Kafka Summit SF 2017 - Running Kafka for Maximum Painconfluent
This document discusses some of the challenges of running Apache Kafka at scale at LinkedIn, including issues with multitenancy, infrastructure, and management. It describes how high volumes of data and many producers can complicate ownership and capacity planning when data is shared. It also explains the pain points of tools like Mirror Maker and the lack of topic configuration management across clusters. Finally, it outlines some of LinkedIn's open source efforts to improve Kafka operations through tools like Cruise Control, Kafka Monitor, and kafka-tools.
This document discusses cloud computing fundamentals. It defines cloud computing as a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources over the internet. The document outlines key cloud service providers like AWS, Azure, and Google Cloud. It also discusses deployment models including private, public, hybrid and community clouds. The document lists requirements for cloud like security, portability, and flexibility. Finally, it notes benefits of cloud like reduced costs, accessibility, and improved flexibility.
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...Majid Hajibaba
The document discusses Aneka, a platform that allows for the integration of private and public clouds. It presents an overview of Aneka's architecture, which enables resource provisioning across different cloud infrastructures. Aneka supports the creation of hybrid clouds through its ability to dynamically incorporate additional cloud service providers and rapidly integrate new features. The talk concludes by examining open issues for further research in hybrid cloud environments, such as pricing models, security standardization, and management policies for heterogeneous systems.
The document discusses cloud-native application architectures and how they enable speed, safety, and scale through approaches like twelve-factor applications and microservices. It outlines the cloud-native stack and where governance is needed to secure different components like code, orchestration tools, containers, services, and infrastructure. The document argues that while cloud-native approaches are well-suited for technology companies, traditional enterprises face challenges in fully adopting these architectures due to differences in priorities, skills, and scale.
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Majid Hajibaba
This document discusses the management of virtual machines (VMs) for cloud infrastructures. It covers several topics:
1. The anatomy of Infrastructure as a Service (IaaS) clouds, including the role of virtualization technologies and challenges in managing virtual machines.
2. Approaches for distributed management of VMs, including using a Virtual Infrastructure Manager and scheduling techniques. OpenNebula is presented as a case study.
3. Techniques for advance reservation of capacity to meet service level agreements (SLAs), including the use of leases and scheduling algorithms in Haizea.
4. Methods for capacity management and elasticity to ensure SLAs are met, such as using probabilistic admission control
Turning Evidence into Insights: How NCIS Leverages Elastic Elasticsearch
Learn how NCIS data analysis uses Elasticsearch to process evidence in the form of log files, its impact on efficient law enforcement, and some lessons learned along the way.
See the video: https://www.elastic.co/elasticon/tour/2019/washington-dc/turning-evidence-into-insights-how-ncis-leverages-elastic-
How to Migrate to Cloud with Complete Confidence and TrustApcera
Henry Stapp, Director of Product Management at Apcera, explores the promises of the cloud and how new technologies (containers, micro-services, etc.) enable unparalleled speed and flexibility.
Kafka Summit SF 2017 - Running Kafka for Maximum Painconfluent
This document discusses some of the challenges of running Apache Kafka at scale at LinkedIn, including issues with multitenancy, infrastructure, and management. It describes how high volumes of data and many producers can complicate ownership and capacity planning when data is shared. It also explains the pain points of tools like Mirror Maker and the lack of topic configuration management across clusters. Finally, it outlines some of LinkedIn's open source efforts to improve Kafka operations through tools like Cruise Control, Kafka Monitor, and kafka-tools.
This document discusses cloud computing fundamentals. It defines cloud computing as a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources over the internet. The document outlines key cloud service providers like AWS, Azure, and Google Cloud. It also discusses deployment models including private, public, hybrid and community clouds. The document lists requirements for cloud like security, portability, and flexibility. Finally, it notes benefits of cloud like reduced costs, accessibility, and improved flexibility.
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...Majid Hajibaba
The document discusses Aneka, a platform that allows for the integration of private and public clouds. It presents an overview of Aneka's architecture, which enables resource provisioning across different cloud infrastructures. Aneka supports the creation of hybrid clouds through its ability to dynamically incorporate additional cloud service providers and rapidly integrate new features. The talk concludes by examining open issues for further research in hybrid cloud environments, such as pricing models, security standardization, and management policies for heterogeneous systems.
