This document provides an overview of microservice architecture and related technologies. It defines microservices as small, independent services that work together. Benefits include independent scaling, faster development, and improved resilience. Challenges include additional complexity from distributed systems. Netflix OSS tools like Zuul, Eureka, Ribbon, and Hystrix are discussed for common microservices patterns like API gateway, service discovery, load balancing, and circuit breaking.
This document discusses incident response in the cloud. It begins with an introduction to cloud basics like service and deployment models. It then contrasts traditional incident response with cloud incident response due to the dynamic nature of cloud environments. It stresses the importance of preparation, including establishing response plans with cloud providers and evaluating security controls. Specific areas of focus for preparation are also outlined, like identity management, monitoring, and backups. The document then provides best practices for containment, investigation, and recovery of cloud incidents. It concludes with recommendations on logging, automation, and resources for further information.
This document provides an overview of security best practices for developers. It discusses the software development lifecycle (SDLC) and phases like planning, architecture, testing, and release. It also summarizes Microsoft's recommendations for securing the SDLC, which include training, defining security requirements, threat modeling, using cryptography standards, and regularly penetration testing. The document then covers topics like how HTTP works with different request and response types, common vulnerabilities from the OWASP Top 10, and ways to test applications through penetration testing and bug bounty programs. It provides tips on applying security best practices and knowing about new vulnerabilities, and recommends securing continuous integration/continuous delivery (CI/CD) through techniques like code analysis, container hardening, and
Vert.x is a toolkit for building reactive applications on the JVM. It was awarded for 'Most Innovative Java Technology' at the JAX Innovation awards. Vert.x is event driven, non blocking and polyglot, which makes it an excellent platform for building microservices. In this talk, I’ll share experiences and real-world use cases from a Dutch company that started building reactive web applications with Vert.x about 4 years ago. You’ll learn the concepts behind Vert.x, why we chose Vert.x, how we’re using it and the challenges we faced. Topics include the anatomy of our projects, (micro)services architecture, deployment model and DevOps, scalability, the upgrade from Vert.x 2 to Vert.x 3 and cooperation with the team behind Vert.x. At the end of this session, you’ll know enough about Vert.x to get started yourself right away!
GeekOut 2017 - Microservices in action at the Dutch National PoliceBert Jan Schrijver
Microservices? At the Police? Definitely!
At the Cloud, Big Data and Internet division of the Dutch National Police, 3 DevOps teams use the latest open source technology to build high tech, cloud native web applications in a private cloud. These applications are used to support various types of police work with data from open, online sources and are built using Spring Boot, Angular 4, Spark, Kafka and Jenkins 2.
In this session, I'll share our experiences and real-world use cases for microservices. I’ll explain our architecture, why we chose it, which challenges we face and what this all brings us. I’ll show how 3 teams work together on one product, loosely based on the models used by Spotify and Netflix, and I’ll talk about how we apply the principles of DevOps and Continuous Delivery. I’ll show how we handle security, build pipelines, test automation, performance tests, automated deployments and monitoring.
You’ll leave this session with an understanding of how this approach enables us to have the agility of a startup within the large Police organisation.
Infrastructure microservices such as Service Discovery and Routing need mechanisms to manage distributed state. The most common answer for this is the use of a central, consistent key value store such as Consul, Etcd or Zookeeper. These systems use consensus-based algorithms, such as Raft or Paxos, to provide consistency and failure tolerance.
I believe this is a dangerous direction for our industry, and instead we should be focusing on ease of use and reliabiligy. As such, Weave wants its infrastructure microservices to be decentralized, yet easy to install and run; our approach is inspired by the Internet, which is distributed and operates with no consensus. In this talk, I'll explain how we designed our Service Discovery and Address Management using Convergent Replicated Data Types (CRDTs) and Gossip, review the pros and cons of this concept, and how it compares to alternatives.
This document discusses Comcast's use of OpenStack for cloud computing. It notes that Comcast has 34 regions, over 700 tenants, and 20,000 instances running on OpenStack. It details Comcast's history with OpenStack, including starting in 2012 with three regions on Essex and upgrading to newer versions over time. Currently, Comcast runs IceHouse across 34 regions, with over 960,000 cores, 20,000 VMs, and plans to deploy Mitaka this year across multiple regions.
This document provides an overview of microservice architecture and related technologies. It defines microservices as small, independent services that work together. Benefits include independent scaling, faster development, and improved resilience. Challenges include additional complexity from distributed systems. Netflix OSS tools like Zuul, Eureka, Ribbon, and Hystrix are discussed for common microservices patterns like API gateway, service discovery, load balancing, and circuit breaking.
This document discusses incident response in the cloud. It begins with an introduction to cloud basics like service and deployment models. It then contrasts traditional incident response with cloud incident response due to the dynamic nature of cloud environments. It stresses the importance of preparation, including establishing response plans with cloud providers and evaluating security controls. Specific areas of focus for preparation are also outlined, like identity management, monitoring, and backups. The document then provides best practices for containment, investigation, and recovery of cloud incidents. It concludes with recommendations on logging, automation, and resources for further information.
