Overview of how Juniper is changing the landscape of software development by exposing APIs to use network data in applications. Included is overview of APIs we offer, Big Data information, and more.
An Infrastructure Based on a Mobile-Agent for Applications of Ebussiness & EworkIJRES Journal
Mobile agents have emerged as a very promising approach for eWork and eBussiness. We have developed an extensive mobile agent infrastructure that supports diverse applications in these fields. Our infrastructure is built around two basic components: a mobile-agent based framework for distributed database access and the PaCMAn (Parallel Computing with Java Mobile Agents) metacomputer. The major functionality of our database framework includes (a) the ability to dynamically create personalized views for the mobile client, (b) dynamic creation and configuration of Web-based warehouses and (c) dynamic support of mobile transactions. PaCMAn offers the necessary tools for Web-based distributed High Performance Computing (HPC) and distributed data mining. Our infrastructure provides the basis for developing eWork applications in many fields. We have utilized it for applications, both wireless and wireline, such as: Electronic commerce, Health Telematics, Teleworking, Distributed Data-mining and Web-based supercomputing.
.Net projects 2011 by core ieeeprojects.com msudan92
The document contains summaries of 15 IEEE projects from 2011. Each project summary is 1-3 sentences describing the high level goal or problem addressed by the project. For example, one project proposes a policy enforcing mechanism to ensure fair communication in mobile ad hoc networks by regulating applications through proper communication policies. Another project presents a query formulation language called MashQL to easily query and fuse structured data from multiple sources on the web.
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCEijcses
In order to solve the low efficiency problem of large-scale distributed software testing , CBDSTP(
Cloud-Based Distributed Software Testing Platform) is put forward.This platform can provide continous
integration and automation of testing for large software systems, which can make full use of resources on
the cloud clients, achieving testing result s in the real environment and reasonable allocating testing jobs,
to resolve the Web application software configuration test, compatibility test and distributed test problems,
to reduce costs, improve efficiency. Through making MySQL testing on this prototype system, the
verification is made for platform architecture and job allocation effectiveness.
The document discusses how networks and applications can become more aware of each other to improve the experience for end users. Currently, networks and applications operate independently without much visibility into each other. The document proposes that applications share information about end users and traffic with networks, and networks share information about topology, bandwidth, and resources with applications. This would allow applications to optimize content placement and resource usage, and networks to gain insights to better optimize traffic and provide new services. The document argues this type of programmable network can improve areas like security, performance, analytics and more.
This document lists several Java/J2EE/J2ME projects related to utility computing environments, schema matching, fuzzy ontology generation, wireless sensor networks, wireless MAC protocols, distributed cache updating, selfish routing, collaborative key agreement, TCP congestion control, global roaming in mobile networks, GPS-based emergency response systems, network intrusion detection, honey pots, voice over IP, vehicle tracking, SIP-based teleconferencing, online security systems, and location-aided routing in ad hoc networks. The projects cover a wide range of topics related to distributed systems, wireless networks, and Internet applications.
An overview of developer benefits when building application utilizing previously unlocked network data. Introduction of new technologies & products available, and examples of what other developers are building today.
This Object Management Group (OMG) RFP solicits submissions identifying and defining mechanisms to achieve integration between DDS infrastructures and TSN networks. The goal is to provide all artifacts needed to support the design, deployment and execution of DDS systems over TSN networks.
The DDS-TSN integration specification sought shall realize the following functionality:
● Define mechanisms that provide the information required for TSN-enabled networks to calculate any network schedules needed to deploy a DDS system.
OMG RFP
● Identify those parts of the set of the IEEE TSN standards that are relevant for a DDS-TSN integration and indicate how the DDS aspects are mapped onto, or related to, the associated TSN aspects. Examples include TSN- standardized information models for calculating system-wide schedules and configuring network equipment.
● Identify and specify necessary extensions to the [DDSI-RTPS] and [DDS- SECURITY] specifications, if any, to allow DDS infrastructures to use TSN- enabled networks as their transport while maintaining interoperability between different DDS implementations.
● Identify and specify necessary extensions to the DDS and DDS- XML specification, if any, to allow declaration of TSN-specific properties or quality of service attributes.
The document discusses several MCA projects including:
1. A medical information integration model using cloud computing to provide data storage and analysis for medical departments and workers.
2. A customer relationship and warehouse management system to optimize revenue, customer satisfaction and understanding.
3. An issue tracking, managing, monitoring and reporting system for IT departments to access shared data and history.
An Infrastructure Based on a Mobile-Agent for Applications of Ebussiness & EworkIJRES Journal
Mobile agents have emerged as a very promising approach for eWork and eBussiness. We have developed an extensive mobile agent infrastructure that supports diverse applications in these fields. Our infrastructure is built around two basic components: a mobile-agent based framework for distributed database access and the PaCMAn (Parallel Computing with Java Mobile Agents) metacomputer. The major functionality of our database framework includes (a) the ability to dynamically create personalized views for the mobile client, (b) dynamic creation and configuration of Web-based warehouses and (c) dynamic support of mobile transactions. PaCMAn offers the necessary tools for Web-based distributed High Performance Computing (HPC) and distributed data mining. Our infrastructure provides the basis for developing eWork applications in many fields. We have utilized it for applications, both wireless and wireline, such as: Electronic commerce, Health Telematics, Teleworking, Distributed Data-mining and Web-based supercomputing.
