SlideShare a Scribd company logo
IMEC Academy / SSET Seminar:

Cost-effective software reliability
through autonomic tuning
of system resources
Vincenzo De Florio
vincenzo.deflorio@ua.ac.be
Agenda


Introduction

Closed world systems
 Open world software
 Autonomic management of redundancy


◦ Examples


Conclusions and next steps
4 May 2011

Imec academy

2
Introduction – main actors in the play





Software reliability – an important,
elusive requirement
Redundancy – an effective way to
achieve reliability
Autonomic software evolution – a costeffective method to parameterize
reliability in software

4 May 2011

Imec academy

3
Part 1: Closed world systems

Key problem & a classic solution
Given an unreliable “channel,” how do we
use it reliably?
 Common solution: redundancy + upper
bounds estimation


◦ Off-line analysis of the maximal disturbance
◦ Off-line dimensioning redundancy such that
any disturbance is tolerated


A closed world approach

4 May 2011

Imec academy

4
Closed world systems
Systems built on immutable hypotheses
regarding their deployment environments
& platforms
 Context-agnostic , ataraxic systems
 ‘Virtual’ agents that operate irrespective of
any physical world property


◦ Time, temperature, humidity, user’s quality of
experience, attacks, …

4 May 2011

Imec academy

5
When does it make sense?
Whenever the designer has strong
confidence that assumptions will hold
 Whenever there is
“strong and certified control” on


◦ The platform
◦ The environment


E.g. synchronous systems

4 May 2011

Imec academy

6
Example


I have a problem of interference, but
◦ I have full confidence on my platform and its
state
◦ I have “full control” on the environment:
◦ e.g., I can make sure that, during certain
critical operational stages, interference will
stay minimal



Do you recognize which case is this?

4 May 2011

Imec academy

7
“Please be advised that all electronic devices
must be switched off and remain switched off until further notice.”
“Most personal devices transmit a signal and all of them emit
electromagnetic waves which, in theory, could interfere with the
plane’s electronics.”
4 May 2011

Imec academy

8
There’s no full control as
fools’ control of course…
How can we make sure that passengers will
comply?
2. System & environment compliance
refers to the past
 “…the deterioration of planes and advance
or decline of electronic devices over time
is the immeasurable factor that is never
taken into account by passengers”
 Or companies! “A plane is designed to the
right specs, but nobody goes back and
checks if it is still robust.”
[p3air]
1.

4 May 2011

Imec academy

9
“Nobody goes back & checks again…”
Closed world systems are “frozen in time”
 Their certification implicitly refers to a
scenario that may differ from the real one


◦ Ariane-5, Therac-25,…
◦ You can only rely on the fact that the
certification was valid yesterday
◦ Scenario = hw/sw/nw technologies, hci

4 May 2011

Imec academy

10
Conclusions part 1


Closed world systems:
“sitting ducks” to change!

“Frozen ducks,” actually
 Service = Platform(t) + Environment(t)
 Design sometimes results in systematic
assumptions hiding and “clashes”


4 May 2011

Imec academy

11
Part 2: Open-world Software

Other option: Open-world


Software that
◦ senses endogenous state & exogenous conditions
◦ makes use of gathered context to optimize its
behavior



Choices must be made of what to make
translucent and what to leave transparent
 Certain events will be detected and treated,
some others won't



Basic feature: detection of
assumption vs. context clashes
4 May 2011

Imec academy

12
Two typical cases


Platform Assumption vs. Context Clashes
◦ PC



Environmental Clashes
◦ EC

4 May 2011

Imec academy

13
PC
Clashes related to our assumptions on
the platform
 E.g.


◦ Memory chip technology
◦ Presence/absence of hw component

4 May 2011

Imec academy

14
PC in memory chips
Failure semantics may differ considerably
 CMOS failures: mostly single bit errors
 SDRAM failures: Single-Event Effects


◦ Single-event latchup  loss of all data on chip
◦ Single-event upset  soft errors
◦ Single-event functional interrupt  device left in
either test mode, halt, or undefined state


Even from lot to lot error and failure rates
can vary more than one order of magnitude
[Lad02]
4 May 2011

Imec academy

15
PC in memory chips
Open-world systems may detect this
clash
 E.g. Configure-like scripts that check
hypotheses at compile / deployment time
 Exploiting hardware / OS support
[DF10]


4 May 2011

Imec academy

16
PC in memory chips

Serial Presence Detect
*-memory
description: System Memory

PC

physical id: 1000
slot: System board or motherboard
size: 1536MiB
*-bank:0
description: DIMM DDR Synchronous 533 MHz (1.9 ns)
vendor: CE00000000000000
physical id: 0
serial: F504F679
slot: DIMM_A
size: 1GiB
width: 64 bits

clock: 533MHz (1.9ns)
*-bank:1

“lshw” on
a Dell
Inspiron

description: DIMM DDR Synchronous 667 MHz (1.5 ns)
vendor: CE00000000000000
physical id: 1
serial: F33DD2FD
slot: DIMM_B
size: 512MiB
width: 64 bits
clock: 667MHz (1.5ns)

18
PC: 2nd case
Presence/absence of features
 (MMU)? Access : Deny


– w/o MMU, memory faults may stay uncovered


Policies (e.g. for security issues)
– Standards, e.g. WS-Policy
Second class of clashes: EC
Re: assumptions on the environment
 Two examples:
1. Choice of protocol
2. Choice of design pattern


4 May 2011

Imec academy

20
EC-1: choice of protocol
c: vi

s

...

...

...

...

…

…

• Client c invokes service vi to get an
object from server s
4 May 2011

Imec academy

21
EC-1: choice of protocol
c: vi

s

t

t

...

...

