Cometari Dedicated Solutions is a technology company based in Cracow, Poland.
We have knowledge and competence in designing, developing and maintaining complex information systems. We specialise in developing advanced server systems as well as soft web and mobile solutions. If you are looking for a reliable IT partner, Cometari Dedicated Solutions
is the right choice. Website: www.cometari.com
HP0-M48 - HP Load Runner 11.x Software certified and working as a Test Engineer/System analyst in Tech Mahindra Americas Inc. Pvt Ltd in United States – New York and working knowledge of Performance testing and monitoring tools like HP Load Runner, Performance Center, CA Wily Introscope and JConsole.
Expertise in the different workload models like Load, Stress, Coarse-grain, Fine Grain, Flat run, Stability test and Performed Load/Stress Testing and Involved in test execution and reporting of results.
HP0-M48 - HP Load Runner 11.x Software certified and working as a Test Engineer/System analyst in Tech Mahindra Americas Inc. Pvt Ltd in United States – New York and working knowledge of Performance testing and monitoring tools like HP Load Runner, Performance Center, CA Wily Introscope and JConsole.
Expertise in the different workload models like Load, Stress, Coarse-grain, Fine Grain, Flat run, Stability test and Performed Load/Stress Testing and Involved in test execution and reporting of results.
The software development life cycle, or SDLC, encompasses all of the steps that an organization follows when it develops software tools or applications.
A brief report on Client Server Model and Distributed Computing. Problems and Applications are also discussed and Client Server Model in Distributed Systems is also discussed.
Conceptual models of enterprise applications as instrument of performance ana...Leonid Grinshpan, Ph.D.
The article introduces enterprise applications conceptual models that uncover performance related fundamentals distilled of innumerable application particulars concealing the roots of performance issues. The value of conceptual models for performance analysis is demonstrated on two examples of virtualized and non-virtualized applications conceptual models.
There are many ways to ruin a performance testing project, there is just a handful of ways to do it right. This publication analyses the most widespread performance testing blunders. It is impossible in one article to expose all the varieties of testing wrongdoings; as such, this publication is definitely an open-ended.
ACA TRACK is a end to end solution that provides variable hour, part-time and seasonal employee tracking. ACA TRACK automatically provides notification of coverage for newly eligible employees and digitally tracks the delivery and acceptance. In addition, ACA TRACK will track all data (Payroll, Eligibility and LOA) and complete the 1094-C for employers. ACA TRACK provides a live dashboard which will financially project future cost based on current and trending work hours.
Don't fall in the trap of "We can do ACA Compliance" make sure you have a end to end solution.
www.acatrack.net
888-603-4289
The software development life cycle, or SDLC, encompasses all of the steps that an organization follows when it develops software tools or applications.
A brief report on Client Server Model and Distributed Computing. Problems and Applications are also discussed and Client Server Model in Distributed Systems is also discussed.
Conceptual models of enterprise applications as instrument of performance ana...Leonid Grinshpan, Ph.D.
The article introduces enterprise applications conceptual models that uncover performance related fundamentals distilled of innumerable application particulars concealing the roots of performance issues. The value of conceptual models for performance analysis is demonstrated on two examples of virtualized and non-virtualized applications conceptual models.
There are many ways to ruin a performance testing project, there is just a handful of ways to do it right. This publication analyses the most widespread performance testing blunders. It is impossible in one article to expose all the varieties of testing wrongdoings; as such, this publication is definitely an open-ended.
ACA TRACK is a end to end solution that provides variable hour, part-time and seasonal employee tracking. ACA TRACK automatically provides notification of coverage for newly eligible employees and digitally tracks the delivery and acceptance. In addition, ACA TRACK will track all data (Payroll, Eligibility and LOA) and complete the 1094-C for employers. ACA TRACK provides a live dashboard which will financially project future cost based on current and trending work hours.