This document provides an overview of security best practices for developers. It discusses the software development lifecycle (SDLC) and phases like planning, architecture, testing, and release. It also summarizes Microsoft's recommendations for securing the SDLC, which include training, defining security requirements, threat modeling, using cryptography standards, and regularly penetration testing. The document then covers topics like how HTTP works with different request and response types, common vulnerabilities from the OWASP Top 10, and ways to test applications through penetration testing and bug bounty programs. It provides tips on applying security best practices and knowing about new vulnerabilities, and recommends securing continuous integration/continuous delivery (CI/CD) through techniques like code analysis, container hardening, and
Vert.x is a toolkit for building reactive applications on the JVM. It was awarded for 'Most Innovative Java Technology' at the JAX Innovation awards. Vert.x is event driven, non blocking and polyglot, which makes it an excellent platform for building microservices. In this talk, I’ll share experiences and real-world use cases from a Dutch company that started building reactive web applications with Vert.x about 4 years ago. You’ll learn the concepts behind Vert.x, why we chose Vert.x, how we’re using it and the challenges we faced. Topics include the anatomy of our projects, (micro)services architecture, deployment model and DevOps, scalability, the upgrade from Vert.x 2 to Vert.x 3 and cooperation with the team behind Vert.x. At the end of this session, you’ll know enough about Vert.x to get started yourself right away!
GeekOut 2017 - Microservices in action at the Dutch National PoliceBert Jan Schrijver
Microservices? At the Police? Definitely!
At the Cloud, Big Data and Internet division of the Dutch National Police, 3 DevOps teams use the latest open source technology to build high tech, cloud native web applications in a private cloud. These applications are used to support various types of police work with data from open, online sources and are built using Spring Boot, Angular 4, Spark, Kafka and Jenkins 2.
In this session, I'll share our experiences and real-world use cases for microservices. I’ll explain our architecture, why we chose it, which challenges we face and what this all brings us. I’ll show how 3 teams work together on one product, loosely based on the models used by Spotify and Netflix, and I’ll talk about how we apply the principles of DevOps and Continuous Delivery. I’ll show how we handle security, build pipelines, test automation, performance tests, automated deployments and monitoring.
You’ll leave this session with an understanding of how this approach enables us to have the agility of a startup within the large Police organisation.
Infrastructure microservices such as Service Discovery and Routing need mechanisms to manage distributed state. The most common answer for this is the use of a central, consistent key value store such as Consul, Etcd or Zookeeper. These systems use consensus-based algorithms, such as Raft or Paxos, to provide consistency and failure tolerance.
I believe this is a dangerous direction for our industry, and instead we should be focusing on ease of use and reliabiligy. As such, Weave wants its infrastructure microservices to be decentralized, yet easy to install and run; our approach is inspired by the Internet, which is distributed and operates with no consensus. In this talk, I'll explain how we designed our Service Discovery and Address Management using Convergent Replicated Data Types (CRDTs) and Gossip, review the pros and cons of this concept, and how it compares to alternatives.
This document discusses Comcast's use of OpenStack for cloud computing. It notes that Comcast has 34 regions, over 700 tenants, and 20,000 instances running on OpenStack. It details Comcast's history with OpenStack, including starting in 2012 with three regions on Essex and upgrading to newer versions over time. Currently, Comcast runs IceHouse across 34 regions, with over 960,000 cores, 20,000 VMs, and plans to deploy Mitaka this year across multiple regions.
Manage your compactions before they manage you! This document discusses compaction in Cassandra databases. It covers why compaction is needed, different compaction strategies like size-tiered, levelled, and time-series, how to tune strategies, monitoring compactions, and disk tuning tips. The key messages are to select the right strategy for your usage, monitor compactions closely, and tune disk configuration, as compactions involve heavy I/O that must be well managed.
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019Lacework
James Condon presented a guide to securing Kubernetes. He began with an overview of Kubernetes architecture and then discussed major risk vectors like exposed Kubernetes components and pod compromise. He demonstrated finding exposed Kubernetes dashboards, API servers, kubelets, and etcd clusters. Condon recommended 10 essential practices for securing Kubernetes, including network security, role-based access control, security boundaries, upgrading, and audit logging. He concluded with resources for further information.
Vert.x is a toolkit for building reactive applications on the JVM. It is event-driven, non-blocking, and distributed. Malmberg, an educational publisher, is building scalable e-learning applications using Vert.x along with Java 8, AngularJS, and MongoDB on Amazon cloud services. Vert.x is well-suited for building microservices as it allows developing each microservice as an independent Verticle that communicates through the event bus.
TUTORIAL: Digital Forensics and Incident Response in the Cloud
Cloud technologies have made it easier for organizations to adapt rapidly to changing IT needs. Teams may acquire (and destroy) new computing resources at a press of a button providing for very flexible deployment environment. While this capability is generally useful, it does come at the cost of increasing management overheads and particularly degraded security posture. Traditionally, IT managers have provided visibility into organizational inventories and could use this information to enforce org wide standard operating environments (SOEs), institute patching regimes etc. However, with the advent of cloud computing, every team can create new VMs and containers on a whim for both production and development use, typically consisting of the cloud service provider's SOE offering.
In this tutorial we explore open source tools available for managing cloud deployments. In particular we look at the endpoint monitoring solutions provided by Google's Rekall Agent and Facebook's OSQuery and how these can be integrated into typical cloud deployments. Delegates should be able to walk away from this tutorial being able to install and manage a cloud deployment of Rekall Agent and OSQuery on their VM endpoints.
These solutions allow the administrators to gain insight into their enterprise wide deployment. For example, one could ask questions such as:
What is the current patch level of all my cloud VM's and containers for each software package? Which VM's are in need of patching? Which VMs have been created recently, and do they comply with minimum security hardening standards?
Who has remote access to my VM's? E.g. via ssh authorized_keys? Via cloud IAM's security policy?
Do any VM's contain a particular indicator of compromise? E.g. Run a YARA signature over all executables on my virtual machines and tell me which ones match.
Karthik Gaekwad is a cloud native evangelist at Oracle Cloud who previously worked on Oracle's Managed Kubernetes team. He discusses his background in teaching and community building. Common challenges to adopting cloud native technologies include complexity, cultural challenges, lack of training, security, and monitoring. Oracle provides managed Kubernetes services on Oracle Cloud Infrastructure to help with managing Kubernetes control and data planes, container networking and storage, and security. Karthik demonstrates a sample ecommerce application deployed to Kubernetes.
