CloudOps Summit 2012, Frankfurt, 20.9.2012 Lightning Talk by
Jelle Frank van der Zwret, Interxion
http://cloudops.de/sprecher/#jellezwet
Find the video of this talk at http://youtu.be/gk6812oRz-Q
The Move to the Cloud for Regulated Industriesdirkbeth
The document discusses the move to cloud computing for regulated industries like pharmaceutical, biotech, and medical device companies. It notes that while 95% of people claim they don't use the cloud, they actually do for online banking, shopping, social media, and storing photos and music. The cloud provides benefits like high reliability, unlimited storage, easy sharing, and supporting enterprise software. However, regulated industries have additional requirements for cloud applications around authentication, encryption, compliance, auditing, and platform qualifications. Examples of potential cloud uses in pharma include drug discovery, clinical data collection, gene sequencing, and collaboration with partners. The future includes benefits like global accessibility, availability, and collaborative environments.
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...Peter de Haas
Presentation I gave on 15 Sept 2009 at the Dutch Datacenter & Hosting Summit 2009.
Main topics of the presentation :
- Look beyond the hype of cloudcomputing
- Microosft vision for cloud computing / online slutions
- Importance of a Partner ecosystem
- The ability to choose the right sourcing and deployment scenario for your organisation
What is Cloud Computing? It can be defined as a web-based technology that remotely delivers computing resources, namely hardware, software and information as services over a network. Learn more about it here. http://www.microsoft.com/en-in/server-cloud/cloud-computing/default.aspx
Collaboration & Social Media New Challenges For Records ManagementMaurene Caplan Grey
Presentation was delivered as the keynote of the 27 Feb 2009, ARMA Northern VA chapter conference (http://www.armamar.org/nova/programs/ARMA%20NOVA%202009%20Seminar%20Brochure-c.pdf).
Broadview Networks offers cloud computing services that allow businesses to:
- Deliver a corporate desktop from anywhere in minutes while maintaining control
- Outsource selected functions to a scalable cloud environment
- Publish and manage business applications with few mouse clicks
Cloud computing provides benefits like mobility, lower costs, disaster avoidance and increased security compared to traditional on-premise IT systems. Broadview can customize a cloud strategy and services to meet specific business needs.
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1Ruud Ramakers
This document discusses cloud computing. It begins by defining cloud computing and discussing its key characteristics like on-demand self-service, ubiquitous network access, resource pooling, rapid elasticity, and pay-per-use pricing. It then discusses how technological advances enabled cloud computing and examples of cloud computing variants and deployment models. The document also covers benefits and opportunities of cloud computing for customers as well as challenges and issues for both customers and suppliers. It provides some examples of large companies and their approaches to cloud computing.
The document is a presentation about running SagePFW in a private cloud called vCloud by Vertical Solutions. It defines cloud computing, discusses the benefits of vCloud such as scalability, security and cost savings over an in-house IT system. It provides an example showing the vCloud solution can save a SagePFW client over $30,000 in costs over 3 years compared to an in-house system. The presentation concludes by taking questions.
Internap’s Adam Weissmuller and Michael Carman of VMware discuss different paths businesses take toward cloud adoption, how to evolve your own cloud strategy and key considerations for choosing a pro
The Move to the Cloud for Regulated Industriesdirkbeth
The document discusses the move to cloud computing for regulated industries like pharmaceutical, biotech, and medical device companies. It notes that while 95% of people claim they don't use the cloud, they actually do for online banking, shopping, social media, and storing photos and music. The cloud provides benefits like high reliability, unlimited storage, easy sharing, and supporting enterprise software. However, regulated industries have additional requirements for cloud applications around authentication, encryption, compliance, auditing, and platform qualifications. Examples of potential cloud uses in pharma include drug discovery, clinical data collection, gene sequencing, and collaboration with partners. The future includes benefits like global accessibility, availability, and collaborative environments.
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...Peter de Haas
Presentation I gave on 15 Sept 2009 at the Dutch Datacenter & Hosting Summit 2009.
Main topics of the presentation :
- Look beyond the hype of cloudcomputing
- Microosft vision for cloud computing / online slutions
- Importance of a Partner ecosystem
- The ability to choose the right sourcing and deployment scenario for your organisation
What is Cloud Computing? It can be defined as a web-based technology that remotely delivers computing resources, namely hardware, software and information as services over a network. Learn more about it here. http://www.microsoft.com/en-in/server-cloud/cloud-computing/default.aspx
Collaboration & Social Media New Challenges For Records ManagementMaurene Caplan Grey
Presentation was delivered as the keynote of the 27 Feb 2009, ARMA Northern VA chapter conference (http://www.armamar.org/nova/programs/ARMA%20NOVA%202009%20Seminar%20Brochure-c.pdf).
Broadview Networks offers cloud computing services that allow businesses to:
- Deliver a corporate desktop from anywhere in minutes while maintaining control
- Outsource selected functions to a scalable cloud environment
- Publish and manage business applications with few mouse clicks
Cloud computing provides benefits like mobility, lower costs, disaster avoidance and increased security compared to traditional on-premise IT systems. Broadview can customize a cloud strategy and services to meet specific business needs.