.Net projects 2011 by core ieeeprojects.com msudan92
The document contains summaries of 15 IEEE projects from 2011. Each project summary is 1-3 sentences describing the high level goal or problem addressed by the project. For example, one project proposes a policy enforcing mechanism to ensure fair communication in mobile ad hoc networks by regulating applications through proper communication policies. Another project presents a query formulation language called MashQL to easily query and fuse structured data from multiple sources on the web.
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCEijcses
In order to solve the low efficiency problem of large-scale distributed software testing , CBDSTP(
Cloud-Based Distributed Software Testing Platform) is put forward.This platform can provide continous
integration and automation of testing for large software systems, which can make full use of resources on
the cloud clients, achieving testing result s in the real environment and reasonable allocating testing jobs,
to resolve the Web application software configuration test, compatibility test and distributed test problems,
to reduce costs, improve efficiency. Through making MySQL testing on this prototype system, the
verification is made for platform architecture and job allocation effectiveness.
The document discusses how networks and applications can become more aware of each other to improve the experience for end users. Currently, networks and applications operate independently without much visibility into each other. The document proposes that applications share information about end users and traffic with networks, and networks share information about topology, bandwidth, and resources with applications. This would allow applications to optimize content placement and resource usage, and networks to gain insights to better optimize traffic and provide new services. The document argues this type of programmable network can improve areas like security, performance, analytics and more.
This document lists several Java/J2EE/J2ME projects related to utility computing environments, schema matching, fuzzy ontology generation, wireless sensor networks, wireless MAC protocols, distributed cache updating, selfish routing, collaborative key agreement, TCP congestion control, global roaming in mobile networks, GPS-based emergency response systems, network intrusion detection, honey pots, voice over IP, vehicle tracking, SIP-based teleconferencing, online security systems, and location-aided routing in ad hoc networks. The projects cover a wide range of topics related to distributed systems, wireless networks, and Internet applications.
An overview of developer benefits when building application utilizing previously unlocked network data. Introduction of new technologies & products available, and examples of what other developers are building today.
This Object Management Group (OMG) RFP solicits submissions identifying and defining mechanisms to achieve integration between DDS infrastructures and TSN networks. The goal is to provide all artifacts needed to support the design, deployment and execution of DDS systems over TSN networks.
The DDS-TSN integration specification sought shall realize the following functionality:
● Define mechanisms that provide the information required for TSN-enabled networks to calculate any network schedules needed to deploy a DDS system.
OMG RFP
● Identify those parts of the set of the IEEE TSN standards that are relevant for a DDS-TSN integration and indicate how the DDS aspects are mapped onto, or related to, the associated TSN aspects. Examples include TSN- standardized information models for calculating system-wide schedules and configuring network equipment.
● Identify and specify necessary extensions to the [DDSI-RTPS] and [DDS- SECURITY] specifications, if any, to allow DDS infrastructures to use TSN- enabled networks as their transport while maintaining interoperability between different DDS implementations.
● Identify and specify necessary extensions to the DDS and DDS- XML specification, if any, to allow declaration of TSN-specific properties or quality of service attributes.
The document discusses several MCA projects including:
1. A medical information integration model using cloud computing to provide data storage and analysis for medical departments and workers.
2. A customer relationship and warehouse management system to optimize revenue, customer satisfaction and understanding.
3. An issue tracking, managing, monitoring and reporting system for IT departments to access shared data and history.
The document discusses data virtualization and key concepts related to data virtualization. It describes how a virtual database (VDB) acts as a container that integrates data from multiple sources and exposes it through a single uniform API. The VDB contains models that define the structure of the underlying data sources, views, and web services. It also describes model types, translators that convert queries to source-specific queries, resource adapters that provide connectivity, and how VDBs are deployed and executed.
This document provides 6 IEEE project summaries in the domain of Java and cloud computing/data mining. The summaries are:
1. A decentralized access control scheme for secure cloud data storage that supports anonymous authentication.
2. A performance analysis framework for distributed file systems that qualitatively and quantitatively evaluates performance.
3. Approaches to guarantee trustworthy transactions on cloud servers by enforcing policy consistency constraints.
4. A scalable MapReduce approach for anonymizing large datasets to satisfy privacy requirements like k-anonymity.
5. A resource allocation scheme for a self-organizing cloud that achieves maximized utilization and optimal execution efficiency.
6. An attribute-based encryption framework for flexible
The document discusses the shift towards more design-driven and innovative data center solutions as enterprises turn to cloud computing to accelerate business innovation and contain costs. It notes that data from a growing number of sources is pouring into data centers, requiring more flexible architectures to handle diverse and real-time workloads. It outlines some of the key challenges with traditional hierarchical data center designs in supporting modern requirements around server-to-server communications, performance, security and availability. Finally, it discusses emerging trends like data center consolidation, virtualization, new application models, and the need for low-latency, high-performance networks optimized for the cloud.
The Journey Toward the Software-Defined Data CenterCognizant
Computing's evolution toward a software-defined data center (SDDC) -- an extension of the cloud delivery model of infrastructure as a service (IaaS) -- is complex and multifaceted, involving multiple layers of virtualization: servers, storage, and networking. We provide a detailed adoption roadmap to guide your efforts.
This resume summarizes Sesha Krishna Jitendar's professional experience as a Database Administrator with over 6.5 years of experience working with databases like Greenplum, Postgres, Oracle, and SQL Server. Some of the key projects mentioned include working on an email archiving and discovery solution for Citi, data migration from Oracle to Greenplum for a bank, and working on a driver licensing system for India's Road Transport Department. The resume provides details on roles and responsibilities, technologies used, and achievements like awards and appreciation received for work.
