The document discusses physical architecture design for web applications. It describes several common architecture patterns including single server, separate database, and replicated web servers. Key considerations for architecture design are also outlined, such as performance, scalability, availability, security and constraints related to cost, complexity and standards.
This document describes 10 cloud computing architectures:
1) Hypervisor clustering protects VMs from hypervisor failures through live migration.
2) Load balancing distributes virtual server instances to prevent under/over-utilized servers.
3) Non-disruptive relocation moves services without disruption through replication and live migration.
4) Zero downtime prevents failures through dynamic migration and failover across physical servers.
5) Cloud balancing distributes loads across multiple clouds for improved performance and reliability.
Virtualization Forum 2014, Prague, 22.10.2014
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
The document discusses cloud architecture and describes the different layers of cloud computing including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It explains how virtualization allows for the pooling of computing resources and rapid provisioning of these resources. The document also discusses multi-tenancy and how a single software instance can be configured for multiple tenants' needs in a SaaS environment. As an example, it describes how a payroll processing application currently used by multiple government departments could be migrated to a cloud environment for improved maintenance and reduced costs.
Cio Breakfast Roundtable 05142009 Final Virtualizationguestc900809
The document introduces virtualization and discusses its benefits including increased resource utilization and management efficiency. It defines key virtualization concepts like hypervisors and describes common virtualization software. Benefits of server, storage, and desktop virtualization are outlined. Considerations for virtualization projects include assessments, partnerships, infrastructure readiness, and training.
BMC Discovery is an agentless discovery and dependency mapping tool that automatically discovers configuration and relationship data across an IT infrastructure. It provides visibility into hardware, software, applications and their dependencies. BMC Discovery works by running scans from a virtual appliance using supplied credentials to retrieve configuration information. It analyzes the data to map relationships and can integrate with a CMDB. Security features include encrypted credential storage and secure communications. Prerequisites for deployment include virtual appliances, a Windows proxy server, and credentials for systems being discovered.
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...ijceronline
The focus of the paper is to generate an advance algorithm of resource allocation and load balancing that can deduced and avoid the dead lock while allocating the processes to virtual machine. In VM while processes are allocate they executes in queue , the first process get resources , other remains in waiting state .As rest of VM remains idle . To utilize the resources, we have analyze the algorithm with the help of First-Come, First-Served (FCFS) Scheduling, Shortest-Job-First (SJR) Scheduling, Priority Scheduling, Round Robin (RR) and CloudSIM Simulator.
Could the “C” in HPC stand for Cloud?This paper examines aspects of computing important in HPC (compute and network bandwidth, compute and network latency, memory size and bandwidth, I/O, and so on) and how they are affected by various virtualization technologies. For more information on IBM Systems, visit http://ibm.co/RKEeMO.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
This document discusses different cloud delivery models from the perspective of cloud consumers. It covers considerations for infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). For IaaS, it describes how virtual servers can be accessed and managed. For PaaS, it outlines tools and resources for developers as well as management features. For SaaS, it notes that services usually have APIs to incorporate into other solutions and discusses customization options and responsibilities for cloud consumers.
This document describes 10 cloud computing architectures:
1) Hypervisor clustering protects VMs from hypervisor failures through live migration.
2) Load balancing distributes virtual server instances to prevent under/over-utilized servers.
3) Non-disruptive relocation moves services without disruption through replication and live migration.
4) Zero downtime prevents failures through dynamic migration and failover across physical servers.
5) Cloud balancing distributes loads across multiple clouds for improved performance and reliability.
Virtualization Forum 2014, Prague, 22.10.2014
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
The document discusses cloud architecture and describes the different layers of cloud computing including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It explains how virtualization allows for the pooling of computing resources and rapid provisioning of these resources. The document also discusses multi-tenancy and how a single software instance can be configured for multiple tenants' needs in a SaaS environment. As an example, it describes how a payroll processing application currently used by multiple government departments could be migrated to a cloud environment for improved maintenance and reduced costs.
Cio Breakfast Roundtable 05142009 Final Virtualizationguestc900809
The document introduces virtualization and discusses its benefits including increased resource utilization and management efficiency. It defines key virtualization concepts like hypervisors and describes common virtualization software. Benefits of server, storage, and desktop virtualization are outlined. Considerations for virtualization projects include assessments, partnerships, infrastructure readiness, and training.
BMC Discovery is an agentless discovery and dependency mapping tool that automatically discovers configuration and relationship data across an IT infrastructure. It provides visibility into hardware, software, applications and their dependencies. BMC Discovery works by running scans from a virtual appliance using supplied credentials to retrieve configuration information. It analyzes the data to map relationships and can integrate with a CMDB. Security features include encrypted credential storage and secure communications. Prerequisites for deployment include virtual appliances, a Windows proxy server, and credentials for systems being discovered.
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...ijceronline
The focus of the paper is to generate an advance algorithm of resource allocation and load balancing that can deduced and avoid the dead lock while allocating the processes to virtual machine. In VM while processes are allocate they executes in queue , the first process get resources , other remains in waiting state .As rest of VM remains idle . To utilize the resources, we have analyze the algorithm with the help of First-Come, First-Served (FCFS) Scheduling, Shortest-Job-First (SJR) Scheduling, Priority Scheduling, Round Robin (RR) and CloudSIM Simulator.
Could the “C” in HPC stand for Cloud?This paper examines aspects of computing important in HPC (compute and network bandwidth, compute and network latency, memory size and bandwidth, I/O, and so on) and how they are affected by various virtualization technologies. For more information on IBM Systems, visit http://ibm.co/RKEeMO.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
This document discusses different cloud delivery models from the perspective of cloud consumers. It covers considerations for infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). For IaaS, it describes how virtual servers can be accessed and managed. For PaaS, it outlines tools and resources for developers as well as management features. For SaaS, it notes that services usually have APIs to incorporate into other solutions and discusses customization options and responsibilities for cloud consumers.
This document discusses cloud computing concepts including its key characteristics, service models, and deployment models. Cloud computing refers to applications and services delivered over the internet using shared computing resources. The main advantages of cloud computing are no upfront investment in servers or software, flexibility, scalability, and pay-per-use models. The three service models are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). The four deployment models are private cloud, public cloud, hybrid cloud, and community cloud. Security and programmability are ongoing challenges that cloud computing aims to address through standardization.
