition from cloud application definition. We present first considerations for a domain specific language for application definition and demonstrate evaluation results on the platform level showing that a cloud-native application can be transfered between different cloud service providers like Azure and Google within minutes and without downtime. The evaluation covers public and private cloud service infrastructures provided by Amazon Web Services, Microsoft Azure, Google Compute Engine and OpenStack.
We have the Bricks to Build Cloud-native Cathedrals - But do we have the mortar?Nane Kratzke
This is some input for a panel discussion about "Challenges of Cloud Computing-based Systems" I attend at the 9th International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2018) in Barcelona, Spain in February 2018.
Cloud-native applications (CNA) are build more and more often according to microservice and independent system architecture (ISA) approaches. ISA involves two architecture layers: the macro and the micro architecture layer. Software engineering outcomes on the micro layer are often distributed in a standardized form as self-contained deployment units (so called container images). There exist plenty of programming languages to implement these units: JAVA, C, C++, JavaScript, Python, R, PHP, Ruby, ... (this list is almost endless) But on the macro layer, one might mention TOSCA and little more. TOSCA is an OASIS deployment and orchestration standard language to describe a topology of cloud based web services, their components, relationships, and the processes that manage them. This works for static deployments. However, CNA are elastic, self-adaptive - almost the exact opposite of what can be defined efficiently using TOSCA. For these kind of scenarios one might mention Kubernetes or Docker Swarm as container orchestrators which are intentionally build to operate elastic services formed of containers. But these operating platforms do not provide expressive and pragmatic programming languages covering the macro layer of cloud-native applications.
So it seems there is a gap and the question arises, whether we need further (and what kind of) macro layer languages for CNA?
About an Immune System Understanding for Cloud-native Applications - Biology ...Nane Kratzke
Presentation for 9th International Conference on Cloud Computing, GRIDS, and Virtualization (CLOUD COMPUTING 2018) in Barcelona, Spain, 2018.
There is no such thing as an impenetrable system, although the penetration of systems does get harder from year to year. The median days that intruders remained undetected on victim systems dropped from 416 days in 2010 down to 99 in 2016. Perhaps because of that, a new trend in security breaches is to compromise the forensic trail to allow the intruder to remain undetected for longer in victim systems and to retain valuable footholds for as long as possible. This paper proposes an immune system inspired solution which uses a more frequent regeneration of cloud application nodes to ensure that undetected compromised nodes can be purged. This makes it much harder for intruders to maintain a presence on victim systems. Basically the biological concept of cell-regeneration is combined with the information systems concept of append-only logs. Evaluation experiments performed on popular cloud service infrastructures (Amazon Web Services, Google Compute Engine, Azure and OpenStack) have shown that between 6 and 40 nodes of elastic container platforms can be regenerated per hour. Even a large cluster of 400 nodes could be regenerated in somewhere between 9 and 66 hours. So, regeneration shows the potential to reduce the foothold of undetected intruders from months to just hours.
Der Bundestagswahlkampf 2017 auf Twitter - War der Ausgang abzusehen?Nane Kratzke
Von Juni bis September wurden Twitter-Interaktionen mit deutschen Politikern des 18. deutschen Bundestags und bundespolitisch relevanten Politikern der FDP und AfD "mitgeschnitten" und als Open Data Datensatz für weitere Analysen aufbereitet. Insgesamt wurden die Accounts von 364 Politikern verfolgt. Im Rahmen dessen wurden etwa 120.000 Twitter User erfasst, die gemeinsam über 1.2 Mio. Tweets erzeugt haben. Dies entspricht einer Stichprobe von etwa 5% des tatsächlichen Traffics auf Twitter. Die Gesamtmenge der erfassten Daten beträgt ca. 10 GB. Der Vortrag stellt erste Erkenntnisse vor, die in diesem Datensatz zu finden sind. Dabei wird einigen Fragen nachgegangen, z.B. ob es "laute" und "leise" Parteien auf Twitter gibt? Lässt sich die politische Nähe von Twitter Nutzern zu Parteien ableiten? Eignet sich Twitter als Instrument für die Meinungsforschung? Und vor allem: War das Wahlergebnis bereits im Vorfeld absehbar?