Software Defined Networking (SDN) is an emerging trend in the networking and communication industry and promises to deliver enormous benefits, from reduced costs to more efficient network operations. It is a new approach that gives network operators and owners more control of the infrastructure, allowing optimization, customization and virtualization that enable the creation of new types of network services. This is done by decoupling the management and control planes that make decisions about where traffic is sent from (the control plane) the underlying hardware that forwards data traffic to the selected destination (the data plane).
Haris M. Ansari is a graduate student at North Carolina State University pursuing a Master's degree in Computer Networking and Telecommunications. He holds a Bachelor's degree in Electronics and Communication Engineering from Jamia Millia Islamia in New Delhi, India. He has work experience in networking solutions engineering and research. His skills include networking protocols, languages like C, C++, Java, and tools like Cisco Packet Tracer, GNS3 and Wireshark. He has implemented projects involving peer-to-peer systems, transport layer protocols, routing algorithms, and databases.
Hashtag Recommendation System in a P2P Social Networking Applicationcsandit
In this paper focus is on developing a hashtag recommendation system for an online social
network application with a Peer-to-Peer infrastructure motivated by BestPeer++ architecture and
BATON overlay structure. A user may invoke a recommendation procedure while writing the
content. After being invoked, the recommendation procedure returns a list of candidate hashtags, and the user may select one hashtag from the list and embed it into the content. The proposed approach uses Latent Dirichlet Allocation (LDA) topic model to derive the latent or
hidden topics of different content. LDA topic model is a well-developed data mining algorithm
and generally effective in analysing text documents with different lengths. The topic model is
used to identify the candidate hashtags that are associated with the texts in the published content
through their association with the derived hidden topics.
The experiments for evaluating the recommendation approach were fed with the tweets
published in Twitter. Hit-rate of recommendation is considered as an evaluation metricfor our
experiments. Hit-rate is the percentage of the selected or relevant hashtags contained in
candidate hashtags. Our experiment results show that the hit-rate above 50% is observed when
we use a method of recommendation approach independently. Also, for the case that both
similar user and user preferences are considered at the same time, the hit-rate improved to 87%
and 92% for top-5 and top-10 candidate recommendations respectively.
The document describes the Anaeko Data Agility Server (A-DAS), which addresses the challenge of consolidating access to multiple incompatible data sources. A-DAS enables unified views of disparate structured and unstructured data without changing the underlying sources. It uses a light-touch approach to integrate new sources easily and adapt flexibly to changes. A-DAS provides real-time, standardized access to data through RESTful interfaces for applications like data services, reporting, and master data management.
Closed Loop Network Automation for Optimal Resource Allocation via Reinforcem...Liz Warner
In this talk, we present a closed-loop automation approach to dynamically adjust LLC cache allocation (Intel RDT) between high priority VNFs and BE workloads using reinforcement learning. The results demonstrated improved server utilization while maintaining required service level agreement for high priority VNFs.
Learn about how Juniper is redefining programmable networking by unlocking network data. Check out new developer tools, Open APIs, and how developers can take advantage of new products & technologies to build more intelligent applications.
Macadamian leveraged the Junos SDK to rapidly develop an innovative VoIP call recording application for Juniper Networks partners. The application captures VoIP calls on Juniper routers, records the audio, and indicates caller and callee information. By reusing code from sample Junos SDK applications and the comprehensive documentation, Macadamian was able to quickly build a functional solution to demonstrate the capabilities and flexibility of developing on the Junos SDK. The VoIP recorder can provide service providers with valuable features for training, marketing, compliance, and business analytics uses.
Learn how Junos Space SDK unlocks critical data through Open APIs. Developers can now use network data in their applications. This presentation walks through features & functionality of the Junos Space SDK>
David Ward's keynote from JavaOne 2011 on how networks are now programmable & intuitive, allowing application developers to access real-time data, geo-loc, and more information from the network through APIs and new protocols.
The New Network unlocks valuable information for developers to be used in building smarter, faster applications. Use real-time data and more with Junos when building applications. Learn how in this presentation.
Programmable networking allows applications and networks to interact in real-time. This is achieved through protocols like OpenFlow, PCE, ALTO, and BGP-TE that enable bidirectional communication. This dynamic interaction allows applications to influence network behavior and networks to optimize themselves based on application needs. It results in improved user experience through capabilities like intelligent service routing, traffic engineering, and policy enforcement.
The document discusses data virtualization and key concepts related to data virtualization. It describes how a virtual database (VDB) acts as a container that integrates data from multiple sources and exposes it through a single uniform API. The VDB contains models that define the structure of the underlying data sources, views, and web services. It also describes model types, translators that convert queries to source-specific queries, resource adapters that provide connectivity, and how VDBs are deployed and executed.
This document provides 6 IEEE project summaries in the domain of Java and cloud computing/data mining. The summaries are:
1. A decentralized access control scheme for secure cloud data storage that supports anonymous authentication.
2. A performance analysis framework for distributed file systems that qualitatively and quantitatively evaluates performance.
3. Approaches to guarantee trustworthy transactions on cloud servers by enforcing policy consistency constraints.
4. A scalable MapReduce approach for anonymizing large datasets to satisfy privacy requirements like k-anonymity.
5. A resource allocation scheme for a self-organizing cloud that achieves maximized utilization and optimal execution efficiency.
