The document discusses best practices for architecting high-volume, high-performance publishing systems for data-intensive websites. It describes using a layered architecture with ActiveMQ for messaging, Camel for routing, and Thrift for data structures and versioning. Techniques covered include virtual topics, throttling, retries, and monitoring to build scalable, fault-tolerant systems that can integrate multiple environments, data centers, applications and data formats.
Scott Edmunds & Rob Davidson's talk at the Metabolomics Society 2014 Meeting ...GigaScience, BGI Hong Kong
Scott Edmunds & Rob Davidson's talk at the Metabolomics Society 2014 Meeting on Beyond Dead Trees: data & workflow publishing with GigaScience, Tsuruoka 23rd June 2014
How Edmunds Got in the Fast Lane: 80% Reduction in Page Load Time in 3 Simple...Edmunds.com, Inc.
The document discusses how Edmunds implemented a JavaScript loader to improve page load times by 80%. It reduced HTTP requests by loading components asynchronously and in parallel after an initial quick page load. Third-party requests were difficult to control, so Edmunds focused on optimizing its own content. The loader declared dependencies, prioritized components, and rendered them sequentially after dependencies were loaded to improve performance while supporting rich content.
Transforming Edmunds has 500 employees, 18 million monthly visitors, and 30% mobile traffic. Edmunds has used various techniques over the years to transform including Agile in 2007, Design Thinking in 2009, hackathons in 2010, and Continuous Delivery in 2011. Recently, Edmunds has used Design Thinking techniques like personas, prototyping and usability testing to better understand users and design products. Edmunds also holds hackathons to generate new product ideas from its employees and partners. Going forward, Edmunds aims to continue innovating and disrupting itself through experimentation and a focus on understanding user needs.
Comparison of Autotrader, Carfax, Cargurus, Edmunds.com and Other Top Car Buy...Unmetric
This document provides a summary of key metrics and performance for 11 car buying websites on Facebook during Q3 2015. It finds that while CarGurus posted the most content, they received the lowest engagement. CarMax engaged best with fans and saw the highest fan growth. AutoTrader.com had the largest fan base and their posts about a hula doll sweepstakes contest were among their most engaging. In general, the document analyzes and compares engagement, posts, conversations, and other Facebook metrics for the 11 brands over this period.
This document outlines a training program called "Peak Performance for Sales Excellence". The objective of the program is to teach participants how to consistently perform at their highest potential during key sales situations. Over the course of the program, participants will learn about the key elements of peak performance, how to access the proper mindset before important performances, and how to maintain peak performance levels by managing focus and adversity. The program utilizes discussion, case studies, practice sessions, and group work to teach these concepts.
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
This document provides a summary of the analytics available through SlideShare for monitoring the performance of presentations. It outlines the key metrics that can be viewed such as total views, actions, and traffic sources over different time periods. The analytics help users identify topics and presentation styles that resonate best with audiences based on view and engagement numbers. They also allow users to calculate important metrics like view-to-contact conversion rates. Regular review of the analytics insights helps users improve future presentations and marketing strategies.
Each month, join us as we highlight and discuss hot topics ranging from the future of higher education to wearable technology, best productivity hacks and secrets to hiring top talent. Upload your SlideShares, and share your expertise with the world!
Scott Edmunds & Rob Davidson's talk at the Metabolomics Society 2014 Meeting ...GigaScience, BGI Hong Kong
Scott Edmunds & Rob Davidson's talk at the Metabolomics Society 2014 Meeting on Beyond Dead Trees: data & workflow publishing with GigaScience, Tsuruoka 23rd June 2014
How Edmunds Got in the Fast Lane: 80% Reduction in Page Load Time in 3 Simple...Edmunds.com, Inc.
The document discusses how Edmunds implemented a JavaScript loader to improve page load times by 80%. It reduced HTTP requests by loading components asynchronously and in parallel after an initial quick page load. Third-party requests were difficult to control, so Edmunds focused on optimizing its own content. The loader declared dependencies, prioritized components, and rendered them sequentially after dependencies were loaded to improve performance while supporting rich content.
Transforming Edmunds has 500 employees, 18 million monthly visitors, and 30% mobile traffic. Edmunds has used various techniques over the years to transform including Agile in 2007, Design Thinking in 2009, hackathons in 2010, and Continuous Delivery in 2011. Recently, Edmunds has used Design Thinking techniques like personas, prototyping and usability testing to better understand users and design products. Edmunds also holds hackathons to generate new product ideas from its employees and partners. Going forward, Edmunds aims to continue innovating and disrupting itself through experimentation and a focus on understanding user needs.
Comparison of Autotrader, Carfax, Cargurus, Edmunds.com and Other Top Car Buy...Unmetric
This document provides a summary of key metrics and performance for 11 car buying websites on Facebook during Q3 2015. It finds that while CarGurus posted the most content, they received the lowest engagement. CarMax engaged best with fans and saw the highest fan growth. AutoTrader.com had the largest fan base and their posts about a hula doll sweepstakes contest were among their most engaging. In general, the document analyzes and compares engagement, posts, conversations, and other Facebook metrics for the 11 brands over this period.