Whitepaper Exchange 2007 Changes, Resilience And Storage ManagementAlan McSweeney
This document discusses how the IBM N Series storage system can provide resilient storage management for Exchange 2007 mail systems. Key features of the N Series include SnapMirror for disaster recovery, SnapManager for backups, and single mailbox recovery. These features help optimize Exchange storage, improve resilience against failures, and simplify management of mail data.
The document discusses storage options and architectures for managing digital image data over long periods of time. It outlines objectives to provide high-level information on storage solutions and initiate discussions on configurations. Sample storage architectures are described, including multi-tier solutions using primary, secondary and tertiary storage, as well as hierarchical storage management. Hardware options like disk, tape, optical storage and virtual tape libraries are also summarized.
The document discusses VMware's strategy and solutions for virtualization. It highlights virtualization as the top strategic technology for 2009 according to Gartner. It outlines VMware's virtualization solutions like server consolidation, virtual desktop infrastructure, and disaster recovery. It also discusses VMware's strategy to evolve its virtualization platform into a "Virtual Datacenter Operating System" to provide services and automation across the entire datacenter.
The document discusses server virtualization technologies and performance testing best practices. It provides details on:
1) The anatomy of a virtual system including hardware virtualization, type 1 and type 2 hypervisors, and allocating VM resources.
2) Key factors for performance testers including modeling virtual workloads, identifying bottlenecks, and effective testing techniques.
3) A case study where a company consolidated 18 servers onto 3 virtual hosts, reduced costs, and performance testing showed maintained or improved performance.
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Paula Koziol
IBM Spectrum Virtualize delivers business continuity capabilities using a stretched cluster configuration together with VMware Site Recovery Manager (SRM). The result is an end-to-end disaster recovery solution for organizations of all sizes. Join this session to understand how IBM Spectrum Virtualize, including offerings like IBM SAN Volume Controller (SVC) and IBM Storwize Family, integrates with VMware SRM to automate and optimize disaster recovery operations. Everyone who works in mission critical environments understands the need for high availability and effective solutions for planned and unplanned outages. Organizations demand disaster recovery operations that are fully automated and can be executed in a repeatable manner, so that they are always prepared for disaster situations. This IBM-VMware solution offers SMB and enterprise customers the ability to survive a wide range of failures and enables seamless migration of applications across company sites for various planned activities, enabling zero-downtime application mobility.
This document discusses challenges related to virtual machine (VM) migration in cloud computing. It provides background on cloud computing and virtual machines. Key issues discussed include automated service provisioning, VM migration for server consolidation and energy management, and security challenges. The document also covers motivation for VM migration when workload increases trigger resource requirement changes. Methods for VM migration discussed include memory, network, and device migration techniques. Performance evaluation results of migration are presented. Migration across data centers introduces additional challenges like increased latency. Proposed solutions discussed encryption for security and redirection approaches to handle increased latency.
Microsoft System Center Virtual Machine Manager 2008 R2 provides centralized management of virtual machines running on Hyper-V, Virtual Server, and VMware ESX/ESXi hypervisors. It allows administrators to provision and deploy virtual machines, perform conversions between physical and virtual machines, and optimize resource utilization across virtualized hosts. The latest release adds enhanced VMware management capabilities and more flexible delegation of administrative tasks through self-service portals and PowerShell scripting.
Distributed Services Scheduling and Cloud ProvisioningAr Agarwal
This is the presentation for my final year project at NIT Allahabad (2013-14). The purpose of the project is to design a scheduling algorithm for cloud environment with proper resource management.
Psdot 15 performance analysis of cloud computingZTech Proje
The document discusses performance analysis of cloud computing centers using queuing systems. It aims to evaluate key performance indicators like response time distribution and mean number of tasks using a queuing model. The proposed system models cloud server farms as COCOMO II systems to obtain more accurate estimations of performance metrics while addressing issues with existing models like high traffic intensity and service time variation. It analyzes how changing server numbers and buffer sizes impacts the performance indicators.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
IRJET- Load Balancing Cluster based on Linux Virtual ServerIRJET Journal
1) The document discusses load balancing techniques for distributed server clusters using Linux Virtual Server (LVS). LVS allows building a virtual server from a cluster of real servers to improve scalability and availability.
2) It presents an LVS cluster architecture with multiple front-ends that can also act as back-ends to remove bottlenecks and balance loads more effectively as requests increase.
3) The proposed scheduling algorithm distributes requests equally among servers considering their loads, allowing servers to redirect requests to less busy backends to avoid overloading.
Log insight technical overview customer facing (based on 3.x)David Pasek
This document provides an overview and technical details of VMware vRealize Log Insight 3.3. It discusses the key capabilities of Log Insight including intelligent operations through machine learning, its usage for troubleshooting, monitoring, and as an unstructured data warehouse. Details are given around Log Insight's architecture, scalability, high availability, enhanced vSphere integration, administration features, and how it can analyze log data from virtual, physical, and cloud environments.
The document compares the technical architectures, operational requirements, and costs of SRDF and Dataguard for database replication. Some key differences noted are that Dataguard replicates transactions through log shipping while SRDF replicates blocks and may replicate corrupt blocks. Dataguard standbys can be opened for read-only operations more easily while SRDF volumes need to be mounted at the OS level. Dataguard has additional maintenance and monitoring needs while SRDF has lower resource costs. The document also lists some stress testing, operational, and maintenance requirements for a Dataguard configuration.
This document discusses setting up System Center Configuration Manager (SCCM) on Microsoft Azure. It begins with an overview of cloud computing benefits and Microsoft Azure features. It then reviews the System Center suite and describes the SCCM on Azure architecture with a SQL database, IIS, and load balancer. Steps are provided for deploying the base configuration in Azure. The document demonstrates SCCM functionality and concludes with notes on additional configuration topics.
SRDF (Symmetrix Remote Data Facility) is EMC's software solution that provides disaster recovery and business continuity capabilities. It works by duplicating production site data on a physically separate recovery site transparently. This allows fast switchover to the copied data if the primary site becomes unavailable, minimizing downtime. SRDF can operate over IP networks or Fibre Channel, and works with the Symmetrix enterprise storage system and various host platforms. Its benefits include eliminating expensive and inflexible manual backup/restore, improving cost-effectiveness, and providing high availability of critical data and applications.
This chapter introduces and describes several of the more common foundational cloud architectural models, each exemplifying a common usage and characteristic of contemporary cloud-based environments. The involvement and importance of different combinations of cloud computing mechanisms in relation to these architectures are explored.
When an Auto Scaling group is first created with a minimum of 3 and maximum of 5 instances, Auto Scaling will initially launch 3 instances to satisfy the minimum capacity setting.
