The document discusses various topics related to cloud computing, virtualization, and green IT. It provides definitions and perspectives on cloud computing, describes the differences between public and private clouds, and highlights challenges related to cloud adoption. Examples of cloud computing success stories and recent news in the cloud space are also mentioned.
This document provides an overview of cloud computing and virtualization trends. It discusses what cloud computing is by comparing it to electricity as a utility. The document outlines the benefits of cloud computing such as reduced costs, ability to scale up and down as needed, and pay per use. It also covers drivers of cloud computing like unused computing power at large tech companies. The document classifies cloud models and provides examples of infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It addresses potential impacts of cloud computing and dangers/concerns regarding privacy, security, performance, and challenges.
Cloud security jean pawluk ewf talk sept 2009atlowe
The document discusses cloud computing security. It begins by providing historical context on computing from mainframes to today's ubiquitous computing power. It then discusses the opportunities and hype around cloud computing while noting an important paradigm shift is occurring. The document outlines examples of cloud computing today and questions when organizations will fully adopt cloud services. It discusses security concerns regarding cloud computing including data location, compliance, and responsibility. Finally, it calls for a governance approach to cloud computing security and notes there are no simple solutions.
Do you need Cloud? An info session for a Belgian financial institutionGabriele Bozzi
Render unto Caesar…
Most of the speculative reasoning comes from SImon Wardley's great presentations. I just assembled what seems to be the relevant core motivation and some real-world use cases.
Cloud Computing is one of transformational technology shifts that is the most misunderstood. Many businesses, individuals fear how cloud would affect their daily lifes, from security, privacy and changes in their daily life. Fortunately, this is a technology that can be embraced in phases. Your business can seize this opportunity and make it as one of your competitive strategy.
This document provides an overview of cloud computing presented by Dan Haurey, President and Founder of Exigent Technologies. The agenda includes defining cloud computing, demystifying cloud terms and acronyms, making the business case for cloud, understanding options and conducting a proper return on investment analysis. Key points covered are public versus private cloud models, software as a service, platform as a service and infrastructure as a service models, benefits to stakeholders like reduced costs and increased productivity, and factors to consider when vetting cloud providers. The presentation promotes Exigent's private cloud "Turnkey Cloud" platform and shares a success story with Tri-County Orthopedics who moved to Exigent's cloud.
IBM developed Sametime 3D to allow users to collaborate in virtual worlds. Sametime 3D integrates virtual worlds with Lotus Sametime for communication and collaboration. It provides 3D meeting spaces that users can access via avatar to hold presentations, brainstorm ideas, and work on projects together in real-time across distances.
The document provides an overview of designing for smaller screens, including mobile screens. It discusses viewports, media queries, mobile layouts, and CSS techniques for mobile apps. Some key points covered include using viewport meta tags to control zooming and scaling, employing media queries to apply different CSS based on device characteristics, designing for a single column layout with top or bottom navigation bars, and leveraging CSS features like rounded corners, shadows, and gradients on mobile. Transition effects and animations are also discussed as techniques for mobile interfaces.
This document provides an overview of cloud computing and virtualization trends. It discusses what cloud computing is by comparing it to electricity as a utility. The document outlines the benefits of cloud computing such as reduced costs, ability to scale up and down as needed, and pay per use. It also covers drivers of cloud computing like unused computing power at large tech companies. The document classifies cloud models and provides examples of infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It addresses potential impacts of cloud computing and dangers/concerns regarding privacy, security, performance, and challenges.
Cloud security jean pawluk ewf talk sept 2009atlowe
The document discusses cloud computing security. It begins by providing historical context on computing from mainframes to today's ubiquitous computing power. It then discusses the opportunities and hype around cloud computing while noting an important paradigm shift is occurring. The document outlines examples of cloud computing today and questions when organizations will fully adopt cloud services. It discusses security concerns regarding cloud computing including data location, compliance, and responsibility. Finally, it calls for a governance approach to cloud computing security and notes there are no simple solutions.
Do you need Cloud? An info session for a Belgian financial institutionGabriele Bozzi
Render unto Caesar…
Most of the speculative reasoning comes from SImon Wardley's great presentations. I just assembled what seems to be the relevant core motivation and some real-world use cases.
Cloud Computing is one of transformational technology shifts that is the most misunderstood. Many businesses, individuals fear how cloud would affect their daily lifes, from security, privacy and changes in their daily life. Fortunately, this is a technology that can be embraced in phases. Your business can seize this opportunity and make it as one of your competitive strategy.