Dublin JUG February 2018 - Building microservices with Vert.xBert Jan Schrijver
Vert.x is a toolkit for building reactive applications on the Java Virtual Machine (JVM). It is used by Malmberg, an educational publisher in the Netherlands, to build scalable e-learning applications. Vert.x is event-driven, non-blocking, and supports multiple programming languages. It allows building microservices by providing lightweight communication between independent processes through its event bus.
Vert.x NL meetup October 2017 - Building microservices with Vert.xBert Jan Schrijver
Vert.x is a toolkit for building reactive applications on the Java Virtual Machine (JVM). It is used by Malmberg, an educational publisher in the Netherlands, to build scalable e-learning applications using microservices. Vert.x is event-driven, non-blocking, and supports multiple programming languages. It allows building distributed applications where verticles (components) communicate through an event bus. Vert.x is well-suited for microservices due to its lightweight verticles that can be developed, deployed, and scaled independently.
Global Azure Bootcamp: Container, Docker & Kubernetes BasicsNico Meisenzahl
This document summarizes a presentation about containerization using Docker and Kubernetes. It introduces Docker as a tool for building and running containerized applications. Kubernetes is introduced as an open-source system for automating deployment, scaling, and management of containerized applications. The presentation demonstrates using kubectl and YAML files to interact with and define resources in a Kubernetes cluster, and discusses concepts like pods, deployments, services and ingress in Kubernetes.
Running Secure Server Software on Insecure Hardware Without ParachuteCloudflare
Nicholas Sullivan discusses the security challenges of running server software on globally distributed edge servers with insecure physical access. He argues for a new approach that distinguishes between long-term and short-term secrets, with the goal of refreshing secrets before attackers can compromise them. Short-term secrets use techniques from digital rights management like white-box cryptography and code obfuscation to impose computational costs on extracting secrets from memory. Long-term secrets are not stored on edge servers and are accessed through short-term secrets.
Malmberg meetup June 2018 - Building microservices with Vert.xBert Jan Schrijver
Vert.x is a toolkit for building reactive applications on the Java Virtual Machine (JVM). It is used to build microservices at an educational publishing company in the Netherlands called Malmberg. Vert.x applications are event-driven, non-blocking, and distributed using an event bus. The presentation discusses why Vert.x was chosen, provides demos of basic and advanced Vert.x features, and explains how Vert.x supports building microservices with characteristics like independence and lightweight communication. Real-world experiences developing with Vert.x for five years are also shared.
Open Source Applied - Real World Use Cases
Justin Reock
Rogue Wave Software - Lead Architect of OSS Support and Services
To find more by Rogue Wave Software: https://www.slideshare.net/RogueWaveSoftware
Orchestrating stateful applications with PKS and PortworxVMware Tanzu
This document provides an overview of Portworx, including:
1. Portworx is a leader in providing stateful container orchestration that works across any cloud or scheduler.
2. It has an experienced team and investors, with headquarters in Los Altos, CA and 70 employees globally.
3. Portworx allows applications to run across different infrastructure types and clouds with a portable cloud stack that provides high availability, replication, security and data mobility features.
Start Building CI/CD as Code. The 7 Lessons Learnt from Deploying and Managin...Amazon Web Services
Discover how your CI/CD can be automated to create consistency and repeat-ability across environments with less reliance on individual team members, confidence in releases and less issues in production.
Using CI to create code pipelines is well understood. However, when it comes to creating the pipelines, reuse, version control and dependencies can cause problems. This can be overcome by turning all your CI into code, not just the pipeline. Learn real-world scenarios of how to incorporate these techniques into your current CI/CD capabilities taking advantage of Jenkins, AWS CodeDeploy, CloudFormation and ECS.
Speaker: Aaron Walker, Technology Director, base2Services
Containers across Clouds - Docker Randstad, April 17th, 2015Fintan Ryan
This document discusses Weave, a tool that allows application portability across infrastructure by enabling container networking across hosts, data centers, and clouds without application changes. Weave provides service discovery, address automation through a secure virtual network, and DNS for containers. It allows containers to connect to each other without specialist networking knowledge and works the same way across single or multiple hosts, data centers, or clouds. Upcoming features for Weave include IPAM, faster data paths, and enhanced DNS integration.
Global Software Development powered by PerforcePerforce
From inception to sunset, hundreds of people from around the world are involved in the production and live operations of video games developed by Electronic Arts. An overview of how EA uses a variety of features in Perforce Helix to effectively utilize its world wide talent pool, develop software efficiently, and protect its intellectual property.
In this talk, we discuss white box cryptography, a technique used to protect cryptographic keys from a local attacker. In keeping with the theme of building and breaking security, we will discuss the challenges involved in building a white-box crypto system.
The document introduces HiPipe, a web-based platform for analyzing next-generation sequencing (NGS) data. HiPipe aims to make NGS data analysis easy for researchers without bioinformatics backgrounds. It allows uploading data from any location and getting rapid analysis results without file size limitations. HiPipe Professional provides additional capabilities like multi-sample analysis, authentication/authorization, and integrated data storage. The document outlines challenges in developing HiPipe and describes its basic architecture and available analysis pipelines. It also introduces related tools for viewing results and functional analysis of variants.
Azure Meetup Hamburg: Production-Ready Terraform Deployments on AzureNico Meisenzahl
Nico Meisenzahl presented on production-ready Terraform deployments on Azure. The presentation introduced Infrastructure as Code (IaC) and Terraform, discussing why IaC is needed and how Terraform works. It provided an overview of Terraform concepts like providers, modules, workflows, and authentication on Azure. The presentation concluded with a demo of using Terraform to provision Azure resources like a service principal and storage container.