6. An attribute-based encryption framework for flexible
The document discusses the shift towards more design-driven and innovative data center solutions as enterprises turn to cloud computing to accelerate business innovation and contain costs. It notes that data from a growing number of sources is pouring into data centers, requiring more flexible architectures to handle diverse and real-time workloads. It outlines some of the key challenges with traditional hierarchical data center designs in supporting modern requirements around server-to-server communications, performance, security and availability. Finally, it discusses emerging trends like data center consolidation, virtualization, new application models, and the need for low-latency, high-performance networks optimized for the cloud.
The Journey Toward the Software-Defined Data CenterCognizant
Computing's evolution toward a software-defined data center (SDDC) -- an extension of the cloud delivery model of infrastructure as a service (IaaS) -- is complex and multifaceted, involving multiple layers of virtualization: servers, storage, and networking. We provide a detailed adoption roadmap to guide your efforts.
This resume summarizes Sesha Krishna Jitendar's professional experience as a Database Administrator with over 6.5 years of experience working with databases like Greenplum, Postgres, Oracle, and SQL Server. Some of the key projects mentioned include working on an email archiving and discovery solution for Citi, data migration from Oracle to Greenplum for a bank, and working on a driver licensing system for India's Road Transport Department. The resume provides details on roles and responsibilities, technologies used, and achievements like awards and appreciation received for work.
Software Defined Networking (SDN) is an emerging trend in the networking and communication industry and promises to deliver enormous benefits, from reduced costs to more efficient network operations. It is a new approach that gives network operators and owners more control of the infrastructure, allowing optimization, customization and virtualization that enable the creation of new types of network services. This is done by decoupling the management and control planes that make decisions about where traffic is sent from (the control plane) the underlying hardware that forwards data traffic to the selected destination (the data plane).
Haris M. Ansari is a graduate student at North Carolina State University pursuing a Master's degree in Computer Networking and Telecommunications. He holds a Bachelor's degree in Electronics and Communication Engineering from Jamia Millia Islamia in New Delhi, India. He has work experience in networking solutions engineering and research. His skills include networking protocols, languages like C, C++, Java, and tools like Cisco Packet Tracer, GNS3 and Wireshark. He has implemented projects involving peer-to-peer systems, transport layer protocols, routing algorithms, and databases.
Hashtag Recommendation System in a P2P Social Networking Applicationcsandit
In this paper focus is on developing a hashtag recommendation system for an online social
network application with a Peer-to-Peer infrastructure motivated by BestPeer++ architecture and
BATON overlay structure. A user may invoke a recommendation procedure while writing the
content. After being invoked, the recommendation procedure returns a list of candidate hashtags, and the user may select one hashtag from the list and embed it into the content. The proposed approach uses Latent Dirichlet Allocation (LDA) topic model to derive the latent or
hidden topics of different content. LDA topic model is a well-developed data mining algorithm
and generally effective in analysing text documents with different lengths. The topic model is
used to identify the candidate hashtags that are associated with the texts in the published content
through their association with the derived hidden topics.
The experiments for evaluating the recommendation approach were fed with the tweets
published in Twitter. Hit-rate of recommendation is considered as an evaluation metricfor our
experiments. Hit-rate is the percentage of the selected or relevant hashtags contained in
candidate hashtags. Our experiment results show that the hit-rate above 50% is observed when
we use a method of recommendation approach independently. Also, for the case that both
similar user and user preferences are considered at the same time, the hit-rate improved to 87%
and 92% for top-5 and top-10 candidate recommendations respectively.
The document describes the Anaeko Data Agility Server (A-DAS), which addresses the challenge of consolidating access to multiple incompatible data sources. A-DAS enables unified views of disparate structured and unstructured data without changing the underlying sources. It uses a light-touch approach to integrate new sources easily and adapt flexibly to changes. A-DAS provides real-time, standardized access to data through RESTful interfaces for applications like data services, reporting, and master data management.
Closed Loop Network Automation for Optimal Resource Allocation via Reinforcem...Liz Warner
In this talk, we present a closed-loop automation approach to dynamically adjust LLC cache allocation (Intel RDT) between high priority VNFs and BE workloads using reinforcement learning. The results demonstrated improved server utilization while maintaining required service level agreement for high priority VNFs.
Learn about how Juniper is redefining programmable networking by unlocking network data. Check out new developer tools, Open APIs, and how developers can take advantage of new products & technologies to build more intelligent applications.
Macadamian leveraged the Junos SDK to rapidly develop an innovative VoIP call recording application for Juniper Networks partners. The application captures VoIP calls on Juniper routers, records the audio, and indicates caller and callee information. By reusing code from sample Junos SDK applications and the comprehensive documentation, Macadamian was able to quickly build a functional solution to demonstrate the capabilities and flexibility of developing on the Junos SDK. The VoIP recorder can provide service providers with valuable features for training, marketing, compliance, and business analytics uses.
Learn how Junos Space SDK unlocks critical data through Open APIs. Developers can now use network data in their applications. This presentation walks through features & functionality of the Junos Space SDK>
David Ward's keynote from JavaOne 2011 on how networks are now programmable & intuitive, allowing application developers to access real-time data, geo-loc, and more information from the network through APIs and new protocols.
The New Network unlocks valuable information for developers to be used in building smarter, faster applications. Use real-time data and more with Junos when building applications. Learn how in this presentation.