The document discusses cloud-native application architectures and how they enable speed, safety, and scale through approaches like twelve-factor applications and microservices. It outlines the cloud-native stack and where governance is needed to secure different components like code, orchestration tools, containers, services, and infrastructure. The document argues that while cloud-native approaches are well-suited for technology companies, traditional enterprises face challenges in fully adopting these architectures due to differences in priorities, skills, and scale.
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Majid Hajibaba
This document discusses the management of virtual machines (VMs) for cloud infrastructures. It covers several topics:
1. The anatomy of Infrastructure as a Service (IaaS) clouds, including the role of virtualization technologies and challenges in managing virtual machines.
2. Approaches for distributed management of VMs, including using a Virtual Infrastructure Manager and scheduling techniques. OpenNebula is presented as a case study.
3. Techniques for advance reservation of capacity to meet service level agreements (SLAs), including the use of leases and scheduling algorithms in Haizea.
4. Methods for capacity management and elasticity to ensure SLAs are met, such as using probabilistic admission control
Turning Evidence into Insights: How NCIS Leverages Elastic Elasticsearch
Learn how NCIS data analysis uses Elasticsearch to process evidence in the form of log files, its impact on efficient law enforcement, and some lessons learned along the way.
See the video: https://www.elastic.co/elasticon/tour/2019/washington-dc/turning-evidence-into-insights-how-ncis-leverages-elastic-
How to Migrate to Cloud with Complete Confidence and TrustApcera
Henry Stapp, Director of Product Management at Apcera, explores the promises of the cloud and how new technologies (containers, micro-services, etc.) enable unparalleled speed and flexibility.
Whether you are already using one or more clouds or just getting started, a cloud management platform (CMP) can help right now. Realize value quickly by using a CMP to gain control over existing cloud usage and then expand your cloud use with a CMP that standardizes how you manage and provision resources across all your cloud and virtualized infrastructure.
This is a fusion talk I presented at the devopsdays conference heled in Galway in 2018.
In it I share some of the misuses of the cloud I have seen and then focus on the five essential characteristics of cloud with the aim of imparting the importance of adopting these characteristics to improve performance.
Last Conference 2017: Big Data in a Production Environment: Lessons LearntMark Grebler
Presentation at the 2017 LAST (Lean, Agile, Systems Thinking) Conference.
A presentation about the challenges involved in building a production Big Data system used directly by customers.
This document summarizes CitrixDay 2012. It discusses Citrix's revenue, employee count, customer count, and partner count. It highlights Citrix's leadership in desktop and app virtualization, cloud networking, and public clouds. It also discusses trends like BYOD, workshifting, and mobility apps that will drive IT change. Citrix products like Project Avalon aim to deliver Windows apps and desktops as a true cloud service. The event emphasized Citrix's vision of supporting any device, any cloud to transform, build, bridge and deliver solutions and services.
The do's and dont's of cloud computing - StatPro Cloud Summit 2012StatPro Group
Neil Smyth (@Neil_StatPro), Technology and Marketing Director at StatPro covers the do’s and don’t’s of cloud computing. Neil provides a comparison of traditional hosting versus SaaS and cloud computing, including an interesting look at how one compares to a housing estate and the other to a hotel. He then moves on to providing top tips on selecting a cloud computing vendor, including the key things to look out for such as infrastructure, security, scalability and the business model.
This document discusses designing an open source observability stack for distributed environments. It covers topics like what observability is and why it's important, how Kubernetes impacts observability, using open source tools for telemetry success, the role of security, and putting all the pieces together into a production-ready architecture. The key challenges of observability in distributed systems are addressed, like collecting the right information without being overwhelmed by noise. Example production architectures are presented using open source tools like ELK, Prometheus, Grafana, and Jaeger.
Ohio LinuxFest: Crash Course in Open Source Cloud ComputingMark Hinkle
This document summarizes Mark R. Hinkle's presentation on open source cloud computing. The presentation provides an overview of cloud computing concepts and models. It then discusses various open source tools that can be used to build public and private clouds, including hypervisors, virtual machine formats, storage solutions, APIs, configuration management, monitoring, and automation/orchestration tools. The presentation aims to demonstrate how open source software can be combined to create cloud computing platforms and manage cloud infrastructure.