…

…

• vi uses transport protocol t to transfer
that object
• Nature & properties of t : unknown to c
4 May 2011

Imec academy

22
EC-1: a possible scenario
Appl.
Appl.
c

Appl.
Appl.
s

TCP
TCP
TCP

TCP
TCP
TCP

IP
IP
IP

IP
IP
IP

…
…
…

…
…
…

• One momentary disruption breaks
all TCP connections
4 May 2011

Imec academy

23
EC-1
Network disruption
No

Yes

TCP
Protocol
UDP

•

Once a clash is suspected / detected,
adjustments can be made
•

E.g. transport protocol changed on the fly
[HGS11]
4 May 2011

Imec academy

24
Clash EC-2: Choice of design pattern
•
•

Fault-tolerance design patterns can be
applied to reach higher reliability
Design choices include e.g.
– Redoing
(time redundancy scheme)
– Reconfiguration (design redundancy scheme)

•

Any choice implies an assumption
– Here: fault model assumption:
transient vs. permanent faults
 Closed

world  “hardwired” assumption
4 May 2011

Imec academy

25
EC-2


Hardwiring assumptions is hazard hiding
Experienced fault
Transient
Design
pattern

Permanent

Redoing
Reconfiguration

4 May 2011

Imec academy

26
EC-2
Possible
treatment:
autonomic
revision
of component
graphs

4 May 2011

As e.g. in
ACCADA
[GD11]
Imec academy

27
Conclusions part 2
•

Depending on the context c(t), the chosen
assumptions:
– May be valid / invalid
– May clash with other assumptions.

•

Clashes  software is bound to
– Experience failures
– Waste useful assets

 Autonomic revision of assumptions in the

face / probability of a context clash
4 May 2011

Imec academy

28
Part 3: Autonomic Redundancy Management

Autonomic
assumptions failure avoidance
Context clash avoidance
 One or (if time allows!) two examples


◦ Adaptively redundant data structures
◦ Adaptive N-version programming

4 May 2011

Imec academy

29
Redundant data structures
Goal: tolerate transient faults affecting
program memory
 Method: transparent memory cells
replication + voting
[TaMB80]


– Writing to a redundant variable = writing to n
replicas [EC], located somewhere and
according to some strategy [PC]
– Reading from a redundant variable = reading
the n cells, performing majority voting

4 May 2011

Imec academy

30
Design & Contextual Redundancy
1.
2.

Design redundancy: our fixed choice
(e.g. , n=3 replicas)
Contextual redundancy: the “right choice”
at time t
◦ A model of the environment



Dynamic system cr(t)
◦ cr(34)=5  “5 replicas is what we need at t=34”

4 May 2011

Imec academy

31
EC in RDS
Contextual
redundancy
…

cr(t)

}

Design
Redundancy

undershooting

}

n < cr(t)

overshooting

n = cr(t)
n > cr(t)
…

4 May 2011

Imec academy

32
Tackling EC in RDS
•

Dynamically redundant data structures
– Autonomic management of redundancy
– RDS where redundancy is not fixed once and
for all, but changes dynamically after cr(t)

How to estimate cr(t)?
 Direct measurement or
indirect deduction


4 May 2011

Imec academy

33
Distance-to-failure

dtof = 4

dtof = 3

??
dtof = 2

dtof = 0 : failure!

4 May 2011

Imec academy

34
Distance-to-failure
n (design redundancy) in function of dtof
• Under normal conditions, n=3
•

– System triplicates cells of redundant variables
– Up to one memory fault is tolerated

Under more critical situations, dtof decreases
 amount of redundancy is automatically
adjusted
• Adjustment logic should select the ideal degree
of redundancy matching the current
disturbances
•

4 May 2011

Imec academy

35
Risk of failure
n(i) = redundancy at voting round i
= 2p(i)+1 (p(i)>0)
 m(i) = card {replicas that agree after
voting round i }
 1 ≤ m(i) ≤ n(i)
 Then
(n(i) – m(i))/p(i) when m(i) > p(i)
risk(i) =
1
otherwise




Here, linear evolution (not very efficient)
4 May 2011

Imec academy

36
Evolution engine
Algorithm responsible for taking decisions
on how/when to adapt
 In what follows, trivial example:


if risk(t-1) was high, then
redundancy  redundancy + 2
if risk(t-1000 … t-1) were low, then
redundancy  redundancy – 2
 A static formulation!
4 May 2011

Imec academy

37
Fault-injection “little language”

4 May 2011

Imec academy

38
Simulations
scrambler + aRDS + reader
 aRDS “protects” 20,000 4-byte variables


◦ Fixed allocation stride = 20
( no protection against PC in this case)

reader: round robin read accesses
 Experiments record


◦ number of scrambled cells
◦ number of read failures

4 May 2011

Imec academy

39
Experiment 1: Closed world, n=3

4 May 2011

Imec academy

40
Experiment 2: Closed world, n=5

4 May 2011

Imec academy

41
Experiment 3: DTOF, n(0)=5

4 May 2011

Imec academy

42
Redundancy

Redundancy evolution

t
4 May 2011

Imec academy

43
4 May 2011

Imec academy

44
A second case – aNVP


Generalization of DTOF:
Normalized dissent

4 May 2011

Imec academy

45
Normalized Dissent
Quantifies the detrimental impact of a
single version in NVP/MV composite
 Two sub-models:


◦ Penalization mechanism: ND↑

 “Fine” faulty replicas
 Omission – performance – value response
failures

◦ Reward model: ND↓
 Reward replicas behaving correctly
 Weigh down i.f.o. time (absolution)
Conclusions
Open-world: in some cases, the only
option
 Transparency vs. translucency: two
conflicting requirements
 Mechanisms are needed to hide
complexity without hiding intelligence
 E.g. via autonomic assumption failure
detection and treatment, or policies
[DF10]


4 May 2011

Imec academy

49
Next steps
•
•

•

Tuning the fault-tolerance design pattern
to the experienced fault class
Mechanisms to express and assert the
design time hypotheses about platform
and environment
Ultimate challenges:
– Intelligent management of the (dependability)
strategies
– Autonomic tuning of time and design
redundancy
– Resilience (robust evolution)
References










[TaMB80] David Taylor et al., “Redundancy in Data Structures:
Improving Software Fault Tolerance,” IEEE Trans. on Software
Engineering 6:6 (1980)
[p3air] http://www.p3air.com/2011/electronic-devices-caninterfere-with-aircraft-instrumnts-to-create-perfectstorm?wpmp_switcher=mobile
[HGS11] Joe Hoffert, Aniruddha Gokhale, and Douglas C.
Schmidt ,“Timely Autonomic Adaptation of Publish/Subscribe
Middleware in Dynamic Environments”, IJARAS Vol.2 No.4
(2011)
[GD11] N. Gui, V. De Florio, and C. Blondia,“Toward
Architecture-based Context-Aware Deployment and
Adaptation, Journal of Systems and Software, 84:2. Elsevier,
February 2011
[DF10] De Florio, V. : "Software Assumptions Failure
Tolerance: Role, Strategies, and Visions," chapter
in Architecting Dependable Systems, Vol. 7, LNCS Vol. 6420,
pp. 249-272. Springer, 2010.
4JMay 2011