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1Ruud Ramakers
This document discusses cloud computing. It begins by defining cloud computing and discussing its key characteristics like on-demand self-service, ubiquitous network access, resource pooling, rapid elasticity, and pay-per-use pricing. It then discusses how technological advances enabled cloud computing and examples of cloud computing variants and deployment models. The document also covers benefits and opportunities of cloud computing for customers as well as challenges and issues for both customers and suppliers. It provides some examples of large companies and their approaches to cloud computing.
The document is a presentation about running SagePFW in a private cloud called vCloud by Vertical Solutions. It defines cloud computing, discusses the benefits of vCloud such as scalability, security and cost savings over an in-house IT system. It provides an example showing the vCloud solution can save a SagePFW client over $30,000 in costs over 3 years compared to an in-house system. The presentation concludes by taking questions.
Internap’s Adam Weissmuller and Michael Carman of VMware discuss different paths businesses take toward cloud adoption, how to evolve your own cloud strategy and key considerations for choosing a pro
This document discusses cloud computing and software as a service (SaaS) solutions for online collaboration. It provides an overview of the benefits of SaaS, including lower total cost of ownership compared to on-premises software in the first two years. It also notes that for companies with fewer than 15,000 users, cloud-based email is always cheaper than on-premises email. The document outlines IBM's strategy to deliver essential collaborative services online through its LotusLive platform, including web conferencing, file sharing, email, and partnerships to extend capabilities.
It has always been a challenge to explain and convince top management including the Chief Financial Officers to embark into Cloud Computing. Predominantly because many still unclear or not so very sure what is cloud computing. Is it managed hosting, co-location or managed services? While technology providers and vendors continue to confuse management technology jargon, the need to embark into cloud computing seems inevitable...just like any others before such as the need to have emails, websites, online transactions, web based applications etc.
This presentation provides layman's, easy to understand meaning of cloud computing, why is it important for management,especially the CFO to seriously consider embarking into and some statistics and trend of how the world will move toward cloud.
Overview of SaaS and online services and the business reasons why organisations should be considering these. Delivered by Ben Kepes at Intergen's ON seminar series in May 2010.
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...ASBIS SK
VMware vSphere 5 Cloud Infrastructure Suite provides a virtualized infrastructure that allows applications to run on any device securely. It offers a more flexible and efficient infrastructure through virtualization and cloud computing. This transforms IT by providing dynamic scaling, intelligent management, and a flexible architecture to support changes.
This document discusses challenges facing Microsoft Corporation including economic slowdown, competition, operational efficiency, global expansion, speed to market, aging systems, distributed operations, and integration of new and legacy technologies. It emphasizes priorities such as collaboration, regulatory compliance, addressing demographic changes, work-life balance, and managing information overload through new technologies.
Layer 7 & Burton Group: New Cloud Security Model RequirementsCA API Management
This document summarizes Anne Thomas Manes' presentation on new security models for cloud computing. It discusses how cloud computing requires rethinking security architectures, with services spanning internal and external clouds. It recommends a service-oriented approach to security using layered defenses, mutual reinforcement of service-oriented architecture and security, and considering cloud brokers to enforce policies. Cloud governance is seen as the evolution of service-oriented architecture governance to provide visibility, security and control in cloud environments.
What exactly is Cloud Computing? This is a surprisingly contentious issue and is hotly debated across the industry. Among the many opinions, there is general agreement that Cloud Computing describes IT applications, such as email and CRM, that are delivered from a 3rd party data centre somewhere in the network (“The Cloud”), rather than from your own office. The term ‘Computing’ is used in the broadest IT sense, encompassing servers, storage, communication systems and applications.
Gateway TechnoLabs provides application development and IT outsourcing services to reduce clients' costs and improve productivity. With over 12 years of experience and 1000+ IT professionals, Gateway offers remote infrastructure management (RIM) to design, deploy, manage, and maintain clients' IT infrastructure globally. Gateway's RIM division aims to be an end-to-end provider of outsourced IT infrastructure management services covering servers, networks, security, desktops and more through flexible pricing models and global delivery.
WebSphere Cast Iron Live provides rapid and trusted integration services and web API services in a single solution. The solution allows businesses to quickly assemble and manage web APIs to externalize their enterprise. It includes a developer portal to socialize and increase adoption of APIs. The unified experience provides business analytics, API controls, and application developer management to help businesses manage their web API economy.
This document summarizes key trends driving growth in cloud computing and adoption of cloud services. It outlines the business and IT challenges that cloud computing addresses such as improving agility, reducing costs, and gaining better insights. Survey results are presented showing hybrid cloud models becoming more popular as organizations adopt both private and public cloud. Examples are given of how cloud computing delivers benefits like reduced costs, improved efficiency and flexibility. The document discusses progress towards an open cloud vision and outlines future opportunities in areas like automated resource provisioning, client awareness and open interoperable solutions.
This presentation will discuss concerns and opportunities, business drivers, cisco solutions for enterprise cloud, the compute platform, cisco automation solutions and cloud enablement workshop.
The document provides an overview and briefing of HP Business Service Management 9.1 for Latin America. It discusses top IT trends for 2012 such as reducing costs, cloud adoption, and mobile computing. It then summarizes HP solutions for application performance management, systems management, network management, and service intelligence that provide real-time monitoring, analytics, and automation capabilities across physical, virtual, private and public cloud environments. The solutions leverage a run-time service model and universal event correlation to help customers achieve operational excellence in today's dynamic IT environments.