Smuggling Multi-Cloud Support into Cloud-native Applications using Elastic Co...Nane Kratzke
Elastic container platforms (like Kubernetes, Docker Swarm, Apache Mesos) fit very well with existing cloud-native application architecture approaches. So it is more than astonishing, that these already existing and open source available elastic platforms are not considered more consequently for multi-cloud approaches. Elastic container platforms provide inherent multi-cloud support that can be easily accessed. We present a solution proposal of a control process which is able to scale (and migrate as a side effect) elastic container platforms across different public and private cloud-service providers. This control loop can be used in an execution phase of self-adaptive auto-scaling MAPE loops (monitoring, analysis, planning, execution). Additionally, we present several lessons learned from our prototype implementation which might be of general interest for researchers and practitioners. For instance, to describe only the intended state of an elastic platform and let a single control process take care to reach this intended state is far less complex than to define plenty of specific and necessary multi-cloud aware workflows to deploy, migrate, terminate, scale up and scale down elastic platforms or applications.
Was die Cloud mit einem brennenden Haus zu tun hatNane Kratzke
Ein Motivationsvortrag für hybride Cloud Szenarien im Rahmen einer Veranstaltung des Computermuseums der FH Kiel und der fat it solution GmbH.
Der Vortrag beschäftigt sich mit häufig genannten Bedenken warum Cloud-basierte Geschäftsmodelle vermieden werden: Verfügbarkeit, Sicherheit, Vendor Lock-In (Fokus dieses Vortrags), Kosten.
Und was man dagegen machen kann.
What the cloud has to do with a burning house?Nane Kratzke
Cloud native applications can create enormous business growth and value in a very short amount of time. Take Instagram as one example company. It took only two years to get a net asset value of 1 billion USD. However, cloud-native applications are often characterized by a highly implicit technological dependency on hosting cloud infrastructures. What happens if you are forced to leave your cloud service provider? What happens if your cloud is burning? The project Cloud TRANSIT investigates how to design cloud-native applications and services to reduce technological dependencies on underlying cloud infrastructures.
ClouNS - A Cloud-native Application Reference Model for Enterprise ArchitectsNane Kratzke
The capability to operate cloud-native applications can create enormous business growth and value. But enterprise architects should be aware that cloud-native applications are vulnerable to vendor lock-in. We investigated cloud-native application design principles, public cloud service providers, and industrial cloud standards. All results indicate that most cloud service categories seem to foster vendor lock-in situations which might be especially problematic for enterprise architectures. This might sound disillusioning at first. However, we present a reference model for cloud-native applications that relies only on a small subset of well standardized IaaS services. The reference model can be used for codifying cloud technologies. It can guide technology identification, classification, adoption, research and development processes for cloud-native application and for vendor lock-in aware enterprise architecture engineering methodologies.
Kleine Einführung in die Entwicklung von RESTful APIs mit Dart. Auskopplung eines Foliensatzes aus der Lehrveranstaltung Webtechnologien des Studiengangs Informatik/Softwaretechnik der Fachhochschule Lübeck.
ppbench - A Visualizing Network Benchmark for MicroservicesNane Kratzke
Companies like Netflix, Google, Amazon, Twitter successfully exemplified elastic and scalable microservice architectures for very large systems. Microservice architectures are often realized in a way to deploy services as containers on container clusters. Containerized microservices often use lightweight and REST-based mechanisms. However, this lightweight communication is often routed by container clusters through heavyweight software defined networks (SDN). Services are often implemented in different programming languages adding additional complexity to a system, which might end in decreased performance. Astonishingly it is quite complex to figure out these impacts in the upfront of a microservice design process due to missing and specialized benchmarks. This contribution proposes a benchmark intentionally designed for this microservice setting. We advocate that it is more useful to reflect fundamental design decisions and their performance impacts in the upfront of a microservice architecture development and not in the aftermath. We present some findings regarding performance impacts of some TIOBE TOP 50 programming languages (Go, Java, Ruby, Dart), containers (Docker as type representative) and SDN solutions (Weave as type representative).
About Microservices, Containers and their Underestimated Impact on Network Pe...Nane Kratzke
Microservices are used to build complex applications composed of small, independent and highly decoupled processes. Recently, microservices are often mentioned in one breath with container technologies like Docker. That is why operating system virtualization experiences a renaissance in cloud computing. These approaches shall provide horizontally scalable, easily deployable systems and a high-performance alternative to hypervisors. Nevertheless, performance impacts of containers on top of hypervisors are hardly investigated. Furthermore, microservice frameworks often come along with software defined networks. This contribution presents benchmark results to quantify the impacts of container, software defined networking and encryption on network performance. Even containers, although postulated to be lightweight, show a noteworthy impact to network performance. These impacts can be minimized on several system layers. Some design recommendations for cloud deployed systems following the microservice architecture pattern are derived.