So in this case, the initial number of instances launched by Auto Scaling when configuring the group would be 3.
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackupSymantec
Symantec NetBackup delivers reliable backup and recovery across applications,
platforms, physical and virtual environments.1 A single console unites the management and reporting of both on-premises and on-cloud information to provide additional operating efficiencies and simplified administration. The NetBackup platform has deep VMware® and Microsoft Hyper-V integration, built-in deduplication to protect the private cloud, seamless integration with industry-leading public cloud storage providers, self-service and multi-tenancy for backup as a service (BaaS).
The NetBackup cloud storage module enables you to backup and restore data from cloud storage providers and is integrated with Symantec's Open Storage (OST) module which provides features that can enhance the operational experience of backup and recovery from the cloud.
This document discusses Microsoft's Private Cloud Solution using System Center Virtual Machine Manager Self Service Portal 2.0 (SSP 2.0). It demonstrates SSP 2.0 in 4 scenarios: 1) configuring data center resources and integrating with VMM, 2) onboarding business units and requesting infrastructure, 3) approving requests and provisioning infrastructure, and 4) self-service virtual machine provisioning. It also discusses SSP 2.0's logical architecture, portal configuration, self-service features, dashboard reporting, and utilization chargeback capabilities. The presentation aims to provide an overview of building private IaaS clouds with SSP 2.0.
The document summarizes various physical architecture patterns for web applications, including single server, separate database, replicated web servers, separate scripting engines, application servers, and J2EE architectures. It also discusses dimensions to consider in architecture design like performance, scalability, and constraints. Additional topics covered include web caching techniques and an overview of cloud computing characteristics and service models.
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)Carles Farré
This document summarizes various design patterns and frameworks related to web presentation layers and business layers. For web presentation layers, it discusses the Context Object pattern for encapsulating state, the Synchronizer Token pattern for controlling request flow, and different approaches to session state management. It also reviews integration patterns for connecting web presentation and business layers, including the Service Locator and Business Delegate patterns. Finally, it examines common architectural patterns for the business layer such as Transaction Script, Domain Model, and Table Module.
This document discusses cloud computing concepts including its key characteristics, service models, and deployment models. Cloud computing refers to applications and services delivered over the internet using shared computing resources. The main advantages of cloud computing are no upfront investment in servers or software, flexibility, scalability, and pay-per-use models. The three service models are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). The four deployment models are private cloud, public cloud, hybrid cloud, and community cloud. Security and programmability are ongoing challenges that cloud computing aims to address through standardization.
Whitepaper Exchange 2007 Changes, Resilience And Storage ManagementAlan McSweeney
This document discusses how the IBM N Series storage system can provide resilient storage management for Exchange 2007 mail systems. Key features of the N Series include SnapMirror for disaster recovery, SnapManager for backups, and single mailbox recovery. These features help optimize Exchange storage, improve resilience against failures, and simplify management of mail data.
The document discusses storage options and architectures for managing digital image data over long periods of time. It outlines objectives to provide high-level information on storage solutions and initiate discussions on configurations. Sample storage architectures are described, including multi-tier solutions using primary, secondary and tertiary storage, as well as hierarchical storage management. Hardware options like disk, tape, optical storage and virtual tape libraries are also summarized.
The document discusses VMware's strategy and solutions for virtualization. It highlights virtualization as the top strategic technology for 2009 according to Gartner. It outlines VMware's virtualization solutions like server consolidation, virtual desktop infrastructure, and disaster recovery. It also discusses VMware's strategy to evolve its virtualization platform into a "Virtual Datacenter Operating System" to provide services and automation across the entire datacenter.
The document discusses server virtualization technologies and performance testing best practices. It provides details on:
1) The anatomy of a virtual system including hardware virtualization, type 1 and type 2 hypervisors, and allocating VM resources.
2) Key factors for performance testers including modeling virtual workloads, identifying bottlenecks, and effective testing techniques.
3) A case study where a company consolidated 18 servers onto 3 virtual hosts, reduced costs, and performance testing showed maintained or improved performance.
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Paula Koziol
IBM Spectrum Virtualize delivers business continuity capabilities using a stretched cluster configuration together with VMware Site Recovery Manager (SRM). The result is an end-to-end disaster recovery solution for organizations of all sizes. Join this session to understand how IBM Spectrum Virtualize, including offerings like IBM SAN Volume Controller (SVC) and IBM Storwize Family, integrates with VMware SRM to automate and optimize disaster recovery operations. Everyone who works in mission critical environments understands the need for high availability and effective solutions for planned and unplanned outages. Organizations demand disaster recovery operations that are fully automated and can be executed in a repeatable manner, so that they are always prepared for disaster situations. This IBM-VMware solution offers SMB and enterprise customers the ability to survive a wide range of failures and enables seamless migration of applications across company sites for various planned activities, enabling zero-downtime application mobility.
This document discusses challenges related to virtual machine (VM) migration in cloud computing. It provides background on cloud computing and virtual machines. Key issues discussed include automated service provisioning, VM migration for server consolidation and energy management, and security challenges. The document also covers motivation for VM migration when workload increases trigger resource requirement changes. Methods for VM migration discussed include memory, network, and device migration techniques. Performance evaluation results of migration are presented. Migration across data centers introduces additional challenges like increased latency. Proposed solutions discussed encryption for security and redirection approaches to handle increased latency.
Microsoft System Center Virtual Machine Manager 2008 R2 provides centralized management of virtual machines running on Hyper-V, Virtual Server, and VMware ESX/ESXi hypervisors. It allows administrators to provision and deploy virtual machines, perform conversions between physical and virtual machines, and optimize resource utilization across virtualized hosts. The latest release adds enhanced VMware management capabilities and more flexible delegation of administrative tasks through self-service portals and PowerShell scripting.
Distributed Services Scheduling and Cloud ProvisioningAr Agarwal
This is the presentation for my final year project at NIT Allahabad (2013-14). The purpose of the project is to design a scheduling algorithm for cloud environment with proper resource management.
Psdot 15 performance analysis of cloud computingZTech Proje
The document discusses performance analysis of cloud computing centers using queuing systems. It aims to evaluate key performance indicators like response time distribution and mean number of tasks using a queuing model. The proposed system models cloud server farms as COCOMO II systems to obtain more accurate estimations of performance metrics while addressing issues with existing models like high traffic intensity and service time variation. It analyzes how changing server numbers and buffer sizes impacts the performance indicators.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
IRJET- Load Balancing Cluster based on Linux Virtual ServerIRJET Journal
1) The document discusses load balancing techniques for distributed server clusters using Linux Virtual Server (LVS). LVS allows building a virtual server from a cluster of real servers to improve scalability and availability.