Programmable networking allows applications and networks to interact in real-time. This is achieved through protocols like OpenFlow, PCE, ALTO, and BGP-TE that enable bidirectional communication. This dynamic interaction allows applications to influence network behavior and networks to optimize themselves based on application needs. It results in improved user experience through capabilities like intelligent service routing, traffic engineering, and policy enforcement.
The document discusses a hybrid programmable forwarding plane (HPFP) for network devices. It describes the motivation for allowing multiple applications to program the forwarding plane of devices. The outcome of an initial BoF discussion was that an ONF working group charter would be proposed to further develop the HPFP concept.
Learn more about the Junos Space SDK, it's APIs, Tools, and more. See specific code samples using Junos Space APIs with Java, Perl, Python, PHP, .NET, and more. Walk thru customer examples.
Openflow allows for external control of networking devices through the separation of the control plane and forwarding plane. It defines a standardized protocol and API for an external controller to program the forwarding tables of Openflow-enabled switches. The controller installs flow entries into flow tables on switches to determine how packets should be matched and processed. This provides programmability of the network and flexibility in how traffic is routed.
Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)SDNRG ITB
This document discusses unified SDN and its applications across network domains. It defines SDN as separating the control plane from the data plane and using a network operating system to programmatically control the network. However, it argues this approach is too low-level and not manageable. Instead, it proposes a next-gen service management system that compiles abstract service models into device configurations. This allows for automated, standardized, and flexible service provisioning across virtualized data centers, NFV, access edges, aggregation, and cores.
SDN and NFV Value in Business Services - A Presentation By Cox CommunicationsCisco Service Provider
Joint presentation on behalf of the Society of Cable Telecommunications Engineers (SCTE) between Cox Communications (Mazen Khaddem) and Cisco Systems (Dr. Loukas Paraschis). Presentation covers different SDN categories, NFV examples in business services, and use cases for WAN SDN.
This document discusses how programmable networking can enable better interaction between applications and networks. It proposes using programmable touchpoints and standardized APIs to allow applications to provide input to networks and networks to provide intelligence to applications. This would allow for improved user experiences through real-time optimization of traffic routing, content placement, and resource allocation between applications, content, end users, and networks.
Nuage Networks: Gluecon 2013 Keynote: The True Potential of Network Virtualiz...Nuage Networks
While much has been said about network virtualization, current solutions are limited to simplistic Layer-2 use cases, restricting services within boundaries of single data centers and resulting in proprietary islands. We describe a novel, open standards approach that fulfills the full promise of massively scalable network virtualization, enabling seamless interconnection of cloud services with existing enterprise environments.
Modern Database Development Oow2008 Lucas JellemaLucas Jellema
This document summarizes an Oracle database expert's presentation on optimal use of Oracle Database 10g and 11g for modern application development. Some key points covered include how modern applications are distributed, global, and service-oriented; how new Oracle database features support cloud computing, analytics, and internationalization; and guidelines for developing applications that leverage the database while maintaining independence.
The document discusses several technology topics including:
1. SOA and its benefits such as facilitating interoperability and promoting technology reuse.
2. Cloud computing and common questions around it such as what cloud computing is, how many clouds there will be, and what's new in cloud computing.
3. An example scenario of a company called FredsList gradually adopting more cloud capabilities for their listings website, from basic storage to search, photos, analytics and performance optimization.
Nuage Networks: Delivering Datacenter Networks As Consumable as Computee_scot...Nuage Networks
The document discusses the potential of network virtualization to address challenges posed by the growth in dynamic virtualized workloads. It notes traditional networks are configuration-driven, complex and inflexible, limiting optimization. Network virtualization provides a programmable, automated approach through software-defined networking, delivering instant, policy-based connectivity across datacenters seamlessly without network constraints. This represents a fundamental shift from static configuration to dynamic service automation through abstraction of the network.
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
Cloud and mobile computing applications are increasing heavily in terms of usage. These two areas extending usability of systems. This review paper gives information about cloud and mobile applications in terms of resources they consume and the need of choosing variety of features for users from several locations and the evolutionary provisions for service provider and end users. Both the fields are combined to provide good functionality, efficiency and effectiveness with mobile phones. The enhancement by considering power consumption by means of resource constrained nature of devices, communication media and cost effectiveness. This paper discuss about the concepts related to power consumption, underlying protocols and the other performance issues
Router virtualization can provide benefits like reduced costs and environmental impact. There are two main approaches: hardware-isolated virtual routers (HVRs) with dedicated resources, and software-isolated virtual routers (SVRs) that share resources. HVRs are better suited for high-scale environments like POPs due to their ability to independently scale resources, while SVRs are preferable for low-scale environments like data centers. Cisco IOS XR Software supports HVRs through Secure Domain Routers that provide full isolation of routing instances.
Azure Serrvices Platform Pro Dev PartnersJohn Stame
The document discusses Microsoft's Azure cloud computing platform and services. It describes Azure as an internet-scale cloud services platform hosted in Microsoft data centers that provides computing, storage, development tools, and other services. It outlines several Azure services including compute services, storage services, SQL data services, and a live framework for building rich consumer applications. It also provides examples of how organizations can use Azure services.
Quality of service refers to a network's ability to provide reliable communication through factors like error rates, bandwidth, throughput, transmission delay, availability, and jitter. These factors influence a network's capability to deliver secure and reliable service. Measuring these QoS factors allows efficient use of network resources and comparison of different networks' overall performance.