Mit Java 8 haben endlich Lambdas in den Sprachumfang von Java Einzug gehalten. Mittels Lambdas lassen sich viele Probleme kurz und prägnant ausdrücken. Vorliegende Auskopplung aus Handouts zur Vorlesung Programmieren I führt Lambdas und Streams ein und erläutert den Einsatz an vielen kleineren Beispielen.
Dies ist der zweite Teil der Tour de Dart. Der erste Teil hat die Sprache Dart an sich betrachtet. Dieser zweite Teil betrachtet erweiterte Aspekte wie:
Das Library System von Dart und den zugehörigen Paketmanager pub. Die asynchrone Programmierung mittels Streams, Futures und Isolates. File I/O mit Dart. Zugriff auf den DOM-Tree mittels Selektoren sowie Event Handling (Client side). Server und Client side Programmierung unter Nutzung von HttpServer, dem Dart webframework Start und Websockets. Datenkonvertierungen (HTML escaping, XSS prevention, decoding and encoding of JSON, base64 encoding and decoding, hashfunction (CryptoUtils)).
Diese Präsentation gibt einen umfassenden Überblick über die Programmiersprache Dart und ihre Konzepte. Um diesen Überblick schnell erfassen zu können, ist es hilfreich eine Programmiersprache wie bspw. Java zu beherrschen sowie die Konzepte der Objektorientierung zu kennen.
Im Teil I wird die Sprache Dart an sich dargestellt. Es wird ein Überblick über die optionale Typisierung, Datentypen, Funktionen, Operatoren, OO-Möglichkeiten sowie Generics in Dart gegeben.
Teil II wird sich dem Library System von Dart sowie der asynchronen Programmierung, der IO Programmierung, der DOM-Tree Programmierung, server- und clientseitiger Programmierung sowie der Konvertierung von Datenformaten widmen.
Are cloud based virtual labs cost effective? (CSEDU 2012)Nane Kratzke
Cost efficiency is an often mentioned strength of cloud computing. In times of decreasing educational budgets virtual labs provided by cloud computing might be an interesting alternative for higher education organizations or IT training facilities. This contribution analyzes the cost advantage of virtual educational labs provided via cloud computing means and compare these costs to costs of classical ed- ucational labs provided in a dedicated manner. This contribution develops a four step decision making model which might be interesting for colleges, universities or other IT training facilities planning to implement cloud based training facilities. Furthermore this contribution provides interesting findings when cloud computing has economical advantages in education and when not. The developed four step decision making model of general IaaS applicability can be used to find out whether an IaaS cloud based virtual IT lab approach is more cost efficient than a dedicated approach.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Full-RAG: A modern architecture for hyper-personalization
Overcoming Cost Intransparency of Cloud Computing
1. Nane Kratzke
OVERCOMING EX ANTE COST
INTRANSPARENCY OF CLOUDS
Prof. Dr. rer. nat. Nane Kratzke
1
Computer Science and Business Information Systems
2. Analyzing Impacts of Clouds
<=)@:":0$.$"#):"+)A4?$%":"2$)
)"*'!&1($$)($234")56B8)
!"#$%&%'($)*'+$) 9&$%:34")4;)<=>
,-(#$.)/$('0") ,$%?'2$()
!"#$%&& '!'()
1($$)($234")5678) 1($$)($234")5678)
Prof. Dr. rer. nat. Nane Kratzke
2
Computer Science and Business Information Systems
3. Analyzing Impacts of Clouds
to COBIT
Reduced efforts for Additional efforts for
• Continuous Service • Assess and manage IT-Risks
• Manageability of Performance and Capacity • Ensure compliancy with external requirements
• Procure IT-Resources and Identify and allocate costs • More complex Configuration management and IT-
• Monitor and evaluate IT-performance Processes/Relationships
Prof. Dr. rer. nat. Nane Kratzke
3
Computer Science and Business Information Systems
4. Analyzing Impacts of Clouds
to TOGAF
Reduced efforts for
• Use billable SaaS or PaaS items as
building blocks for information
systems architecture
• Data architecture
• Application architecture