2) It presents an LVS cluster architecture with multiple front-ends that can also act as back-ends to remove bottlenecks and balance loads more effectively as requests increase.
3) The proposed scheduling algorithm distributes requests equally among servers considering their loads, allowing servers to redirect requests to less busy backends to avoid overloading.
Log insight technical overview customer facing (based on 3.x)David Pasek
This document provides an overview and technical details of VMware vRealize Log Insight 3.3. It discusses the key capabilities of Log Insight including intelligent operations through machine learning, its usage for troubleshooting, monitoring, and as an unstructured data warehouse. Details are given around Log Insight's architecture, scalability, high availability, enhanced vSphere integration, administration features, and how it can analyze log data from virtual, physical, and cloud environments.
The document compares the technical architectures, operational requirements, and costs of SRDF and Dataguard for database replication. Some key differences noted are that Dataguard replicates transactions through log shipping while SRDF replicates blocks and may replicate corrupt blocks. Dataguard standbys can be opened for read-only operations more easily while SRDF volumes need to be mounted at the OS level. Dataguard has additional maintenance and monitoring needs while SRDF has lower resource costs. The document also lists some stress testing, operational, and maintenance requirements for a Dataguard configuration.
This document discusses setting up System Center Configuration Manager (SCCM) on Microsoft Azure. It begins with an overview of cloud computing benefits and Microsoft Azure features. It then reviews the System Center suite and describes the SCCM on Azure architecture with a SQL database, IIS, and load balancer. Steps are provided for deploying the base configuration in Azure. The document demonstrates SCCM functionality and concludes with notes on additional configuration topics.
SRDF (Symmetrix Remote Data Facility) is EMC's software solution that provides disaster recovery and business continuity capabilities. It works by duplicating production site data on a physically separate recovery site transparently. This allows fast switchover to the copied data if the primary site becomes unavailable, minimizing downtime. SRDF can operate over IP networks or Fibre Channel, and works with the Symmetrix enterprise storage system and various host platforms. Its benefits include eliminating expensive and inflexible manual backup/restore, improving cost-effectiveness, and providing high availability of critical data and applications.
This chapter introduces and describes several of the more common foundational cloud architectural models, each exemplifying a common usage and characteristic of contemporary cloud-based environments. The involvement and importance of different combinations of cloud computing mechanisms in relation to these architectures are explored.
When an Auto Scaling group is first created with a minimum of 3 and maximum of 5 instances, Auto Scaling will initially launch 3 instances to satisfy the minimum capacity setting.
So in this case, the initial number of instances launched by Auto Scaling when configuring the group would be 3.
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackupSymantec
Symantec NetBackup delivers reliable backup and recovery across applications,
platforms, physical and virtual environments.1 A single console unites the management and reporting of both on-premises and on-cloud information to provide additional operating efficiencies and simplified administration. The NetBackup platform has deep VMware® and Microsoft Hyper-V integration, built-in deduplication to protect the private cloud, seamless integration with industry-leading public cloud storage providers, self-service and multi-tenancy for backup as a service (BaaS).
The NetBackup cloud storage module enables you to backup and restore data from cloud storage providers and is integrated with Symantec's Open Storage (OST) module which provides features that can enhance the operational experience of backup and recovery from the cloud.
This document discusses Microsoft's Private Cloud Solution using System Center Virtual Machine Manager Self Service Portal 2.0 (SSP 2.0). It demonstrates SSP 2.0 in 4 scenarios: 1) configuring data center resources and integrating with VMM, 2) onboarding business units and requesting infrastructure, 3) approving requests and provisioning infrastructure, and 4) self-service virtual machine provisioning. It also discusses SSP 2.0's logical architecture, portal configuration, self-service features, dashboard reporting, and utilization chargeback capabilities. The presentation aims to provide an overview of building private IaaS clouds with SSP 2.0.
The document summarizes various physical architecture patterns for web applications, including single server, separate database, replicated web servers, separate scripting engines, application servers, and J2EE architectures. It also discusses dimensions to consider in architecture design like performance, scalability, and constraints. Additional topics covered include web caching techniques and an overview of cloud computing characteristics and service models.
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)Carles Farré
This document summarizes various design patterns and frameworks related to web presentation layers and business layers. For web presentation layers, it discusses the Context Object pattern for encapsulating state, the Synchronizer Token pattern for controlling request flow, and different approaches to session state management. It also reviews integration patterns for connecting web presentation and business layers, including the Service Locator and Business Delegate patterns. Finally, it examines common architectural patterns for the business layer such as Transaction Script, Domain Model, and Table Module.
This document provides a summary of the history and development of virtualization technology. It discusses early virtualization companies like VMware and Microsoft's entry into the space. It outlines the differences between type 1 and type 2 hypervisors. It also summarizes key virtualization products from Microsoft and VMware over time like Hyper-V, VMware ESX, and Application Virtualization. Finally, it discusses benefits of virtualization like server consolidation and cost savings realized by organizations.
This is the first post in my series about the new features in Windows Server 2008 R2. As in my series about the new features of Windows 7, I will update the articles when I learn about new features. I will discuss some of the new features in more detail soon. Essentially, the term "virtualization" covers three different technologies in Windows Server 2008 R2: Server Virtualization, Desktop Virtualization, and Presentation Virtualization. Server Virtualization is based on Hyper-V 2.0, which will get quite a few interesting new features. The virtualization technology ehind Desktop virtualization, i.e., Virtual Desktop Infrastructure (VDI), is also Hyper-V. This is probably the most important new feature in Windows Server 2008 R2. Presentation Virtualization is nothing but the good old Terminal Server. Technically, I find it a bit odd to use the term "virtualization" in this context, but from a marketer's point of view, it probably makes a lot of sense. Note that Microsoft renamed the "Terminal Services" as "Remote Desktop Services" in Windows Server 2008 R2.
Practical Thin Server Architecture With Dojo Peter Svenssonrajivmordani
The document discusses thin server architecture, which moves user interface code from servers to clients. This improves scalability by distributing processing across clients. It also enhances responsiveness by allowing immediate client-side reactions to user input. Key benefits include improved scalability, responsiveness, programming model, and support for offline/interoperable applications. The document provides examples using Dojo to demonstrate how client-side widgets and data stores can be implemented following thin server principles.