Imec academy

51
Where to Get More information
•

•
•

•
•

•

•
•

K. Boulding (1956): “General Systems Theory – The Skeleton of Science”.
Management Science, 2(3).
V. De Florio (2009): “Application-layer Fault-tolerance Protocols”. Information
Science Reference, IGI-Global.
V. De Florio & C. Blondia (2010): “Adaptation and dependability and their key role in
modern software engineering”, International Journal of Adaptive, Resilient and
Autonomic Systems (IJARAS), 1(2).
C. Esposito & D. Cotroneo (2010): “Resilient and Timely Event Dissemination in
Publish/Subscribe Middleware”, IJARAS, 1(1).
N. Gui, V. De Florio, H. Sun & C. Blondia (2009): "ACCADA: A Framework for
Continuous Context-Aware Deployment and Adaptation," Proc. of 11th Int.l Symp.
on Stabilization, Safety, and Security of Distributed Systems, Lyon.
E. Hollnagel, D. Woods, N.G. Leveson (2006): “Resilience engineering: Concepts and
precepts”, Aldershot, UK.
J. Horning (1998): “ACM Fellow Profile”, ACM Software Eng. Notes 23(4).
N. G. Leveson (1995): “Safeware: Systems Safety and Computers”, Addison.
Where to Get More information:
www.igi-global.com/reference/details.asp?ID=32917
Thank you for your attention
Questions?

More Related Content

What's hot

Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Jaap van Ekris
 
What activates a bug? A refinement of the Laprie terminology model.
What activates a bug? A refinement of the Laprie terminology model.What activates a bug? A refinement of the Laprie terminology model.
What activates a bug? A refinement of the Laprie terminology model.
Peter Tröger
 
Meltdown and Spectre
Meltdown and SpectreMeltdown and Spectre
Meltdown and Spectre
yeokm1
 
Fault tolerance techniques tsp
Fault tolerance techniques tspFault tolerance techniques tsp
Fault tolerance techniques tspPradeep Kumar TS
 
4213ijsea06
4213ijsea064213ijsea06
4213ijsea06
ijseajournal
 
2015 05-07 - vu amsterdam - testing safety critical systems
2015 05-07 - vu amsterdam - testing safety critical systems2015 05-07 - vu amsterdam - testing safety critical systems
2015 05-07 - vu amsterdam - testing safety critical systems
Jaap van Ekris
 
Fault avoidance and fault tolerance
Fault avoidance and fault toleranceFault avoidance and fault tolerance
Fault avoidance and fault tolerance
Jabez Winston
 
2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems
Jaap van Ekris
 
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Jaap van Ekris
 
Exploiting Modern Microarchitectures: Meltdown, Spectre, and other Attacks
Exploiting Modern Microarchitectures: Meltdown, Spectre, and other AttacksExploiting Modern Microarchitectures: Meltdown, Spectre, and other Attacks
Exploiting Modern Microarchitectures: Meltdown, Spectre, and other Attacks
inside-BigData.com
 
Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance Systemprakashjjaya
 
Components in real time systems
Components in real time systemsComponents in real time systems
Components in real time systemsSaransh Garg
 
2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems
Jaap van Ekris
 
Reliability and clock synchronization
Reliability and clock synchronizationReliability and clock synchronization
Reliability and clock synchronization
Sri Manakula Vinayagar Engineering College
 
Real Time Systems
Real Time SystemsReal Time Systems
Real Time Systems
leo3004
 
Co emulation of scan-chain based designs
Co emulation of scan-chain based designsCo emulation of scan-chain based designs
Co emulation of scan-chain based designs
ijcsit
 
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
AdaCore
 
xCORE architecture flyer
xCORE architecture flyerxCORE architecture flyer
xCORE architecture flyer
XMOS
 

What's hot (20)

Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
 
What activates a bug? A refinement of the Laprie terminology model.
What activates a bug? A refinement of the Laprie terminology model.What activates a bug? A refinement of the Laprie terminology model.
What activates a bug? A refinement of the Laprie terminology model.
 
Meltdown and Spectre
Meltdown and SpectreMeltdown and Spectre
Meltdown and Spectre
 
Fault tolerance techniques tsp
Fault tolerance techniques tspFault tolerance techniques tsp
Fault tolerance techniques tsp
 
4213ijsea06
4213ijsea064213ijsea06
4213ijsea06
 
2015 05-07 - vu amsterdam - testing safety critical systems
2015 05-07 - vu amsterdam - testing safety critical systems2015 05-07 - vu amsterdam - testing safety critical systems
2015 05-07 - vu amsterdam - testing safety critical systems
 
Fault avoidance and fault tolerance
Fault avoidance and fault toleranceFault avoidance and fault tolerance
Fault avoidance and fault tolerance
 
2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems
 
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
 
Exploiting Modern Microarchitectures: Meltdown, Spectre, and other Attacks
Exploiting Modern Microarchitectures: Meltdown, Spectre, and other AttacksExploiting Modern Microarchitectures: Meltdown, Spectre, and other Attacks
Exploiting Modern Microarchitectures: Meltdown, Spectre, and other Attacks
 
Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance System
 
Components in real time systems
Components in real time systemsComponents in real time systems
Components in real time systems
 
2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems
 
Reliability and clock synchronization
Reliability and clock synchronizationReliability and clock synchronization
Reliability and clock synchronization
 
Project_Report_Masters
Project_Report_MastersProject_Report_Masters
Project_Report_Masters
 
Real Time Systems
Real Time SystemsReal Time Systems
Real Time Systems
 
Co emulation of scan-chain based designs
Co emulation of scan-chain based designsCo emulation of scan-chain based designs
Co emulation of scan-chain based designs
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
 
xCORE architecture flyer
xCORE architecture flyerxCORE architecture flyer
xCORE architecture flyer
 