On-demand recording: https://www.nginx.com/resources/webinars/mra-ama-part-6-service-mesh-models/
Speakers:
Charles Pretzer
Technical Architect
NGINX, Inc.
Floyd Smith
Director of Content Marketing
NGINX, Inc.
About the webinar:
In this webinar, two models of the NGINX Microservices Reference Architecture, the Router Mesh Model and the Fabric Model, are shown as successively more capable implementations of a service mesh architecture. We compare the MRA models to Istio, linkerd, and other service mesh architectures, and show how the NGINX Kubernetes Ingress Controller allows direct use of these other architectures. Attendees of the live webinar will have the opportunity to ask questions.
Service mesh models are an emerging standard for microservices development and deployment. Popular architectures such as Istio and linkerd use a service mesh approach, including attributes such as load balancing capability, support for authorization and authentication, and use of the circuit breaker model for resiliency.
Watch this webinar to learn:
- Key problems solved by using a service mesh model for microservices
_ How different service mesh architectures compare to each other
- How to use NGINX service mesh models - the Router Mesh Model and Fabric Model of the MRA
- How the Kubernetes Ingress Controller enables the use of NGINX in Istio, linkerd, and other service mesh models
How to Manage VMware vSphere Like AWS and AzureRightScale
This document discusses how to manage VMware vSphere like AWS and Azure. It outlines the challenges of multi-cloud management and how RightScale's Cloud Appliance for vSphere can help "cloudify" vSphere. The document shows that RightScale provides a single pane of glass for managing cloud and virtualized environments across platforms. It also includes an agenda and information about RightScale and data on enterprise cloud adoption trends. Finally, it previews a demo of RightScale's Cloud Appliance for vSphere capabilities.
Orchestrating stateful applications with PKS and PortworxVMware Tanzu
This document provides an overview of Portworx, including:
1. Portworx is a leader in providing stateful container orchestration that works across any cloud or scheduler.
2. It has an experienced team and investors, with headquarters in Los Altos, CA and 70 employees globally.
3. Portworx allows applications to run across different infrastructure types and clouds with a portable cloud stack that provides high availability, replication, security and data mobility features.
Webinar: Considering Hyperconverged for Your Enterprise? 3 Key Questions to AskStorage Switzerland
Over the last few years, Hyper-Converged Infrastructure (HCI) deployments have been on the increase. HCI combines server, storage and networking into a single system building block, however, it introduces many new complexities into your environment. Join Storage Switzerland and Datrium as we discuss the three key questions that enterprises need to ask when considering hyperconverged architectures.
Lost in the Fog: Is Cloud Computing the Future for Digital InformationClifton Chan
Cloud computing provides on-demand access to shared computing resources like servers, storage, databases, networking, software, analytics and more that can be rapidly provisioned with minimal management effort. It is becoming a trend and part of the computing landscape, moving from an immature technology to mainstream use. For governments, cloud computing provides opportunities to focus on core functions rather than infrastructure maintenance, with potential cost savings from rapid elasticity and pay-per-use models. However, security, data sovereignty and loss of control over unique systems are challenges to address with cloud adoption.
Integration Patterns and Anti-Patterns for Microservices ArchitecturesApcera
Integration Patterns and Anti-Patterns for Microservices Architectures
David Williams
Co-Founder and Partner, Williams Garcia
You can learn more about NATS at http://www.nats.io
Security Events Logging at Bell with the Elastic StackElasticsearch
One of Canada’s largest telecommunications company is using Elastic to drive improved security analysis in their SOC. With a need to ingest all security logs, build threat detection models, and normalize many new types of logs, the Bell security team turned to Elastic. Learn how they’ve streamlined alerts, deepened log analysis, and addressed challenges unique to being an ISP.
This document discusses patterns for data management in microservice architectures. It covers database per service, where each service owns its own private data store. Event-driven architecture is presented as a way to maintain consistency across services by having each service publish events after updating its database. Patterns like command query responsibility segregation (CQRS) and storing events in a transaction log can also help maintain consistency. The challenges of distributed transactions are discussed, along with eventual consistency as an alternative to strong consistency.