Containerizing Traditional ApplicationsJim Bugwadia
Can traditional applications be containerized? Does it make sense to do so? In this meetup session we tackle some of these questions, with a focus on managing stateful applications using Docker or other container technologies!
Multi-cloud Container Management for vRealize AutomationJim Bugwadia
This document discusses multi-cloud container management with vRealize Automation. It introduces Nirmata, a solution that provides a single interface to deploy and manage containerized applications on any cloud. The solution enables self-service provisioning of container hosts and application environments directly in vRealize Automation across vSphere, AWS, and Azure. It also allows enterprises to transform to cloud-native applications without vendor lock-in or loss of visibility and control.
Manage your compactions before they manage you! This document discusses compaction in Cassandra databases. It covers why compaction is needed, different compaction strategies like size-tiered, levelled, and time-series, how to tune strategies, monitoring compactions, and disk tuning tips. The key messages are to select the right strategy for your usage, monitor compactions closely, and tune disk configuration, as compactions involve heavy I/O that must be well managed.
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019Lacework
James Condon presented a guide to securing Kubernetes. He began with an overview of Kubernetes architecture and then discussed major risk vectors like exposed Kubernetes components and pod compromise. He demonstrated finding exposed Kubernetes dashboards, API servers, kubelets, and etcd clusters. Condon recommended 10 essential practices for securing Kubernetes, including network security, role-based access control, security boundaries, upgrading, and audit logging. He concluded with resources for further information.
Vert.x is a toolkit for building reactive applications on the JVM. It is event-driven, non-blocking, and distributed. Malmberg, an educational publisher, is building scalable e-learning applications using Vert.x along with Java 8, AngularJS, and MongoDB on Amazon cloud services. Vert.x is well-suited for building microservices as it allows developing each microservice as an independent Verticle that communicates through the event bus.
TUTORIAL: Digital Forensics and Incident Response in the Cloud
Cloud technologies have made it easier for organizations to adapt rapidly to changing IT needs. Teams may acquire (and destroy) new computing resources at a press of a button providing for very flexible deployment environment. While this capability is generally useful, it does come at the cost of increasing management overheads and particularly degraded security posture. Traditionally, IT managers have provided visibility into organizational inventories and could use this information to enforce org wide standard operating environments (SOEs), institute patching regimes etc. However, with the advent of cloud computing, every team can create new VMs and containers on a whim for both production and development use, typically consisting of the cloud service provider's SOE offering.
In this tutorial we explore open source tools available for managing cloud deployments. In particular we look at the endpoint monitoring solutions provided by Google's Rekall Agent and Facebook's OSQuery and how these can be integrated into typical cloud deployments. Delegates should be able to walk away from this tutorial being able to install and manage a cloud deployment of Rekall Agent and OSQuery on their VM endpoints.
These solutions allow the administrators to gain insight into their enterprise wide deployment. For example, one could ask questions such as:
What is the current patch level of all my cloud VM's and containers for each software package? Which VM's are in need of patching? Which VMs have been created recently, and do they comply with minimum security hardening standards?
Who has remote access to my VM's? E.g. via ssh authorized_keys? Via cloud IAM's security policy?
Do any VM's contain a particular indicator of compromise? E.g. Run a YARA signature over all executables on my virtual machines and tell me which ones match.
Karthik Gaekwad is a cloud native evangelist at Oracle Cloud who previously worked on Oracle's Managed Kubernetes team. He discusses his background in teaching and community building. Common challenges to adopting cloud native technologies include complexity, cultural challenges, lack of training, security, and monitoring. Oracle provides managed Kubernetes services on Oracle Cloud Infrastructure to help with managing Kubernetes control and data planes, container networking and storage, and security. Karthik demonstrates a sample ecommerce application deployed to Kubernetes.
Dublin JUG February 2018 - Building microservices with Vert.xBert Jan Schrijver
Vert.x is a toolkit for building reactive applications on the Java Virtual Machine (JVM). It is used by Malmberg, an educational publisher in the Netherlands, to build scalable e-learning applications. Vert.x is event-driven, non-blocking, and supports multiple programming languages. It allows building microservices by providing lightweight communication between independent processes through its event bus.
Vert.x NL meetup October 2017 - Building microservices with Vert.xBert Jan Schrijver
Vert.x is a toolkit for building reactive applications on the Java Virtual Machine (JVM). It is used by Malmberg, an educational publisher in the Netherlands, to build scalable e-learning applications using microservices. Vert.x is event-driven, non-blocking, and supports multiple programming languages. It allows building distributed applications where verticles (components) communicate through an event bus. Vert.x is well-suited for microservices due to its lightweight verticles that can be developed, deployed, and scaled independently.
Global Azure Bootcamp: Container, Docker & Kubernetes BasicsNico Meisenzahl
This document summarizes a presentation about containerization using Docker and Kubernetes. It introduces Docker as a tool for building and running containerized applications. Kubernetes is introduced as an open-source system for automating deployment, scaling, and management of containerized applications. The presentation demonstrates using kubectl and YAML files to interact with and define resources in a Kubernetes cluster, and discusses concepts like pods, deployments, services and ingress in Kubernetes.
Running Secure Server Software on Insecure Hardware Without ParachuteCloudflare
Nicholas Sullivan discusses the security challenges of running server software on globally distributed edge servers with insecure physical access. He argues for a new approach that distinguishes between long-term and short-term secrets, with the goal of refreshing secrets before attackers can compromise them. Short-term secrets use techniques from digital rights management like white-box cryptography and code obfuscation to impose computational costs on extracting secrets from memory. Long-term secrets are not stored on edge servers and are accessed through short-term secrets.