WebSphere App Server vs JBoss vs WebLogic vs Tomcat (InterConnect 2016)Roman Kharkovski
This document provides a competitive comparison of WebSphere Application Server (WAS) versus Tomcat, JBoss and WebLogic. It discusses each product's capabilities in areas like runtimes, API management, development tools, cloud support, and more. Gartner research is referenced showing IBM holds the #1 position in the middleware software market for the past 13 years. The document aims to help organizations choose the best application server for their needs.
Move to the Lightweight Application Platform
Ankur Agarwal discusses the advantages of delivering applications as software as a service (SaaS) and implications for independent software vendors (ISVs). He introduces the VMware vFabric Cloud Application Platform, which provides a lightweight Java runtime, application services, and tools to build, run, and manage SaaS applications. The platform allows scaling applications elastically on demand and simplifies supporting global users.
Everything you need to know about creating, managing and debugging Java applications on IBM Bluemix. This presentation covers the features the IBM WebSphere Application Server Liberty Buildpack provides to make Java development on the cloud easier. It also covers the Eclipse tooling support including remote debugging, incremental update, etc.
Configuring and Troubleshooting XenDesktop SitesDavid McGeough
Citrix XenDesktop introduced a number of new concepts and processes for desktop administrators. The goal of this session is to demystify these concepts and provide a tactical approach to deployment and troubleshooting of a XenDesktop environment. In this session we will demonstrate the core configuration that is required, and also cover proven troubleshooting approaches to the top three problems we see in customer deployments.
GatewayScript is a new JavaScript runtime for DataPower appliances that simplifies configuration for developers. Link aggregation increases network redundancy and throughput by combining multiple Ethernet interfaces. WebSockets enable full-duplex communication and DataPower can secure and route initial connections. The release also includes enhancements to OAuth 2.0 token handling and support for deploying DataPower virtual editions on Citrix XenServer.
This document summarizes key platform investments and trends for Windows Server 2008 R2. It discusses the server core application platform which provides a minimal installation option without a GUI shell. This reduces patching requirements by around 40%. It also discusses power management improvements, virtualization enhancements like Hyper-V, and leveraging the enterprise network stack to build applications. New R2 solutions like BITS Compact Server and the native web services API are highlighted.
This document proposes a virtual heterogeneous database platform to address challenges with physical database servers like low utilization and high costs. It would provide a virtualization platform to host multiple database types and high availability solutions in virtual machines, improving efficiency through automated provisioning and management. The document discusses database server models, high availability solutions like Datakeeper and clustering, operations team concerns about flexibility and testing, and monitoring tools.
Virtualization get ready for tomorrow, today! - crChris Avis
This document provides a summary of the history and development of virtualization technologies. It discusses:
- The differences between type 1 and type 2 hypervisors and examples of each.
- Key events in virtualization history from 1998 to 2006, including VMware's founding and Microsoft's acquisition of Connectix and release of Virtual PC.
- An overview of Microsoft Application Virtualization (App-V) and how it can reduce costs by dynamically streaming software as a centralized service.
- Integration features and benefits of Microsoft Enterprise Desktop Virtualization (MED-V) for seamless virtual application delivery.
This presentation covers four things:
1. Why every business is a software business
2. The clear trends with VMware vFabric customers and prospects
3. Cloud Scale and Economics
4. Pricing Comparisons of vFabric to Competitors
Read an article summarizing the presentation and access the recording here: http://blogs.vmware.com/vfabric/2012/11/why-is-vfabric-on-the-cio-agenda-trends-and-economics.html
Luis Alves Martins Presentation / CloudViews.Org - Cloud Computing Conference...EuroCloud
The document discusses different computing models including on-premises, hosted, and cloud platforms. It describes key differences like control, costs, and scalability. The cloud platform offers shared, virtualized infrastructure that is scalable and available. Services discussed include Azure, SQL Server, and .NET services which provide programmatic access to user data and applications. Microsoft plans to run all its line-of-business and public services on the Windows Azure cloud platform.
TechInsight - Real World Implementation of VDILai Yoong Seng
This document discusses virtual desktop infrastructure (VDI) and provides demonstrations of VDI solutions using Microsoft Remote Desktop Services and Citrix. It begins with an introduction to VDI and how it works. It then demonstrates Remote Desktop Services for remote desktops and application publishing. Next, it demonstrates a VDI solution using Remote Desktop Services and Citrix with the Microsoft platform. It concludes with a discussion of VDI capacity planning considerations around processors, memory, disk I/O, and network performance.
Practical Thin Server Architecture With Dojo Sapo Codebits 2008codebits
This document discusses the benefits of thin server architecture, where user interface code is moved from the server to the client. Some key benefits include improved scalability, immediate user response times, an organized programming model with clear separation of client and server code, client-side state management, support for offline applications, and improved interoperability. The document provides examples to illustrate how scenarios like styling changes, adding new features, and replacing backend code are simpler with a thin server architecture approach. It argues that separating the user interface from the server using structured data and services allows each layer to focus on its own concerns without unnecessary complexity.
This document summarizes enhancements in Windows Server 2008 R2, including improved support for multi-core processors, removal of coarse-grained locks to improve scaling, more efficient memory management, and new features like trigger-start services, native VHD support, and the file classification infrastructure for extensible file management policies. It also discusses the server core architecture and web application platform enhancements like PowerShell 2.0 and the Windows Web Services API for building extensible web services.
Introduction to Web Application Technologies
CGI Programs on the Web Server
What is servlet?
Jobs of servlet
Advantages over CGI
Why pages are build dynamically?
Servlet container
Installation & configuration
- Type 1: Integration of Tomcat server and eclipse
- Type 2: Java Servlet
Servlet Sample Example
Servlet Overview And Architecture
- Servlet Life cycle/Single Thread Model
- Interface Servlet
- HttpServlet Class
- HttpServletRequest, HttpServletResponse
Similar to [DSBW Spring 2009] Unit 05: Web Architectures (20)
DSBW Final Exam (Spring Sementer 2010)Carles Farré
The document describes a UX model for a "light" version of Twitter called Chirper. It provides details on the following screens and functionality:
1. Home - The main page where users can see chirps from those they follow, send new chirps, search topics, and view their profile and followers/following.