The document discusses cloud-enabled testing services and some issues to consider when using them. It defines cloud computing and outlines the benefits of using cloud services for testing like cost reduction, flexibility, and compliance. However, issues like data security, test data ownership, and dependency on secure virtual infrastructure need to be addressed. Overall, while cloud testing services provide benefits, organizations must standardize processes, virtualize testing environments, and implement security measures to mitigate risks.
Micro-services architecture is an evolutionary design ideal for evolutionary systems where you can’t fully anticipate the types of devices that may one day be accessing your application
Service Fabric - Microservices Architectures made SimpleParis Polyzos
In this presentation I talk about Azure Service Fabric and microservices architecture. I describe the challenges we face in the development of modern applications and, furthermore, I explore how the use of Azure Service Fabric can help us build and operate always-on, scalable, distributed apps.
Сергей Ковалёв (Altoros): Practical Steps to Improve Apache Hive PerformanceOlga Lavrentieva
Сергей Ковалёв: Solutions Architect, Big Data/High-performance Computation Expert в Altoros; г.Минск
Доклад: «Practical Steps to Improve Apache Hive Performance»
Whether you are already using one or more clouds or just getting started, a cloud management platform (CMP) can help right now. Realize value quickly by using a CMP to gain control over existing cloud usage and then expand your cloud use with a CMP that standardizes how you manage and provision resources across all your cloud and virtualized infrastructure.
This is a fusion talk I presented at the devopsdays conference heled in Galway in 2018.
In it I share some of the misuses of the cloud I have seen and then focus on the five essential characteristics of cloud with the aim of imparting the importance of adopting these characteristics to improve performance.
Last Conference 2017: Big Data in a Production Environment: Lessons LearntMark Grebler
Presentation at the 2017 LAST (Lean, Agile, Systems Thinking) Conference.
A presentation about the challenges involved in building a production Big Data system used directly by customers.
This document summarizes CitrixDay 2012. It discusses Citrix's revenue, employee count, customer count, and partner count. It highlights Citrix's leadership in desktop and app virtualization, cloud networking, and public clouds. It also discusses trends like BYOD, workshifting, and mobility apps that will drive IT change. Citrix products like Project Avalon aim to deliver Windows apps and desktops as a true cloud service. The event emphasized Citrix's vision of supporting any device, any cloud to transform, build, bridge and deliver solutions and services.
The do's and dont's of cloud computing - StatPro Cloud Summit 2012StatPro Group
Neil Smyth (@Neil_StatPro), Technology and Marketing Director at StatPro covers the do’s and don’t’s of cloud computing. Neil provides a comparison of traditional hosting versus SaaS and cloud computing, including an interesting look at how one compares to a housing estate and the other to a hotel. He then moves on to providing top tips on selecting a cloud computing vendor, including the key things to look out for such as infrastructure, security, scalability and the business model.
This document discusses designing an open source observability stack for distributed environments. It covers topics like what observability is and why it's important, how Kubernetes impacts observability, using open source tools for telemetry success, the role of security, and putting all the pieces together into a production-ready architecture. The key challenges of observability in distributed systems are addressed, like collecting the right information without being overwhelmed by noise. Example production architectures are presented using open source tools like ELK, Prometheus, Grafana, and Jaeger.
Ohio LinuxFest: Crash Course in Open Source Cloud ComputingMark Hinkle
This document summarizes Mark R. Hinkle's presentation on open source cloud computing. The presentation provides an overview of cloud computing concepts and models. It then discusses various open source tools that can be used to build public and private clouds, including hypervisors, virtual machine formats, storage solutions, APIs, configuration management, monitoring, and automation/orchestration tools. The presentation aims to demonstrate how open source software can be combined to create cloud computing platforms and manage cloud infrastructure.
On-demand recording: https://www.nginx.com/resources/webinars/mra-ama-part-6-service-mesh-models/
Speakers:
Charles Pretzer
Technical Architect
NGINX, Inc.
Floyd Smith
Director of Content Marketing
NGINX, Inc.
About the webinar:
In this webinar, two models of the NGINX Microservices Reference Architecture, the Router Mesh Model and the Fabric Model, are shown as successively more capable implementations of a service mesh architecture. We compare the MRA models to Istio, linkerd, and other service mesh architectures, and show how the NGINX Kubernetes Ingress Controller allows direct use of these other architectures. Attendees of the live webinar will have the opportunity to ask questions.