Similar to Cost-effective software reliability through autonomic tuning of system resources

Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
TEST Huddle
 
ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN
ECI – THE ELASTIC NETWORK™
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
Angela Hauber
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
MEN Micro
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
MEN Mikro Elektronik GmbH
 
Embedded system hardware architecture ii
Embedded system hardware architecture iiEmbedded system hardware architecture ii
Embedded system hardware architecture ii
Grace Abraham
 
Electranix_Advanced_Simulation_Lab_July_2021.pdf
Electranix_Advanced_Simulation_Lab_July_2021.pdfElectranix_Advanced_Simulation_Lab_July_2021.pdf
Electranix_Advanced_Simulation_Lab_July_2021.pdf
smrasteg12
 
Reliability analysis of wireless automotive applications with transceiver red...
Reliability analysis of wireless automotive applications with transceiver red...Reliability analysis of wireless automotive applications with transceiver red...
Reliability analysis of wireless automotive applications with transceiver red...
rchulyada
 
Embedded Intro India05
Embedded Intro India05Embedded Intro India05
Embedded Intro India05
Rajesh Gupta
 
Software Architecture: Introduction to the abstraction (May 2014_Split)
Software Architecture: Introduction to the abstraction (May 2014_Split)Software Architecture: Introduction to the abstraction (May 2014_Split)
Software Architecture: Introduction to the abstraction (May 2014_Split)
Henry Muccini
 
Mr201304 open flow_security_eng
Mr201304 open flow_security_engMr201304 open flow_security_eng
Mr201304 open flow_security_engFFRI, Inc.
 
Embedded intro india_2018-02-v1
Embedded intro india_2018-02-v1Embedded intro india_2018-02-v1
Embedded intro india_2018-02-v1
Ali Baig
 
Crash course on data streaming (with examples using Apache Flink)
Crash course on data streaming (with examples using Apache Flink)Crash course on data streaming (with examples using Apache Flink)
Crash course on data streaming (with examples using Apache Flink)
Vincenzo Gulisano
 
Sioux Hot-or-Not: The future of Linux (Alan Cox)
Sioux Hot-or-Not: The future of Linux (Alan Cox)Sioux Hot-or-Not: The future of Linux (Alan Cox)
Sioux Hot-or-Not: The future of Linux (Alan Cox)
siouxhotornot
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologies
Stephane Potier
 
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
Jaap van Ekris
 
Intro720T5.pptx
Intro720T5.pptxIntro720T5.pptx
Intro720T5.pptx
MahendraShukla27
 
5th KuVS Meeting
5th KuVS Meeting5th KuVS Meeting
5th KuVS Meetingsteccami
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
Jaap van Ekris
 
Domino Effect and Analysis | Relaibility Analysis | Unavailability Analysis
Domino Effect and Analysis | Relaibility Analysis | Unavailability AnalysisDomino Effect and Analysis | Relaibility Analysis | Unavailability Analysis
Domino Effect and Analysis | Relaibility Analysis | Unavailability Analysis
Gaurav Singh Rajput
 

Similar to Cost-effective software reliability through autonomic tuning of system resources (20)

Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
 
ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
Embedded system hardware architecture ii
Embedded system hardware architecture iiEmbedded system hardware architecture ii
Embedded system hardware architecture ii
 
Electranix_Advanced_Simulation_Lab_July_2021.pdf
Electranix_Advanced_Simulation_Lab_July_2021.pdfElectranix_Advanced_Simulation_Lab_July_2021.pdf
Electranix_Advanced_Simulation_Lab_July_2021.pdf
 
Reliability analysis of wireless automotive applications with transceiver red...
Reliability analysis of wireless automotive applications with transceiver red...Reliability analysis of wireless automotive applications with transceiver red...
Reliability analysis of wireless automotive applications with transceiver red...
 
Embedded Intro India05
Embedded Intro India05Embedded Intro India05
Embedded Intro India05
 
Software Architecture: Introduction to the abstraction (May 2014_Split)
Software Architecture: Introduction to the abstraction (May 2014_Split)Software Architecture: Introduction to the abstraction (May 2014_Split)
Software Architecture: Introduction to the abstraction (May 2014_Split)
 
Mr201304 open flow_security_eng
Mr201304 open flow_security_engMr201304 open flow_security_eng
Mr201304 open flow_security_eng
 
Embedded intro india_2018-02-v1
Embedded intro india_2018-02-v1Embedded intro india_2018-02-v1
Embedded intro india_2018-02-v1
 
Crash course on data streaming (with examples using Apache Flink)
Crash course on data streaming (with examples using Apache Flink)Crash course on data streaming (with examples using Apache Flink)
Crash course on data streaming (with examples using Apache Flink)
 
Sioux Hot-or-Not: The future of Linux (Alan Cox)
Sioux Hot-or-Not: The future of Linux (Alan Cox)Sioux Hot-or-Not: The future of Linux (Alan Cox)
Sioux Hot-or-Not: The future of Linux (Alan Cox)
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologies
 
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
 
Intro720T5.pptx
Intro720T5.pptxIntro720T5.pptx
Intro720T5.pptx
 
5th KuVS Meeting
5th KuVS Meeting5th KuVS Meeting
5th KuVS Meeting
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
 
Domino Effect and Analysis | Relaibility Analysis | Unavailability Analysis
Domino Effect and Analysis | Relaibility Analysis | Unavailability AnalysisDomino Effect and Analysis | Relaibility Analysis | Unavailability Analysis
Domino Effect and Analysis | Relaibility Analysis | Unavailability Analysis
 

More from Vincenzo De Florio

My little grundgestalten
My little grundgestaltenMy little grundgestalten
My little grundgestalten
Vincenzo De Florio
 
Models and Concepts for Socio-technical Complex Systems: Towards Fractal Soci...
Models and Concepts for Socio-technical Complex Systems: Towards Fractal Soci...Models and Concepts for Socio-technical Complex Systems: Towards Fractal Soci...
Models and Concepts for Socio-technical Complex Systems: Towards Fractal Soci...
Vincenzo De Florio
 
