IBM InfoSphere Streams is a platform for processing streaming data in real-time. It allows for the construction of application graphs where data continuously flows between operators. The platform can handle high data volumes and varieties, providing low-latency analysis. It includes various pre-built operators and toolkits for integration, analytics, text processing, and more. Streams supports the development of applications across multiple nodes in a cluster and can automatically distribute and parallelize processing.
The world’s information is doubling every two years. In 2011 the world created a staggering 1.8 zettabytes. By 2020 the world will generate 50 times the amount of information and 75 times the number of "information containers", while IT staff to manage it will grow less than 1.5 times. This session introduces students to various storage networking, & business continuity terminologies.
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Liz Warner
Transformation of network softwarization towards 5G inherently requires satisfying the requirements across a broad scope of verticals while maintaining Quality of Service (QoS) and Quality of Experience (QoE) criteria required to satisfy various network slice constraints. This session with hands-on lab introduces 3 key elements of service assurance – Monitoring, Presentation & provisioning layers and introduction to various cloud-native open source frameworks like Collectd, Influxdb, Grafana, Prometheus, Kafka and Platform for Network Data Analytics (PNDA).
Bringing Mainframe Security Information Into Your Splunk Security Operations ...Precisely
In today’s always-on IT world, a single security breach can bring your business to a standstill. You rely on Splunk’s powerful platform for monitoring, integrating, analyzing and visualizing security data from across your enterprise to protect your organization from security threats and incidents. However, Splunk doesn’t natively interact with mainframe and IBM i systems, leaving a glaring blind spot.
Join us to learn how to effectively integrate Mainframe and IBM i security data into Splunk- providing you with a comprehensive view of your security operations landscape.
Topics will include:
- An overview of different types of security data and how to tap into mainframe & IBM i data in your Splunk Security Operations Center
- Unique and comparative differentiators across security data integration tools to be used within the Splunk Security Operations center
- Customer use cases and examples
Run Book Automation with PlateSpin OrchestrateNovell
his session will describe how to use PlateSpin Orchestrate for tasks beyond virtualization management. Run Book Automation can support the IT operation in a variety of processes, including monitoring, ticket enrichment, problem diagnosis, change and repair, optimization and virtualization, system management and disaster recovery. IDC predicts that data center management will be required to implement higher automation in all fields of system operation.
This session will show what the typical use cases for Run Book Automation are, how PlateSpin Orchestrate fits the requirement for an automation implementation platform, and where in the enterprise IT infrastructure it can be implemented organically and in manageable steps.
A number of implementation examples, such as a disaster recovery implementation for SAP components, prove that automation is not necessarily a huge step, and that even limited projects can lead to a quick return on investment. Implementation details in code and project examples, a technical demo and a tour of the existing example code will conclude the session.
Closed Loop Network Automation for Optimal Resource Allocation via Reinforcem...Liz Warner
In this talk, we present a closed-loop automation approach to dynamically adjust LLC cache allocation (Intel RDT) between high priority VNFs and BE workloads using reinforcement learning. The results demonstrated improved server utilization while maintaining required service level agreement for high priority VNFs.
The world’s information is doubling every two years. In 2011 the world created a staggering 1.8 zettabytes. By 2020 the world will generate 50 times the amount of information and 75 times the number of "information containers", while IT staff to manage it will grow less than 1.5 times. This session introduces students to various storage networking, & business continuity terminologies.
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Liz Warner
Transformation of network softwarization towards 5G inherently requires satisfying the requirements across a broad scope of verticals while maintaining Quality of Service (QoS) and Quality of Experience (QoE) criteria required to satisfy various network slice constraints. This session with hands-on lab introduces 3 key elements of service assurance – Monitoring, Presentation & provisioning layers and introduction to various cloud-native open source frameworks like Collectd, Influxdb, Grafana, Prometheus, Kafka and Platform for Network Data Analytics (PNDA).
Bringing Mainframe Security Information Into Your Splunk Security Operations ...Precisely
In today’s always-on IT world, a single security breach can bring your business to a standstill. You rely on Splunk’s powerful platform for monitoring, integrating, analyzing and visualizing security data from across your enterprise to protect your organization from security threats and incidents. However, Splunk doesn’t natively interact with mainframe and IBM i systems, leaving a glaring blind spot.