Service mesh models are an emerging standard for microservices development and deployment. Popular architectures such as Istio and linkerd use a service mesh approach, including attributes such as load balancing capability, support for authorization and authentication, and use of the circuit breaker model for resiliency.
Watch this webinar to learn:
- Key problems solved by using a service mesh model for microservices
_ How different service mesh architectures compare to each other
- How to use NGINX service mesh models - the Router Mesh Model and Fabric Model of the MRA
- How the Kubernetes Ingress Controller enables the use of NGINX in Istio, linkerd, and other service mesh models
How to Manage VMware vSphere Like AWS and AzureRightScale
This document discusses how to manage VMware vSphere like AWS and Azure. It outlines the challenges of multi-cloud management and how RightScale's Cloud Appliance for vSphere can help "cloudify" vSphere. The document shows that RightScale provides a single pane of glass for managing cloud and virtualized environments across platforms. It also includes an agenda and information about RightScale and data on enterprise cloud adoption trends. Finally, it previews a demo of RightScale's Cloud Appliance for vSphere capabilities.
Orchestrating stateful applications with PKS and PortworxVMware Tanzu
This document provides an overview of Portworx, including:
1. Portworx is a leader in providing stateful container orchestration that works across any cloud or scheduler.
2. It has an experienced team and investors, with headquarters in Los Altos, CA and 70 employees globally.
3. Portworx allows applications to run across different infrastructure types and clouds with a portable cloud stack that provides high availability, replication, security and data mobility features.
Webinar: Considering Hyperconverged for Your Enterprise? 3 Key Questions to AskStorage Switzerland
Over the last few years, Hyper-Converged Infrastructure (HCI) deployments have been on the increase. HCI combines server, storage and networking into a single system building block, however, it introduces many new complexities into your environment. Join Storage Switzerland and Datrium as we discuss the three key questions that enterprises need to ask when considering hyperconverged architectures.
Lost in the Fog: Is Cloud Computing the Future for Digital InformationClifton Chan
Cloud computing provides on-demand access to shared computing resources like servers, storage, databases, networking, software, analytics and more that can be rapidly provisioned with minimal management effort. It is becoming a trend and part of the computing landscape, moving from an immature technology to mainstream use. For governments, cloud computing provides opportunities to focus on core functions rather than infrastructure maintenance, with potential cost savings from rapid elasticity and pay-per-use models. However, security, data sovereignty and loss of control over unique systems are challenges to address with cloud adoption.
Integration Patterns and Anti-Patterns for Microservices ArchitecturesApcera
Integration Patterns and Anti-Patterns for Microservices Architectures
David Williams
Co-Founder and Partner, Williams Garcia
You can learn more about NATS at http://www.nats.io
Security Events Logging at Bell with the Elastic StackElasticsearch
One of Canada’s largest telecommunications company is using Elastic to drive improved security analysis in their SOC. With a need to ingest all security logs, build threat detection models, and normalize many new types of logs, the Bell security team turned to Elastic. Learn how they’ve streamlined alerts, deepened log analysis, and addressed challenges unique to being an ISP.
This document discusses patterns for data management in microservice architectures. It covers database per service, where each service owns its own private data store. Event-driven architecture is presented as a way to maintain consistency across services by having each service publish events after updating its database. Patterns like command query responsibility segregation (CQRS) and storing events in a transaction log can also help maintain consistency. The challenges of distributed transactions are discussed, along with eventual consistency as an alternative to strong consistency.
The document discusses cloud-enabled testing services and some issues to consider when using them. It defines cloud computing and outlines the benefits of using cloud services for testing like cost reduction, flexibility, and compliance. However, issues like data security, test data ownership, and dependency on secure virtual infrastructure need to be addressed. Overall, while cloud testing services provide benefits, organizations must standardize processes, virtualize testing environments, and implement security measures to mitigate risks.
Micro-services architecture is an evolutionary design ideal for evolutionary systems where you can’t fully anticipate the types of devices that may one day be accessing your application
Service Fabric - Microservices Architectures made SimpleParis Polyzos
In this presentation I talk about Azure Service Fabric and microservices architecture. I describe the challenges we face in the development of modern applications and, furthermore, I explore how the use of Azure Service Fabric can help us build and operate always-on, scalable, distributed apps.