2. Profile - A screen to view and edit a user's profile details.
3. User Page - A screen displaying a user's chirps and profile.
4. People - A screen listing users a profile follows/follows them.
It also includes instructions to design the internal class diagram and sequence diagrams for these screens and navigation between them
The document provides an overview of web usability and usability testing. It discusses key aspects of usability including learnability, efficiency, memorability, errors, and satisfaction. It outlines why usability is important for websites. Common usability problems are presented such as bad search functions, PDFs for online reading, and fixed font sizes. Methods for assessing usability through evaluations and testing are described. The testing process, roles, methods, and tools are defined. Metrics for measuring effectiveness, efficiency, satisfaction, and learnability are provided. The relationship between usability testing and user-centered design is explained.
[DSBW Spring 2010] Unit 10: XML and Web And beyondCarles Farré
The document provides an overview of XML, web services, and the semantic web. It defines XML as a flexible text format used to represent structured information. It describes web services as software systems that support machine-to-machine interactions over a network using standards like SOAP, WSDL, and UDDI. It introduces the semantic web as using standards like RDF, RDF Schema, and OWL to make web resources more machine-understandable to enable greater data sharing and interoperability.
[DSBW Spring 2009] Unit 09: Web TestingCarles Farré
The document discusses various types of web application testing including content testing, interface testing, navigation testing, component testing, and configuration testing. It provides definitions and objectives for each type of testing. Content testing focuses on errors in text, graphics, and organization. Interface testing evaluates mechanisms like links and forms. Navigation testing ensures users can move through the application. Component testing examines application functions. Configuration testing checks server-side issues.
[DSBW Spring 2009] Unit 08: WebApp SecurityCarles Farré
Unit 8 discusses security for web applications. It identifies potential threats, vulnerabilities, and attacks. Authentication verifies a user's identity, authorization governs user access, and other security goals are discussed like confidentiality, integrity, and availability. Main threat categories are outlined using the STRIDE methodology. Countermeasures are provided for network, host, and application level threats. The document also discusses web application security approaches like least privilege and defense in depth. Cryptography, SSL/TLS, and other protocols are summarized in the context of web security.
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (3/3)Carles Farré
This document discusses various web application frameworks including Struts 1, Spring MVC, and JavaServer Faces (JSF). It provides an overview of each framework, their terminology in relation to Java EE design patterns, examples of usage, and architectural details. Specifically, it examines the user registration process in Struts 1 through code examples and configuration files.
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (1/3)Carles Farré
The document discusses various design patterns and frameworks related to web application development. It begins by describing the Model-View-Controller (MVC) pattern, which divides an application into three main components: the model, the view, and the controller. It then provides details on different MVC-based patterns such as the classical MVC pattern, page controller pattern, front controller pattern, application controller pattern, and intercepting filter pattern. The document also discusses view-related patterns like view helpers as well as MVC web frameworks.
[DSBW Spring 2009] Unit 06: Conallen's Web Application Extension for UML (WAE2)Carles Farré
The document discusses the Web Application Extension (WAE) for UML. The WAE allows web pages and other significant web elements to be modeled alongside classes and components. It defines stereotypes like <<client page>>, <<server page>>, and <<form>> to model things like dynamic web pages, HTML forms, and their relationships. An example of a microblogging application modeled with WAE stereotypes is also provided to demonstrate how it can be used.
[DSBW Spring 2009] Unit 04: From Requirements to the UX ModelCarles Farré
The document discusses the process of developing a user experience (UX) model for a web application from requirements. It describes gathering requirements, creating models to represent the requirements including use case diagrams and screen descriptions, and developing a UX model to guide the interface design. The UX model represents how content will be structured and organized across screens and how users will navigate between screens to complete tasks. It includes artifacts like screen descriptions and storyboards to illustrate user flows.
[DSBW Spring 2009] Unit 03: WebEng Process ModelsCarles Farré
The document discusses various process models and business models for web application development and electronic commerce. It provides an overview of the Rational Unified Process (RUP) as a process model, describing its key aspects, phases, artifacts, and workflows. It also discusses agile methods and eXtreme Programming (XP) as alternative process models. For business models, it describes categories such as business-to-consumer, business-to-business, and emerging models like consumer-to-consumer and mobile commerce.
[DSBW Spring 2009] Unit 02: Web Technologies (2/2)Carles Farré
This document provides summaries of key web technologies including:
- Core technologies like web browsers, web servers, URIs, and HTTP.
- Client-side technologies like HTML, CSS, JavaScript, DOM, AJAX, and Rich Internet Applications.
- Server-side technologies for web applications like CGI, PHP, Java servlets, and JavaServer Pages.
It also discusses enabling technologies for dynamic web content and applications servers, session state management, cookies, the Common Gateway Interface (CGI) standard, and an example "EnWEBats" application built with CGI and PHP.
[DSBW Spring 2009] Unit 02: Web Technologies (1/2)Carles Farré
This document summarizes key concepts related to web technologies:
- It outlines core client-side technologies like HTML, CSS, JavaScript, and DOM that allow rendering and interacting with web pages in browsers. It also describes common server-side technologies like PHP, Java servlets, and JSPs that power dynamic web applications.
- It explains fundamental web protocols like HTTP that define communication between browsers and servers, and standards like URIs that identify resources on the web.
- It provides examples of how browsers fetch pages from servers using HTTP requests and responses, and how clients and servers interact through web technologies to deliver dynamic web experiences.
[DSBW Spring 2009] Unit 01: Introducing Web EngineeringCarles Farré
The document discusses web-based systems and how they are built. It defines a web-based system as a software system based on World Wide Web Consortium standards that provides web resources like content and services through a web browser. It then covers categories of web-based systems, characteristics like being network intensive and globally accessible, technologies used like HTML and programming languages, and the web engineering process of requirements analysis, design, testing and maintenance.
Data integration involves providing unified access to data stored across multiple heterogeneous data sources. There are several data integration architectures including data warehouses, virtual mediators, and peer-to-peer integration. Key challenges in data integration include modeling the global schema, source schemas, and mappings between them, as well as reformulating queries over the global schema to retrieve answers from the source schemas. Languages for modeling schema mappings include GAV, LAV, and GLAV, with different advantages for query reformulation and modularity when new sources are added.