Cisco live 2013 anything as a service david deakinOptusBusiness
The document discusses the journey to delivering IT services using a "Anything-as-a-Service" model. It begins by building the foundation, which involves getting executive buy-in, identifying suitable workloads to move to cloud, and setting up private cloud infrastructure. The next step is guiding the transformation, which involves changing mindsets, focusing on application placement, and implementing policy-driven governance across cloud providers. The final step is enabling cloud-based services and realizing the benefits such as agility, cost optimization, and demonstrating ROI through measurement of outcomes.
This document summarizes performance testing of a virtual Linux desktop cloud service running on an IBM System z server. The testing validated that a shared Linux platform running z/VM virtualization can efficiently support thousands of concurrent desktop users by optimizing CPU, memory, and I/O usage. Rational Performance Tester was used to simulate many users concurrently accessing a virtual desktop based on the open source eyeos platform. Response times remained reasonable as the number of simulated users increased.
1) The document discusses security challenges presented by cloud computing and best practices for addressing them. Cloud computing demands a new security model as resources are shared between multiple customers in ways not seen before.
2) Key security challenges in the public cloud include lack of transparency and control over security controls, authenticated attackers, lack of a DMZ, reliance on multiple providers including identity/authentication providers, and less visibility into asset management.
3) The document outlines best practices for the public cloud around identity and authentication, asset management, physical security, availability, backups and restoration, application security testing, patch management, and data handling. Customers should evaluate a cloud provider's security capabilities and controls before committing
Cloud computing provides on-demand access to computing resources like servers and applications without long term commitments. It allows users to access services from any device, and pay only for what they use. Moving systems and applications to the cloud can provide benefits like flexibility, scalability, lower costs, increased productivity and mobility.
Presentation on basics of cloud computing models, current status and future use in healthcare environments, differences between traditional outsourcing contracting and cloud contracting, and discussion of e-discovery issues created by cloud environments.
This document summarizes performance testing of a virtual Linux desktop cloud service running on an IBM System z server. Thousands of virtual desktop clients were able to concurrently access an eyeos open source web desktop platform running on Linux on System z. The results validate that a shared all-Linux platform using z/VM virtualization can efficiently support thousands of concurrent desktop users using CPU, memory, and I/O resources. Rational Performance Tester was used to simulate users accessing files and browsing web pages from their virtual desktops to test the scalability and response times of the System z configuration.
IT Authorities is a cloud computing services provider headquartered in Tampa, Florida. They have built a highly advanced and sophisticated cloud computing platform using best-in-breed technologies from Cisco, VMware, and NetApp. Their infrastructure provides enterprise-grade performance, flexibility, security and redundancy through virtualized servers, Cisco Unified Computing fabric, VMware virtualization software, NetApp storage, and Cisco networking and security appliances. Their facilities have robust security, power, cooling and connectivity to enable flexible, scalable cloud services for customers.
The document discusses different types of camera shots including long shots, mid shots, close ups, extreme close ups, two shots, wide shots, point of view shots, bird's eye views, and worm's eye views. Long shots show a whole person from a distance while close ups focus on shoulders and above to reveal emotions. Mid shots show from the waist up for facial expressions. Two shots capture two characters in a scene. Wide shots emphasize scale and distance in landscapes. Point of view shots make the audience feel worried for the vulnerable person being watched without their knowledge. Bird's eye views look directly down to convey size while worm's eye views look directly up.
The document provides information on various animal species. It includes sections on antelope, alpaca, alligators, bears, buffalo, bulls, cats, camels, cows, dogs, donkeys, elephants, earthworms, fish, goats, hens, horses, hippos, kangaroos, lions, llamas, monkeys, moose, owls, pigs, rabbits, rhinos, sheep, snakes, tigers, turkeys, whales, wolves, and zebras. Each section provides some key facts about the species and how they are used by humans.
This document discusses cloud computing and software as a service (SaaS) solutions for online collaboration. It provides an overview of the benefits of SaaS, including lower total cost of ownership compared to on-premises software in the first two years. It also notes that for companies with fewer than 15,000 users, cloud-based email is always cheaper than on-premises email. The document outlines IBM's strategy to deliver essential collaborative services online through its LotusLive platform, including web conferencing, file sharing, email, and partnerships to extend capabilities.
It has always been a challenge to explain and convince top management including the Chief Financial Officers to embark into Cloud Computing. Predominantly because many still unclear or not so very sure what is cloud computing. Is it managed hosting, co-location or managed services? While technology providers and vendors continue to confuse management technology jargon, the need to embark into cloud computing seems inevitable...just like any others before such as the need to have emails, websites, online transactions, web based applications etc.
This presentation provides layman's, easy to understand meaning of cloud computing, why is it important for management,especially the CFO to seriously consider embarking into and some statistics and trend of how the world will move toward cloud.
Overview of SaaS and online services and the business reasons why organisations should be considering these. Delivered by Ben Kepes at Intergen's ON seminar series in May 2010.
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...ASBIS SK
VMware vSphere 5 Cloud Infrastructure Suite provides a virtualized infrastructure that allows applications to run on any device securely. It offers a more flexible and efficient infrastructure through virtualization and cloud computing. This transforms IT by providing dynamic scaling, intelligent management, and a flexible architecture to support changes.