Malmberg meetup June 2018 - Building microservices with Vert.xBert Jan Schrijver
Vert.x is a toolkit for building reactive applications on the Java Virtual Machine (JVM). It is used to build microservices at an educational publishing company in the Netherlands called Malmberg. Vert.x applications are event-driven, non-blocking, and distributed using an event bus. The presentation discusses why Vert.x was chosen, provides demos of basic and advanced Vert.x features, and explains how Vert.x supports building microservices with characteristics like independence and lightweight communication. Real-world experiences developing with Vert.x for five years are also shared.
Open Source Applied - Real World Use Cases
Justin Reock
Rogue Wave Software - Lead Architect of OSS Support and Services
To find more by Rogue Wave Software: https://www.slideshare.net/RogueWaveSoftware
Orchestrating stateful applications with PKS and PortworxVMware Tanzu
This document provides an overview of Portworx, including:
1. Portworx is a leader in providing stateful container orchestration that works across any cloud or scheduler.
2. It has an experienced team and investors, with headquarters in Los Altos, CA and 70 employees globally.
3. Portworx allows applications to run across different infrastructure types and clouds with a portable cloud stack that provides high availability, replication, security and data mobility features.
Start Building CI/CD as Code. The 7 Lessons Learnt from Deploying and Managin...Amazon Web Services
Discover how your CI/CD can be automated to create consistency and repeat-ability across environments with less reliance on individual team members, confidence in releases and less issues in production.
Using CI to create code pipelines is well understood. However, when it comes to creating the pipelines, reuse, version control and dependencies can cause problems. This can be overcome by turning all your CI into code, not just the pipeline. Learn real-world scenarios of how to incorporate these techniques into your current CI/CD capabilities taking advantage of Jenkins, AWS CodeDeploy, CloudFormation and ECS.
Speaker: Aaron Walker, Technology Director, base2Services
Containers across Clouds - Docker Randstad, April 17th, 2015Fintan Ryan
This document discusses Weave, a tool that allows application portability across infrastructure by enabling container networking across hosts, data centers, and clouds without application changes. Weave provides service discovery, address automation through a secure virtual network, and DNS for containers. It allows containers to connect to each other without specialist networking knowledge and works the same way across single or multiple hosts, data centers, or clouds. Upcoming features for Weave include IPAM, faster data paths, and enhanced DNS integration.
Global Software Development powered by PerforcePerforce
From inception to sunset, hundreds of people from around the world are involved in the production and live operations of video games developed by Electronic Arts. An overview of how EA uses a variety of features in Perforce Helix to effectively utilize its world wide talent pool, develop software efficiently, and protect its intellectual property.
In this talk, we discuss white box cryptography, a technique used to protect cryptographic keys from a local attacker. In keeping with the theme of building and breaking security, we will discuss the challenges involved in building a white-box crypto system.
The document introduces HiPipe, a web-based platform for analyzing next-generation sequencing (NGS) data. HiPipe aims to make NGS data analysis easy for researchers without bioinformatics backgrounds. It allows uploading data from any location and getting rapid analysis results without file size limitations. HiPipe Professional provides additional capabilities like multi-sample analysis, authentication/authorization, and integrated data storage. The document outlines challenges in developing HiPipe and describes its basic architecture and available analysis pipelines. It also introduces related tools for viewing results and functional analysis of variants.
Azure Meetup Hamburg: Production-Ready Terraform Deployments on AzureNico Meisenzahl
Nico Meisenzahl presented on production-ready Terraform deployments on Azure. The presentation introduced Infrastructure as Code (IaC) and Terraform, discussing why IaC is needed and how Terraform works. It provided an overview of Terraform concepts like providers, modules, workflows, and authentication on Azure. The presentation concluded with a demo of using Terraform to provision Azure resources like a service principal and storage container.
Containerizing Traditional ApplicationsJim Bugwadia
Can traditional applications be containerized? Does it make sense to do so? In this meetup session we tackle some of these questions, with a focus on managing stateful applications using Docker or other container technologies!
Multi-cloud Container Management for vRealize AutomationJim Bugwadia
This document discusses multi-cloud container management with vRealize Automation. It introduces Nirmata, a solution that provides a single interface to deploy and manage containerized applications on any cloud. The solution enables self-service provisioning of container hosts and application environments directly in vRealize Automation across vSphere, AWS, and Azure. It also allows enterprises to transform to cloud-native applications without vendor lock-in or loss of visibility and control.
The document summarizes a Kubernetes meetup about networking for microservices. It discusses Contiv, an open source solution for container networking, storage policies, and cluster management. Contiv provides connectivity and policies for networking between containers. It also discusses collecting application telemetry data through the network, such as service interactions and security violations, to help optimize microservices. The meetup concludes with a demo of Contiv's capabilities using an on-demand taxi application as an example.
This document discusses the challenges of scaling microservices and introduces Project Contiv as a solution. It outlines how Contiv can hide infrastructure complexity, provide network isolation through virtual networks per tenant and microservice segments, and implement network-based service routing and security policies. Performance tests show that Contiv can scale to support thousands of security rules without performance degradation. The document concludes with an agenda for a demo of Contiv integrated with Kubernetes.
Simplifying open stack and kubernetes networking with romanaJuergen Brendel
Romana, the open source project by Pani Networks, brings stunning simplicity to the usually so complex networking in OpenStack and Kubernetes. Using only native L3 routing and no overlays, along with automated distributed application of network policies and security rules, it provides operators with easy to understand and manage networking, while allowing network hardware to operate at its best and with full efficiency.
These slides were used during the OpenStack meetup in Auckland in May 2016, hosted by Catalyst IT.