The document discusses logic as a database language. It defines base facts and deductive rules that can be used to infer derived facts. Deductive rules specify that the head is true if all subgoals in the body are true. Predicates represent relations and atoms assert tuples in those relations. Rules can be used recursively to compute derived tuples in IDB relations. Queries to a database defined in this logical way return all facts derived for the query predicate using the given rules and base facts while respecting integrity constraints. Query containment examines whether the answer to one query is always a subset of the answer to another query over all database states.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
1. Unit 5: Physical Architecture Design
Introduction
Dimensions to be considered
Architecture Patterns:
Single server
Separate database
Replicated Web servers
Separated scripting engines
Application servers
Web Caching
Cloud Computing
J2EE architectures for WebApps
dsbw 2008/2009 2q 1
2. Physical Architecture Design: A Definition
“
(physical) architecture design concentrates on the choice of the
hardware, network, and software components that make up the
system, to find the mix of these components that best meets the
application requirements, and at the same time respects the
”
technical and economic constraints of the project.
Ceri et al., 2003
dsbw 2008/2009 2q 2
3. Architecture: Logical vs. Physical
3-Layered Logical Architecture 2(+)-Tiered Client/Server
Physical Architecture
......
Client WB
WB
(tier #1)
.gif
HTTP
.html
Presentation Layer
WS
WS
Business Logic Layer Server
(tier #2)
Data Mapping Layer AppServer
Scripting Eng.
WapServer
DBMS
File/Database Management System
Server HOST
...... DBMS
(tier #3)
dsbw 2008/2009 2q 3
4. Logical-Physical Mapping: Distributed Presentation
One fragment of the Web presentation layer is executed on the Web
browser:
Download and rendering of HTML (XML, …) documents
Client-side scripting: JavaScript, VBScript
Execution of embedded components: Applets, ActiveX
The other fragment of the Web presentation layer is executed on
the server side:
Retrieval and delivery of static documents/files
Execution of server scripts
Interaction with the Business Logic Layer
The other layers are executed on the server tier(s)
AJAX (RIA) applications may change this paradigm.
dsbw 2008/2009 2q 4
5. Dimensions of Architecture Design
Non-functional requirements that pursue the achievement of an
adequate level of service
Physical, financial and organizational constraints that may affect
decision-making
Alternative scenarios in architecture deployment
dsbw 2008/2009 2q 5
6. Non-functional requirements that may affect Architecture Design
Performance
The application must sustain the expected workload defined in terms of:
maximum number of concurrent users,
the number of page requests served per unit of time
the maximum time for delivering a page to the client
Scalability
The architecture must be easily extensible
Availability
Faults should not affect significantly the service delivered to users
State maintenance
The state of the user interaction must be preserved, even when the
application is distributed on multiple machines or failures occur
Security:
Data should be protected
Users should be identified and granted access only to the data and
functions they are entitled to
dsbw 2008/2009 2q 6
7. Constraints of Architecture Design
Cost
Every configuration requires a different investment, in terms of
processors, network infrastructure, interfaces, and software licenses
The application budget may limit the choice of hardware resources and
software products
Complexity
Some configurations are simpler than others to set up and maintain
The unavailability or the cost of specialized technical skills may
constrain the architecture design
Corporate standards and infrastructures
The WebApp may be deployed within a corporate IT infrastructure,
which may constrain the selection of hardware resources and software
products.
dsbw 2008/2009 2q 7
8. Scenarios of Architecture Deployment
Internal
The application architecture is kept inside the enterprise and
maintained by the internal IT department.
Housed
The application architecture is maintained by the internal IT department
of the enterprise, but is physically installed at an external service
provider.
Hosted
The application architecture is located at the premises of an external
service provider, who also maintains it.
dsbw 2008/2009 2q 8
9. Architecture Pattern: Single Server
Host
Web server
HTTP
HTTP
Script engine
rooter/
DBMS
firewall
Client
(browser)
dsbw 2008/2009 2q 9
10. Single Server Pattern: Evaluation (1/2)
Performance
Depends on the configuration of the server: CPU speed, available
memory, disk access latency, etc.
The DBMS is both memory and CPU-intensive
Scalability
Is bound by the hardware architecture of the selected server
Availability
Every software and hardware element is a single point of failure: if it
breaks, the entire system hangs.
Can be improved by adding redundant hardware resources (multiple
CPUs, mirrored disks) and by installing multiple processes running
different instances of the Web server, script engine, and database …
dsbw 2008/2009 2q 10
11. Single Server Pattern: Evaluation (2/2)
State maintenance
No problems with none of the three possibilities to store user data:
client, server or database
Security:
This the weakest aspect of is configuration: attackers breaking the
firewall and the Web server can take control of the host and gain direct
access to the database, violating data protection
Low cost, as far as massive parallelism is not required.
Low complexity
dsbw 2008/2009 2q 11
12. Architecture Pattern: Separate Database
Host 2
Host 1
HTTP
HTTP
rooter/
firewall
Client firewall
DBMS
Web server + Script engine
(browser)
Demilitarized Zone (DMZ)
dsbw 2008/2009 2q 12
13. Separate Database Pattern: Evaluation
Better performance
One extra machine
Each tier can be tuned to the requirements of the installed software
More scalable
It is possible to act separately on each tier.
Normally, the first bottleneck is in the middle tier
Availability is not improved
Each component is still a single point of failure
Significantly improved security
The inner firewall may disallow HTTP requests at all and let only
database requests pass, making it more difficult for attackers to reach
the data tier.
dsbw 2008/2009 2q 13
15. Replicated Web Server Pattern: Evaluation
Improved performance and scalability:
Load balancing
Clustering: A cluster is a group of servers (aka nodes) that provide a
unified view of the services that they individually offer
Improved availability:
Fail-over: if a cluster node fails, its workload can be redistributed to the
other nodes of the same cluster
Session state maintenance on the replicated servers
Session affinity (aka sticky sessions): The load balancer sends all the
incoming requests pertinent to a given session to the same server.
Session migration: Session state is shared by the servers in the cluster
Improved data transmission security
One of the Web servers may be configured to handle the connections
that require cryptographic protection.
dsbw 2008/2009 2q 15
16. Architecture Pattern: Separate Script Engine
WS #1 SE #1 Host 2
HTTP
HTTP
HTTP
HTTPS
rooter/ firewall/ WS #2 SE #2
firewall
Client load balancer
DBMS
HTTPS
(browser)
WS #3 SE #3
(secure)
dsbw 2008/2009 2q 16
17. Separate Script Engine Pattern : Evaluation
Improved performance, scalability and availability
Web server and the scripting engine can be replicated independently so
that the number and configuration of the hosts can be optimized: a well-
balanced configuration may require more machines for the scripting
engines than for the Web servers.