Don't fall in the trap of "We can do ACA Compliance" make sure you have a end to end solution.
www.acatrack.net
888-603-4289
Cometari Dedicated Solutions jest firmą technologiczną zlokalizowaną w Krakowie. Posiadamy wiedzę i kompetencje w zakresie projektowania, produkcji i utrzymania
złożonych systemów informatycznych. Nasi inżynierowie posiadają wieloletnie doświadczenie branżowe dzięki czemu do każdego tematu podchodzimy indywidualnie. Kładziemy nacisk na szybkość komunikacji z klientem oraz jakość wytwarzanych rozwiązań. Specjalizujemy się w produkcji zaawansowanych systemów serwerowych jak również lekkich rozwiązań webowych oraz mobilnych. Jeśli potrzebujesz rzetelnego partnera technologicznego jesteśmy do dyspozycji.
Cometari Dedicated Solutions Company PresentationJakub Hajek
We are a team of talented and ambitious software engineers, data scientists, graphic and UX designers. We have knowledge and competence in designing, developing and maintaining complex information systems. Our engineers have many years of experience in the area which enables us to meet our clients’ most demanding requirements and adopt an individual approach to every issue we deal with.
An established software development company passionately engaged in providing best Software Development, Mobile App development, Technology Consulting, IT Outsourcing Solutions and Human Capital Management services, Digital Wallet, Travel Portal, E-Learning development with our clients worldwide.
Established in 2009, Elite Mindz is a Software Development Company with proven track record. We are passionately engaged in providing the best Software Solutions to our worldwide clientele. We believe in adopting emerging technologies as per our client’s needs.
Why use SmarTek21? We always provide measurable results, our team members use a flexible approach, adoption of repeatable poroven best practise methodologies, extensive knowledge transfer on every engagment, and high quality documentation including as part of delivery.
Real-Time Monitoring System For Healthcare Services - Silver touchSAP Silver Touch
Silver touch has developed an AUDIM application for a Healthcare Service Provider based in the UK. UDIM application is live in use and running successfully and productively. It is currently being used by 10 UK-based Hospitals to monitor/inspect various aspects and they are very glad about the functionalities and performance of the application.
Healthcare software service provider - Silver TouchSAP Silver Touch
SilverTouch is actively engaged in Enterprise software development, enterprise content management, document managementand IT consulting ser vices such as Business process optimization, process consulting, implementation and customization of ERP.
This time we'll talk about "Canary Deployment with Traefik". You'll learn what Canary Deployment is and why we should do it in the first place. You'll also have the chance to see a technical live demo.
⚙ Jakub Hajek is going to present a cluster built using K3S (Kubernetes light version), on which he will do Traefik deployment version 2.x and a test application. Then, we will release a newer version and check how we can control the traffic between different versions of the application, deployed in one environment.
Traefik as an open source edge router for microservice architecturesJakub Hajek
Traefik is an edge router that can be easily integrated with the common cluster management solutions. The presentation includes features provided in the recent major release of Traefik. The live demo includes presentation of canary deployment, mirroring which are built-in features. The cluster was running on a lightweight version of Kubernets called #k3s.
Container Orchestration with Traefik 2.xJakub Hajek
The presentation includes key features of Traefk - a modern reverse proxy and load balancer for micro services that easily integrates with many cluster technology such as Kubernetes and Docker Swarm.
Docker Logging and analysing with Elastic StackJakub Hajek
Collecting logs from the entire stateless environment is challenging parts of the application lifecycle. Correlating business logs with operating system metrics to provide insights is a crucial part of the entire organization. What aspects should be considered while you design your logging solutions?
This presentation has been given during DevOps Congress in Wrocław. It is about container orchestrations with Docker Swarm and Traefik. It includes the configuration examples of Traefik version 2.0.
The source code used in the presentation: https://github.com/jakubhajek/traefik-swarm
Container Orchestration with Traefk on Docker SwarmJakub Hajek
The presentation contains details of how to set up a fully-fledged environment based on Docker Swarm and Traefk. You will see a multi-tier application stack consisting of Edge router running in the first layer, then the frontend application and NodeJS backend. This is a quite common setup used in a microservices architecture. If you are building a high available environment without a single point of failure, it can be interesting for you.