Mobility Information Series - Webservice Architecture Comparison by RapidValueRapidValue
The document compares various web services data transfer frameworks for mobile applications, specifically examining SOAP vs REST and XML vs JSON. It finds that REST has better performance than SOAP, especially for mobile, due to using standard HTTP and being lighter weight. It also finds that JSON has better performance than XML, especially for mobile, due to being lighter weight. The document recommends REST and JSON for most mobile applications unless high security is required, in which case SOAP may be better.
This document provides an overview of Microsoft's Azure cloud services platform. It discusses key Azure capabilities and services including compute, storage, SQL Azure database, service bus, and access control. Azure provides scalable infrastructure and platform services that allow developers to build and host applications in the cloud using familiar .NET tools. The document also demonstrates a sample grid computing application built on Azure and highlights reasons to consider cloud computing such as reducing costs, improving scalability, and reducing IT overhead.
The document discusses key concepts in network management including network analysis, architecture, design, and requirements analysis. It defines important terms like mission-critical networks, bandwidth, network services, quality of service, and performance characteristics. The document also covers topics like systems methodology, identifying system components, and factors that affect network architecture/design decisions. Overall, the document provides an overview of the fundamental concepts and processes involved in network management.
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationThomasGraf42
This document discusses several challenges with integrating YANG push data into a data mesh architecture, and proposes solutions to address those challenges. Specifically, it discusses:
1. The need to unify observations from network events that occur at different times into single alerts.
2. The lack of standardization around aspects of YANG push like transport protocols, encodings, subscriptions, metadata, and versioning.
3. A proposal to integrate YANG push into a data mesh to produce standardized metrics with timestamps, and control semantic changes end-to-end.
Skeuomorphs, Databases, and Mobile PerformanceSam Ramji
The document discusses skeuomorphs and metaphors in architecture and databases. It explores how mobile applications can architect for performance by making the application smarter through profiling, threading, and caching, using the network intelligently through bundling and pipelining requests, and optimizing databases through stored procedures, queueing, denormalization, and managing result sets. The document considers whether describing the internet as a database is a skeuomorph or metaphor, and discusses lessons learned from prior database architectures that can help improve mobile performance.
The document discusses skeuomorphs and metaphors in architecture and databases. It explores how mobile applications can architect for performance when the internet functions like a database. It recommends making applications smarter through profiling, threading, and caching, using networks intelligently through bundling and pipelining requests, and optimizing "databases" through stored procedures, queueing, denormalization, and managing result sets. The document considers whether viewing the internet as a database is a skeuomorph or metaphor, and discusses lessons from the past that can help optimize current mobile and cloud architectures.
The document discusses cloud architecture and describes the different layers of cloud computing including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It explains how virtualization allows for the pooling of computing resources and rapid provisioning of these resources. The document also discusses multi-tenancy and how a single software instance can be configured for multiple tenants' needs in a SaaS environment. As an example, it describes how a payroll processing application currently used by multiple government departments could be migrated to a cloud environment for improved maintenance and reduced costs.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
3. If you are a java developer and Not protocol hacking acronym-fueled standard creator You’re using Java SE or Java FX Drop hints to the network about application behavior, or find out the “shape” of the network near you in terms of latency, jitter, local caching You really like(d) OSS/J Connect existing OSS/BSS systems deeper into the network by better informing them, separating decision from provisioning & enforcement points. You are an expert at modeling complex behaviors in Java EE Apply your graph-fu to bucket loads of network data and optimize your network (or someone else’s) You do all of the above, but in perl or PHP Use the RESTful interfaces
4. The FIX and FORGET network route requests to resources best effort in over-constrained space
5. Establishing the data supply chain manage experience optimize delivery Create information valuefrom network element/service operational data optimize placementmanage efficiency
12. “BIg data” ADDS TO THE INFORMATION MIX “If you’re good at distribution (*), then you’re generating data. Use it.” Steve O’Grady, analyst, Redmonk“Big Data + Open Source = Big Money” (*) distribution of bits == networking
13. Decoupling of control points Policy Content/Resource Placement Flows/Filtering Delivery/Experience logs statistics history topology context Networks adapt to applications Applications adapt to networks ephemeral state
15. The brand information paradox “Information wants to be free, because it’s easy to access; it wants to be valuable because it’s hard to create” – Stewart Brand Making the network accessible to developers – the programmable network – is the first step in creation
16. Information factory: changing the economics “The iPhone is doing to the mobile world what the browser did to the wireline world”– PradeepSindhu Juniper Networks CTO Monetization Efficiency Optimization Personal Reliable Immediate