This document outlines a training program called "Peak Performance for Sales Excellence". The objective of the program is to teach participants how to consistently perform at their highest potential during key sales situations. Over the course of the program, participants will learn about the key elements of peak performance, how to access the proper mindset before important performances, and how to maintain peak performance levels by managing focus and adversity. The program utilizes discussion, case studies, practice sessions, and group work to teach these concepts.
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
This document provides a summary of the analytics available through SlideShare for monitoring the performance of presentations. It outlines the key metrics that can be viewed such as total views, actions, and traffic sources over different time periods. The analytics help users identify topics and presentation styles that resonate best with audiences based on view and engagement numbers. They also allow users to calculate important metrics like view-to-contact conversion rates. Regular review of the analytics insights helps users improve future presentations and marketing strategies.
Each month, join us as we highlight and discuss hot topics ranging from the future of higher education to wearable technology, best productivity hacks and secrets to hiring top talent. Upload your SlideShares, and share your expertise with the world!
RowdMap, Inc. joined the Rothman Institute at the Medical Group Management Association (MGMA) 2015 National Conference on using government benchmark data to identify and capture hidden value for physicians entering value-based risk arrangements.
Joshua Rosenthal, PhD, Chief Scientific Officer and Co-Founder at RowdMap, Inc., joined Mike West, Chief Executive Officer at the Rothman Institute to jointly speak on how doctors can use newly released government data to identify and capture hidden value to succeed in value based risk arrangements. The presentation entitled, “Capturing Your Hidden Value: Using Newly Released Government Benchmark Data to Select Value Programs and Negotiate Risk Arrangements,” was delivered at the Medical Group Management Association (MGMA) 2015 National Conference.
IBM Watson Data Platform is an integrated platform of tools, services and data that helps companies accelerate their shift to become data-driven organizations. It is the IBM public cloud foundation designed to support the data and analytics vision of whole enterprises, delivering a fully integrated platform that sustains both analytical investigations and putting insights into active use in production at any scale. It delivers the user experiences that amplify the ability of every data professional to execute on that vision, allowing teams such as data scientists, developers and business analysts to work together across different languages and data models.
The document discusses the concepts of VPEC-T (values, policies, events, content, and trust) as drivers of innovation and how they change and evolve across different containers including human brains, applications and databases, organizations, and web communities. It also examines how barriers between these containers are dissolving as content becomes more externalized and accessible on the web.
The document discusses different types of policies for managing personal data, including specific policies over individual resources, access control policies, and data handling policies. It also describes authorizations that define how personal data can be used and obligations that specify actions that must be performed, such as deleting data. The document provides an example of how policies can be matched and combined when a user creates an account.
The document discusses different types of policies for managing personal data, including specific policies over individual resources, access control policies, and data handling policies. It also describes authorizations that define how personal data can be used and obligations that specify actions that must be taken, such as deleting data. The document provides an example of how policies from a data controller and data subject's preferences can be matched to generate a single sticky policy.
The document discusses different types of policies for managing personal data, including specific policies over individual resources, access control policies, and data handling policies. It also describes authorizations that define how personal data can be used and obligations that specify actions that must be taken, such as deleting data. The document provides an example of how policies from a data controller and data subject's preferences can be matched to generate a single sticky policy.
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...CA Technologies
As data becomes ever more central to daily operations, pressure is mounting on organizations to become fully secure. Legislation is becoming increasingly stringent throughout the world. The common practice of using production data in non-production environments will soon risk fines in the millions of dollars.
For more information, please visit http://cainc.to/Nv2VOe
Complex Analytics using Open Source TechnologiesDataWorks Summit
The document discusses Verizon's Big Answers Platform (VBAP), which is a big data analytics platform that uses open source technologies. VBAP includes both batch and streaming analytics capabilities to enable descriptive, predictive, and prescriptive analytics. It ingests structured and unstructured data from various sources and channels. VBAP is demonstrated to provide cross-channel customer journey insights and enable just-in-time interventions through real-time streaming analytics. The key takeaways emphasized are that people, problem definition, support, partnerships are critical, and that technology alone is not sufficient and will continue to evolve.
GDPR, ePrivacy Regulation, consent, and online media Johnny Ryan
This document discusses the implications of GDPR and ePrivacy Regulation on online advertising and consent requirements. It notes that GDPR requires explicit consent for processing personal data, while ePrivacy Regulation focuses on communications privacy. It outlines the complex ad targeting and data sharing ecosystem, noting numerous companies have access to personal data with each transfer. Finally, it questions whether users will opt-in to sharing their data given detailed consent requests, noting companies like Google and Facebook will likely need to change practices to comply.