The source code used in the presentation: https://github.com/jakubhajek/traefik-consul-swarm
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. What are we proud of?
Cometari Dedicated Solutions is a technology company based in Cracow, Poland.
We have knowledge and competence in designing, developing and maintaining complex
information systems. Our engineers have many years of experience in the area which
enables us to meet ourclients’ most demanding requirements and adopt an individual
approach to every issue we deal with. We put a special emphasis on prompt communication
with our clients and the quality of the solutions we develop.
We specialise in developing advanced server systems as well as soft web and mobile
solutions. If you are looking for a reliable IT partner, Cometari Dedicated Solutions
is the right choice.
1. A system for generating marketing games
on mobile platforms (Web)
We were responsible for preparing software architecture and server environments
as well as development and deployment of the software for a range of marketing games
on ready-made templates. For this project we delivered a RESTful IT system with an
interface (WebService) which accounts for collecting valuable information necessary
for creating a design for a game and then sending such a design to Mac Server where
a physical compilation of a game is developed and then sent back to the engine.
www.cometari.com
3. 2. A system for managing events (Web)
It is our independent project which relies on delivering a tool (online) which helps
to coordinate the process of organising events. A basic version has mechanisms
implemented for distributing tickets/ invitations to those who would be interested in
the event. It also delivers solutions which help organisers control the entry to the event.
Aswith our other projects we created an overall system with software and an efficient
environment on which the project was deployed.
3. An application for managing user configurations (Desktop)
For one of our clients we designed and developed
an application for managing the configuration
of the desktop system. Due to the implemented
mechanisms the client can differentiate
the configuration (access control, layout,
functionality) of the system for different users.
www.cometari.com
4. 4. An environment for online press
For one of the publishers we designed a highly available and fully redundant
environment on which the publisher’s portals were deployed. The system handles
about 1,000 requests per second. Our objective was to accelerate portals loading time
and ensuring the continuity of the service. In addition, the project involved implementing
the processes of deploying the application on production environments (Release
Management) and preparing thedevelopment and integration environments.
5. An environment for an online shop.
For one of our clients we designed a web platform on which an online shop was
deployed. The shop was listed in a ranking of TOP 10 online shops (according
to money.pl). One of our objectives was ensuring the continuity of the service
and increasing the capacity of the system.
6. A B2B platform for hotel reservations.
For one of our clients we designed and developed a high availability environment
on which a B2B platform for hotel reservations was deployed.
www.cometari.com
5. What can we offer?
1. The analysis of your company requirements followed by a thorough
documentation of the system/application
We will analyse your requirements which will let us make an outline of a functional
project. We will also create a project of the architecture of the system which will
describe technical aspects of the system using UML. This offer is aimed mainly to entities
taking part in tenders and applying for subsidies (also EU subsidies) where such
documents are required.
2. Software development
Having the architecture in place, we implement the intended functionalities.
Our software engineers are competent in the following technologies: -
languages: Java /J2EE, Groovy
- web technologies: HTML, CSS, JavaScript, Angular, JQuery
- desktop technologies: Eclipse RCP, SWT, JFaces
- container applications: Tomcat, JBoss, Jetty
- data bases: MySQL, Oracle, MongoDB, Postgres
- frameworks: Spring, Hibernate, Struts, Play
- mobile technologies and platforms: Android, iOS
The code which was developed is regularly reviewed in order to ensure its high quality.
3. Quality Assurance - software testing
Testing is done to minimise the risk of serious mistakes in software. Engineers either
develop a testing code (a default test) or produce a report from a manual test. Default
tests are done on build servers and result from a change being registered in the basic
code in the software. Such an approach lessens the risk of making mistakes due to
introducing changes in the already existing code, which is very common.
The tests encompass:
• testing compliance with the requirements (manual/default),
• manual testing of usability,
• efficiency tests (manual/default),
• stress tests (manual/default).