Сергей Ковалёв (Altoros): Practical Steps to Improve Apache Hive PerformanceOlga Lavrentieva
Сергей Ковалёв: Solutions Architect, Big Data/High-performance Computation Expert в Altoros; г.Минск
Доклад: «Practical Steps to Improve Apache Hive Performance»
Владимир Иванов (Oracle): Java: прошлое и будущееOlga Lavrentieva
Владимир Иванов: Software Engineer / Principal Member of Technical Staff в Oracle; г.Санкт-Петербург
Ведущий инженер Oracle, работает в группе разработки виртуальной Java-машиныHotSpot. Специализируется на JIT-компиляции и поддержке альтернативных языков на платформе Java.
Доклад: «Java: прошлое и будущее».
This document discusses various topics related to language and technology including:
- The history and names of the city of Strasbourg in different languages.
- Features of programming languages like classes, lambdas, and multiple assignment in ECMAScript 6.
- How Apache Cordova allows building native mobile apps using HTML, CSS, and JavaScript.
- Different phonetic systems used by linguists and how to organize searches across multiple conversions.
- Functional programming languages like Haskell and its features like laziness and parallelism.
- Web frameworks like Yesod built for Haskell.
- Cloud platforms like Cloud Foundry that support building apps in multiple languages using buildpacks.
Александр Протасеня: "PayPal. Различные способы интеграции"Olga Lavrentieva
Александр Протасеня (.Net Developer в Altoros): "PayPal. различные способы интеграции"
- Classic API, Subscriptions, Express Checkout, использование IPN. Разбор наиболее частых проблем.
Сергей Черничков: "Интеграция платежных систем в .Net приложения"Olga Lavrentieva
Сергей Черничков (.Net Developer в Altoros): "Интеграция платежных систем в .Net приложения"
- Выбор платежной системы (Payment Gateway)
- Обзор типовых решений интеграции платежных систем
- Рекомендации по разработке, тестированию интеграции платежной системы.
Антон Шемерей «Single responsibility principle в руби или почему instanceclas...Olga Lavrentieva
Антон Шемерей (Senior Developer в Sphere Consulting, г.Минск)
Доклад: «Single Responsibility Principle в Руби или почему instance/class variables это ОЧЕНЬ плохо»
Всем приходится работать с унаследованным кодом и часами тратить время на поиск устранения ошибок, которых в большинстве случаев можно было бы легко избежать. Одним из краеугольных камней является нарушение принципа единственной ответственности. В докладе пойдет речь о том, как провести анализ кода, как его можно исправить и как избегать таких ошибок в будущем.
Егор Воробьёв (Web Developer в Datarockets)
Доклад: «Ruby internals»
Юкихиро Мацумото и его команда потратили уйму времени, чтобы реализовать те вещи, которыми мы пользуемся каждый день. В своем докладе Егор расскажет, что скрывается за обычными строчками, которые каждый из нас использует, и объяснит, почему важно знать то, что находятся по ту сторону экрана.
Андрей Колешко (Team Lead проекта Mezuka)
Доклад: «Что не так с Rails?»
Андрей расскажет, как и почему он и его команда решили отказаться от многих возможностей Rails и чем их заменили на своем проекте. В целом рассказ Андрея - это рассуждение о том, к чему приводит неправильное использование Rails, почему Rails не годится для всех Web-проектов в том виде, в котором представляет его сообщество разработчиков, авторы книг и best practices.
Дмитрий Савицкий (Senior Software Engineer в Altoros)
Доклад: «Ruby Anti-Magic Shield»
Не упустите шанс попасть на сеанс практической магии с разоблачением от Дмитрия Савицкого. Способов помешать кому-то, кто пытается повлиять на ваш код со злым умыслом или по незнанию, не так уж и много. Дмитрий расскажет о тех немногочисленных возможностях, которые позволяют избежать запутанной и опасной "метамагии" в приложениях. Будет магически интересно.