Multi-Cloud Microservices - DevOps Summit Silicon Valley 2015Jim Bugwadia
Learn about the cloud native application maturity model, and how to evolve to microservices style applications deployed in containers, across public and private clouds.
DockerCon US 2016 - Docker Networking deep diveMadhu Venugopal
Docker networking provides a networking fabric for containers called libnetwork that defines the container networking model and provides features like multi-host networking, service discovery, load balancing, and security. New features in Docker 1.12 include networking in swarm mode without an external key-value store, macvlan driver support, a gossip-based secure control plane, optional IPSec for the data plane, built-in DNS for service discovery and load balancing, and a routing mesh for edge routing.
Running Netflix OSS on Docker with NirmataDamien Toledo
Nirmata is an enterprise platform that uses Netflix OSS like Eureka, Zuul, Ribbon, and Archaius to build cloud applications. It allows users to model their business services and deploy them along with infrastructure services to sandbox environments using Docker containers. Services are deployed by launching Docker containers from a central repository in a specific order to ensure dependencies are met. Nirmata addresses challenges in running Docker containers together by configuring ports, service communication, and dependency injection.
This document summarizes a presentation about Romana Cloud Native SDN and multi-tenant networking in Kubernetes. It discusses how Romana embeds tenant and segment IDs in IP addresses to provide layer 3 isolation and tenancy without using overlays. This simplifies operations by eliminating the need for VLANs, VXLANs, and other complex networking constructs. The presentation includes examples of how Romana assigns addresses and isolates tenants, pods, and tiers through network policies. It concludes with an outline of a demo to showcase these capabilities by launching isolated tenants and enforcing policies between tiers.
This document discusses policy-based container networking using Contiv.io. It describes how network policies can be applied between containers within service tiers, between tiers, and for all containers in a tier. Policies can enforce security, provide network services, enable analytics, manage infrastructure usage and IP allocation. The Contiv plugin maps policy intents to Docker constructs like networks and endpoints to instantiate policies and render networking for containers. A demonstration of using Docker Compose with Contiv's plugin to set up a multi-tier application with network policies is described.
This document discusses using Golang for building command line tools. It introduces the speaker, Takaaki Mizuno, and his experience. It then discusses some common use cases for Golang, including web services, mobile apps, daemons/services, and command line tools. It asks which language is commonly used for command line tools and argues that Golang is a good choice. Benefits of Golang for command line tools include producing a single binary, being cross-platform, having no runtime dependencies, and supporting concurrency. Many famous command line tools like Docker are written in Golang. The document demonstrates using the gcli tool to generate a skeleton for a Golang command line tool. It provides some tips for
This document outlines an agenda for a session on the Go programming language. It covers Go's history and development, grammar and syntax, concurrency features using CSP, the standard library and toolchain, interfacing Go with C, popular production and open source projects using Go, and reference materials. The session aims to provide an overview of Go's key features and how it is used in practice.
This was presented at the "Microservices for Enterprises" meetup, March 31, 2016 in Palo Alto, California.
We review the experience of deploying Project Calico in enterprise container environments, and compare/contrast with traditional virtual networking approaches.
Evolving Virtual Networking with IO Visor [OpenStack Summit Austin | April 2016]IO Visor Project
As virtual network functions increasingly run on compute nodes, having efficient monitoring to manage the health of virtual networks has become a key requirement. Traditional monitoring methods are no longer scalable in distributed data plane models and new methods must be developed to offer greater scale without compromising programmability and flexibility. Using IO Visor, high performance monitoring can be achieved for operations and management. Join the session to find out about IO Visor and how it can be used for scalable monitoring of virtual network functions. The talk will also cover using IO Visor to evolve Virtual Network data plane and to enable hardware accelerations.
This document compares Gogs and Jenkins for continuous integration and delivery. It outlines that Gogs is a Git service that can be easily used with Docker, while Jenkins can also run on Docker. It provides a simple demo of setting up Gogs and Jenkins to trigger builds on Git pushes to Gogs. The document also discusses how Jenkinsfiles and pipelines allow developers to define the build process with code and provide visualizations of the pipeline.
What does being "cloud native" mean? In this session, presented at the Austin Microservices Meetup, I explore the four levels of the ODCA Cloud Application Maturity Model and discuss how microservices and containers can help transform applications.
Golang basics for Java developers - Part 1Robert Stern
This document provides an overview of Golang basics for Java developers. It covers Golang's history, features, syntax, data types, flow control, functions and interfaces, concurrency, and differences from Java. Key points include Golang being a compiled, statically typed language created at Google in 2007, its use of packages and imports, basic types like strings and integers, slices for dynamic arrays, maps for key-value pairs, functions with receivers, errors instead of exceptions, and goroutines for concurrency with channels.
Docker Networking with New Ipvlan and Macvlan DriversBrent Salisbury
This document introduces new Docker network drivers called Macvlan and Ipvlan. It provides information on setting up and using these drivers. Some key points:
- Macvlan and Ipvlan allow containers to have interfaces directly on the host network instead of going through NAT or VPN. This provides better performance and no NAT issues.
- The drivers can be used in bridge mode to connect containers to an existing network, or in L2/L3 modes for more flexibility in assigning IPs and routing.
- Examples are given for creating networks with each driver mode and verifying connectivity between containers on the same network.
- Additional features covered include IP address management, VLAN trunking, and dual-stack IPv4/
Unified Underlay and Overlay SDNs for OpenStack CloudsPLUMgrid
Slides from the SFBay OpenStack Meetup
TOPIC: Unified Underlay and Overlay SDNs for OpenStack Clouds
ABSTRACT: With unified underlay and overlay SDNs, IT and operators can leverage best of both technologies to build service-rich SDNs for OpenStack clouds. At this meet up, PLUMgrid will discuss an overlay SDN architecture for service rich SDNs with service function chaining for 3rd party VNFs and demonstrate how to build that using Cisco Nexus 9K as the underlay to leverage the power and throughput of the Nexus fabric.