Our software engineers are competent in the following technologies:
- Java / Groovy
- Selenium, SWTBot
- Test NG, JUnit, Hamcrest, Mockito
www.cometari.com
6. 4. Designing and deploying environments.
The process of delivering software is backed by tools such as Continuous Integration/
Continuous Delivery. They do a number of default activities which otherwise would have
to be done manually after delivering the intended amount of code eg. they can build a
code, update the configuration, copy the code to the target servers, doing load tests
etc. If tests fail, deployment of the system is cancelled.
We also offer services connected with designing, developing, maintaining and monitoring
server environments as part of the project or independently on client’s demand.
The main features of the environments we design are high availability and scalability.
Due to such an approach the environment operates in a continuous 24/7 mode all year
round. Every critical element of the system is duplicated, which means that in case of
a breakdown, the traffic is maintained by a spare element. An additional advantage of
such a solution is that when all the elements of the system operate correctly,
the traffic is divided between them, which increases the system’s capacity.
We also configure appropriate tools to monitor the traffic, load and resource usage.
Reports which are generated allow us to detect potentially weak spots of the system
(bottlenecks). The monitoring tools give an advance notice of possible problems with
the service accessibility. Those reports also make it possible to control the usage
of resources and thus allow us to plan expanding the infrastructure if it is necessary.
Our system engineers are competent in the following technologies:
- operation systems : Linux (Redhat, Debian, Centos, Gentoo, Ubuntu),
Windows Server, FreeBSD,
- databases: MySQL, Percona Server, Percona XtraDB Cluster, PostgreSQL,
Oracle Real Application Cluster,
- balancers and high availability mechanisms: Linux Virtual Server, F5 Bigip,
- Storage: Raid, SAN, NAS, ZFS, Glusterfs, Ceph,
- Storage NoSQL: Redis, Mongodb, Cassandra,
- search mechanisms (Full Text Search), Solr, ElasticSearch, Sphinx,
- www and application servers: Apache, Nginx, Lighttpd, IIS, Tomcat, Jboss, Jetty,
- www accelerators (Reverse Proxy): Varnish,
- DNS servers: Bind, PowerDNS, DJBDNS,
- post servers: Postfix, Dovecot, Courier, Exim,
- monitoring mechanisms: Nagios, Zabbix, Anag, Mon, Cacti, Munin,
- version controller systems: GIT, Subversion,
- isolation and virtualisation mechanisms: Vmware, KVM, Xen, OpenVZ, Docker,
- default systems: Ansible, Puppet, Chef,
- mechanisms increasing safety: OpenVPN, Iptables, Shorewall,
- continuous Integration: Jenkins, Maven, Php Phing, TeamCity.
5. Support
We offer administrator’s and developer’s support in relation to systems/environments
developed by us or other providers. We provide our customers with a system for making
remarks or reporting failures should such come up. We deal with any critical
problem immediately..
www.cometari.com
7. How do we do it?
We apply two approaches:
1. We make advance valuations regarding explicit short-term projects (lasting not longer
than three months) unless the nature of the project makes it highly likely that the
requirements will change (eg integration with outer systems)
2. We divide long-term projects (lasting more than three months) into stages. We
evaluate each stage and charge the customer for the work hours put in the project,
which means that the customer pays only for the hours which were devoted to the
project. We guarantee that the cost of each stage will not exceed the estimate.
We work within the SCRUM methodology, which means that the project is divided into
two-week intervals called iterations. Each iteration begins with work planning and
finishes with the presentation of the results. The client (or his representative)
participates in short team meetings which are held every day. It gives him the
opportunity to monitor work progress. The requirements for each stage are described as
tasks and stored in a system for managing the project. It is also where the hours
dedicated to a particular task are reported.
Cometari Dedicated Solutions
Malczewskiego 47A/12, 30 - 207 Kraków, Poland
Phone: +48 123769596, Fax: +48 123769597,
email: info@cometari.com