Join us to learn how to effectively integrate Mainframe and IBM i security data into Splunk- providing you with a comprehensive view of your security operations landscape.
Topics will include:
- An overview of different types of security data and how to tap into mainframe & IBM i data in your Splunk Security Operations Center
- Unique and comparative differentiators across security data integration tools to be used within the Splunk Security Operations center
- Customer use cases and examples
Run Book Automation with PlateSpin OrchestrateNovell
his session will describe how to use PlateSpin Orchestrate for tasks beyond virtualization management. Run Book Automation can support the IT operation in a variety of processes, including monitoring, ticket enrichment, problem diagnosis, change and repair, optimization and virtualization, system management and disaster recovery. IDC predicts that data center management will be required to implement higher automation in all fields of system operation.
This session will show what the typical use cases for Run Book Automation are, how PlateSpin Orchestrate fits the requirement for an automation implementation platform, and where in the enterprise IT infrastructure it can be implemented organically and in manageable steps.
A number of implementation examples, such as a disaster recovery implementation for SAP components, prove that automation is not necessarily a huge step, and that even limited projects can lead to a quick return on investment. Implementation details in code and project examples, a technical demo and a tour of the existing example code will conclude the session.
Closed Loop Network Automation for Optimal Resource Allocation via Reinforcem...Liz Warner
In this talk, we present a closed-loop automation approach to dynamically adjust LLC cache allocation (Intel RDT) between high priority VNFs and BE workloads using reinforcement learning. The results demonstrated improved server utilization while maintaining required service level agreement for high priority VNFs.
Intel® Select Solutions for the Network provide a faster means to address these challenges as we transition to 5G with pre-validated, optimized building blocks to help drive scale. Hear the what, why, when and where around Intel® Select Solutions for the Network.
EMC IT's Journey to the Private Cloud: A Practitioner's Guide EMC
This white paper is the first in a series of EMC IT Proven papers describing EMC ITs initiative to move toward a private cloud-based IT infrastructure. EMC IT defines the private cloud as the next-generation IT infrastructure comprising both internal and external clouds that enables efficiency, control, and choice for the internal IT organization.
Diagnosability versus The Cloud, Redwood Shores 2011-08-30Cary Millsap
In our increasingly virtualized environments, it's ever more difficult to diagnose application defects—especially performance defects that affect response time or throughput expectations. Runtime diagnosis of defects can be an unbearably complicated problem to solve once the application is sealed up and put into production use. But having excellent runtime diagnostics is surprisingly easy if you design the diagnostic features into the application from its inception, as it is being grown, like you would with any other desired application feature.
Security in the Real World - JavaOne 2013MattKilner
Java was built from the ground up with security clearly in mind and is now the engine powering a huge number of business-critical systems. With this visibility and opportunity come attacks, and this session goes through the state of security in Java in 2013 and discusses some of the attack vectors. It presents a couple of real-world examples and also addresses the real-world challenges in getting security fixes out quickly. Finally, it touches on hardware cryptography. Come learn more about the reality of security today and take away a better awareness of exactly how Java helps protect you.
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...Splunk
National Australia Bank has gained new operational visibility and intelligence using Splunk and their machine data. Learn how hundreds of Splunk users within these organizations turn terabytes of machine data into increased uptime, improved service delivery, real-time customer insights, enhanced security posture, informed capacity planning and more.
Closed Loop Platform Automation - Tong Zhong & Emma CollinsLiz Warner
Closed-loop automation would dramatically help with the network transformation which is central to our business. Building a general analytics workflow to support various use cases (such as power management, fault prediction, networking slicing, etc.) is a critical component in the overall platform.
IBM Power Systems is working to decrease costs, improve performance and use the open community to help competitive enterprises put data to work in the cloud.
IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18Pawel Maczka
Subject: IBM Spectrum Protect, Plus - What's new! June '18
When: June 7th 10AM ET, 4PM CET
Speakers: Harley Puckett (IBM), Pawel Maczka (Storware)
Harley Puckett is the Program Director for IBM #SpectrumProtect development. He has over 30 years experience in Storage and Data Protection, regularly presenting at client briefings and user conferences. Harley spent 6 ½ years as an Executive Storage Software Consultant and manager of the Client Workshop Program in the Tucson Executive Briefing Center. He was the Solutions Architect for IBM’s Global Archive Solutions Center in Guadalajara Mexico. Prior to a temporary assignment as the technical assistant to the GM of System Storage he spent 9 ½ years as a senior development manager for IBM Tivoli Storage Manager (TSM). He led IBM’s efforts to implement Systems Managed Storage on its internal systems and outsourced accounts. Graduated University of Arizona with BS MIS
Pawel Maczka - CTO, VP at Storware Company. Addicted to Storage and Data Protection Solutions serve in every combination - cloud, hybrid, on premise.More than 10 years work with Enterpise Backup & Recovery platforms. Technology evangelist, always with strong cooperation among IBM Spectrum Storage team.
Learn how Cloud is enabled for fast implementation of new workloads, secure application, available with modular and economically efficient design. For more information visit, http://ibm.co/Lx6hfc.
Mike Spicer is the lead architect for the IBM Streams team. In his presentation, Mike provides an overview of the many key new features available in IBM Streams V4.1. Simpler development, simpler management, and Spark integration are a few of the capabilities included in IBM Streams V4.1.
Big Data: Technical Introduction to BigSheets for InfoSphere BigInsightsCynthia Saracco
Introduces BigSheets, a spreadsheet-style tool for business users working with Big Data. BigSheets is part of IBM's InfoSphere BigInsights platform, which is based on open source technologies (e.g., Apache Hadoop) and IBM-specific technologies.
Intel® Select Solutions for the Network provide a faster means to address these challenges as we transition to 5G with pre-validated, optimized building blocks to help drive scale. Hear the what, why, when and where around Intel® Select Solutions for the Network.
EMC IT's Journey to the Private Cloud: A Practitioner's Guide EMC
This white paper is the first in a series of EMC IT Proven papers describing EMC ITs initiative to move toward a private cloud-based IT infrastructure. EMC IT defines the private cloud as the next-generation IT infrastructure comprising both internal and external clouds that enables efficiency, control, and choice for the internal IT organization.
Diagnosability versus The Cloud, Redwood Shores 2011-08-30Cary Millsap
In our increasingly virtualized environments, it's ever more difficult to diagnose application defects—especially performance defects that affect response time or throughput expectations. Runtime diagnosis of defects can be an unbearably complicated problem to solve once the application is sealed up and put into production use. But having excellent runtime diagnostics is surprisingly easy if you design the diagnostic features into the application from its inception, as it is being grown, like you would with any other desired application feature.
Security in the Real World - JavaOne 2013MattKilner
Java was built from the ground up with security clearly in mind and is now the engine powering a huge number of business-critical systems. With this visibility and opportunity come attacks, and this session goes through the state of security in Java in 2013 and discusses some of the attack vectors. It presents a couple of real-world examples and also addresses the real-world challenges in getting security fixes out quickly. Finally, it touches on hardware cryptography. Come learn more about the reality of security today and take away a better awareness of exactly how Java helps protect you.
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...Splunk
National Australia Bank has gained new operational visibility and intelligence using Splunk and their machine data. Learn how hundreds of Splunk users within these organizations turn terabytes of machine data into increased uptime, improved service delivery, real-time customer insights, enhanced security posture, informed capacity planning and more.
Closed Loop Platform Automation - Tong Zhong & Emma CollinsLiz Warner
Closed-loop automation would dramatically help with the network transformation which is central to our business. Building a general analytics workflow to support various use cases (such as power management, fault prediction, networking slicing, etc.) is a critical component in the overall platform.
IBM Power Systems is working to decrease costs, improve performance and use the open community to help competitive enterprises put data to work in the cloud.
IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18Pawel Maczka
Subject: IBM Spectrum Protect, Plus - What's new! June '18
When: June 7th 10AM ET, 4PM CET
Speakers: Harley Puckett (IBM), Pawel Maczka (Storware)
Harley Puckett is the Program Director for IBM #SpectrumProtect development. He has over 30 years experience in Storage and Data Protection, regularly presenting at client briefings and user conferences. Harley spent 6 ½ years as an Executive Storage Software Consultant and manager of the Client Workshop Program in the Tucson Executive Briefing Center. He was the Solutions Architect for IBM’s Global Archive Solutions Center in Guadalajara Mexico. Prior to a temporary assignment as the technical assistant to the GM of System Storage he spent 9 ½ years as a senior development manager for IBM Tivoli Storage Manager (TSM). He led IBM’s efforts to implement Systems Managed Storage on its internal systems and outsourced accounts. Graduated University of Arizona with BS MIS
Pawel Maczka - CTO, VP at Storware Company. Addicted to Storage and Data Protection Solutions serve in every combination - cloud, hybrid, on premise.More than 10 years work with Enterpise Backup & Recovery platforms. Technology evangelist, always with strong cooperation among IBM Spectrum Storage team.
Learn how Cloud is enabled for fast implementation of new workloads, secure application, available with modular and economically efficient design. For more information visit, http://ibm.co/Lx6hfc.
Mike Spicer is the lead architect for the IBM Streams team. In his presentation, Mike provides an overview of the many key new features available in IBM Streams V4.1. Simpler development, simpler management, and Spark integration are a few of the capabilities included in IBM Streams V4.1.
Big Data: Technical Introduction to BigSheets for InfoSphere BigInsightsCynthia Saracco
Introduces BigSheets, a spreadsheet-style tool for business users working with Big Data. BigSheets is part of IBM's InfoSphere BigInsights platform, which is based on open source technologies (e.g., Apache Hadoop) and IBM-specific technologies.
Streaming Analytics - Comparison of Open Source Frameworks and ProductsKai Wähner
Stream Processing is a concept used to create a high-performance system for rapidly building applications that analyze and act on real-time streaming data. Benefits, amongst others, are faster processing and reaction to real-time complex event streams and the flexibility to quickly adapt to changing business and analytic needs. Big data, cloud, mobile and internet of things are the major drivers for stream processing and streaming analytics.
This session discusses the technical concepts of stream processing and how it is related to big data, mobile, cloud and internet of things. Different use cases such as predictive fault management or fraud detection are used to show and compare alternative frameworks and products for stream processing and streaming analytics.
The audience will understand when to use open source frameworks such as Apache Storm, Apache Spark or Esper, and powerful engines from software vendors such as IBM InfoSphere Streams or TIBCO StreamBase. Live demos will give the audience a good feeling about how to use these frameworks and tools.
The session will also discuss how stream processing is related to Hadoop and statistical analysis with software such as SAS, Apache Spark’s MLlib or R language.
Gain New Insights by Analyzing Machine Logs using Machine Data Analytics and BigInsights.
Half of Fortune 500 companies experience more than 80 hours of system down time annually. Spread evenly over a year, that amounts to approximately 13 minutes every day. As a consumer, the thought of online bank operations being inaccessible so frequently is disturbing. As a business owner, when systems go down, all processes come to a stop. Work in progress is destroyed and failure to meet SLA’s and contractual obligations can result in expensive fees, adverse publicity, and loss of current and potential future customers. Ultimately the inability to provide a reliable and stable system results in loss of $$$’s. While the failure of these systems is inevitable, the ability to timely predict failures and intercept them before they occur is now a requirement.
A possible solution to the problem can be found is in the huge volumes of diagnostic big data generated at hardware, firmware, middleware, application, storage and management layers indicating failures or errors. Machine analysis and understanding of this data is becoming an important part of debugging, performance analysis, root cause analysis and business analysis. In addition to preventing outages, machine data analysis can also provide insights for fraud detection, customer retention and other important use cases.
StreamBase - Embedded Erjang - Erlang User Group London - 20th April 2011darach
A presentation delivered to the Erlang User Group in London demonstrating how to embed the erjang implementation of erlang into the StreamBase CEP engine, enabling extending StreamBase with erlang based extensions.
Tools for developing and monitoring SQL in DB2 for z/OSSurekha Parekh
Building optimal applications against DB2 for z/OS is often difficult. As most of the real issues relate to maintenancence and changes in the surrounding parameters it’s necessary to define a methodology which enables performance monitoring as well as optimization in existing code.