Enabling Fast IT using Containers, Microservices and DevOps ModelCisco DevNet
This document discusses enabling fast IT using containers, microservices, and DevOps models. It provides an overview of containers and their ecosystem, use cases, and adoption trends. It then describes Contiv, an open source project that provides policy-based networking and storage for containerized applications. It discusses challenges around fast IT adoption and different consumption models. Finally, it concludes that containers will disrupt traditional virtualization and that Contiv provides tools to maintain policies in container infrastructure while embracing fast IT.
Secure your K8s cluster from multi-layersJiantang Hao
The document discusses securing a Kubernetes cluster from multiple layers of risk. It covers securing the infrastructure layer by limiting access and exposure, the control plane layer by enabling TLS and RBAC, the workload layer using pod security policies and network policies, the container runtime layer with tools like Kata Containers, the user misconfiguration layer by avoiding defaults and validating configurations, and useful security tools. The presenter then provides contact information for potential job opportunities.
Go through the result of our latest large-scale study about Docker usage in real environment. Analyze and see the impact for operations and monitoring.
Development of concurrent services using In-Memory Data Gridsjlorenzocima
As part of OTN Tour 2014 believes this presentation which is intented for covers the basic explanation of a solution of IMDG, explains how it works and how it can be used within an architecture and shows some use cases. Enjoy
CLIMB System Introduction Talk - CLIMB LaunchTom Connor
Talk outlining the CLoud Infrastructure for Microbial Bioinformatics (CLIMB) system given at the CLIMB Launch in July 2016. CLIMB is a UK national e-infrastructure providing Microbial Bioinformatics as a Service.
The document provides guidelines for evaluating cloud workload suitability and best practices for cloud architecture. It discusses key considerations for applications in the cloud like performance, elasticity, and resilience. It also outlines suitable and less suitable workloads for cloud. The best practices section describes tactics like designing for failure, decoupling components, implementing elasticity, thinking parallel, optimizing data placement, and security. Examples are given for how to implement these practices on AWS specifically.
Enabling Fast IT using Containers, Microservices and DAVROS models: an overviewCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. As IT strives to become Fast IT, application architectures are undergoing fundamental disruption to enable faster development to deployment lifecycles. As part of this trend, the number of applications being created using microservices architectures and container technologies like Docker is exploding. This new "cloud native" framework makes deployments on-prem or public cloud seamless. In this session, we will look at these evolving trends and how several open source technologies have converged to provide enterprises the ability to innovate at unprecedented levels.
Deliver Best-in-Class HPC Cloud Solutions Without Losing Your MindAvere Systems
While cloud computing offers virtually unlimited capacity, harnessing that capacity in an efficient, cost effective fashion can be cumbersome and difficult at the workload level. At the organizational level, it can quickly become chaos.
You must make choices around cloud deployment, and these choices could have a long-lasting impact on your organization. It is important to understand your options and avoid incomplete, complicated, locked-in scenarios. Data management and placement challenges make having the ability to automate workflows and processes across multiple clouds a requirement.
In this webinar, you will:
• Learn how to leverage cloud services as part of an overall computation approach
• Understand data management in a cloud-based world
• Hear what options you have to orchestrate HPC in the cloud
• Learn how cloud orchestration works to automate and align computing with specific goals and objectives
• See an example of an orchestrated HPC workload using on-premises data
From computational research to financial back testing, and research simulations to IoT processing frameworks, decisions made now will not only impact future manageability, but also your sanity.
Adoption of Cloud Computing in Scientific ResearchYehia El-khatib
Some might say the scientific research community is somewhat behind the curve of adopting the cloud. In this talk, I present a few examples of adopting the cloud from the wider research community. I also highlight some of the aspects by which cloud computing could affect scientific research in the near future and the associated challenges.
Storage os kubernetes clusters need persistent dataLibbySchulze
Kubernetes clusters require persistent storage to unlock their full potential. Without persistent storage, workarounds are needed that sacrifice Kubernetes benefits. StorageOS provides persistent storage through storage classes, allowing multi-tenancy, data encryption, and migration of legacy apps to Kubernetes without additional scaffolding. It also enables features like read-write-many volumes through orchestrating user space NFS.
Scaling Security Workflows in Government AgenciesAvere Systems
For most federal agencies dealing with increased security threats, limiting machine-data collection is not an option. But faced with finite IT budgets, few agencies can continue to absorb the high costs of scaling high-end network attached storage (NAS) or moving to and expanding a block-based storage footprint. During this webcast, you’ll learn about more cost-effective solutions to support large-scale machine-data ingestion and fast data access for security analytics.
You’ll learn about:
- The common challenges organizations face when scaling security workflows
- Why a high-performance cache works to solve these issues
- How to integrate cloud into processing and storage for additional scalability and efficiencies
How DreamHost builds a Public Cloud with OpenStackCarl Perry
This document summarizes DreamHost's presentation on how they built a public cloud using OpenStack. Some key points:
- DreamHost is using OpenStack for compute, storage, and networking in their public cloud offering called DreamCompute.
- For storage, they chose Ceph which provides shared, scalable block and object storage.
- Their network architecture uses 10Gb switches in a spine-leaf topology with logical networking software for tenant isolation.
- Automation is key to managing the cloud infrastructure and providing services to customers.
- DreamHost discussed the considerations and challenges in building the cloud such as scalability, speed, monitoring, security and cost effectiveness.