17. It’s déjà vu all over again Evolving APIs on the network software assets…. Create new consumption and constraint patterns… Requiring network-level information
19. Information created via data networking Point in Time Real Time Long Time Annotation Context Corroboration Correlation
20. The new network is PROGRAMMABLE Control API Data /Packet API … Management API EphemeralState 3rd party Apps & SDKs 3rd party applications & SDKs Enterprise Customer Research Institution SI Partner ISV Partner Service Provider Pulse - Endpoint Junos Space APIs Space - Across the network Data Center CDN Network APIs Junos SDK Network device
21. NETWORK Programmability addresses Flexibility of service placement Place your services where you want, not necessarily where the user is physically connected Control of resources from applications Customize network behavior to better meet user/application needs Introduce non-configured device behavior changes: ephemeral classifiers Lowering of operational barriers Decrease dependency on the traditional provisioning workflow Static configurations are maintenance heavy & expensive to change Enable automation and dynamic adaptability within constraints
22. Why NOW? DEVELOPERS STILL BOUND BYDeutSch’s eight fallacies 1. The network is reliable 2. Latency is zero 3. Bandwidth is infinite 4. The network is secure 5. Topology doesn't change 6. There is one administrator 7. Transport cost is zero 8. The network is homogeneous Virtualization and cloud computing make bad assumptions worse
23. Network application examples Content / Service Routing Locate best copy of content for the end user, using customer rules Managed content distribution Content prepositioning to caches Live events Map-Reduce class of applications as consumers and producers High-end distributed computing informed by and informing placement Cloud OS network operations Move VMs / Apps / Storage between locations Cloudburst Flexible on-demand allocation of cloud & network capacity Security DDoS attack prevention
24. INFORMING THE CONTROL APPLICATIONS What activities create the most traffic? Where is latency introduced? Congestion? What impacts user experience the most? Extending network vocabulary to general purpose applications Content networking as a future: More about what, who, when of access, not where Resource oriented: things you link, copy, incorporate and extend
25. Mapping Time and functional domains securityposture QoS service levelenforcement cloudplacement threat,failureanalysis cloud cost
26. Value Action Configure Provision Dynamic Policy GENERATE Filter Correlate Combine INSIGHT AFFECTS Assets Data Inventory History Real-time CREATE Networking Devices, Servers, Databases, Applications etc. Unlock the power of network information
27. Topology JUNOS SPACEnetwork application platform OSS● BSS ● Green/Energy ● End-user Forensics Adapters (MTOSI, OneAPI) ● … others Network Activate ● Route Insight Virtual Control ● Service Now … others programmable Powerful Flexible Juniper Apps 3rd Party Apps APPLICATIONS Junos Space RESTful Web Service Device & Network Abstractions Infrastructure Inventory Scripts Devices Events Discovery Jobs Users UI Widgets Configuration JUNOS SPACE PLATFORM Network Interface (DMI)
28. Under The Hood Java (and other languages)via REST NBI BridgeSOA, MTOSI APIs & Libraries Interface Servicesusers, RBAC, application deployment, UI, RESTful wrappers Data Servicestagging, taxonomy, join/product, indexing, search/query Element and Network Servicesinventory, topology, fabric, jobs, device management Local Persistence DMI
29. Jboss/EJB container Architecture Browser Pluggable App GUI NBI Client Common Space GUI Components EXT-JS DWR REST (JSON/XML) REST (JSON) Apache Web Proxy Tomcat Tomcat JBoss Cache JBoss Cache DWR Servlet RESTEasy DWR Servlet RESTEasy JBoss App Server JBoss App Server GUI Notification Action/Data Binding (POJO) GUI Notification Action/Data Binding (POJO) EJB Container EJB Container Business Logic SLSB & MDB Business Logic SLSB & MDB Sync/Async Replication Persistent Data Access SLSB Persistent Data Access SLSB Business Logic JPA Entities Business Logic JPA Entities JMS Message Bus JMS Message Bus DB Cluster JPA/JTA JPA/JTA
33. IMPLEMENTING JOULEX ENERGY MANAGER (JEM) JouleX JEM Application 1 1 2 1 3 Junos Space Platform 1 API Native Apps 1 1 2 1 3 1 Platform DMI/NetConf
34. DATA DRIVEN USE CASE “Big Data”Domain Hadoop Business Constraints Real Time Analytics Java DeveloperDomain Ephemeral State Updates Tag/Filter/Join Flow Data Event/Log Data Configuration
35. The NETWORK Application ecosystems Control API Data /Packet API … Management API EphemeralState 3rd PartyApp 3rd PartyApp Experience governed through data insight & ephemeral state control: make network aware of applications External Developer APIs Content Placement Subscriber Analytics FlowAnalysis Existing Systems Junos Space APIs Make applications aware of network: resources, integration points, services exposed Junos Space Network APIs Junos SDK Network device
37. Solving hard problems Triangulating security, privacy and trust Where to enforce Multi-tenancy Data in motion, at rest, at work Precision Sampling, estimation and approximation algorithms needed where absolute magnitude of data is in Pbytes or more Complexity Running into potentially intractible (NP-Hard) problems with network structures and cost minimization Time 10-6 to 104 seconds, real time to historical
38. Reach info & resources hstern@juniper.net @freeholdhal Developer Information & Resources www.juniper.net/developer @junosdeveloper helpmebuildmyapp@juniper.net
Editor's Notes
applications tell networks their requirements, resources, constraints, security rulesnetworks tell applications how to optimize, run more efficiently, handle exceptions
applications tell networks their requirements, resources, constraints, security rulesnetworks tell applications how to optimize, run more efficiently, handle exceptions
It is possible both to ask questions about specific endpoints, and to request bulk map data for further processing, depending on application needs.
there’s more data, and more reason and drive to use it, which means more network-centric or network-aware applications
how do you change the coase-driven economics?