This document provides an overview of cloud computing presented by Dan Haurey, President and Founder of Exigent Technologies. The agenda includes defining cloud computing, demystifying cloud terms and acronyms, making the business case for cloud, understanding options and conducting a proper return on investment analysis. Key points covered are public versus private cloud models, software as a service, platform as a service and infrastructure as a service models, benefits to stakeholders like reduced costs and increased productivity, and factors to consider when vetting cloud providers. The presentation promotes Exigent's private cloud "Turnkey Cloud" platform and shares a success story with Tri-County Orthopedics who moved to Exigent's cloud.
IBM developed Sametime 3D to allow users to collaborate in virtual worlds. Sametime 3D integrates virtual worlds with Lotus Sametime for communication and collaboration. It provides 3D meeting spaces that users can access via avatar to hold presentations, brainstorm ideas, and work on projects together in real-time across distances.
The document provides an overview of designing for smaller screens, including mobile screens. It discusses viewports, media queries, mobile layouts, and CSS techniques for mobile apps. Some key points covered include using viewport meta tags to control zooming and scaling, employing media queries to apply different CSS based on device characteristics, designing for a single column layout with top or bottom navigation bars, and leveraging CSS features like rounded corners, shadows, and gradients on mobile. Transition effects and animations are also discussed as techniques for mobile interfaces.
This document summarizes a presentation on cloud computing. It discusses how cloud computing represents the 4th major platform shift after OLTP, PCs, and the web. It outlines different cloud service models like SaaS, PaaS, and DaaS. Key enabling technologies for cloud computing are also summarized, including server virtualization, grid computing, fast networks, and open source development tools. Traditional IT is contrasted with cloud computing models. The document then provides a taxonomy of the cloud including infrastructure, platform, services, and applications. Speakers from companies including Amazon, Google, IBM, and Microsoft then discuss their cloud computing offerings and visions.
Cloud computing refers to applications and services delivered over the Internet. It allows users to access files, personal data, and applications from any device with Internet access. Key benefits include reduced costs, flexibility, and scalability. Challenges include availability of data if a provider fails, data lock-in to specific providers, and performance unpredictability. However, opportunities exist through standardization, encryption, and improved virtualization support. The future of cloud computing is promising with many companies investing heavily and forecasts of widespread adoption over the next few years.
This document provides an introduction and overview of cloud computing. It defines cloud computing as applications and services delivered over the internet, as well as the hardware and systems that provide those services. The document discusses common cloud services like SaaS, utility computing using Amazon EC2 as an example, and the key characteristics of cloud computing. It also covers challenges of cloud computing like availability, data security, and performance unpredictability, as well as the growth and future potential of cloud computing.
Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., computer networks, servers, storage, applications and services),
NCOIC Enterprise Cloud Computing - Kevin JacksonGovCloud Network
The document summarizes a discussion on enterprise cloud computing that took place at the World Summit of Cloud Computing. It discusses three approaches that were proposed: [1] establishing a "standards body" to develop unified cloud interface standards, [2] adopting existing proven cloud technologies as standards, and [3] taking a "customer driven" approach where industry use cases define the standards. While each approach has benefits, a hybrid approach is suggested that incorporates elements of all three.
If you are a consumer of project information this presentation is directed at you. The Project Control Data Warehouse is an 'open' type project and an instance of the ODWM. Thanks for taking a look!
This document discusses cloud computing and provides an overview of key topics including definitions of cloud computing, reasons for its importance, different types of cloud services (IaaS, PaaS, SaaS), what cloud computing can provide, and important considerations. The presentation notes that cloud computing is still in early stages but promises huge benefits including cost savings, scalability, and complementing service-oriented architectures.
Introduction to Microsoft Azure. Covers the change to a cloud development paradigm. Motivations for the change, Pricing structures, and an exercise in IT portfolio evaluation.
This document discusses cloud computing concepts including software as a service (SaaS), platform as a service (PaaS), hardware as a service (HaaS), and virtualization. It outlines the traditional computing stack versus the virtualized cloud computing stack. Some advantages of cloud computing are lower costs, improved performance, unlimited storage, and availability, but there are also security, privacy, and legal issues to consider. Major technology companies are investing billions of dollars in cloud computing research and development.
The document discusses emerging trends in software and services including:
1) Software as a Service and cloud computing which allows software to be delivered and consumed "as a service" with service level agreements.
2) The growth of massive data centers which are becoming large physical assets requiring significant capital expenditures.