"Elastic enables the world’s leading organization to exceed their business objectives and power their mission-critical systems by eliminating data silos, connecting the dots, and transforming data of all types into actionable insights.
Come learn how the power of search can help you quickly surface relevant insights at scale. Whether you are an executive looking to reduce operational costs, a department head striving to do more with fewer tools, or engineer monitoring and protecting your IT environment, this session is for you. "
This document provides an installation guide for AccessData Forensic Toolkit (FTK) version 6.x. It discusses planning the FTK installation, including hardware and software requirements. It then describes how to perform a default or advanced installation of FTK, install required databases, initialize the FTK database, and create an administrator account. The document also covers uninstalling FTK as well as upgrading FTK and handling case migration between versions. Backup and restore procedures for FTK cases are also outlined.
1 3Financial Service Security EngagementLearning Team .docxoswald1horne84988
1
3
Financial Service Security EngagementLearning Team CCMGT/400
April 8th, 2019
Ellen Gaston
Financial Service Security Engagement
· Create a plan that addresses the secure use of mobile devices by internal employees and external employees as they use mobile devices to access these applications.
· Recommend physical security and environmental controls to protect the data center which runs the on-site applications.
Introduction
Integrating cloud-based, customer relationship management (CRM) software application with the on-site software applications that manage customer accounts and investment portfolios can assist a firm to create more leads, increase revenue, minimize the cost of sales, and improve customer services. However, this system has some security risks and requires an organization to create a plan that addresses its secure use.
Mobile Gadget Security/Bring Your Own Device Plan (BYOD)
This involves creating a gadget usage policy, before issuing them to workers. This entails limitation of its use and probable actions against its violation (Michener, 2015). Employees also are taught on how to mitigate security risks of mobile phones. If workers can utilize their personal gadgets, BYOD security policy is created, which comprises of installing distant wiping application on all devices to store data accessed from the organization (Michener, 2015). Organization should install current antivirus software to all devices to prevent hacking and loss of data. The content stored in the mobile devices should be backed up on organization’s computers on regularly basis to make sure that the data is safe if a gadget is stolen or lost.
Selecting Passwords
Passwords meant for the devices should be strong enough and not common to any third party. This ensures privacy as it prevents data linkage to unwanted individuals. On a different point, carrying out consistent mobile security audits and penetration assessment is one of the physical securities and environmental control measures. In this case, a firm hires a recognized security testing company to audit their gadget security and carry out penetration assessment (Michener, 2015). This ensures data protection as any noticed channels of data linkage drives the firm to upgrade its system.
· Propose audit assessment and processes that will be used to ensure that the cloud-based CRM software provider uses appropriate physical security and environmental controls to protect their data centers which run your cloud-based CRM software.
· Develop identity and access management policies for both the on-site systems and the cloud-based CRM.
Customers should be aware that unique data security issues arise in a cloud computing environment. For example, in an ASP environment, a single physical server may be dedicated to the customer for hosting the application and storing the customer’s data. However, in a cloud computing environment, technologies and approaches used to facilitate scalability, such .
55 Must-Haves in Every Affiliate Manager's ToolboxAffiliate Summit
This presentation is from Affiliate Summit West 2015 (January 18-20, 2015 in Las Vegas, NV). Session description: Geno will uncover 55 tools that effective affiliate managers use to streamline processes of affiliate recruitment, compliance policing, communication, program optimization, and more.
DataOps @ Scale: A Modern Framework for Data Management in the Public SectorTamrMarketing
Within the last 6 months, the U.S. agencies have begun defining a “Data Science Occupational Series”.
This means adding the term “(Data Scientist)” at the end of a job title to increase the odds of finding a candidate that understands data.
Watch the full presentation: https://resources.tamr.com/govdataops
Summary of open data and using it to benchmark providers to driver membership in government ACA programs. Delivered by Ashley Distler and Bryant Hutson of RowdMap at AHIP.
OSCon 2011 Talk: The implications of open source technologies in safety criti...Shahid Shah
FDA regulated medical devices are considered safety-critical systems due to their ability to affect patient lives. Given the nature of scrutiny and the requirement to play it safe, most medical device vendors end up choosing proprietary or custom solutions for operating systems, databases, messaging platforms, alarm notification systems, and event logging.
This talk uncovered some of the common misconceptions around government regulations and how there are not inherent limitations around using FOSS in safety-critical systems so long as the requisite risk analysis and quality assurance work is conducted.
Shahid presented his recent work on modern medical device architectures, the challenges and opportunities associated with using open source software in medical devices, and real-world findings from use of open source answering questions such as:
Will the FDA accept open source in safety-critical systems?
Are open source systems safe enough for medical devices?
What kind of assessments are needed for open source software in medical devices?
This document provides an overview of key considerations for operating online services in the cloud. It discusses three main components to review:
1) Knowing your data elements and how data is handled in the cloud, which reduces control over data.