Speaker notes and backup informationJuniper is a strong proponent of open networks & programmability and has been so for many yearsKey benefit of programmability is to enable value creation on the new network, e.g., for the creation of value added services or apps that simplify network managementExamples of Juniper’s open stance include: Juniper enables the use of 3rd party optics on Juniper products and several companies OEM Juniper products, incl. Ericsson.Juniper is also actively creating a developer ecosystem, Junos Developer Network, with over 100 partner companies signed up to dateJuniper provides unique end-to-end programmabilityStarting with on-device: JunosJunos Software Development Kit (SDK) offering programmability; OpenFlow is one of the APIs that enable programmabilityCross-device: Junos SpaceWith Space SDK to enable orchestration and management, incl. mash-ups of networking apps with non-networking appsOn the Endpoint: Junos PulseJunos Pulse available for iPhone and iPad among othersUse cases include handset and data securityOpenFlow enriches programmability of the deviceHelping make apps network-aware and networks app-awareOpenFlow adds new incremental method for programmable filter-based forwardingJuniper utilizes several mediation layers, ALTO, PCE, OF – all leveraging industry standards.As such, OF is one of many elements of network programmability and in line with Juniper’s vision for the programmable new networkFAQ:Do all Juniper products have SDKs?No, not all Juniper products have SDKs at this point in time but we plan to roll out SDKs to all platforms expanding on the MX SDK offeringPossible use cases for SDKsJunos SDK: “Embedded” apps: packet processing, proximity, data collection API examples: DMI, OpenFlow, ProximityJunos Space: widgets, content-oriented applications, network management (network data pre-processing & presentation), higher-level APIs to Junos SDK apps, workflow orchestration, etc.; mashups with non-networking appsPulse APIs: security
james gosling, on his nighthacks website – something he has said since 1995, and is true 15 years onpeople writing enterprise applications will eventually run into these, intentionally or not (usually not)when they do, the opportunity exists for the network to highlight, announce and help redress the problem.that’s what my group does at juniper networksreliability a function of internal and external factors – congestion, DDOS are “failures”latency is 30 msec US-europe. can’t make it less. bandwidth may go up but the first byte is still sloweveryone ignores them, assuming they are not constraints. come back at scale, or criticality, to bite younetwork engineering and awareness has to be part of any data-centric IT focus.
A couple of examples, some of which will be featured in our demos today
Consider a closed loop system that is often used to describe how a company works. Consider the same model in the context of a network. The network infrastructure in terms of the networking devices like routers, switches, security devices combined with the entities that they connect that include the printers, servers, databases, applications form the assets in our model. Typical actions that are taken to affect these assets include permanent actions such as configuration of these devices and provisioning of services in response to customer orders. There could also be dynamic actions such as QoS policy provisioning to ensure sufficient bandwidth during a video streaming event. This is classis network management and there are several systems that offer this capability including Junos Space.What is the major paint point for a developer?Major pain point is that inhibits several developers in doing anything worthwhile beyond the realm of network management is is lack of ability with a platform that can marry the action and asset side of the cycle based on the data that is generated by the asset. Network assets generate a lot of data. This includes fairly static data such as the inventory and configuration of the network, historical information such as logs, and dynamic real-time data such as flow records. All this data by itself is worthless unless you can turn it into value by understanding what it means in the business context and what it might do operationally for the company. What is the solution?What would be useful is if the platform can provide the capability to perform analysis by filtering, collecting and correlating this data with external sources such as real time traffic, weather patterns, click behavior, financial markets etc. For example, the right insight into the data generated from the network when combined with data from external sources could yield a wealth of valuable information about subscribers - who they are, where they are, how often they connect, where they connect from, the duration of usage, the type of services they use, the frequency of these services, their credit profile, etc. This insight will generate intelligent actions – both permanent as well as dynamic – which will tune the networking assets to operate more efficiently as well as generate more value for the company.How does Junos Space and the SDK change the equation in favor of an application innovator?Where Junos Space changes the equation is to marry the Action and Asset side of the cycle on the left with the Data and Value side on the right. It provides the ability to suck in the static and dynamic behavior of the network and analyze this behavior in the context that can be provided by an internal or an external source. The internal source could be an event on the network itself and the external source (as mentioned before) could be some business intelligence or a truly external entity in the form of weather patterns or user behavior etc. Space combines the ability to access the static and the dynamic nature and the wealth of information hidden in them with the ability to combine this data with an internal or an external source. This combined with a highly scalable and resilient platform and a great set of tools that allow developers to easily utilize the wealth information makes Space and Space SDK a great platform to develop the new and the next generation applications.
Joulex is an external application using the JUNOS Space API to collect Energy information for Junos Space managed devices.It collects Power information by executing Junos XML RPCs on Junos Space discovered devices.Underpinned by an open, standards-based, integrateddevelopment environment (IDE), Junos Space SDK provides arich development environment which includes a RESTful Webservices API, the Junos Space platform, built-in device simulators,documentation, reference applications, and support tools. JunosSpace SDK reduces the complexity of building a broad range ofinnovative applications and services on enterprise and serviceprovider networks.Using Junos Space SDK, JouleX was able to extend the reach anddepth of JEM to deliver energy consumption reductions of 30% to60%.1. JEM remotely queries each Juniper device using Junos SpaceSDK for the current energy consumption and utilization.2. JEM builds historical utilization data for an accurate energy useprofile for each device and in aggregation.
Objective of this slide:Showcase various partners taking advantage of our platform. Why they are betting on our platform. And HOW they are seeing the value of our 3 principles in their own solns by relying on Juniper. speak to that we want the audience names to show there eventually w/ their solns.===We’d like to see your name up here and your applications in our marketplace and would love to hear what you can do with and on our platform. We are here to help, we are here to jointly work w/ you in making YOU successful on our platform. Transition to next slide:Before, I close this session…I would like to leave you w/ a few call to actions…