By knowing more about how the SQL in your shop performs, a lot can be done to to anticipate future problems, such as identifying performance bottlenecks before they impact users and add to IT costs. By building a performance history table, where you monitor performance as time passes, and changes in the environment occur, it’s possible to be proactive, and optimize before the costs turns red.
Introduction to Cloud Computing Data Center and Network Issues to Internet Research Lab at NTU, Taiwan. Another definition of cloud computing and comparison of traditional IT warehouse and current cloud data center. (ppt slide for download.) Take a opensource data center management OS, OpenStack, as an example. Underlying network issues inside a cloud DC.
Slides for the JavaOne 2012 session on Java batch for Cost Optimized Efficiency. This session talks about the importance of Java Batch in Enterprise computing and provides a reference architecture, overview of the JSR 352 and the WebSphere Batch solutions.
DM Radio Webinar: Adopting a Streaming-Enabled ArchitectureDATAVERSITY
Architecture matters. That's why today's innovators are taking a hard look at streaming data, an increasingly attractive option that can transform business in several ways: replacing aging data ingestion techniques like ETL; solving long-standing data quality challenges; improving business processes ranging from sales and marketing to logistics and procurement; or any number of activities related to accelerating data warehousing, business intelligence and analytics.
Register for this DM Radio Deep Dive Webinar to learn how streaming data can rejuvenate or supplant traditional data management practices. Host Eric Kavanagh will explain how streaming-first architectures can relieve data engineers from time-consuming, error-prone processes, ideally bidding farewell to those unpleasant batch windows. He'll be joined by Kevin Petrie of Attunity, who will explain why (with real-world story successes) streaming data solutions can keep the business fueled with trusted data in a timely, efficient manner for improved business outcomes.
DAT332_How Verizon is Adopting Amazon Aurora PostgreSQL for Enterprise WorkloadsAmazon Web Services
Learn how Verizon is adopting the Amazon Aurora PostgreSQL-compatible edition for their mission-critical applications. Verizon has a history of adopting best of breed database technologies as they continue to serve their 140M+ customers. As Verizon moves its enterprise applications to the cloud, database performance and reliability are the key considerations. With heavy dependence on commercial databases, learn how a large enterprise like Verizon evaluated performance, reliability and operational characteristics of Amazon Aurora, and was able to create internal momentum behind adoption of open source technologies by showcasing early wins. This session also highlights best practices for using Amazon Aurora and the newly-announced RDS Performance Insights.
As the core SQL processing engine of the Greenplum Unified Analytics Platform, the Greenplum Database delivers Industry leading performance for Big Data Analytics while scaling linearly on massively parallel processing clusters of standard x86 servers. This session reviews the product's underlying architecture, identify key differentiation areas, go deep into the new features introduced in Greenplum Database Release 4.2, and discuss our plans for 2012.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
9. Smarter Faster Cheaper CDR Processing
6 Billion CDRs per day, dedups over 15 days, processing latency from 12 hours to a few seconds
6 machines (using ½ processor capacity)
InfoSphere Streams
xDR Hub
Key Requirements:
Price/Performance and Scaling
9
10. Surveilance and Physical Security: TerraEchos (Business
Partner)
Use scenario
– State-of-the-art covert surveillance system
based on Streams platform
– Acoustic signals from buried fiber optic cables
are monitored, analyzed and reported in real time
for necessary action
– Currently designed to scale up to 1600 streams
of raw binary data
Requirement
– Real-time processing of multi-modal signals
(acoustics. video, etc)
– Easy to expand, dynamic
– 3.5M data elements per second
Winner 2010 IBM CTO Innovation Award
10
25. XML Support: Built Into SPL
XML type
– With XPath expressions and functions
to parse and manipulate XML data
– Convert XML to tuples
XQuery functions
– Use XML data on the fly
Adapters support XML format
32. Analytics: The Complex Event Processing Toolkit
MatchRegex Use patterns to detect composite events
– In streams of simple events (tuples)
– Easy-to-use regex-style pattern match of user-defined predicates
Integration in Streams allows CEP-style processing with high
performance and rich analytics