This document summarizes DreamHost's presentation on how they built a public cloud using OpenStack. Some key points:
- DreamHost is using OpenStack for compute, storage, and networking in their public cloud offering called DreamCompute.
- For storage, they chose Ceph which provides shared, scalable block and object storage.
- Their network architecture uses 10Gb switches in a spine-leaf topology with logical networking software for tenant isolation.
- Automation is key to managing the cloud infrastructure and providing services to customers.
- DreamHost discussed the considerations and challenges in building the cloud such as scalability, speed, monitoring, security and cost effectiveness.
SNIA : Swift Object Storage adding EC (Erasure Code)Odinot Stanislas
In depth presentation on EC integration in Swift object storage. Content delivered by Paul Luse, Sr. Staff Engineer @ Intel and Kevin Greenan, Staff Software Engineer - Box during fall SNIA event
This document discusses how big data assumptions and requirements have changed dramatically, necessitating an evolution in big data solutions. Specifically, it notes that big data now needs to address volume, velocity, and variety as well as real-time response. It also must run over virtualized cloud infrastructure while providing availability, security, and efficiency. The document recommends that big data solutions use infinitely scalable, high-performance data lakes rather than directly attached storage, as well as technologies like containers, network virtualization, and automated deployment and operation. It positions OpenStack as well-suited for big data given its ability to address these needs through integrated services for shared storage, deployment, job scheduling, and more.
Data Lake and the rise of the microservicesBigstep
By simply looking at structured and unstructured data, Data Lakes enable companies to understand correlations between existing and new external data - such as social media - in ways traditional Business Intelligence tools cannot.
For this you need to find out the most efficient way to store and access structured or unstructured petabyte-sized data across your entire infrastructure.
In this meetup we’ll give answers on the next questions:
1. Why would someone use a Data Lake?
2. Is it hard to build a Data Lake?
3. What are the main features that a Data Lake should bring in?
4. What’s the role of the microservices in the big data world?
Narus provides cybersecurity analytics and solutions to help customers gain visibility into their network traffic and security threats. Their technology fuses network, semantic, and user data to provide comprehensive security insights. Key challenges include increasing data volumes and diversity of network deployments. Narus addresses these with an integrated analytics platform that uses machine learning to extract metadata and detect anomalies in real-time and over long periods of stored data. Their hybrid approach leverages both Hadoop/Hbase and relational databases for scalable analytics and business intelligence.
In the last 5 years Pluralsight has grown from one team of 4 engineers to over a dozen teams totaling more than 100 smart, professional software craftsmen. During this time, we have also acquired more than half a dozen companies and disassembled a single monolith into 40+ bounded contexts with hundreds of independent microservices. Come to this talk to learn how we integrated .NET, PHP, Python, NodeJS, Ruby, Elixer, and Scala into a single, functional product offering. Come to this talk to learn how we have embraced team autonomy to create an architecture that allowed us to deliver more than 60 new user experiences over the last year.
- Utah Code Camp on 11 November 2017
Similar to Container Networking Challenges for Production Readiness (20)
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
3. A word about Contiv
Networking for Containers
• Multi-tenant multi-host networking for containers
• Service Load Balancing, Security Policies, Telemetry
• Physical Network Integration, etc.
Storage for Containers
• Persistent Storage for Containers
• Policies for allocation, garbage collection, snapshots, IOPs rate limiting, etc.
• Supports Ceph, NFS backends, etc.
Clustering
• Discover, Provision and Manage nodes
All Open Sourced
• Componentized packages for individual use
• Hacks/Contributions Welcome!
Sponsored by Cisco
4. 1. Scale: 200-500 containers per host may not be unusual
• Efficient Packing; More State (endpoints, networks, policies, DNS queries, etc.)
• More of Everything!
2. Speed: Comes up in a second (many more simultaneously in a cluster)
• Automation is a MUST
• Network/Volume/Scheduling must be quick to provision
• And work at scale!
3. Layers of Orchestration: Container Layer, VM Layer, Physical Layer
• Challenges Workload Visibility: Encap in encap makes it obscure
• Makes Monitoring/Diagnostics difficult
• Reduces Performance: Processing at each layer, and encapsulation/abstraction would affect performance
• Nested and Migrating Apps
4. Stable Predictable Networking Deployment
• Components of networking, and elements should be easy and predictable to install and run
Production Readiness Networking Challenges
5. 5. Application Centric (vs. Infrastructure centric) consumption of resources
• Creating networks, volumes as applications need, and dispose them accordingly
• Must integrate with application blue-print
• Keeping it easy to consume for application
6. Shared Resources
• Needs Predictable resource acquisition/disposal => Need Ops Policies
7. Hybrid Scenarios
• Consistency, Security, Connectivity across heterogeneous workloads
• Across private/public cloud
8. Security
• Tenancy, Isolation, Compliance for network/storage/compute
9. Telemetry and Diagnostics
• Need to be real time, Must work at the scale/speed
Production Readiness Networking Challenges
6. Shared Resources
Policies for Resource
Acquisition
Hybrid Cloud
Consistent Policies For
Network
Security
Tenant Isolation
Security Policies
Telemetry /Diagnostics
Application Statistics
Data Export
Contiv’s Approach
Scale
Route and Policy
Distribution
Speed
Automated
Scale-out
Orchestration Layers
Flat Networks
Bare Metal Options
Application Centric
Integrated with App
Blueprint
7. Elements of Contiv Networking
Cluster-wide Connectivity
Truly Multi-tenant
Network Isolation
Traffic Prioritization
App-Blueprint Integration
Network Monitoring
Scalable
Physical Network Integration: { L2 | L3 | SDN-Fabric }
Micro Services Ready
Leverages NIC
IPAM, Service Discovery
Contiv
Networking
High Throughput