3) The rise of "Dev-signers" or designer-developers who are combining development and design skills.
4) The integration of software and services will be key as local software interacts with internet services to provide combined capabilities.
Presentation from JAOO 09 Australia on how to design software architectures to maxmise sustainable outcomes by limiting power and resource usage. Uses the Virtualisation Maturity Model (see Architecture Journal edition 18).
This document provides an overview of cloud computing. It begins with Gartner's definition of cloud computing as delivering elastic IT capabilities as a service using internet technologies. The document then discusses the history of cloud computing from John McCarthy's vision in 1961 to modern cloud services from Amazon, Google, and Microsoft. It explores how cloud computing solves the scalability problem by allowing resources to rapidly scale up or down as needed. The document outlines the key cloud service models of IaaS, PaaS, and SaaS and provides examples. It also shares success stories of companies like Zynga and Netflix leveraging cloud computing. Finally, it discusses potential cost savings and benefits of cloud computing through case studies.
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1Ruud Ramakers
This document discusses cloud computing. It begins by defining cloud computing and discussing its key characteristics like on-demand self-service, ubiquitous network access, resource pooling, rapid elasticity, and pay-per-use pricing. It then discusses how technological advances enabled cloud computing and examples of cloud computing variants and deployment models. The document also covers benefits and opportunities of cloud computing for customers as well as challenges and issues for both customers and suppliers. It provides some examples of large companies and their approaches to cloud computing.
Cloud computing is a buzzword used to describe concepts like utility computing and grid computing that have existed for decades, allowing users to access computing resources like servers, storage, and databases over the internet. While there is no clear definition, cloud computing typically involves delivering hosted services over the internet, including software, platforms, and infrastructure. The document discusses the history and types of cloud computing, as well as considerations around building versus buying applications and whether to use on-premise or cloud-based systems.
Let's dive into cloud computing. We are going to do a high-level review of a few components of GCP in the scope of Go application development and deployment.
This document summarizes an eBay presentation on next generation data centers and cloud computing technologies. It provides examples of how eBay has leveraged these technologies, including virtualizing and scaling their database to handle extreme growth. The presentation discusses how next generation data centers are more than just technologies, and focus on running business processes driven by service level agreements.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
This document summarizes a presentation on cloud computing. It discusses how cloud computing represents the 4th major platform shift after OLTP, PCs, and the web. It outlines different cloud service models like SaaS, PaaS, and DaaS. Key enabling technologies for cloud computing are also summarized, including server virtualization, grid computing, fast networks, and open source development tools. Traditional IT is contrasted with cloud computing models. The document then provides a taxonomy of the cloud including infrastructure, platform, services, and applications. Speakers from companies including Amazon, Google, IBM, and Microsoft then discuss their cloud computing offerings and visions.
Cloud computing refers to applications and services delivered over the Internet. It allows users to access files, personal data, and applications from any device with Internet access. Key benefits include reduced costs, flexibility, and scalability. Challenges include availability of data if a provider fails, data lock-in to specific providers, and performance unpredictability. However, opportunities exist through standardization, encryption, and improved virtualization support. The future of cloud computing is promising with many companies investing heavily and forecasts of widespread adoption over the next few years.
This document provides an introduction and overview of cloud computing. It defines cloud computing as applications and services delivered over the internet, as well as the hardware and systems that provide those services. The document discusses common cloud services like SaaS, utility computing using Amazon EC2 as an example, and the key characteristics of cloud computing. It also covers challenges of cloud computing like availability, data security, and performance unpredictability, as well as the growth and future potential of cloud computing.
Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., computer networks, servers, storage, applications and services),
NCOIC Enterprise Cloud Computing - Kevin JacksonGovCloud Network
The document summarizes a discussion on enterprise cloud computing that took place at the World Summit of Cloud Computing. It discusses three approaches that were proposed: [1] establishing a "standards body" to develop unified cloud interface standards, [2] adopting existing proven cloud technologies as standards, and [3] taking a "customer driven" approach where industry use cases define the standards. While each approach has benefits, a hybrid approach is suggested that incorporates elements of all three.
If you are a consumer of project information this presentation is directed at you. The Project Control Data Warehouse is an 'open' type project and an instance of the ODWM. Thanks for taking a look!
This document discusses cloud computing and provides an overview of key topics including definitions of cloud computing, reasons for its importance, different types of cloud services (IaaS, PaaS, SaaS), what cloud computing can provide, and important considerations. The presentation notes that cloud computing is still in early stages but promises huge benefits including cost savings, scalability, and complementing service-oriented architectures.