This document discusses challenges facing Microsoft Corporation including economic slowdown, competition, operational efficiency, global expansion, speed to market, aging systems, distributed operations, and integration of new and legacy technologies. It emphasizes priorities such as collaboration, regulatory compliance, addressing demographic changes, work-life balance, and managing information overload through new technologies.
Layer 7 & Burton Group: New Cloud Security Model RequirementsCA API Management
This document summarizes Anne Thomas Manes' presentation on new security models for cloud computing. It discusses how cloud computing requires rethinking security architectures, with services spanning internal and external clouds. It recommends a service-oriented approach to security using layered defenses, mutual reinforcement of service-oriented architecture and security, and considering cloud brokers to enforce policies. Cloud governance is seen as the evolution of service-oriented architecture governance to provide visibility, security and control in cloud environments.
What exactly is Cloud Computing? This is a surprisingly contentious issue and is hotly debated across the industry. Among the many opinions, there is general agreement that Cloud Computing describes IT applications, such as email and CRM, that are delivered from a 3rd party data centre somewhere in the network (“The Cloud”), rather than from your own office. The term ‘Computing’ is used in the broadest IT sense, encompassing servers, storage, communication systems and applications.
Gateway TechnoLabs provides application development and IT outsourcing services to reduce clients' costs and improve productivity. With over 12 years of experience and 1000+ IT professionals, Gateway offers remote infrastructure management (RIM) to design, deploy, manage, and maintain clients' IT infrastructure globally. Gateway's RIM division aims to be an end-to-end provider of outsourced IT infrastructure management services covering servers, networks, security, desktops and more through flexible pricing models and global delivery.
WebSphere Cast Iron Live provides rapid and trusted integration services and web API services in a single solution. The solution allows businesses to quickly assemble and manage web APIs to externalize their enterprise. It includes a developer portal to socialize and increase adoption of APIs. The unified experience provides business analytics, API controls, and application developer management to help businesses manage their web API economy.
This document summarizes key trends driving growth in cloud computing and adoption of cloud services. It outlines the business and IT challenges that cloud computing addresses such as improving agility, reducing costs, and gaining better insights. Survey results are presented showing hybrid cloud models becoming more popular as organizations adopt both private and public cloud. Examples are given of how cloud computing delivers benefits like reduced costs, improved efficiency and flexibility. The document discusses progress towards an open cloud vision and outlines future opportunities in areas like automated resource provisioning, client awareness and open interoperable solutions.
This presentation will discuss concerns and opportunities, business drivers, cisco solutions for enterprise cloud, the compute platform, cisco automation solutions and cloud enablement workshop.
The document provides an overview and briefing of HP Business Service Management 9.1 for Latin America. It discusses top IT trends for 2012 such as reducing costs, cloud adoption, and mobile computing. It then summarizes HP solutions for application performance management, systems management, network management, and service intelligence that provide real-time monitoring, analytics, and automation capabilities across physical, virtual, private and public cloud environments. The solutions leverage a run-time service model and universal event correlation to help customers achieve operational excellence in today's dynamic IT environments.
Cisco live 2013 anything as a service david deakinOptusBusiness
The document discusses the journey to delivering IT services using a "Anything-as-a-Service" model. It begins by building the foundation, which involves getting executive buy-in, identifying suitable workloads to move to cloud, and setting up private cloud infrastructure. The next step is guiding the transformation, which involves changing mindsets, focusing on application placement, and implementing policy-driven governance across cloud providers. The final step is enabling cloud-based services and realizing the benefits such as agility, cost optimization, and demonstrating ROI through measurement of outcomes.
This document summarizes performance testing of a virtual Linux desktop cloud service running on an IBM System z server. The testing validated that a shared Linux platform running z/VM virtualization can efficiently support thousands of concurrent desktop users by optimizing CPU, memory, and I/O usage. Rational Performance Tester was used to simulate many users concurrently accessing a virtual desktop based on the open source eyeos platform. Response times remained reasonable as the number of simulated users increased.
1) The document discusses security challenges presented by cloud computing and best practices for addressing them. Cloud computing demands a new security model as resources are shared between multiple customers in ways not seen before.
2) Key security challenges in the public cloud include lack of transparency and control over security controls, authenticated attackers, lack of a DMZ, reliance on multiple providers including identity/authentication providers, and less visibility into asset management.
3) The document outlines best practices for the public cloud around identity and authentication, asset management, physical security, availability, backups and restoration, application security testing, patch management, and data handling. Customers should evaluate a cloud provider's security capabilities and controls before committing
Cloud computing provides on-demand access to computing resources like servers and applications without long term commitments. It allows users to access services from any device, and pay only for what they use. Moving systems and applications to the cloud can provide benefits like flexibility, scalability, lower costs, increased productivity and mobility.
Presentation on basics of cloud computing models, current status and future use in healthcare environments, differences between traditional outsourcing contracting and cloud contracting, and discussion of e-discovery issues created by cloud environments.
This document summarizes performance testing of a virtual Linux desktop cloud service running on an IBM System z server. Thousands of virtual desktop clients were able to concurrently access an eyeos open source web desktop platform running on Linux on System z. The results validate that a shared all-Linux platform using z/VM virtualization can efficiently support thousands of concurrent desktop users using CPU, memory, and I/O resources. Rational Performance Tester was used to simulate users accessing files and browsing web pages from their virtual desktops to test the scalability and response times of the System z configuration.
