SlideShare a Scribd company logo
Machine Learning concepts	for	
software	monitoring
Lior Redlus
Co-founder	and	Chief	Scientist
Coralogix
About	Myself
• 31yr.	Scientist	at	heart.
• B.Sc and	M.Sc in	Neuroscience	and	Information	Processing	(BIU)
• Co-founder	and	Chief	Scientist	@	Coralogix
About	Coralogix
• A	Machine	Learning	platform	for	software	Log	Analysis
• Log	Management	already	included:	indexing,	querying,	filtering,	
alerting	etc.
• Coralogix Analytics:
• Turns	your	data	into	patterns	and	flows
• Gives	you	deep	insights	on	your	system
• Automatically	detects	production	problems
In	this	talk…
• We’ll	explore	some	challenges	in	software	logs	today
• Have	an	overview	of	machine	learning	and	some	use	cases
• Suggest	a	fully-automatic	algorithm	for	anomaly	detection	in	logs
Schedule:
• Logs	today
• Machine	Learning	to	the	rescue!
• Types	of	Machine	Learning
• Applying	to	Log	Records
• Possible	log	analysis	pipeline
Logs	today	(1)
• What	do	we	use	them	for?
• Debugging
• Security
• Compliance
• User	analytics
• and	many	more!
• Two	use	cases	stand	out:
• Production	Monitoring	(70%)
• Production	Troubleshooting	(67%)
Logs	today	(2)
• Open-source	software	accelerates	
development
• Cloud	enables	massive	scale
• Even	small	companies	are	
generating	huge	amounts	of	logs
• The	growth	is	exponential!
Logs	today	(3)
• Log	Management	(and	Big	Data)	approach:
1. Collect	everything!
2. Don’t	worry,	we’ll	know	what	to	do	when	we	need	it
• Or	will	we..?
Logs	today	(4)
• The	problem	with	Log	Management:
• Humans	do	the	analysis
• And	humans	are	bad	at…
• Identifying	complex	relationships
• Noticing	small	(but	important)	changes
• Staying	100%	in	focus	all	the	time
Logs	today	(5)
• Too	much	time	is	wasted	on	FINDING issues	
instead	of	FIXING them
• Most	DevOps spend	>70%	of	issue	resolution	
time	just	to	find	what	went	wrong!
• Problem:
Log	Management	does	not	have	a	“brain”
• Solution:
Give	it	a	brain!
In	other	words:	welcome	to	Log	Analytics
Logs	today	(6)
Schedule:
• Logs	today
• Machine	Learning	to	the	rescue!
• Types	of	Machine	Learning
• Applying	to	Log	Records
• Possible	log	analysis	pipeline
Machine	Learning	to	the	rescue
• What	is	Machine	Learning?
"Field	of	study	that	gives	computers	the	ability	to	learn	without	being	
explicitly	programmed.“
- Arthur	Samuel,	pioneer	of	Machine	Learning,	1959
Machine	Learning	to	the	rescue
• Traditional	coding:
• You	have	a	model	of	the	world
• You	write	code	that	explicitly	represents	this	model
• The	code	behaves	exactly	as	expected
• Need	to	manually	update	the	code	in	a	changing	world
Machine	Learning	to	the	rescue
• Machine	Learning:
• You	have	loose	concepts	about	the	world	(or	even	none!)
• You	write	code	that	learns	the	data	and	builds	models	of	the	world
• The	exact	behavior	of	the	code	is	not	known,	but	generally	works	well
• Can	automatically	update	the	model	as	needed!
• How	well?
• Much	faster	than	humans
• Sometimes	with	better	accuracy!
Schedule:
• Logs	today
• Machine	Learning	to	the	rescue!
• Types	of	Machine	Learning
• Applying	to	Log	Records
• Possible	log	analysis	pipeline
• Supervised	Learning:
• Uses	data	with	clearly-defined	output	(“labeled	data”)
• Machine	learns	explicitly	through	right	and	wrong	answers
• Two	main	types:
• Regression – Predict	continuous	values	based	on	sets	of	(correlated)	data
• Classification	– Predict	the	class	of	an	item	based	on	its	properties
Types	of	Machine	Learning	- Supervised
• Regression	1	– Given	the	temperature	and	yogurt	sold
• Predict	the	temperature	based	on	amount	of	yogurt	sold
• Linear	regression:
Types	of	Machine	Learning	– Regression	(1)
Temperature	(F)
Frozen	yogurt	sold	(lbs)
• Regression	2	– Given	cups	of	coffee	sold	per	10	minutes
• Predict	how	many	cups	are	sold	on	any	given	time	of	the	day
• Linear	regression:
• Polynomial	regression:
Types	of	Machine	Learning	– Regression	(2)
Time	of	day	(hours)
Cups	of	coffee	sold
• Classification:	can	we	automatically	identify	the	type	of	an	iris?