Introduction to Microsoft Azure. Covers the change to a cloud development paradigm. Motivations for the change, Pricing structures, and an exercise in IT portfolio evaluation.
This document discusses cloud computing concepts including software as a service (SaaS), platform as a service (PaaS), hardware as a service (HaaS), and virtualization. It outlines the traditional computing stack versus the virtualized cloud computing stack. Some advantages of cloud computing are lower costs, improved performance, unlimited storage, and availability, but there are also security, privacy, and legal issues to consider. Major technology companies are investing billions of dollars in cloud computing research and development.
The document discusses emerging trends in software and services including:
1) Software as a Service and cloud computing which allows software to be delivered and consumed "as a service" with service level agreements.
2) The growth of massive data centers which are becoming large physical assets requiring significant capital expenditures.
3) The rise of "Dev-signers" or designer-developers who are combining development and design skills.
4) The integration of software and services will be key as local software interacts with internet services to provide combined capabilities.
Presentation from JAOO 09 Australia on how to design software architectures to maxmise sustainable outcomes by limiting power and resource usage. Uses the Virtualisation Maturity Model (see Architecture Journal edition 18).
This document provides an overview of cloud computing. It begins with Gartner's definition of cloud computing as delivering elastic IT capabilities as a service using internet technologies. The document then discusses the history of cloud computing from John McCarthy's vision in 1961 to modern cloud services from Amazon, Google, and Microsoft. It explores how cloud computing solves the scalability problem by allowing resources to rapidly scale up or down as needed. The document outlines the key cloud service models of IaaS, PaaS, and SaaS and provides examples. It also shares success stories of companies like Zynga and Netflix leveraging cloud computing. Finally, it discusses potential cost savings and benefits of cloud computing through case studies.
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1Ruud Ramakers
This document discusses cloud computing. It begins by defining cloud computing and discussing its key characteristics like on-demand self-service, ubiquitous network access, resource pooling, rapid elasticity, and pay-per-use pricing. It then discusses how technological advances enabled cloud computing and examples of cloud computing variants and deployment models. The document also covers benefits and opportunities of cloud computing for customers as well as challenges and issues for both customers and suppliers. It provides some examples of large companies and their approaches to cloud computing.
Cloud computing is a buzzword used to describe concepts like utility computing and grid computing that have existed for decades, allowing users to access computing resources like servers, storage, and databases over the internet. While there is no clear definition, cloud computing typically involves delivering hosted services over the internet, including software, platforms, and infrastructure. The document discusses the history and types of cloud computing, as well as considerations around building versus buying applications and whether to use on-premise or cloud-based systems.
Let's dive into cloud computing. We are going to do a high-level review of a few components of GCP in the scope of Go application development and deployment.
This document summarizes an eBay presentation on next generation data centers and cloud computing technologies. It provides examples of how eBay has leveraged these technologies, including virtualizing and scaling their database to handle extreme growth. The presentation discusses how next generation data centers are more than just technologies, and focus on running business processes driven by service level agreements.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
4. Hot HPC Topics
• Cloud Computing: Buzz- and Fuzz (y) Word!
• Virtualization:Virtualized Season
5. Hot HPC Topics
• Cloud Computing: Buzz- and Fuzz (y) Word!
• Virtualization:Virtualized Season
• Green IT: Think Green, Do Green, Feel Green
6. Hot HPC Topics
• Cloud Computing: Buzz- and Fuzz (y) Word!
• Virtualization:Virtualized Season
• Green IT: Think Green, Do Green, Feel Green
• Parallel Programming is Important
8. Cloud Computing: Buzz- and Fuzz (y) Word!
“... computation may someday be organized as a public utility ...”
John McCarthy, 1960
9. Cloud Computing: Buzz- and Fuzz (y) Word!
“... computation may someday be organized as a public utility ...”
John McCarthy, 1960
“Cloud Computing can take on different shapes depending on the
viewer, and often seems a little fuzzy at the edges.”
JamesO’Brien
10. Cloud Computing: Buzz- and Fuzz (y) Word!
“... computation may someday be organized as a public utility ...”
John McCarthy, 1960
“Cloud Computing can take on different shapes depending on the
viewer, and often seems a little fuzzy at the edges.”
JamesO’Brien
“A cloud is a pool of virtualized resources that can host variety of
different workloads, allow workloads to be deployed and scaled-out
quickly, allocate resources when needed, and support redundancy. ”
Greg Boss et al., IBM
11. Cloud Computing: Buzz- and Fuzz (y) Word!
“... computation may someday be organized as a public utility ...”