IT Authorities is a cloud computing services provider headquartered in Tampa, Florida. They have built a highly advanced and sophisticated cloud computing platform using best-in-breed technologies from Cisco, VMware, and NetApp. Their infrastructure provides enterprise-grade performance, flexibility, security and redundancy through virtualized servers, Cisco Unified Computing fabric, VMware virtualization software, NetApp storage, and Cisco networking and security appliances. Their facilities have robust security, power, cooling and connectivity to enable flexible, scalable cloud services for customers.
The document discusses different types of camera shots including long shots, mid shots, close ups, extreme close ups, two shots, wide shots, point of view shots, bird's eye views, and worm's eye views. Long shots show a whole person from a distance while close ups focus on shoulders and above to reveal emotions. Mid shots show from the waist up for facial expressions. Two shots capture two characters in a scene. Wide shots emphasize scale and distance in landscapes. Point of view shots make the audience feel worried for the vulnerable person being watched without their knowledge. Bird's eye views look directly down to convey size while worm's eye views look directly up.
The document provides information on various animal species. It includes sections on antelope, alpaca, alligators, bears, buffalo, bulls, cats, camels, cows, dogs, donkeys, elephants, earthworms, fish, goats, hens, horses, hippos, kangaroos, lions, llamas, monkeys, moose, owls, pigs, rabbits, rhinos, sheep, snakes, tigers, turkeys, whales, wolves, and zebras. Each section provides some key facts about the species and how they are used by humans.
This document summarizes a market research report conducted by students for furniture retailer BoConcept as it plans to enter the Indian market. The report analyzes BoConcept's competitive environment in India, identifies competitors and their strategies, examines consumer behavior trends, and provides strategic recommendations. Primary and secondary research was conducted, including surveys of Indian consumers in India and Denmark and analysis of industry data. SWOT, PEST, Porter's five forces, and other frameworks were used to evaluate opportunities and threats in the Indian market.
Keynote: JP Schmetz - How i learned to stop worrying and love CloudOps Summit
Jean-Paul Schmetz, HackFwD - How I learned to stop worrying and love the Cloud
---
Please contact us for a downloadable copy of the slides at CloudOps.Summit@googlemail.com .
Follow us on Twitter @CloudOps_Summit and
Facebook http://www.facebook.com/CloudOps
The document summarizes the digital technologies, software, hardware, and internet tools used to plan, create, edit, and distribute products for a media studies course. Key tools included Microsoft Publisher, Paint, Photoshop, Blogger, Survey Monkey, Facebook, YouTube, and SlideShare. Hardware included an iPod Touch, digital SLR camera, tripod, Windows PC, memory stick, scanner, and printer. The tools were used to create schedules, mockups, edit images, conduct surveys, upload videos and presentations, and transfer files between devices.
To search for a company dossier on LexisNexis, click the "Companies" tab and select "Company Dossier". For companies with multiple words in their name, enclose the full name in quotation marks. Once a company name is selected, the dossier provides detailed business information under the company type, parent/subsidiary and public/private designations. Additional reports and legal cases involving the company can be found through the dossier menu and links.
Google Online Marketing Challenge - Organization: Shoe RevoltParth Acharya
This document discusses a campaign by Shoe Revolt, a nonprofit organization, to raise awareness about human trafficking. It outlines the campaign's objective, strategy, and lessons learned over three weeks. The strategy involved using Google Adwords and analyzing metrics like click-through rate and impressions to optimize the campaign. Key lessons included improving ad copy, using different match types for keywords, and implementing automated rules to pause low-performing ads. The document concludes by discussing next steps like recommending website changes and pursuing a new project funded by a $10,000 Google grant.
As the concepts of eLearning and mLearning converge and create every day learning built to support today’s modern learners, how might our design decisions change? Do the elements and principles of design for conventional eLearning prevail? Does the powerful trend of mobile first design win the day? How can you make great decisions that will ensure your course content has a long life, degrades gracefully on a multitude of screens and looks great no matter which way those pesky learners turn those screens?
Join Dr. Allen Partridge, Artist, Designer, Developer and Adobe eLearning Evangelist for this journey into the unknown and barely understood world of design for multimedia eLearning in the multi-device world. You’ll learn practical tips for designing and developing great course content that stands the test of time, and the tide of ever-evolving display sizes and orientations using Adobe Captivate 8.
This document is a resume and cover letter from Mayra Sanchez. She introduces herself as a junior at the University of Illinois pursuing a Bachelor's of Science in Accountancy. She has experience working as an intern at Deloitte Services LP. Friends and former supervisors praise her strengths as being a strong communicator, leader, reliable, and hard worker. While she sees her weaknesses as needing more business knowledge and improving presentation skills, others see her potential weaknesses as getting stressed and taking too much control over situations. She reflects on presenting herself consistently going forward and focusing on being confident, fearless, and inclusive.
Integrating email with social media ebookPML Media
Integrating email with social media can help businesses in several ways:
1) It allows companies to engage directly with target audiences to establish and advance their brand reputation.