Сергей Алексеев «Парное программирование. Удаленно»Olga Lavrentieva
Сергей Алексеев (Ruby Developer в Pinshape)
Доклад: «Парное программирование. Удаленно»
«Устали объяснять как это работает? Парное программирование – вместо тысячи слов. Потратили полдня на решение задачи и безрезультатно? Не тормозите – программируйте с напарником. Следуете трендам, следите за тенденциями – новое поколение выбирает парное программирование. Когда программировать одному уже не ice... Просто добавьте напарника. Несколько полезных инструментов и техник – мы отбираем только самое лучшее. Вы еще программируете в одиночку? Тогда мы идем к вам!»
Алексей Дёмин (Java Developer в InData Labs)
Доклад: «Почему Spark отнюдь не так хорош»
О чём: Сейчас по всем каналам идёт обсуждение новой революционной технологии обработки данных Spark. Алексей предлагает взглянуть чуть глубже и узнать, действительно ли Spark так хорош, как нам рассказывает об этом маркетинг.
«Cassandra data modeling – моделирование данных для NoSQL СУБД Cassandra»Olga Lavrentieva
Cassandra is a scalable, masterless database. It uses a column family data structure with rows and columns mapped to keys. Data is stored in SSTables. Cassandra supports composite primary keys and secondary indexes. Examples show creating tables, inserting data, and performing queries. Normalization and denormalization techniques are discussed. References provide additional resources on Cassandra data modeling best practices.
«Практика построения высокодоступного решения на базе Cloud Foundry Paas»Olga Lavrentieva
This document discusses building a highly available solution based on the Cloud Foundry PaaS. It describes selecting AWS and OpenStack as technologies, implementing a pilot project on AWS across two regions, and using Cloud Foundry for application deployment. The solution provides a scalable and distributed platform for managing devices as a service, leveraging technologies like Cassandra, MariaDB, and open source components.
«Дизайн продвинутых нереляционных схем для Big Data»Olga Lavrentieva
Виктор Смирнов (Java Tech Lead в Klika Technologies)
Доклад: «Дизайн продвинутых нереляционных схем для Big Data»
О чём: Виктор познакомит всех с примерами продвинутых нереляционных схем данных и тем, как они могут использоваться для решения задач, связанных с хранением и обработкой больших данных.
«Нужно больше шин! Eventbus based framework vertx.io»Olga Lavrentieva
Михаил Бортник (Ruby Developer в R&R Music Ukraine, г.Киев)
Доклад: «Нужно больше шин! Eventbus-based framework Vertx.io»
О чём: Михаил поведает о мультиязычном фреймворке с нетрадиционным подходом, а также о том, как Software заимствует идеи у Hardware.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdfOn-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). Resource pooling. The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, and network bandwidth. Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time. Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability1 at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.
Let’s assume that you’ve selected a trusted CC service provider. Is it enough to meet the NIST definition of what Cloud Computing is?It’s not and it often has multiple reasons, because so many applications were not developed having CC architecture in mind
Many customers don’t have a clear picture of the process. So they give a task to project manager: migrate to cloud.It’s modern hot topic, it doesn’t require any hardware maintenance thus it’s cheaper, and it’s scalable and pay-as-you-go etc.What many of them don’t understand is that developers should think cloud-wise while writing source-code.Performance tests should be able to provide statistics for further decisions on scaling policies.Security should be verified.It can be a real pain if the process of cloud migration is as simple as run some machines and send an army of maintenance engineers to configure them.Then just trust these cloud guys with all the High Availability and Scalability and if anything goes wrong in their cloud – blame the cloud.
Having all the issues in mind we came up with process unification: you should start migration process with showing it to the customer to skip sudden failovers and making this hot topic a taboo and a nightmare he survived.First of all, you select a virtual hosting provider: consider your project specifics and costs and make your choice.As a part of CCCC in EPAM we go through this process with project team and get a knowledge of pros and cons of every service provider for every technology stack.Then we run environment and give IP-addresses of launched instances, SSH or RDP or any other access and credentials. And there you go, you have your machines “in the cloud”.We can move to step 3: deployment engineers setup everything they need and they are satisfied with the “cloudness” of their applications.Most of them just stop there and won’t move forward to get all the essential requirements of Cloud Computing term met.There still are 5 more steps I’d like to focus on.First of all machines configuration has to be fully automated. How do you plan to have Multi-platform, multi-technology oriented solution. EPAM projects contain multiple decisions, sometimes legacy, sometimes it’s optimal, other platforms are monogam.Azure Fabric Controller.AWS Elastic beanstalkHeroku