On the Role of Perception and Apperception in Ubiquitous and Pervasive Enviro...
On the Role of Perception and Apperception in Ubiquitous and Pervasive Enviro...On the Role of Perception and Apperception in Ubiquitous and Pervasive Enviro...
On the Role of Perception and Apperception in Ubiquitous and Pervasive Enviro...
Vincenzo De Florio
 
Service-oriented Communities: A Novel Organizational Architecture for Smarter...
Service-oriented Communities: A Novel Organizational Architecture for Smarter...Service-oriented Communities: A Novel Organizational Architecture for Smarter...
Service-oriented Communities: A Novel Organizational Architecture for Smarter...
Vincenzo De Florio
 
On codes, machines, and environments: reflections and experiences
On codes, machines, and environments: reflections and experiencesOn codes, machines, and environments: reflections and experiences
On codes, machines, and environments: reflections and experiences
Vincenzo De Florio
 
Tapping Into the Wells of Social Energy: A Case Study Based on Falls Identifi...
Tapping Into the Wells of Social Energy: A Case Study Based on Falls Identifi...Tapping Into the Wells of Social Energy: A Case Study Based on Falls Identifi...
Tapping Into the Wells of Social Energy: A Case Study Based on Falls Identifi...
Vincenzo De Florio
 
How Resilient Are Our Societies? Analyses, Models, Preliminary Results
How Resilient Are Our Societies?Analyses, Models, Preliminary ResultsHow Resilient Are Our Societies?Analyses, Models, Preliminary Results
How Resilient Are Our Societies? Analyses, Models, Preliminary Results
Vincenzo De Florio
 
Advanced C Language for Engineering
Advanced C Language for EngineeringAdvanced C Language for Engineering
Advanced C Language for Engineering
Vincenzo De Florio
 
A framework for trustworthiness assessment based on fidelity in cyber and phy...
A framework for trustworthiness assessment based on fidelity in cyber and phy...A framework for trustworthiness assessment based on fidelity in cyber and phy...
A framework for trustworthiness assessment based on fidelity in cyber and phy...
Vincenzo De Florio
 
Fractally-organized Connectionist Networks - Keynote speech @PEWET 2015
Fractally-organized Connectionist Networks - Keynote speech @PEWET 2015Fractally-organized Connectionist Networks - Keynote speech @PEWET 2015
Fractally-organized Connectionist Networks - Keynote speech @PEWET 2015
Vincenzo De Florio
 
A behavioural model for the discussion of resilience, elasticity, and antifra...
A behavioural model for the discussion of resilience, elasticity, and antifra...A behavioural model for the discussion of resilience, elasticity, and antifra...
A behavioural model for the discussion of resilience, elasticity, and antifra...
Vincenzo De Florio
 
Considerations and ideas after reading a presentation by Ali Anani
Considerations and ideas after reading a presentation by Ali AnaniConsiderations and ideas after reading a presentation by Ali Anani
Considerations and ideas after reading a presentation by Ali AnaniVincenzo De Florio
 
A Behavioral Interpretation of Resilience and Antifragility
A Behavioral Interpretation of Resilience and AntifragilityA Behavioral Interpretation of Resilience and Antifragility
A Behavioral Interpretation of Resilience and Antifragility
Vincenzo De Florio
 
Community Resilience: Challenges, Requirements, and Organizational Models
Community Resilience: Challenges, Requirements, and Organizational ModelsCommunity Resilience: Challenges, Requirements, and Organizational Models
Community Resilience: Challenges, Requirements, and Organizational Models
Vincenzo De Florio
 
On the Behavioral Interpretation of System-Environment Fit and Auto-Resilience
On the Behavioral Interpretation of System-Environment Fit and Auto-ResilienceOn the Behavioral Interpretation of System-Environment Fit and Auto-Resilience
On the Behavioral Interpretation of System-Environment Fit and Auto-Resilience
Vincenzo De Florio
 
Antifragility = Elasticity + Resilience + Machine Learning. Models and Algori...
Antifragility = Elasticity + Resilience + Machine Learning. Models and Algori...Antifragility = Elasticity + Resilience + Machine Learning. Models and Algori...
Antifragility = Elasticity + Resilience + Machine Learning. Models and Algori...
Vincenzo De Florio
 
Service-oriented Communities and Fractal Social Organizations - Models and co...
Service-oriented Communities and Fractal Social Organizations - Models and co...Service-oriented Communities and Fractal Social Organizations - Models and co...
Service-oriented Communities and Fractal Social Organizations - Models and co...
Vincenzo De Florio
 
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013
Vincenzo De Florio
 
TOWARDS PARSIMONIOUS RESOURCE ALLOCATION IN CONTEXT-AWARE N-VERSION PROGRAMMING
TOWARDS PARSIMONIOUS RESOURCE ALLOCATION IN CONTEXT-AWARE N-VERSION PROGRAMMINGTOWARDS PARSIMONIOUS RESOURCE ALLOCATION IN CONTEXT-AWARE N-VERSION PROGRAMMING
TOWARDS PARSIMONIOUS RESOURCE ALLOCATION IN CONTEXT-AWARE N-VERSION PROGRAMMING
Vincenzo De Florio
 
A Formal Model and an Algorithm for Generating the Permutations of a Multiset
A Formal Model and an Algorithm for Generating the Permutations of a MultisetA Formal Model and an Algorithm for Generating the Permutations of a Multiset
A Formal Model and an Algorithm for Generating the Permutations of a Multiset
Vincenzo De Florio
 

More from Vincenzo De Florio (20)

My little grundgestalten
My little grundgestaltenMy little grundgestalten
My little grundgestalten
 
Models and Concepts for Socio-technical Complex Systems: Towards Fractal Soci...
Models and Concepts for Socio-technical Complex Systems: Towards Fractal Soci...Models and Concepts for Socio-technical Complex Systems: Towards Fractal Soci...
Models and Concepts for Socio-technical Complex Systems: Towards Fractal Soci...
 
On the Role of Perception and Apperception in Ubiquitous and Pervasive Enviro...
On the Role of Perception and Apperception in Ubiquitous and Pervasive Enviro...On the Role of Perception and Apperception in Ubiquitous and Pervasive Enviro...
On the Role of Perception and Apperception in Ubiquitous and Pervasive Enviro...
 