2) Mapping how data is transmitted and handled from input to storage and access to identify privacy and regulatory obligations.
3) Understanding cloud platforms and the distinctions between software, infrastructure and platform as a service models, and how data resides in public, private or hybrid cloud environments.
The document emphasizes the importance of classifying data types, owners, controllers and processors, and mapping who has access to data throughout its lifecycle to ensure proper use and address accuracy and consent requirements
SecureDroid: An Android Security Framework Extension for Context-Aware policy...Giuseppe La Torre
SecureDroid is an Android security framework extension that allows context-aware policy enforcement at runtime. It extends the standard Android security framework to check custom policies after an app is installed, using context information like location as constraints. Multiple parties like manufacturers, carriers, and users can set policies that are evaluated in a specific order. SecureDroid's architecture includes a policy enforcement point, context handler, policy administration and information points, and a policy decision point to determine access based on the app, permissions, context, and applicable policies.
Personium - Open Source PDS envisioning the Web of MyData暁生 下野
How can we citizens maximize the benefits of the new right to data portability, which is now rapidly being recognized globally?
Personal Data Store is a technology that will receive all “My Data” from hundreds of services. It aggregates and integrates them, and at times discloses a portion of them to others under user’s control for creating new values.
This talk will introduce an open-source Personal Data Store (PDS) server “Personium”, providing details on its technical implementation, the underpinning business models, and the actual implemented and future use cases.
SIEM, malware protection, deep data visibility — for freeElasticsearch
Are you a SIEM user who needs endpoint detection and correlation for complex multi-stage attacks across your environment? Elastic has launched a free and open endpoint security offering, directly integrated into the Elastic Stack. This offering is part of the free distribution tier and is available to every Elastic user. Learn how Elastic Security can help you protect your environment and why this advancement is so significant to security visibility.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
RowdMap, Inc. joined the Rothman Institute at the Medical Group Management Association (MGMA) 2015 National Conference on using government benchmark data to identify and capture hidden value for physicians entering value-based risk arrangements.
Joshua Rosenthal, PhD, Chief Scientific Officer and Co-Founder at RowdMap, Inc., joined Mike West, Chief Executive Officer at the Rothman Institute to jointly speak on how doctors can use newly released government data to identify and capture hidden value to succeed in value based risk arrangements. The presentation entitled, “Capturing Your Hidden Value: Using Newly Released Government Benchmark Data to Select Value Programs and Negotiate Risk Arrangements,” was delivered at the Medical Group Management Association (MGMA) 2015 National Conference.
IBM Watson Data Platform is an integrated platform of tools, services and data that helps companies accelerate their shift to become data-driven organizations. It is the IBM public cloud foundation designed to support the data and analytics vision of whole enterprises, delivering a fully integrated platform that sustains both analytical investigations and putting insights into active use in production at any scale. It delivers the user experiences that amplify the ability of every data professional to execute on that vision, allowing teams such as data scientists, developers and business analysts to work together across different languages and data models.
The document discusses the concepts of VPEC-T (values, policies, events, content, and trust) as drivers of innovation and how they change and evolve across different containers including human brains, applications and databases, organizations, and web communities. It also examines how barriers between these containers are dissolving as content becomes more externalized and accessible on the web.
The document discusses different types of policies for managing personal data, including specific policies over individual resources, access control policies, and data handling policies. It also describes authorizations that define how personal data can be used and obligations that specify actions that must be performed, such as deleting data. The document provides an example of how policies can be matched and combined when a user creates an account.
The document discusses different types of policies for managing personal data, including specific policies over individual resources, access control policies, and data handling policies. It also describes authorizations that define how personal data can be used and obligations that specify actions that must be taken, such as deleting data. The document provides an example of how policies from a data controller and data subject's preferences can be matched to generate a single sticky policy.
The document discusses different types of policies for managing personal data, including specific policies over individual resources, access control policies, and data handling policies. It also describes authorizations that define how personal data can be used and obligations that specify actions that must be taken, such as deleting data. The document provides an example of how policies from a data controller and data subject's preferences can be matched to generate a single sticky policy.
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...CA Technologies
As data becomes ever more central to daily operations, pressure is mounting on organizations to become fully secure. Legislation is becoming increasingly stringent throughout the world. The common practice of using production data in non-production environments will soon risk fines in the millions of dollars.
For more information, please visit http://cainc.to/Nv2VOe
Complex Analytics using Open Source TechnologiesDataWorks Summit
The document discusses Verizon's Big Answers Platform (VBAP), which is a big data analytics platform that uses open source technologies. VBAP includes both batch and streaming analytics capabilities to enable descriptive, predictive, and prescriptive analytics. It ingests structured and unstructured data from various sources and channels. VBAP is demonstrated to provide cross-channel customer journey insights and enable just-in-time interventions through real-time streaming analytics. The key takeaways emphasized are that people, problem definition, support, partnerships are critical, and that technology alone is not sufficient and will continue to evolve.