2) Social media can acquire opt-in names for email campaigns at a lower cost than list buying and increase content circulation.
3) Marketers can generate more impressions, click-throughs, and sales for advertisers by raising exposure on social media channels.
4) The feedback from social media allows businesses to refine their content and products to provide more relevance and value to customers.
Efectos potenciales a la salud por transgenicos y pesticidasCHST
1. The document discusses potential human health effects from genetically engineered crops and pesticides, including concerns about Bt crops and glyphosate.
2. Studies have found that Bt toxins from crops can survive digestion and negatively impact gut cells in mice. Bt toxins have also been shown to strongly stimulate the immune system.
3. Further testing is recommended to demonstrate the safety of Cry1A proteins and ensure genetically engineered crops do not pose risks to human health before they are commercialized.
The document provides information about the present perfect tense in English. It discusses the form, use, contractions, examples, and exceptions of the present perfect tense. Specifically, it notes that the present perfect tense is used to talk about actions that started in the past but have relevance to the present, actions that occurred at an unspecified time before now, and completed actions that have recent results. It also lists the affirmative, negative, and interrogative forms of the present perfect and provides example sentences to illustrate its use.
The document discusses the various media technologies and software programs the student used to complete their coursework. This included using Blogger to post coursework, research previous students' work, and conduct research; Google to research products and information; Survey Monkey to research their target audience; and YouTube to study existing texts. They used these technologies and software like Microsoft Word, Publisher, and Pages because they were easily accessible and the student was familiar with how to use them. The technologies were used during the research, planning, construction, and evaluation stages of the coursework.
The Life, Death and Afterlife of Virtual Worlds for Education & TrainingAllen Partridge
This is the 2012 LearnX Presentation that I did in Melbourne. Some of the slides may seem a bit odd out of context, but you'll get the gist of it if you're just patient. ;)
- Cloud computing represents a major shift in enterprise IT that will transform the industry over several years.
- It offers opportunities for new cloud-based application and service companies as well as those providing enabling infrastructure.
- Virtualization technologies have allowed data centers to transition from isolated silos to automated and optimized cloud environments, improving efficiency and agility.
This document discusses whether telecom companies should become cloud providers. It outlines some potential benefits, such as leveraging existing investments in data centers and networks, defending existing franchises from competitors, and preserving customer relationships. However, it also notes challenges like meeting enterprise-grade service level agreements and avoiding vendor lock-in. In conclusion, the document advises telecom companies not to rely solely on cloud computing and to maintain a diverse portfolio of services and business models.
The document discusses cloud computing and its benefits. In 3 sentences:
Cloud computing delivers IT services over the internet, allowing users to access applications from any device. It offers scalable resources, pay-per-use pricing with no upfront costs, and removes the need for hardware management. The cloud computing model can help organizations reduce costs, improve resource agility and business agility, and lower their carbon footprint.
This document discusses how a large Asian low-cost airline migrated their web frontend to AWS public cloud to gain scalability. During quarterly sales promotions, the airline's website would go down within minutes due to a surge in traffic that exceeded their existing infrastructure capacity. By using AWS, the airline was able to automatically provision over 60 servers within 25 minutes before each promotion to handle the increased load. This improved site availability and helped convert more customers, while reducing promotion infrastructure costs by 40%. After each promotion, the extra infrastructure was turned off to avoid unnecessary costs.
Another One Zero One Digital Briefing. This one provides an introduction to the world of "Cloud Computing", the way it works, the benefits and the risks for business. We'd love to hear from you if you've got any comments, questions or feedback.
http://www.onezeroone.com.au/
Making of a Successful Cloud Business:
Current Status & Future Requirements
Rajarshi Bhose and Sumit Kumar Bose
Infosys Technologies Limited
Delivered as part of Cloud symposium, at ACM Bangalore COmpute 2009.
Digital media companies face challenges managing infrastructure, rapidly scaling for new formats or devices, and reducing costs. The AWS cloud provides tools to help with media management including ingest, storage, encoding and packaging. It also offers media publishing services such as analytics, websites, streaming, databases and search. AWS provides security, high availability, and flexibility to help digital media companies focus on content instead of infrastructure.
FewebPlus @ microsoft 19 april 2010 cloud continuumTom Crombez
This document discusses the fifth generation of computing and Microsoft's vision for cloud computing. It introduces Microsoft's Windows Azure platform, which provides infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The document outlines the benefits of the Windows Azure platform for independent software vendors (ISVs), agencies, and provides an example scenario of how it could improve a real-life event registration process. It also discusses Windows Azure pricing models and resources for training.
This document discusses recent developments in the cloud computing market. It analyzes strategies and acquisitions by major players like Amazon, Microsoft, Google, IBM, Oracle, and others. It attempts to categorize cloud services into infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The structure of the cloud computing market has evolved from a single public cloud to a mix of public, private, and hybrid cloud models. The document predicts corporations will increasingly utilize a mix of public and private clouds to meet different application and data needs.
This document provides an introduction to cloud computing by defining it, explaining its origins and evolution, and describing its key components and benefits. It defines cloud computing as computing functionality provided as an on-demand service over the internet. It explains how cloud computing has evolved from traditional on-premise computing models and how businesses are increasingly adopting cloud services like SaaS, PaaS and IaaS to improve efficiency, scalability and reduce costs. The document uses examples to illustrate how different types of businesses are leveraging cloud computing in practical ways.