The communication overhead introduced by the separation should be
compensated by the performance increase.
dsbw 2008/2009 2q 17
18. Architecture Pattern: Application Server
Application
WS #1 SE #1 Server
HTTP Host 2
HTTP
HTTP
HTTPS Application
rooter/ firewall/ WS #2 SE #2 Server firewall
Client load balancer DBMS
HTTPS
(browser)
Application
WS #3 SE #3 Server
(secure)
dsbw 2008/2009 2q 18
19. Application Server Pattern: Evaluation
An application server is a software platform, distinct from the Web
server, dedicated to the efficient execution of business components
for supporting the construction of dynamic pages.
Improved performance, scalability and availability:
Transparent component distribution, replication, and load balancing:
The application server automatically manages the creation of
processes, the replication of business objects and their allocation to the
available processes, and the allotment of client requests to the increase
and decrease of the actual workload.
Automatic failure recovery: The application server may detect
hardware, software and network failures, and avert client requests
addressed to a failed component and route them to available replicas of
the same business object.
Resource pooling: The application server may handle pools of
expensive resources, like database connections, and share these
resource among multiple business objects in an optimized way
dsbw 2008/2009 2q 19
20. Web Caching
Caching consists of temporarily storing resources in a fast access
location, for later retrieval.
Benefits:
Reduction of the response time
Reduction of computation effort when the resource is dynamically build
Anything can be cached:
Static HTML pages and multimedia files.
Fragments of pages computed by scripting programs.
Intermediate data consumed by the scripting programs for producing
page, e.g. XML files.
The result of database queries or other application commands
dsbw 2008/2009 2q 20
21. Web caching: Where to Cache (1/3)
Browser caching: Proxy caching:
Proxy caches store a local copy of
Every Web browser contains a cache
each resource requested by users,
of HTML pages and multimedia files
and avoid accessing the Internet for
used to speed up the rendition of
retrieving frequently asked pages
pages that contain cached objects.
dsbw 2008/2009 2q 21
22. Web caching: Where to Cache (2/3)
Server accelerators
A server accelerator is a “buffer” placed in front of a server cluster that
intercepts requests, caches copies of the objects produced by the
servers, and delivers them to the subsequent requests.
Page prefetching: Based on the last request, the server accelerator
loads into cache those pages that are more probable of being
requested next.
dsbw 2008/2009 2q 22
23. Web caching: Where to Cache (3/3)
Content delivery networks (CDNs)
CDNs are systems of computers networked together across the Internet
that allow content providers to outsource their caching infrastructures
When a client requests a page to the origin server, this returns a page
with rewritten links that point to the nodes of the CDN
The CDN serves requests selecting the optimal copy of the page by
taking into account the geographical location of the user and the real-
time traffic conditions.
dsbw 2008/2009 2q 23
24. Cloud Computing
Cloud computing is a style of computing in which dynamically
scalable and often virtualised resources are provided as a
service over the Internet. (Wikipedia)
Source: http://www.collab-ogce.org/gce08/images/7/76/LamiaYouseff.pdf
dsbw 2008/2009 2q 24
25. Cloud Computing: Some Providers
Cloud Layer Examples of Commercial Cloud Systems
Cloud Application Google Apps and Salesforce Customer Relation
Layer Management (CRM) system
Cloud Software
Google App Engine and Salesforce Apex System
Environment
Computational Resources: Amazon's EC2.
Enomalism Elastic Cloud.
Cloud Software Storage: Amazon's S3. EMC Storage Managed
Infrastructure Service.
Communication: Microsoft Connected Service
Framework (CSF).
Grid and Cluster Computing Systems like Globus
Software Kernel
and Condor.
Firmware / IBM-Morgan Stanley's Computing Sublease, and
Hardware IBM's Kittyhawk Project.
dsbw 2008/2009 2q 25
26. J2EE Architectures for Web Applications
“Classic” J2EE architecture, using remote EJBs and entity beans
Local EJB architecture, using local EJBs
Ad hoc J2EE architecture without EJB
Lightweight container architecture
dsbw 2008/2009 2q 26
27. “Classic” J2EE Architecture
Web Container
J2EE
Servlets / Web Classes
Server
Business Interface
Business Delegate
RMI
J2EE
EJB Container
Server
(Same or
Session EJB
Separate
JVM
Entity EJB (optional)
DBMS Legacy System
dsbw 2008/2009 2q 27
28. Local EJB architecture
Web Container
J2EE
Servlets / Web Classes
Server
Business Interface
Business Delegate
Local EJB Invocation
EJB Container
(Single
JVM)
Session EJB
Entity EJB (optional)
DBMS Legacy System
dsbw 2008/2009 2q 28
29. Ad hoc J2EE Architecture without EJB
Web Container
J2EE
Servlets / Web Classes
Server
Business Interface
Implementation
DBMS
Legacy System
dsbw 2008/2009 2q 29
30. Lightweight Container Architecture
J2EE
MVC Web Framework
Server
Web Container
Business Interface
POJO
Implementation
with declarative
services via AOP
O/R Mapping Layer
RDBMS
(Optional) Other
transactional resource
dsbw 2008/2009 2q 30
31. J2EE Architectures: A Comparison
Architect. Simplicity Productivity Transaction Horizontal Testability
Capable Scalability
Remote Complex to Poor, Yes Inherent support Poor. It's very
EJBs implement and because of for distributing hard to test
use business complexity of objects. EJBs outside a
objects. distribution container. In-
and EJB container
programming testing is slow
model. and complex.
Local EJBs Slightly less Slightly better Yes Relies on web Poor. As for
complex to than for container to remote EJBs.
access remote EJBs. deliver clustering.
No EJB, ad Typically Productivity is No. Explicit Depends on Depends on
hoc simpler than usually better use of implementation implementation
architectures than with EJB specific APIs strategy. strategy.
using EJB. architectures. is required.
Light- Good, as High Yes, if using Relies on web Good. Easy to
weight business AOP. container to test business
container objects are deliver clustering. objects outside
POJOs. an application
server.
dsbw 2008/2009 2q 31
32. References
S. Ceri et al. Designing Data-Intensive Web Applications. Capítol
10. Morgan Kaufmann, 2003.
JOHNSON, Rod and HOELLER Juergen. Expert One-on-One
J2EE Development without EJB. Willey Publishing, 2004
Youseff, L.; Butrico, M.; Da Silva, D. Toward a Unified Ontology of
Cloud Computing. Grid Computing Environments Workshop, 2008.
GCE '08, pages 1-10.
http://www.cs.ucsb.edu/~lyouseff/CCOntology/CloudOntology.pdf
dsbw 2008/2009 2q 32