Service-oriented Communities: A Novel Organizational Architecture for Smarter...
Service-oriented Communities: A Novel Organizational Architecture for Smarter...Service-oriented Communities: A Novel Organizational Architecture for Smarter...
Service-oriented Communities: A Novel Organizational Architecture for Smarter...
 
On codes, machines, and environments: reflections and experiences
On codes, machines, and environments: reflections and experiencesOn codes, machines, and environments: reflections and experiences
On codes, machines, and environments: reflections and experiences
 
Tapping Into the Wells of Social Energy: A Case Study Based on Falls Identifi...
Tapping Into the Wells of Social Energy: A Case Study Based on Falls Identifi...Tapping Into the Wells of Social Energy: A Case Study Based on Falls Identifi...
Tapping Into the Wells of Social Energy: A Case Study Based on Falls Identifi...
 
How Resilient Are Our Societies? Analyses, Models, Preliminary Results
How Resilient Are Our Societies?Analyses, Models, Preliminary ResultsHow Resilient Are Our Societies?Analyses, Models, Preliminary Results
How Resilient Are Our Societies? Analyses, Models, Preliminary Results
 
Advanced C Language for Engineering
Advanced C Language for EngineeringAdvanced C Language for Engineering
Advanced C Language for Engineering
 
A framework for trustworthiness assessment based on fidelity in cyber and phy...
A framework for trustworthiness assessment based on fidelity in cyber and phy...A framework for trustworthiness assessment based on fidelity in cyber and phy...
A framework for trustworthiness assessment based on fidelity in cyber and phy...
 
Fractally-organized Connectionist Networks - Keynote speech @PEWET 2015
Fractally-organized Connectionist Networks - Keynote speech @PEWET 2015Fractally-organized Connectionist Networks - Keynote speech @PEWET 2015
Fractally-organized Connectionist Networks - Keynote speech @PEWET 2015
 
A behavioural model for the discussion of resilience, elasticity, and antifra...
A behavioural model for the discussion of resilience, elasticity, and antifra...A behavioural model for the discussion of resilience, elasticity, and antifra...
A behavioural model for the discussion of resilience, elasticity, and antifra...
 
Considerations and ideas after reading a presentation by Ali Anani
Considerations and ideas after reading a presentation by Ali AnaniConsiderations and ideas after reading a presentation by Ali Anani
Considerations and ideas after reading a presentation by Ali Anani
 
A Behavioral Interpretation of Resilience and Antifragility
A Behavioral Interpretation of Resilience and AntifragilityA Behavioral Interpretation of Resilience and Antifragility
A Behavioral Interpretation of Resilience and Antifragility
 
Community Resilience: Challenges, Requirements, and Organizational Models
Community Resilience: Challenges, Requirements, and Organizational ModelsCommunity Resilience: Challenges, Requirements, and Organizational Models
Community Resilience: Challenges, Requirements, and Organizational Models
 
On the Behavioral Interpretation of System-Environment Fit and Auto-Resilience
On the Behavioral Interpretation of System-Environment Fit and Auto-ResilienceOn the Behavioral Interpretation of System-Environment Fit and Auto-Resilience
On the Behavioral Interpretation of System-Environment Fit and Auto-Resilience
 
Antifragility = Elasticity + Resilience + Machine Learning. Models and Algori...
Antifragility = Elasticity + Resilience + Machine Learning. Models and Algori...Antifragility = Elasticity + Resilience + Machine Learning. Models and Algori...
Antifragility = Elasticity + Resilience + Machine Learning. Models and Algori...
 
Service-oriented Communities and Fractal Social Organizations - Models and co...
Service-oriented Communities and Fractal Social Organizations - Models and co...Service-oriented Communities and Fractal Social Organizations - Models and co...
Service-oriented Communities and Fractal Social Organizations - Models and co...
 
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013
 
TOWARDS PARSIMONIOUS RESOURCE ALLOCATION IN CONTEXT-AWARE N-VERSION PROGRAMMING
TOWARDS PARSIMONIOUS RESOURCE ALLOCATION IN CONTEXT-AWARE N-VERSION PROGRAMMINGTOWARDS PARSIMONIOUS RESOURCE ALLOCATION IN CONTEXT-AWARE N-VERSION PROGRAMMING
TOWARDS PARSIMONIOUS RESOURCE ALLOCATION IN CONTEXT-AWARE N-VERSION PROGRAMMING
 
A Formal Model and an Algorithm for Generating the Permutations of a Multiset
A Formal Model and an Algorithm for Generating the Permutations of a MultisetA Formal Model and an Algorithm for Generating the Permutations of a Multiset
A Formal Model and an Algorithm for Generating the Permutations of a Multiset
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Cost-effective software reliability through autonomic tuning of system resources

