Tungsten University: Setup and Operate Tungsten ReplicatorsContinuent
Do you have the background necessary to take full advantage of Tungsten Replicator in your environments? Tungsten offers enterprise-quality replication features in an open source package hosted on Google Code. This virtual course teaches you how to set up innovative topologies that solve complex replication problems. We start with single MySQL servers running MySQL replication and show a simple path migration path to Tungsten.
Course Topics
- Checking host and MySQL prerequisites
- Downloading code from http://code.google.com/p/tungsten-replicator/
- Installation using the tungsten-installer utility
- Transaction filtering using standard filters as well as customized filters you write yourself
- Enabling and managing parallel replication
- Configuring multi-master and fan-in using multiple replication services
- Backup and restore integration
- Troubleshooting replication problems
- Logging bugs and participating in the Tungsten Replicator community
Replication is a powerful technology that takes knowledge and planning to use effectively. We give you the background that makes replication easier to set up, and allows you to take full advantage of the Tungsten Replicator benefits. Learn how to configure and use it more effectively for your projects in the cloud as well as on-premises hardware.
Tungsten University: Setup and Operate Tungsten ReplicatorsContinuent
Do you have the background necessary to take full advantage of Tungsten Replicator in your environments? Tungsten offers enterprise-quality replication features in an open source package hosted on Google Code. This virtual course teaches you how to set up innovative topologies that solve complex replication problems. We start with single MySQL servers running MySQL replication and show a simple path migration path to Tungsten.
Course Topics
- Checking host and MySQL prerequisites
- Downloading code from http://code.google.com/p/tungsten-replicator/
- Installation using the tungsten-installer utility
- Transaction filtering using standard filters as well as customized filters you write yourself
- Enabling and managing parallel replication
- Configuring multi-master and fan-in using multiple replication services
- Backup and restore integration
- Troubleshooting replication problems
- Logging bugs and participating in the Tungsten Replicator community
Replication is a powerful technology that takes knowledge and planning to use effectively. We give you the background that makes replication easier to set up, and allows you to take full advantage of the Tungsten Replicator benefits. Learn how to configure and use it more effectively for your projects in the cloud as well as on-premises hardware.
Virtual Machine Incorporated Sharing Model for Resource Utilizationidescitation
Cooperation and autonomy of virtual machines are
important features of virtualization where resources are
shared among virtual machines in a resource constrained
cloud environment. To facilitate resource sharing, this paper
proposes a resource sharing facility, called the VM Incorporated
RPC, that coordinates the remote procedure call (RPC) with
virtual machine based memory management. In this paper,
we present a process based resource sharing model in case of
collocated virtual machines. Evaluation of our algorithm
demonstrates that sharing of resources within collocated
virtual machines often results in utilizing almost 90% of the
resource potential when compared to inter machine sharing
which contributes a lesser amount of resource utilization.
This report was prepared based on my own experiance and for sleflearning , this is report is not to give you or guide to take decision . This benchmark report has been created to high you a rough idea about the Alibaba basic components. Taking this report benchmark for a comparison of other cloud competitors is at own user Risk.
Virtual Machine Incorporated Sharing Model for Resource Utilizationidescitation
Cooperation and autonomy of virtual machines are
important features of virtualization where resources are
shared among virtual machines in a resource constrained
cloud environment. To facilitate resource sharing, this paper
proposes a resource sharing facility, called the VM Incorporated
RPC, that coordinates the remote procedure call (RPC) with
virtual machine based memory management. In this paper,
we present a process based resource sharing model in case of
collocated virtual machines. Evaluation of our algorithm
demonstrates that sharing of resources within collocated
virtual machines often results in utilizing almost 90% of the
resource potential when compared to inter machine sharing
which contributes a lesser amount of resource utilization.
This report was prepared based on my own experiance and for sleflearning , this is report is not to give you or guide to take decision . This benchmark report has been created to high you a rough idea about the Alibaba basic components. Taking this report benchmark for a comparison of other cloud competitors is at own user Risk.
Amazon EC2 provides a broad selection of instance types to accommodate a diverse mix of workloads. In this session, we provide an overview of the Amazon EC2 instance platform, key platform features, and the concept of instance generations. We dive into the current generation design choices of the different instance families, including the General Purpose, Compute Optimized, Storage Optimized, Memory Optimized, and GPU instance families. We also detail best practices and share performance tips for getting the most out of your Amazon EC2 instances.