This document advertises an upcoming IGT Annual Event focused on big data, SaaS business, cloud computing, mobility, analytics, social media, and cybersecurity. The event will allow attendees to network with partners and customers, learn about case studies and new technologies, and be part of a professional cloud community. It provides details on registering for the event through the IGTCloud Meetup group.
Never before have businesses and IT directors had more choice about how they consume and deliver IT services. With an established IT services market, rampant virtualization, and now Cloud – what is the best way to delivery IT? And critically, how can it be as efficient as possible? The answer for most business is to create a dynamic equilibrium between different delivery models, using the best of in house, outsourced and cloud delivered IT services in a hybrid approach. Simon Daykin, CTO of Logicalis UK, will present a hybrid delivery model, with a case study of Loughborough University where this has been implemented in practice. In t
Splunk provides software that allows users to search, monitor, and analyze machine-generated data. It collects data from websites, applications, servers, networks and other devices and stores large amounts of data. The software provides dashboards, reports and alerts to help users gain operational intelligence and insights. It is used by over 4,400 customers across many industries to solve IT and business challenges.
The document discusses trends in the IT industry towards more efficient, productive, economical and environmentally friendly data centers. It notes that data growth and demand for IT resources is constantly increasing, outpacing available resources if changes are not made. Technologies like virtualization, cloud computing, and improved hardware densities are enabling organizations to do more with their existing IT infrastructure and remove constraints on growth. The document advocates an approach focused on both efficiency and effectiveness to close the "Green IT gap" and support sustainable business and IT operations.
Hybrid clouds are quickly forming on the horizon, and they are transforming the way that organizations do business. Join David Butler, SVP of Marketing at Eucalyptus, Judith Hurwitz, President and CEO, and Marcia Kaufman, COO and partner, of Hurwitz & Associates and co-authors of “Hybrid Cloud For Dummies” to learn what this new cloud deployment model is all about.
Hybrid clouds are quickly forming on the horizon, and they are transforming the way that organizations do business. Join David Butler, SVP of Marketing at Eucalyptus, Judith Hurwitz, President and CEO, and Marcia Kaufman, COO and partner, of Hurwitz & Associates and co-authors of “Hybrid Cloud For Dummiesto learn what this new cloud deployment model is all about.
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...CloudOps Summit
CloudOps Summit 2012, Frankfurt, 20.9.2012 Track 2 - Build and Run
by Nigel Sanctuary, VP Propositions at Kognitio (www.kognitio.com)
http://cloudops.de/sprecher/#nigelsanctuary
Find the video of this talk at http://youtu.be/wQrHQNOMlKc
Windows Server 2012 vereinfacht die Einrichtung von Direct Access stark. Wie ist die Abgrenzung zum Forefront UAG, was sind die neuen Möglichkeiten und wie sieht DirectAccess in der Praxis aus? Nach dieser Session haben Sie DirectAccess live gesehen und können das Potenzial für Ihr Unternehmen einschätzen.
Metasoft Solutions Pvt Ltd is an IT services and software company established in 2003 that provides end-to-end IT solutions including managed services, cloud services, and unified communications. The company offers hosting, data center infrastructure, server virtualization, private and public cloud services, video conferencing, and collaboration tools. Metasoft aims to be a leading provider of these services in India and the Middle East.
Similar to Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion (20)
This document is a one page CV that introduces Hackandcraft as a boutique product and tech agency. It lists the previous employers of Harry McCarney and Martin Peschke, as well as some of the services offered by Hackandcraft, including data cleansing, normalization, image and text approval, and normalizing free text. Contact information is provided at the bottom for Harry McCarney.
This document discusses how to make enterprise IT more engaging by embracing social networks, BYOD, open source technologies, cloud computing as a philosophy, and DIY approaches. Some specific strategies mentioned include using social networks to create social intranets and help desks, embracing BYOD by supporting HTML5 responsive designs and dealing with Android complexity, leveraging open source tools like Ansible, Redis, and Solr Cloud, and empowering employees to build their own apps by opening up APIs. The overall goal is to move from a traditional "ugly" enterprise IT model to a more "sexy" and vivacious one that focuses on people over transactions and empowers knowledge sharing.
Fidor Bank AG is a fully licensed online bank in Germany that focuses on web 2.0, social media, e-commerce, and mobile banking. It offers a unique combination of banking, payment, and community services. FidorBank's proprietary technology platform allows for high scalability and standardized interfaces. The bank aims to deliver cost-effective and customer-centric services, and has begun international expansion through partnerships.
True Storage Virtualization with Software-Defined StorageCloudOps Summit
The document discusses software-defined storage and how it can virtualize, automate, and centralize storage management. It describes how software-defined storage abstracts physical storage into virtual pools that can be delivered as storage services. These services can be integrated with platforms like VMware and provisioned on-demand to applications in a self-service manner. The software-defined storage approach aims to simplify storage delivery while allowing for extensibility and an open platform for innovation.
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
The document discusses EMC's transformation to an IT-as-a-Service model. Key points include:
1) EMC transitioned IT from an infrastructure focus to applications focus and now a business focus, optimizing IT production for business consumption.
2) This involved virtualizing servers and applications, consolidating data centers, and achieving 90% virtualization of OS images.