GDPR, ePrivacy Regulation, consent, and online media Johnny Ryan
This document discusses the implications of GDPR and ePrivacy Regulation on online advertising and consent requirements. It notes that GDPR requires explicit consent for processing personal data, while ePrivacy Regulation focuses on communications privacy. It outlines the complex ad targeting and data sharing ecosystem, noting numerous companies have access to personal data with each transfer. Finally, it questions whether users will opt-in to sharing their data given detailed consent requests, noting companies like Google and Facebook will likely need to change practices to comply.
"Elastic enables the world’s leading organization to exceed their business objectives and power their mission-critical systems by eliminating data silos, connecting the dots, and transforming data of all types into actionable insights.
Come learn how the power of search can help you quickly surface relevant insights at scale. Whether you are an executive looking to reduce operational costs, a department head striving to do more with fewer tools, or engineer monitoring and protecting your IT environment, this session is for you. "
This document provides an installation guide for AccessData Forensic Toolkit (FTK) version 6.x. It discusses planning the FTK installation, including hardware and software requirements. It then describes how to perform a default or advanced installation of FTK, install required databases, initialize the FTK database, and create an administrator account. The document also covers uninstalling FTK as well as upgrading FTK and handling case migration between versions. Backup and restore procedures for FTK cases are also outlined.
1 3Financial Service Security EngagementLearning Team .docxoswald1horne84988
1
3
Financial Service Security EngagementLearning Team CCMGT/400
April 8th, 2019
Ellen Gaston
Financial Service Security Engagement
· Create a plan that addresses the secure use of mobile devices by internal employees and external employees as they use mobile devices to access these applications.
· Recommend physical security and environmental controls to protect the data center which runs the on-site applications.
Introduction
Integrating cloud-based, customer relationship management (CRM) software application with the on-site software applications that manage customer accounts and investment portfolios can assist a firm to create more leads, increase revenue, minimize the cost of sales, and improve customer services. However, this system has some security risks and requires an organization to create a plan that addresses its secure use.
Mobile Gadget Security/Bring Your Own Device Plan (BYOD)
This involves creating a gadget usage policy, before issuing them to workers. This entails limitation of its use and probable actions against its violation (Michener, 2015). Employees also are taught on how to mitigate security risks of mobile phones. If workers can utilize their personal gadgets, BYOD security policy is created, which comprises of installing distant wiping application on all devices to store data accessed from the organization (Michener, 2015). Organization should install current antivirus software to all devices to prevent hacking and loss of data. The content stored in the mobile devices should be backed up on organization’s computers on regularly basis to make sure that the data is safe if a gadget is stolen or lost.
Selecting Passwords
Passwords meant for the devices should be strong enough and not common to any third party. This ensures privacy as it prevents data linkage to unwanted individuals. On a different point, carrying out consistent mobile security audits and penetration assessment is one of the physical securities and environmental control measures. In this case, a firm hires a recognized security testing company to audit their gadget security and carry out penetration assessment (Michener, 2015). This ensures data protection as any noticed channels of data linkage drives the firm to upgrade its system.
· Propose audit assessment and processes that will be used to ensure that the cloud-based CRM software provider uses appropriate physical security and environmental controls to protect their data centers which run your cloud-based CRM software.
· Develop identity and access management policies for both the on-site systems and the cloud-based CRM.
Customers should be aware that unique data security issues arise in a cloud computing environment. For example, in an ASP environment, a single physical server may be dedicated to the customer for hosting the application and storing the customer’s data. However, in a cloud computing environment, technologies and approaches used to facilitate scalability, such .
55 Must-Haves in Every Affiliate Manager's ToolboxAffiliate Summit
This presentation is from Affiliate Summit West 2015 (January 18-20, 2015 in Las Vegas, NV). Session description: Geno will uncover 55 tools that effective affiliate managers use to streamline processes of affiliate recruitment, compliance policing, communication, program optimization, and more.
DataOps @ Scale: A Modern Framework for Data Management in the Public SectorTamrMarketing
Within the last 6 months, the U.S. agencies have begun defining a “Data Science Occupational Series”.
This means adding the term “(Data Scientist)” at the end of a job title to increase the odds of finding a candidate that understands data.
Watch the full presentation: https://resources.tamr.com/govdataops
Summary of open data and using it to benchmark providers to driver membership in government ACA programs. Delivered by Ashley Distler and Bryant Hutson of RowdMap at AHIP.
OSCon 2011 Talk: The implications of open source technologies in safety criti...Shahid Shah
FDA regulated medical devices are considered safety-critical systems due to their ability to affect patient lives. Given the nature of scrutiny and the requirement to play it safe, most medical device vendors end up choosing proprietary or custom solutions for operating systems, databases, messaging platforms, alarm notification systems, and event logging.