DevoxxUK: Optimizating Application Performance on KubernetesDinakar Guniguntala
Now that you have your apps running on K8s, wondering how to get the response time that you need ? Tuning a polyglot set of microservices to get the performance that you need can be challenging in Kubernetes. The key to overcoming this is observability. Luckily there are a number of tools such as Prometheus that can provide all the metrics you need, but here is the catch, there is so much of data and metrics that is difficult make sense of it all. This is where Hyperparameter tuning can come to the rescue to help build the right models.
This talk covers best practices that will help attendees
1. To understand and avoid common performance related problems.
2. Discuss observability tools and how they can help identify perf issues.
3. Look closer into Kruize Autotune which is a Open Source Autonomous Performance Tuning Tool for Kubernetes and where it can help.
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERSDeepak Shankar
Selecting the right Ethernet standard and configuring all the network devices in the embedded systems accurately is an extremely hard and rigorous job. The configuration depends on the topology, workloads of the connected devices, processing overhead at the switches, and the external interfaces. Network calculus, mathematical models and analytical techniques provide worst case execution time (WCET), but their probability of activity is extremely wide. This leads to overdesign which leads to higher costs, power consumption, weight, and size. Simulating the network is the best way to measure the throughput of the entire system. Digital system simulation provides better latency and throughput accuracy, but the accuracy is still limited because it does not consider the latency associated with the network OS, cybersecurity processing and scheduling. In many cases, these factors can reduce the throughput by 20-40%.
In this paper, we will present our research on modeling the entire Ethernet network, including the workloads, network flow control, scheduling, switch hardware, and software. To substantially increase the coverage and compare topologies, we have developed a set of benchmarks that provides coverage for different combination of deterministic, rate-constrained, and best effort traffic. During the presentation, we will cover the benchmarks, the list of attributes required to accurately model the traffic, nodes, switches, and the scheduler settings. We will also look at the statistics and reports required to make the configuration decision. In addition, we will discuss how the model must be constructed to study the impact of future requirements, failures, network intrusions, and security detection schemes.
Key Takeaways:
1. Learn how to efficiently use network simulation to design Ethernet systems
2. Develop a reusable benchmark and associated statistics to test different configurations
3. The role and impact of the CDT slots, guard band, send slope, idle slope, shuffle scheduling, flow control and virtual channels
Your Linux AMI: Optimization and Performance (CPN302) | AWS re:Invent 2013Amazon Web Services
Your AMI is one of the core foundations for running applications and services effectively on Amazon EC2. In this session, you'll learn how to optimize your AMI, including how you can measure and diagnose system performance and tune parameters for improved CPU and network performance. We'll cover application-specific examples from Netflix on how optimized AMIs can lead to improved performance.
Windows Azure + PHP, Java, MySQL, LOLCODE?
This session explores the interop possiblities Windows Azure has to offer starting from the architecture that leverages The Freedom of Choice and ending up with relevant examples and usage scenarios.
Building Continuous Application with Structured Streaming and Real-Time Data ...Databricks
One of the biggest challenges in data science is to build a continuous data application which delivers results rapidly and reliably. Spark Streaming offers a powerful solution for real-time data processing. However, the challenge remains in how to connect them with various continuous and real-time data sources, guaranteeing the responsiveness and reliability of data applications.
In this talk, Nan and Arijit will summarize their experiences learned from serving the real-time Spark-based data analytic solutions on Azure HDInsight. Their solution seamlessly integrates Spark and Azure EventHubs which is a hyper-scale telemetry ingestion service enabling users to ingress massive amounts of telemetry into the cloud and read the data from multiple applications using publish-subscribe semantics.
They’ll will cover three topics: bridging the gap of data communication model in Spark and data source, accommodating Spark to rate control and message addressing of data source, and the co-design of fault tolerance Mechanisms. This talk will share the insights on how to build continuous data applications with Spark and boost more availabilities of connectors for Spark and different real-time data sources.
How do you improve the Config Model? Where to use Windows Server AppFabric? How to provide a RoutingService in the Framework? How to enable dynamic apps with Discovery?
Hpe service virtualization 3.8 what's new chicago admJeffrey Nunn
Service Virtualization is an HPE branded solution that helps simulate and emulate the behavior of specific components in heterogeneous component-based applications such as API-driven apps, ERP apps, cloud-based apps, and web services/service-oriented architectures (SOA).