3) The transformation aims to provide agility, cost savings, and a 1 day application provisioning time through a service-oriented IT-as-a-Service model.
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...CloudOps Summit
CloudOps Summit 2012, Frankfurt, 20.9.2012
Track 2 - Build and Run by Francesco Incorvaia, fluid Operations AG (@fluidops)
http://cloudops.de/sprecher/#francescoincorvaia
Find the video of this talk at http://youtu.be/Eb0HO0hi_jc
CloudOps Summit 2012, Frankfurt, 20.9.2012
Track 3 - Cloud Skills by Luca Hammer (@luca), work.io
http://cloudops.de/sprecher/#lucahammer
Find the video of this talk at http://youtu.be/i10lvR6MGNs
Amazon Web Services for Disaster Recovery, Attila Narin, AWS CloudOps Summit
CloudOps Summit 2012, Frankfurt, 20.9.2012, Track 2 - Build and Run
by Attila Narin, Senior Solutions Architect AWS
http://cloudops.de/sprecher/#attilanarin
Find the video of this talk at http://youtu.be/PY6SThtenVc
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
1. Truth and Lies about
Latency in the Cloud
Jelle Frank van der Zwet
Global Marketing Manager Cloud
2. Agenda
What you will take away from this presentation
WHAT WHY HOW
is Latency? is Latency to reduce
important? Latency?
3. Remember...?
Do you know
what is was like...
when we didn’t have
high speed internet?
4. Trying to define latency is not simple
• Endpoints aren't fixed:
– High speed fiber
– 3G or 4G mobile networks
• Consider the location of the
ultimate end-users and the
networks that connect them to
the destination networks
• Who are the ultimate "owners"
and "users" of our applications
– Delivering the appropriate service
levels, means also measuring and
controlling the expected latencies
5. The true cost of latency can add up
A half-second delay will cause a 20%
drop in Google's traffic.
A tenth of a second delay can cause a
drop in one percent of Amazon's sales.
6. Todays complicating factors
• Distributed computing
– Then: Everything in 1 enterprise data center
– Now: Distributed applications can employ multiple servers
• Virtualization adds another layer of complexity
– Virtualised network infrastructures can introduce its own series of
packet delays before any data even leaves the rack itself
• It isn't just about ping, either
– Best way to measure and understand latency is to measure the
performance of the same protocols that your applications use.
• Understand Quality of Service and what traffic is prioritized
7. Cloud Infrastructure Requirements
What applications benefit from low latency
Applications Compute Intensity Network Bandwidth Network Latency*
Testing & Development High Low High
Web browsing Low Low High
Backup & Recovery Low High High
Email & Calendar Low Low High
HRM Medium Low High
Document Management Low High Medium
CRM Medium Low Medium
Finance & Accounting High Medium Medium
ERP High Medium Medium
Payments & Transactions Medium High Medium
Virtual Desktops Medium Medium Low
Network Storage High Medium Low
Unified Communication High Medium Low
Online Gaming High Medium Low CDN to get
HD Video streaming High High Low close to end-user
Black Box (M2M) Trading High High Proximity
8. Cloud and Applications
Mapped on Performance and Availability
Performance
We live
in a world of
Backup & Email & CRM Payments & Private Unified Black Box
many clouds
Recovery Calendar Transactions Cloud Communication (M2M) Trading and even more
applications
Availability
Analytics HRM ERP Finance & Virtual Network
Accounting Desktops Storage
Enterprises
Test & Web Document Public Gaming Video & Live
approach cloud
Development Browsing Management Cloud Streaming in silos
High < 80ms RTD Medium < 40ms RTD Low < 20ms RTD < 1ms RTD
9. Why bypass the Internet?
How to connect clouds?
Direct Connect Direct Connect
Private Cloud Public Cloud Managed Hosting
The Internet has no SLA
10. What’s happening in the meet-me-room
Providing more consistent network connections
Backup &
Archiving Supplement capacity when
working with large data sets
Analytics
Big Data
Public Clouds
Virtual
Desktops
Real time data feeds
Collabo-
Direct ration
Private Cloud
Connect Email &
Calendar
Distributed applications
in hybrid environments
CRM
SaaS
HPC
Back up via Planned or unplanned
Internet peaks in capacity
Gaming
Bursting
11. Free Cloud Test Labs
Easy access to industry-leading software, systems and connectivity
Amsterdam – The Netherlands
London – United Kingdom
Frankfurt – Germany
12. More information, download our whitepaper
Truth and Lies about Latency in the Cloud
Jelle Frank
David Strom van der Zwet
David Strom is an international authority on network Jelle Frank (JF) van der Zwet is Global Marketing
and Internet technologies. He is currently the business Manager at Interxion. He has over 13 years of
channels writer for ReadWriteWeb. He also contributes experience in marketing and product development.
to Slashdot.org and GigaOm Pro. He has written He’s a frequent speaker at international events and
extensively on IT-related topics for more than 25 years contributor to Cloud Times, Virtual-Strategy Magazine,
for a wide variety of print publications and websites. Inside-HPC and Wired Cloudline.
www.interxion.com/sectors/cloud
13. Thank you! – Vielen dank!
Jelle Frank van der Zwet
Global Marketing Manager Cloud
jellez@interxion.com