  • 1. IMEC Academy / SSET Seminar: Cost-effective software reliability through autonomic tuning of system resources Vincenzo De Florio vincenzo.deflorio@ua.ac.be
  • 2. Agenda  Introduction Closed world systems  Open world software  Autonomic management of redundancy  ◦ Examples  Conclusions and next steps 4 May 2011 Imec academy 2
  • 3. Introduction – main actors in the play    Software reliability – an important, elusive requirement Redundancy – an effective way to achieve reliability Autonomic software evolution – a costeffective method to parameterize reliability in software 4 May 2011 Imec academy 3
  • 4. Part 1: Closed world systems Key problem & a classic solution Given an unreliable “channel,” how do we use it reliably?  Common solution: redundancy + upper bounds estimation  ◦ Off-line analysis of the maximal disturbance ◦ Off-line dimensioning redundancy such that any disturbance is tolerated  A closed world approach 4 May 2011 Imec academy 4
  • 5. Closed world systems Systems built on immutable hypotheses regarding their deployment environments & platforms  Context-agnostic , ataraxic systems  ‘Virtual’ agents that operate irrespective of any physical world property  ◦ Time, temperature, humidity, user’s quality of experience, attacks, … 4 May 2011 Imec academy 5
  • 6. When does it make sense? Whenever the designer has strong confidence that assumptions will hold  Whenever there is “strong and certified control” on  ◦ The platform ◦ The environment  E.g. synchronous systems 4 May 2011 Imec academy 6
  • 7. Example  I have a problem of interference, but ◦ I have full confidence on my platform and its state ◦ I have “full control” on the environment: ◦ e.g., I can make sure that, during certain critical operational stages, interference will stay minimal  Do you recognize which case is this? 4 May 2011 Imec academy 7
  • 8. “Please be advised that all electronic devices must be switched off and remain switched off until further notice.” “Most personal devices transmit a signal and all of them emit electromagnetic waves which, in theory, could interfere with the plane’s electronics.” 4 May 2011 Imec academy 8
  • 9. There’s no full control as fools’ control of course… How can we make sure that passengers will comply? 2. System & environment compliance refers to the past  “…the deterioration of planes and advance or decline of electronic devices over time is the immeasurable factor that is never taken into account by passengers”  Or companies! “A plane is designed to the right specs, but nobody goes back and checks if it is still robust.” [p3air] 1. 4 May 2011 Imec academy 9
  • 10. “Nobody goes back & checks again…” Closed world systems are “frozen in time”  Their certification implicitly refers to a scenario that may differ from the real one  ◦ Ariane-5, Therac-25,… ◦ You can only rely on the fact that the certification was valid yesterday ◦ Scenario = hw/sw/nw technologies, hci 4 May 2011 Imec academy 10
  • 11. Conclusions part 1  Closed world systems: “sitting ducks” to change! “Frozen ducks,” actually  Service = Platform(t) + Environment(t)  Design sometimes results in systematic assumptions hiding and “clashes”  4 May 2011 Imec academy 11
  • 12. Part 2: Open-world Software Other option: Open-world  Software that ◦ senses endogenous state & exogenous conditions ◦ makes use of gathered context to optimize its behavior  Choices must be made of what to make translucent and what to leave transparent  Certain events will be detected and treated, some others won't  Basic feature: detection of assumption vs. context clashes 4 May 2011 Imec academy 12
  • 13. Two typical cases  Platform Assumption vs. Context Clashes ◦ PC  Environmental Clashes ◦ EC 4 May 2011 Imec academy 13
  • 14. PC Clashes related to our assumptions on the platform  E.g.  ◦ Memory chip technology ◦ Presence/absence of hw component 4 May 2011 Imec academy 14
  • 15. PC in memory chips Failure semantics may differ considerably  CMOS failures: mostly single bit errors  SDRAM failures: Single-Event Effects  ◦ Single-event latchup  loss of all data on chip ◦ Single-event upset  soft errors ◦ Single-event functional interrupt  device left in either test mode, halt, or undefined state  Even from lot to lot error and failure rates can vary more than one order of magnitude [Lad02] 4 May 2011 Imec academy 15
  • 16. PC in memory chips Open-world systems may detect this clash  E.g. Configure-like scripts that check hypotheses at compile / deployment time  Exploiting hardware / OS support [DF10]  4 May 2011 Imec academy 16
  • 17. PC in memory chips Serial Presence Detect
  • 18. *-memory description: System Memory PC physical id: 1000 slot: System board or motherboard size: 1536MiB *-bank:0 description: DIMM DDR Synchronous 533 MHz (1.9 ns) vendor: CE00000000000000 physical id: 0 serial: F504F679 slot: DIMM_A size: 1GiB width: 64 bits clock: 533MHz (1.9ns) *-bank:1 “lshw” on a Dell Inspiron description: DIMM DDR Synchronous 667 MHz (1.5 ns) vendor: CE00000000000000 physical id: 1 serial: F33DD2FD slot: DIMM_B size: 512MiB width: 64 bits clock: 667MHz (1.5ns) 18
  • 19. PC: 2nd case Presence/absence of features  (MMU)? Access : Deny  – w/o MMU, memory faults may stay uncovered  Policies (e.g. for security issues) – Standards, e.g. WS-Policy
  • 20. Second class of clashes: EC Re: assumptions on the environment  Two examples: 1. Choice of protocol 2. Choice of design pattern  4 May 2011 Imec academy 20
  • 21. EC-1: choice of protocol c: vi s ... ... ... ... … … • Client c invokes service vi to get an object from server s 4 May 2011 Imec academy 21
  • 22. EC-1: choice of protocol c: vi s t t ... ... … … • vi uses transport protocol t to transfer that object • Nature & properties of t : unknown to c 4 May 2011 Imec academy 22
  • 23. EC-1: a possible scenario Appl. Appl. c Appl. Appl. s TCP TCP TCP TCP TCP TCP IP IP IP IP IP IP … … … … … … • One momentary disruption breaks all TCP connections 4 May 2011 Imec academy 23
  • 24. EC-1 Network disruption No Yes TCP Protocol UDP • Once a clash is suspected / detected, adjustments can be made • E.g. transport protocol changed on the fly [HGS11] 4 May 2011 Imec academy 24
  • 25. Clash EC-2: Choice of design pattern • • Fault-tolerance design patterns can be applied to reach higher reliability Design choices include e.g. – Redoing (time redundancy scheme) – Reconfiguration (design redundancy scheme) • Any choice implies an assumption – Here: fault model assumption: transient vs. permanent faults  Closed world  “hardwired” assumption 4 May 2011 Imec academy 25
  • 26. EC-2  Hardwiring assumptions is hazard hiding Experienced fault Transient Design pattern Permanent Redoing Reconfiguration 4 May 2011 Imec academy 26