Value Proposition
Empowers developers and testers to easily automate, predict, accelerate and scale their application testing and delivery through virtualization and simulation of dependent components and services that are either off limits, unavailable, inaccessible, or with costly fees to access.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
7. Java ThreadMXBean to rescue..
●
The management interface for the thread system
of the JVM.
●
Java virtual machine implementation supports
measuring the CPU time for the current thread
or for any thread.
●
getCurrentThreadCpuTime() Returns the total
CPU time for the current thread in nanoseconds.
●
Does not account for thread sleep/idle time.
8. Sample Code Usage
if (Metering is enabled) { //check the system property (carbon.xml)
if(tenant!= carbon.super && context equals “services” or “webapps”) {
startCpuTime=threadMXBean.getCurrentThreadCpuTime() //get thread cpu time
}
}
//Executable code
if (Metering is enabled) {
if(tenant!= carbon.super && context equals “services” or “webapps”) {
endCpuTime = Get thread Cpu time
threadCpuTime = (endCpuTime – startCpuTime)/1000000 //to milliseconds
if(threadCpuTime> 0) Add cpuStatisticsEntry to Queue
}
}
9. CPU time of requests passing through
Tomcat to ODE
Thread Pool
Request
Request BPEL
Response Axis 2 Component
Tomcat Valves
Invoke
Tomcat Servlet Transport (Job)
Apache ODE
Internal
Thread Pool
Scheduler
Simple
10. ESB CPU Time …
Synapse
Proxy Service
In Sequence
Class
Endpoint
Mediator
Service
Consumer ServerWorker Provider
Out Sequence
Class
Mediator
ClientWorker
11. How it works ??
Thread Execution Component
CpuUsageStatisticsContainer
CpuUsageStatistics
Retreive retrieval Component
CpuUsageStatisticsEntries Queue
Thread CPU Time per Request Send
Existing
(To be used for Billing Publish Stratos Usage Agent
and Throttling) Component
14. BpsCpuUsageStatisticsContainer
Data Retriever <CpuUsageStatisticsEntry>
BPS Usage Agent Component
<<send>> SimpleScheduler
PublisherUtils
ode
Data Persister
<<send>>
Data Retriever EsbCpuUsageStatisticsContainer
<CpuUsageStatisticsEntry>
Data Retriever
ESB Usage Agent Component
ServerWorker ClientWorker
Stratos Usage
Agent
synapse-nhttp-
tranport
<<retrieve>>
CpuUsageStatisticsContainer
New Agent Component <CpuUsageStatisticsEntry>
TransportStatisticsContainer
<CpuUsageStatisticsEntry>
ThreadMXBean
CarbonStuckThreadDetection
Valve
Extensible Cpu Time Capturing Component
Tomcat Ext
15. Why different … ??
✔ Every Request does not go through Tomcat
servlet transport (eg: ESB uses nhttp requests)
✔ Some products uses their internal thread pools
and thread execution mechanisms. (eg : BPS
uses Apache Ode & ESB uses Apache Synapse)
✔ BAM script execution is handled by a separate
JVM
16. Solution
✔ Specifically capture the CPU time for the products
which has above constraints.
✔ Separate Component to retrieve product specific
CPU Usage Statistics and send them to Stratos
Usage Agent Component.
✔ Should add CPU Statistics to the same Usage
Agent instance, once it is registered as an OSGI
Service.
17. How to use tenant CPU usage Statistics
Metered CPU Statistics will be summarized in BAM.
Data will be used for billing and throttling.
Tenants will be throttled and billed at the end of the
month according to their CPU usage.
Summarized Data in BAM using a Hive Script
18. How they all fit - in …???
er Throttling
st to Serv
Reque Agent
Client
Metering Data
Store
Mediator Agent
( Optional )
Server Usage Agent
22. Problems
[1] Products are different
Thread handling is done differently in some
products. Had to remotely debug each an every
product's dependent apache code
(ode/synapse/hive/hadoop) and find the thread
execution part and capture the CPU time of each
request
Usually tenant information is not associated with
each request/response in apache code. I had to
send the tenant domain/id in certain cases as a
parameter in the invoke method from the particular
component or set it as a property so that I could
find which request comes from which tenant.