This talk uncovered some of the common misconceptions around government regulations and how there are not inherent limitations around using FOSS in safety-critical systems so long as the requisite risk analysis and quality assurance work is conducted.
Shahid presented his recent work on modern medical device architectures, the challenges and opportunities associated with using open source software in medical devices, and real-world findings from use of open source answering questions such as:
Will the FDA accept open source in safety-critical systems?
Are open source systems safe enough for medical devices?
What kind of assessments are needed for open source software in medical devices?
This document provides an overview of key considerations for operating online services in the cloud. It discusses three main components to review:
1) Knowing your data elements and how data is handled in the cloud, which reduces control over data.
2) Mapping how data is transmitted and handled from input to storage and access to identify privacy and regulatory obligations.
3) Understanding cloud platforms and the distinctions between software, infrastructure and platform as a service models, and how data resides in public, private or hybrid cloud environments.
The document emphasizes the importance of classifying data types, owners, controllers and processors, and mapping who has access to data throughout its lifecycle to ensure proper use and address accuracy and consent requirements
SecureDroid: An Android Security Framework Extension for Context-Aware policy...Giuseppe La Torre
SecureDroid is an Android security framework extension that allows context-aware policy enforcement at runtime. It extends the standard Android security framework to check custom policies after an app is installed, using context information like location as constraints. Multiple parties like manufacturers, carriers, and users can set policies that are evaluated in a specific order. SecureDroid's architecture includes a policy enforcement point, context handler, policy administration and information points, and a policy decision point to determine access based on the app, permissions, context, and applicable policies.
Personium - Open Source PDS envisioning the Web of MyData暁生 下野
How can we citizens maximize the benefits of the new right to data portability, which is now rapidly being recognized globally?
Personal Data Store is a technology that will receive all “My Data” from hundreds of services. It aggregates and integrates them, and at times discloses a portion of them to others under user’s control for creating new values.
This talk will introduce an open-source Personal Data Store (PDS) server “Personium”, providing details on its technical implementation, the underpinning business models, and the actual implemented and future use cases.
SIEM, malware protection, deep data visibility — for freeElasticsearch
Are you a SIEM user who needs endpoint detection and correlation for complex multi-stage attacks across your environment? Elastic has launched a free and open endpoint security offering, directly integrated into the Elastic Stack. This offering is part of the free distribution tier and is available to every Elastic user. Learn how Elastic Security can help you protect your environment and why this advancement is so significant to security visibility.
Similar to Best Practices for Architecting High Volume, High Performance Publishing for Data Intensive Website (20)
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...AlexanderRichford
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation Functions to Prevent Interaction with Malicious QR Codes.
Aim of the Study: The goal of this research was to develop a robust hybrid approach for identifying malicious and insecure URLs derived from QR codes, ensuring safe interactions.
This is achieved through:
Machine Learning Model: Predicts the likelihood of a URL being malicious.
Security Validation Functions: Ensures the derived URL has a valid certificate and proper URL format.
This innovative blend of technology aims to enhance cybersecurity measures and protect users from potential threats hidden within QR codes 🖥 🔒
This study was my first introduction to using ML which has shown me the immense potential of ML in creating more secure digital environments!
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
What is an RPA CoE? Session 2 – CoE RolesDianaGray10
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
• What roles are essential?
• What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Keywords: AI, Containeres, Kubernetes, Cloud Native
Event Link: https://meine.doag.org/events/cloudland/2024/agenda/#agendaId.4211
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfleebarnesutopia
So… you want to become a Test Automation Engineer (or hire and develop one)? While there’s quite a bit of information available about important technical and tool skills to master, there’s not enough discussion around the path to becoming an effective Test Automation Engineer that knows how to add VALUE. In my experience this had led to a proliferation of engineers who are proficient with tools and building frameworks but have skill and knowledge gaps, especially in software testing, that reduce the value they deliver with test automation.
In this talk, Lee will share his lessons learned from over 30 years of working with, and mentoring, hundreds of Test Automation Engineers. Whether you’re looking to get started in test automation or just want to improve your trade, this talk will give you a solid foundation and roadmap for ensuring your test automation efforts continuously add value. This talk is equally valuable for both aspiring Test Automation Engineers and those managing them! All attendees will take away a set of key foundational knowledge and a high-level learning path for leveling up test automation skills and ensuring they add value to their organizations.
Best Practices for Architecting High Volume, High Performance Publishing for Data Intensive Website
1. Copyright Edmunds Inc. (the “Company”). All rights reserved.
Edmunds®, Edmunds.com®, the Edmunds.com car design, Inside Linesm , CarSpacesm and AutoObserver® are proprietary trademarks of the Company.
This document contains proprietary and/or confidential information of the Company. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any
purpose other than advancing the best interests of the Company, and any such disclosure requires the express approval of the Company.