  • 27. EC-2 Possible treatment: autonomic revision of component graphs 4 May 2011 As e.g. in ACCADA [GD11] Imec academy 27
  • 28. Conclusions part 2 • Depending on the context c(t), the chosen assumptions: – May be valid / invalid – May clash with other assumptions. • Clashes  software is bound to – Experience failures – Waste useful assets  Autonomic revision of assumptions in the face / probability of a context clash 4 May 2011 Imec academy 28
  • 29. Part 3: Autonomic Redundancy Management Autonomic assumptions failure avoidance Context clash avoidance  One or (if time allows!) two examples  ◦ Adaptively redundant data structures ◦ Adaptive N-version programming 4 May 2011 Imec academy 29
  • 30. Redundant data structures Goal: tolerate transient faults affecting program memory  Method: transparent memory cells replication + voting [TaMB80]  – Writing to a redundant variable = writing to n replicas [EC], located somewhere and according to some strategy [PC] – Reading from a redundant variable = reading the n cells, performing majority voting 4 May 2011 Imec academy 30
  • 31. Design & Contextual Redundancy 1. 2. Design redundancy: our fixed choice (e.g. , n=3 replicas) Contextual redundancy: the “right choice” at time t ◦ A model of the environment  Dynamic system cr(t) ◦ cr(34)=5  “5 replicas is what we need at t=34” 4 May 2011 Imec academy 31
  • 32. EC in RDS Contextual redundancy … cr(t) } Design Redundancy undershooting } n < cr(t) overshooting n = cr(t) n > cr(t) … 4 May 2011 Imec academy 32
  • 33. Tackling EC in RDS • Dynamically redundant data structures – Autonomic management of redundancy – RDS where redundancy is not fixed once and for all, but changes dynamically after cr(t) How to estimate cr(t)?  Direct measurement or indirect deduction  4 May 2011 Imec academy 33
  • 34. Distance-to-failure dtof = 4 dtof = 3 ?? dtof = 2 dtof = 0 : failure! 4 May 2011 Imec academy 34
  • 35. Distance-to-failure n (design redundancy) in function of dtof • Under normal conditions, n=3 • – System triplicates cells of redundant variables – Up to one memory fault is tolerated Under more critical situations, dtof decreases  amount of redundancy is automatically adjusted • Adjustment logic should select the ideal degree of redundancy matching the current disturbances • 4 May 2011 Imec academy 35
  • 36. Risk of failure n(i) = redundancy at voting round i = 2p(i)+1 (p(i)>0)  m(i) = card {replicas that agree after voting round i }  1 ≤ m(i) ≤ n(i)  Then (n(i) – m(i))/p(i) when m(i) > p(i) risk(i) = 1 otherwise   Here, linear evolution (not very efficient) 4 May 2011 Imec academy 36
  • 37. Evolution engine Algorithm responsible for taking decisions on how/when to adapt  In what follows, trivial example:  if risk(t-1) was high, then redundancy  redundancy + 2 if risk(t-1000 … t-1) were low, then redundancy  redundancy – 2  A static formulation! 4 May 2011 Imec academy 37
  • 38. Fault-injection “little language” 4 May 2011 Imec academy 38
  • 39. Simulations scrambler + aRDS + reader  aRDS “protects” 20,000 4-byte variables  ◦ Fixed allocation stride = 20 ( no protection against PC in this case) reader: round robin read accesses  Experiments record  ◦ number of scrambled cells ◦ number of read failures 4 May 2011 Imec academy 39
  • 40. Experiment 1: Closed world, n=3 4 May 2011 Imec academy 40
  • 41. Experiment 2: Closed world, n=5 4 May 2011 Imec academy 41
  • 42. Experiment 3: DTOF, n(0)=5 4 May 2011 Imec academy 42
  • 44. 4 May 2011 Imec academy 44
  • 45. A second case – aNVP  Generalization of DTOF: Normalized dissent 4 May 2011 Imec academy 45
  • 46. Normalized Dissent Quantifies the detrimental impact of a single version in NVP/MV composite  Two sub-models:  ◦ Penalization mechanism: ND↑  “Fine” faulty replicas  Omission – performance – value response failures ◦ Reward model: ND↓  Reward replicas behaving correctly  Weigh down i.f.o. time (absolution)
  • 47. Conclusions Open-world: in some cases, the only option  Transparency vs. translucency: two conflicting requirements  Mechanisms are needed to hide complexity without hiding intelligence  E.g. via autonomic assumption failure detection and treatment, or policies [DF10]  4 May 2011 Imec academy 49
  • 48. Next steps • • • Tuning the fault-tolerance design pattern to the experienced fault class Mechanisms to express and assert the design time hypotheses about platform and environment Ultimate challenges: – Intelligent management of the (dependability) strategies – Autonomic tuning of time and design redundancy – Resilience (robust evolution)
  • 49. References      [TaMB80] David Taylor et al., “Redundancy in Data Structures: Improving Software Fault Tolerance,” IEEE Trans. on Software Engineering 6:6 (1980) [p3air] http://www.p3air.com/2011/electronic-devices-caninterfere-with-aircraft-instrumnts-to-create-perfectstorm?wpmp_switcher=mobile [HGS11] Joe Hoffert, Aniruddha Gokhale, and Douglas C. Schmidt ,“Timely Autonomic Adaptation of Publish/Subscribe Middleware in Dynamic Environments”, IJARAS Vol.2 No.4 (2011) [GD11] N. Gui, V. De Florio, and C. Blondia,“Toward Architecture-based Context-Aware Deployment and Adaptation, Journal of Systems and Software, 84:2. Elsevier, February 2011 [DF10] De Florio, V. : "Software Assumptions Failure Tolerance: Role, Strategies, and Visions," chapter in Architecting Dependable Systems, Vol. 7, LNCS Vol. 6420, pp. 249-272. Springer, 2010. 4JMay 2011 Imec academy 51
  • 50. Where to Get More information • • • • • • • • K. Boulding (1956): “General Systems Theory – The Skeleton of Science”. Management Science, 2(3). V. De Florio (2009): “Application-layer Fault-tolerance Protocols”. Information Science Reference, IGI-Global. V. De Florio & C. Blondia (2010): “Adaptation and dependability and their key role in modern software engineering”, International Journal of Adaptive, Resilient and Autonomic Systems (IJARAS), 1(2). C. Esposito & D. Cotroneo (2010): “Resilient and Timely Event Dissemination in Publish/Subscribe Middleware”, IJARAS, 1(1). N. Gui, V. De Florio, H. Sun & C. Blondia (2009): "ACCADA: A Framework for Continuous Context-Aware Deployment and Adaptation," Proc. of 11th Int.l Symp. on Stabilization, Safety, and Security of Distributed Systems, Lyon. E. Hollnagel, D. Woods, N.G. Leveson (2006): “Resilience engineering: Concepts and precepts”, Aldershot, UK. J. Horning (1998): “ACM Fellow Profile”, ACM Software Eng. Notes 23(4). N. G. Leveson (1995): “Safeware: Systems Safety and Computers”, Addison.
  • 51. Where to Get More information: www.igi-global.com/reference/details.asp?ID=32917
  • 52. Thank you for your attention Questions?