23. Problems Continued ..
[2] Retrieving data from different dependencies
Cannot add direct dependencies to ode/synapse
in Stratos usage agent component since it is not
used in every WSO2 product. I had to write new
component to do the data retrieval/persistence
tasks for each product, where I had to capture
CPU time, except for Tomcat.ext
Had to register UsageDataPersistenceManager in
usage agent as an OSGI service, so that
ESB/BPS components can add the CPU usage
data to the same instance that is used by the
org.wso2.carbon.usage.agent component's
persistence queue.
24. Problems Continued ..
[3] Accurate CPU Usage data ..??
Request execution live time and CPU time are very
close values, but CPU time is less than the live
time.
Thread sleep time is not captured as CPU time.
Thread CPU time is aggregated in ThreadMXBean.
Had to take the difference of thread CPU time
always for a particular request.
25. Problems Continued ..
[4] Performance Hit ...??
EnableMetring is set to 'false' by default in
carbon.xml. CPU time measuring code is executed
only if metering is enabled.
Tested for Tomcat.ext after metering is enabled.
No noticeable change in SOAPUI for a of web
service call burst.
Tested for several types of ESB proxy services
with and without code from Apache Jmeter and
there is no sign of change in TPS.
26. Performance Comparison with Apache Jmeter
ESB Echo Proxy Service – 1000 Samples
No of Threads : 100 Ramp-up period : 5s Loop Count : 10
Average Median 90% Line Min Max Error Throughput
3 3 6 2 26 0.0% 199.7/sec
3 3 6 2 18 0.0% 199.4/sec
Without Code 3 2 6 2 34 0.0% 199.6/sec
2 2 6 2 32 0.0% 199.3/sec
3 2 6 2 22 0.0% 199.7/sec
Average Median 90% Line Min Max Error Throughput
4 3 7 2 38 0.0% 199.1/sec
With Code 3 3 6 2 21 0.0% 199.3/sec
3 3 6 2 38 0.0% 199.6/sec
3 3 6 2 21 0.0% 199.5/sec
2 3 6 2 25 0.0% 199.0/sec
27. Performance Comparison with Apache Jmeter
ESB Echo Proxy Service – 1000 Samples
No of Threads : 50 Ramp-up period : 5s Loop Count : 20
Average Median 90% Line Min Max Error Throughput
3 3 4 2 19 0.0% 199.0/sec
3 3 4 2 13 0.0% 198.8/sec
Without Code 3 3 4 2 21 0.0% 197.5/sec
2 3 4 2 12 0.0% 199.0/sec
2 3 3 2 19 0.0% 199.3/sec
Average Median 90% Line Min Max Error Throughput
4 3 7 2 29 0.0% 196.9/sec
With Code 4 3 7 2 22 0.0% 199.3/sec
4 3 7 2 21 0.0% 199.5/sec
3 3 6 2 22 0.0% 198.1/sec
2 3 3 2 17 0.0% 199.2/sec
28. Performance Comparison with Apache Jmeter
ESB Proxy Service (Class mediator) – 1000 Samples
No of Threads : 100 Ramp-up period : 1s Loop Count : 10
Without With
Code Code
760.5/sec 766.8/sec
762.2/sec 749.1/sec
754.1/sec 746.8/sec
745.2/sec 746.3/sec
751.9/sec 751.3/sec
763.4/sec 748.5/sec
764.5/sec 757.6/sec
753.6/sec 749.6/sec
– Checked out for several types of Proxy services at the same
time and total throughput seems to be quite even.
29. Problems Continued ..
[5] Product/version problems
Different Products used different versions of the
same component
While project goes on several changes to
dependent components occurred
31. Automation Hackathon
With GREG team for almost 2 months.
Wrote a lot of test cases and ported old tests to
Clarity framework.
Learnt on Greg LCs, Rxts, APIs, URIs, Handlers,
Permissions etc.
Learnt to writie axis2 clients to test CRUD Operation
support and Discovery Proxy for GREG.
Automated several Support Patches.
33. Above them all ...
Obviously learnt a load of technical things.
How to take important architectural decisions and
flexibility of carbon architecture.
How to Communicate ideas with others and get the
necessary help.
Was able to get the help of lot of people and work in
several products Carbon, AS, ESB, BPS, GREG,
BAM, DSS, Stratos etc.
Learnt best practices in software engineering and
coding conventions.
34. Above them all ...
How to test software, automate the functionality and
how QA functions.
How to use mailing lists effectively.
How to manage time and meet deadlines.
How does a company function and how a company
prepares for a release.
Got to know a bunch of good friends/people.
Enjoyed every minute of it.