• Use billable IaaS items as building
blocks for technology architecture
• Use scalability and cost associativity
as well as pay-as-you-go to generate
new oportunities and solutions
• 100 processing units for one hour
• 100 hours of one processing unit
• Produce (almost) the same costs
• Experimentation is cheap
Prof. Dr. rer. nat. Nane Kratzke
4
Computer Science and Business Information Systems
5. Analyzing Impacts of Clouds
to ITIL
Reduced efforts for
• Service Design
• Capacity Management
• Availability Managemet
• Continuity Management
• Service Operation
• Event Management
• Incident Management
• Problem Management
Additional efforts for
• Service Design
• Service Level Management
• Information Security
Management
• Service Transition
• Asset and Configuration
Management
Prof. Dr. rer. nat. Nane Kratzke
5
Computer Science and Business Information Systems
6. Qualitative Weaknesses and Strengths of Clouds
Strength Weakness
l
cture and low leve
Physical infrastru mer perspective)
o
service free (cust
mpliancy
More complex co t
ted functional managemen
Pro vision of automa
services
t
cu rity managemen
More complex se
(ex post)
Cost transparency
d
rvice, process an
More complex se anagement
ntinuousity and configuration m
Inhe rent scalability, co
availability
Prof. Dr. rer. nat. Nane Kratzke
6
Computer Science and Business Information Systems
7. So – everthing is beautifull?
No substantial show stoppers?
• Higher order showstoppers for cloud approaches
Hard to handle
• Security and Compliance Management
• Incompatible SLAs
• Especially national laws, privacy, data ownership,
confidentiality, data location, forensic evidence, auditing, etc.
• Decision making showstoppers for cloud approaches
Could be solved
• Ex post but no ex ante cost transparency
• Relevant costs of cloud approaches must be known before a
system enters operation
• Otherwise IT investment decisions pro or contra cloud based
approaches can not been made
Prof. Dr. rer. nat. Nane Kratzke
7
Computer Science and Business Information Systems
8. Costs are influenced by
Your System
Usage
Your System Costs
XaaS Usage
Architecture
Prof. Dr. rer. nat. Nane Kratzke
8
Computer Science and Business Information Systems
9. Costs are influenced by ...
To be validated by ongoing research
User accounts
Your System
Usage Amount of unique visitors/users
Amounts of user/system requests
24x7
Loadbalancing and autoscaling
asset groups
Generated Your System
XaaS Usage Architecture Structure of processing tier
(network)
Structure of storage and backup
Data transfer
tier (network)
Data storage
Data processing
Monitoring efforts (e.g. events, IaaS)
Amount of sub-service requests (PaaS, SaaS)
Prof. Dr. rer. nat. Nane Kratzke
9
Computer Science and Business Information Systems
10. Finding nearest neighbors to exploit
comparable ex-post costs of other systems
!"#$%&'()*%&)+),*-&).(/*&
cost estimations
operated systems with ex post costs
planned system
Prof. Dr. rer. nat. Nane Kratzke
10
Computer Science and Business Information Systems
11. Select comparable systems and collected
data by similarity
!"#$%&'()'*)%()#+,-&(.) !"#$%&'()'*)%()#+,-&(.) !"#$%&'()'*)%()#+,-&(.)
/0'12)3%-#2)45678-9#:) /0'12)3%-#2)45678-9#:) /0'12)3%-#2)45678-9#:)
=+) =+) =+)
;'-9) ;'-9) ;'-9)
/'-9-) /'-9-) /'-9-)
System
Selection of the Architecture
most comparable
operated system =+)
/'-9)<%0<10%&'()
>(9#)
:'2#0)
/'-9-)
;0%((,(.)%)<':"%$%30#)
/0'12)3%-#2)45678-9#:)
Prof. Dr. rer. nat. Nane Kratzke
11
Computer Science and Business Information Systems
12. Conclusion
or: Vision for ongoing research
• Collect and Provide Data
• Your System Usage, Provided Service Usage
• Your System Architecture, Costs (Billing)
• of real world cloud-based applications/services
in order to estimate costs for planned cloud-based
costs/services
CLOUDLAB
Cost, Usage, and Architecture Analytics
for Cloud-based Information Systems
Prof. Dr. rer. nat. Nane Kratzke
12
Computer Science and Business Information Systems