John McCarthy, 1960
“Cloud Computing can take on different shapes depending on the
viewer, and often seems a little fuzzy at the edges.”
JamesO’Brien
“A cloud is a pool of virtualized resources that can host variety of
different workloads, allow workloads to be deployed and scaled-out
quickly, allocate resources when needed, and support redundancy. ”
Greg Boss et al., IBM
My Own Definition
• Visualizable, Configurable, Scalable, and also Payable Internet-based Computing Model
15. Something about Private Clouds
• Need more benefits so invest more resources
• Buy more and own more (Good ?)
16. Something about Private Clouds
• Need more benefits so invest more resources
• Buy more and own more (Good ?)
• Objective: ROI [+] while TCO [-]
17. Something about Private Clouds
• Need more benefits so invest more resources
• Buy more and own more (Good ?)
• Objective: ROI [+] while TCO [-]
• TCO = Investment (budget, energy, man power, maintenance, ...)
18. Something about Private Clouds
• Need more benefits so invest more resources
• Buy more and own more (Good ?)
• Objective: ROI [+] while TCO [-]
• TCO = Investment (budget, energy, man power, maintenance, ...)
• ROI = Benefits
19. Something about Private Clouds
• Need more benefits so invest more resources
• Buy more and own more (Good ?)
• Objective: ROI [+] while TCO [-]
• TCO = Investment (budget, energy, man power, maintenance, ...)
• ROI = Benefits
• Let’s see
20. Something about Private Clouds
• Need more benefits so invest more resources
• Buy more and own more (Good ?)
• Objective: ROI [+] while TCO [-]
• TCO = Investment (budget, energy, man power, maintenance, ...)
• ROI = Benefits
• Let’s see
• Need someday but own forever
21. Something about Private Clouds
• Need more benefits so invest more resources
• Buy more and own more (Good ?)
• Objective: ROI [+] while TCO [-]
• TCO = Investment (budget, energy, man power, maintenance, ...)
• ROI = Benefits
• Let’s see
• Need someday but own forever
• You are a new investor / a small business
22. Something about Private Clouds
• Need more benefits so invest more resources
• Buy more and own more (Good ?)
• Objective: ROI [+] while TCO [-]
• TCO = Investment (budget, energy, man power, maintenance, ...)
• ROI = Benefits
• Let’s see
• Need someday but own forever
• You are a new investor / a small business
• Trial and Error!
23. Timeline
Grid Computing Utility Computing Software-as-a-Service Cloud Computing
(SaaS)
Volunteer HP’s Google App Engine
Computing Utility Data
Amazon EC2
(e.g., GIMPS and Center (UDC)
SETI@home)
Google Apps IBM Blue Cloud
Sun Grid Microsoft SSDS
Globus Toolkit Computing saas-showplace.com
(from GT2 - Utility
GoGrid
GT4) (Network.com) Singapore’s AxSaaS
[virtual server] [virtual platforms] [virtual applications] [virtual things]
Early 1990s Late 1990s 2000 2008
Reference: wikipedia.com
24. Learning from the Past
Grid Computing Utility Computing Software-as-a-Service
[virtual server] [virtual platforms] [virtual applications]
25. Learning from the Past
Grid Computing Utility Computing Software-as-a-Service
“A single VO with a single virtual
servers”
VO = Virtual organization
PO = Physical organization
Advantage
• Collaboration
• Sharing
• Saver
• Independent policies / PO
Disadvantage
• Inflexible in other POs
• Need the isolation
• Who’ll give me more
• Who’ll take care of me
• No incentive
[virtual server] [virtual platforms] [virtual applications]
26. Learning from the Past
Grid Computing Utility Computing Software-as-a-Service
“A single VO with a single virtual
“An economic model: how to
servers”
VO = Virtual organization manage idled time (80%)”
PO = Physical organization
Advantage
Advantage
• Sell your garbage
Disadvantage
• Collaboration • Inflexible (on customer-side)
• Sharing
• Saver
• Independent policies / PO
Disadvantage