Best Practices for Architecting High Volume, High
Performance Publishing for Data Intensive Web Site
October 23th 2010
Greg Rokita
Director, Sr. Architect
Edmunds.com
2. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Assumptions
o Knowledge of Java
o Basic understanding of Spring
o Basic knowledge of JMS
3. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Agenda
o Common Enterprise Problems
o Layered Architecture
o ActiveMQ and Virtual Topics
o Camel
o Thrift & Versioning
o Retry and Throttling mechanism
o Monitoring
o Q&A
4. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Common Enterprise Problems
o Multiple:
o Environments (Prod, Test, Dev, etc)
o Data Centers (Los Angeles, New York, Amazon EC2, etc)
o Sites
o Applications (Solr, Coherence, etc)
o Data Sets (inventory, user data, pricing data, etc)
o Data Format Changes
o Components Fail
5. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
What evolved from the efforts
o Message
o Delivery
o Routing
o Persistence
o Durability
o Retries
o Throttling
o Versioning
o Monitoring
ActiveMQ
Camel
Thrift
7. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Publish Subscribe
o Producers decoupled from consumers –– cool idea
o JMS durable topics suck
o message consumer is created with a JMS client ID and
durable subscriber name
o only one consumer can be active for a client ID and
subscriber name
o CAN’’T failover of the subscriber if that one process running
that one consumer thread dies
o CAN’’T load balancing of messages.
8. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Virtual Topics
Virtual Topic:
VirtualTopic.Vehicle
Queues:
Consumer.Queue1.VirtualTopic.Vehicle
Consumer.Queue2.VirtualTopic.Vehicle
9. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Virtual Topics
public class QueueDestinationInterceptor implements DestinationInterceptor {
public synchronized Destination intercept(final Destination destination) {
return new DestinationFilter(destination) {
public void send(ProducerBrokerExchange context, Message message) throws Exception {
if (applyFilterBasedOnMessageProperties(destination)) {
return;
}
destination.send(context, message);
}
};
}
}
o Message is always send to ALL the queues
o Solution: Destination Interceptor ActiveMQ plug in
10. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Camel
from(A).filter(header(““type").isEqualTo(““Widget")).to(B)
Endpoint A Endpoint B
Filter
11. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Camel Cont.
activemq.queue.A activemq.queue.B
Filter
RouteBuilder builder = new RouteBuilder() {
public void configure() {
from(“activemq.queue.A”)
.filter(header(“type”).isEqualTo(“Widget”))
.to(“activemq.queue.B”);
}
};
12. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Camel Cont.
activemq.queue.A activemq.queue.B
Filter
<camelContext errorHandlerRef="errorHandler“
xmlns="http://camel.apache.org/schema/spring">
<route>
<from uri=“activemq.queue.A"/>
<filter>
<xpath>/foo:person[@name='James']</xpath>
<to uri="activemq.queue.B"/>
</filter>
</route>
</camelContext>
13. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Camel Cont.
<route>
<from uri="timer://foo?fixedRate=true&period=1000"/>
<to uri="bean:myBean?method=someMethodName"/>
</route>
o Example endpoints
o Queue
o Topic
o Timer
o Email
o Log
o Javabean
o FTP
o HDFS
o HTTP
o XSLT
14. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Source/Target Selectors
14
Field Example Values Purpose
Environment PROD, TEST, DEV The staging environment in the
promotional cycle
Data Center LAX, EC2 The data center where the
environment is located
Site Edmunds, InsideLine Defines the site as a set of
services
Application Digital Asset Manager,
Inventory Application
Deployment Unit
15. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Topic Selectors
15
Field Example Values Purpose
Type Publish, Audit, Control Defines the type of the message
Service Inventory, Pricing Type of data being send
16. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Producer / Consumer matching
Producer Consumer
Prod
Lax
Edmunds
Inventory
I am
Prod, Test
Lax, EC2
Edmunds
Dealer
Send To Prod
Lax, EC2
Edmunds
Inventory
I am
Test
EC2
Edmunds
Dealer
Receive From
Broker
Destination
Interceptor
Publish
Inventory
Publish
Inventory
Virtual
Topic
Name
Queue
Name
Match!
17. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Thrift: Data+Service+Strong Typing+
Versioning
namespace java com.edmunds.inventory.thrift.gen
struct Product {
1: string productType = "NCI",
2: map<string, string> vehicleDisplayInfo,
}
struct Inventory {
1: string id,
2: string vin,
3: string franchiseId,
4: map<string, string> edmundsAttributes,
5: list<Product> products,
}
service InventoryService {
oneway void removeInventory(1:Inventory inventory),
oneway void updateInventory(1:Inventory inventory),
}
18. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Thrift –– Camel Integration
Camel
Thrift
19. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Thrift –– Camel Integration: Sender
import org.apache.thrift.transport.TTransport;
public class ClientTransportImpl extends TTransport {
private SenderInternal senderInternal;
public void flush() throws TTransportException {
byte[] buf = writeBuffer.toByteArray();
writeBuffer.reset();
senderInternal.sendThrift(buf);
}
public class SenderImpl extends AbstractEndpoint implements Sender, SenderInternal,
InitializingBean {
public void sendThrift(Object object) throws Exception {
Map<String, Object> headers = initializeMessageHeaders();
headers.put("CamelBeanMethodName", "executeThrift");
headers.put("CamelJmsMessageType", getContext().getProtocol().getJmsMessageType());
doSend(object, headers, ReceiverImpl.getEntryEndpointName(getTopicSelectors().topicName()));
}
private void doSend(Object object, Map<String, Object> headers, String entryPointName) {
producerTemplate
.sendBodyAndHeaders(entryPointName, ExchangePattern.InOnly, object, headers);
}
}
20. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Thrift –– Camel Integration: Receiver
public class ReceiverService {
public void executeThrift(@Body byte[] byteArray, @Headers Map<String, String> headers)
{
enterMessageDeck.addHeaders(headers);
ReceiverInternal receiverInternal = (ReceiverInternal) callable.getReceiver();
receiverInternal.getContext().initialize(headers);
ProcessorTransportImpl processorTransport = new ProcessorTransportImpl();
TProcessor processor = findProcessor();
processorTransport.messageReceived(byteArray, processor, receiverInternal
}
21. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Creating Consumer
@Component(“inventoryConsumer")
public class InventoryConsumer extends AbstractDataHandler implements
InventoryService.Iface {
@Override
public void updateInventory(com.edmunds.inventory.thrift.gen.Inventory inventory) {
// perform your business logic here
}
<bean id="receiver" class="com.edmunds.eps.endpoint.impl.ReceiverImpl">
<property name="service" value=“inventory"/>
<property name="messageType" value=“publish"/>
<property name=“dataCenter" value=“lax"/>
<property name=“environment" value=“prod"/>
<property name=“site" value=“Edmunds"/>
<property name="application" value=“Search"/>
</bean>
22. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Creating Producer
// Inventory.Client is generated by Thrift
Inventory.Client inventoryClient = new Inventory.Client(sender.getProtocol());
inventoryClient.updateInventory( /*inventory object generated by Thrift*/ );
<bean id=“sender" class=“com.edmunds.eps.endpoint.impl.SenderImpl ">
<property name="service" value=“inventory"/>
<property name="messageType" value=“publish"/>
<property name=“dataCenter" value=“lax"/>
<property name=“environment" value=“prod"/>
<property name=“site" value=“Edmunds"/>
<property name="application" value=“Inventory-Source"/>
</bean>
23. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Throttling
getReceiver().getThrottler().setEnabled(true);
getReceiver().getThrottler().setMaximumRequestsPerPeriod(10);
getReceiver().getThrottler().setTimePeriodInMilliseconds(2000);
Camel:
Dynamically in Java:
receiver.throttler.enabled=true
receiver.throttler.maximumRequestsPerPeriod=10
receiver.throttler.timePeriodInMilliseconds=2000
Statically in property file using Spring PropertyOverrideConfigurer:
from(…).throttle(10).timePeriodMillis(2000).to(…)
24. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Retries / Error Handling:
free gift from Camel
getReceiver().getErrorHandler().setUseCollisionAvoidance(true);
getReceiver().getErrorHandler().setUseExponentialBackOff(true);
getReceiver().getErrorHandler().setDelayPattern("5:1000;10:5000;20:20000");
getReceiver().getErrorHandler().setUri("jms:queue:dead");
ExceptionHandler exceptionHandler = new ExceptionHandlerImpl(RegionException.class);
exceptionHandler.setHandled(true);
exceptionHandler.addException(ExceptionA.class);
exceptionHandler.setStop(true);
getReceiver().addExceptionHandler(exceptionHandler);
25. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Control System
25
Topic
Producer A
Producer B
Producer C
Control Message
o Control Message
o Initiates producer activity
o Bulk, Single and Multiple loads
o Indicates targets systems for publishing
o Decouples Producer logic form Clients of the publishing system
o Allows to initiate all publishing activity form a single point
o Can be sent from JMX or HTTP
26. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Heartbeat
26
27. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
High Level View
28. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Summary
o Simple to develop producers and consumers (library takes care of the
plumbing)
o Can deploy producers and consumers “anywhere”
o Can match producers and consumers at any level
o Handle error conditions, throttling
o Type safety
o Versioning
o HA & scalability
o Consumers: Virtual Topics, Queues
o Producers: Control System
o Broker: Network of Brokers
o Monitoring
29. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
We are hiring!
http://www.edmunds.com/help/about/jobs
30. No part of this document or the information it contains may be used, or disclosed to any person or entity, for any purpose other than advancing the best interests of the Edmunds Inc., and any such
disclosure requires the express approval of Edmunds Inc.
Q&A
Greg Rokita
grokita@edmunds.com