• Inflexible in other POs
• Need the isolation
• Who’ll give me more
• Who’ll take care of me
• No incentive
[virtual server] [virtual platforms] [virtual applications]
27. Learning from the Past
Grid Computing Utility Computing Software-as-a-Service
“A single VO with a single virtual “Less on-premise Less budget”
“An economic model: how to
servers”
VO = Virtual organization manage idled time (80%)”
Advantage
PO = Physical organization
Advantage • Less (or no) software
• Sell your garbage development
Advantage
Disadvantage • Less (or no) hosting
• Collaboration • Inflexible (on customer-side) • Less maintenance (e.g., update)
• Sharing • Choose the right app
• Saver Disadvantage
• Independent policies / PO • Limitation on the other sides
Disadvantage • Only applications
• Inflexible in other POs
• Need the isolation
• Who’ll give me more
• Who’ll take care of me
• No incentive
[virtual server] [virtual platforms] [virtual applications]
29. Google Trends : 2004 - October 2008
Reference: http://www.google.com/trends, Oct 7, 2008
30. Google Trends : 2008
Reference: http://www.google.com/trends, Oct 7, 2008
31. Google Trends : 2008
Reference: http://www.google.com/trends, Oct 7, 2008
32. Google Trends : 2008 (Only Grid)
สวัสดี
Reference: http://www.google.com/trends, Oct 7, 2008
33. Players in the Clouds
Cloud Customers Cloud Supporters
Cloud Distribution * (e.g., Akamai, LimeLight, CDNetworks) Platform VMO,
Citrix XenServer,
Software-as-a-Service (SaaS) Google Apps, Microsoft S+S MS Windows Cloud,
MS VMM,
Google App Engine, Force.com, Citrix Cloud Center,
Platform-as-a-Service (PaaS) IBM IT Factory, 10gen, Mosso Intel VT vs AMD-V,
IBM Blue Cloud, Amazon EC2, VMware VDC-OS,
Infrastructure-as-a-Service (IaaS)
GoGrid, Sun Grid Google MapReduce,
Amazon S3, Nirvanix SDN, Intel Parallel Studio,
data-Storage-as-a-Service (dSaaS) Flickr, Mosso Cloud FS Oracle Database 11g
and etc.
Cloud Providers **
* Based on “Benefiting from Cloud Compuitng Technology Trends”, Gear6
** Based on “Cloud Computing with Linux”, IBM
37. Ten Challenges
1. Security 6. Power Consumption
2. Logging 7. Latency
3. Platform-dependency 8. Legacy Internal Cloud
4. Reliability 9. National Laws
5. Standard (Inter-Cloud) 10. Internal Politics
Based on Stacey Higginbotham, “10 Reasons Enterprises Aren’t Ready to Trust Cloud”, Gigaom
38. Virtualization: Virtualized Season
• Characteristics • Applying the Virtualization
• Virtualized Resources • Server Consolidation
•
• Heterogeneity
Working outside firewall
• Sharing & Isolation + Security
• Snapshot • Resource Planning
• Migration • Load-balancing
• Green IT
• High Availability
39. Green IT: Think Green, Do Green, Feel Green
• Green Approaches * • Blognone’s News
• Green use • กูเกิลรักษ์โลกสีเขียว
•
•
จัดอันดับซูเปอร์คอมพิวเตอร์ประหยัดไฟ
Green disposal
• Xeon ใหม่ไร้สารฮาโลเจน
• Green design
• Data center จะสร้างมลพิษมากกว่าอุตสาหกรรมการบิน
• Green manufacturing ในปี 2020
• เปลี่ยนแผ่นซิลิคอนเวเฟอร์ให้เป็นเซลล์รับพลังงานแสง
อาทิตย์
• OLPC เป็น quot;สุดยอดแล็ปท็อปสําหรับสิ่งแวดล้อมquot; ของโลก
• โปรดติตตามต่อไป
* Reference: San Murugesan “Harnessing Green IT Principle and Pratices”, IEEE ITPro, 2008
41. Parallel Programming is Important!
Unsustainable
(overheating + power consumption)
Parallelism is the primary method
Doubling every 18 months
Intel x86
8086, 8088
J. Hennessy and D. Patterson, “Computer Architecture: A Quantitive Approach”,
4th edition, Morgan Kauffman, 2007
42. Parallel Programming
• MPI / PVM
• OpenMP
• Multithreading
• Intel Threading Building Blocks
• Intel Parallel Studio
• Microsoft Robotics Studio
• Microsoft Parallel FX
• Google’s MapReduce / Hadoop
43. Any Questions ?
Contact Me
Sivadon Chaisiri
http://www.blognone.com/user/javaboom
http://javaboom.wordpress.com
EMAIL: javaboom@gmail.com
MSN: javaboom@hotmail.com