• Assumption:	we	can	differentiate	iris	types	by	their	leaves	sizes
Types	of	Machine	Learning	– Classification	(1)
Types	of	Machine	Learning	– Classification	(2)
• Classification:	given	leaves	sizes	of	irises	(Fisher’s data	set,	1936)
• Predict	which	type	is	an	iris	based	on	its	leaves
Types	of	Machine	Learning	– Classification	(3)
• Classification:	Fisher’s iris	data	set
• Support	Vector	Machine	(SVM)	achieves	73%	accuracy!
Sepal	Width	(cm)
Sepal	Length	(cm)
SVM	with	
linear	kernel
Sepal	Length	(cm)
Sepal	Width	(cm)
setosa
versicolor
virginica
• Reinforcement	(reward-based)	Learning:
• A	set	of	rules	defines	interaction	with	the	environment
• “Good”	actions	may	grant	rewards
• “Bad”	actions	may	reduce	rewards
• Machine	tries	to	maximize	this	score
• Used	in	game	bots,	recommender	systems	etc.
Types	of	Machine	Learning	– Reinforcement	(1)
Types	of	Machine	Learning	– Reinforcement	(2)
• Recommender	systems:
• Build	profiles	for	items	and	for	users
• Recommend	an	item	to	a	user	based	on	previous	purchases
• Gain	rewards	when	users	click	on	recommended	items
• Update	profiles	based	on	recommendations,	ratings	etc.
Types	of	Machine	Learning	– Reinforcement	(3)
• Generally	speaking,	recommender	systems	offer	similar	things	to	
similar	users:
Jim
Bob
Types	of	Machine	Learning	– Unsupervised	(1)
• Problem:
• Supervised	learning	is	good,	but	requires	labeled	data
• Most	data	in	the	world	is	not	labeled,	there’s	no	right/wrong	answer
• Labeling	requires	human	effort	à tedious	and	expensive
• Unsupervised	Learning:
• The	machine	automatically	recognizes	relationships	in	the	data
• No	right	or	wrong	answers	are	given
• Many	times	used	to	enhance	Supervised	Learning
• Some	approaches	include:
• Clustering	algorithms:	k-means,	k-nearest-neighbors	etc.
• Anomaly	detection	of	rare	events
• Deep	learning	(for	pretty	much	everything…)
• Deep	Learning	approach:
• Learn	from	a	lot	of	non-labeled	data
• Learn	highly	non-linear	correlations	(represent	complex	relationships)
• Surprisingly	good	results	for	many	applications!
Types	of	Machine	Learning	– Unsupervised	(2)
Types	of	Machine	Learning	– Unsupervised	(3)
• Deep	Learning:	can	we	automatically	cluster	digits	together?
• Data:	60,000	b/w	20x20	pixel	images	of	hand-written	digits
• Each	image	is	“flattened”	to	a	1D	vector	of	400	floating	point	values	[0..1]
[0.0,	0.0,	0.01,	0.07,	0.07,	0.07,	0.49,	0.65,	1.0,	0.97,	…,	0.0,	0.0]
Types	of	Machine	Learning	– Unsupervised	(4)
• Deep	Learning:	can	we	automatically	cluster	digits	together?
• Image	vectors	are	fed	to	the	neural	network
[0.0,	0.0,	0.01,	0.07,	0.07,	0.07,	0.49,	0.65,	1.0,	0.97,	…,	0.0,	0.0]
.
.
.
.								.									.									.									.								.							.													.						.
Types	of	Machine	Learning	– Unsupervised	(5)
• Deep	Learning:	can	we	automatically	cluster	digits	together?
• The	neural	network	automatically	learns	features	of	the	images
• Each	neuron	“lights	up”	when	it	recognizes	a	feature	in	the	previous	layer
round	edges
vertical	lines
diagonal	lines
… etc …
.
.
Types	of	Machine	Learning	– Unsupervised	(6)
• Deep	Learning:	can	we	automatically	cluster	digits	together?
• The	last	layer	recognizes	highly	complex	features	of	the	image:	the	digits!
• This	method	achieves	an	amazing	0.2%	error	rate in	this	task!
[0.0,	0.0,	0.01,	0.07,	0.97,	…,	0.0,	0.0]
3
1
Output:
1
Schedule:
• Logs	today
• Machine	Learning	to	the	rescue!
• Types	of	Machine	Learning
• Applying	to	Log	Records
• Possible	log	analysis	pipeline
Applying	to	Log	Records	(1)
• Problems:
• Log	data	is	very	redundant
• Hard	to	find	the	important	events
• Rare	logs	are	a	needle	in	the	haystack
• Also:
• Actions	in	the	system	are	represented	by	a	series	of	logs	records
• But	other	logs	interrupt	the	visual	flow
• Tracing	the	logs	of	a	complete	action	is	hard
Applying	to	Log	Records	(2)
• Solutions:
• Identify	log	prototypes	(“log	templates”)
• Cluster	logs	which	represent	an	action
• Alert	when	actions	are	incomplete	or	anomalous
• Notify	about	new	errors	which	have	never	occurred	before
And	much	more!
Log	prototypes	distribution	– real-world
• The	10	most	frequent	logs	make	up	~60%	of	the	data	(!)
Log	
Prototypes
Log	
Frequency
Log	prototypes	distribution	– real-world
Show	me	statistics	and	
correlate	these:
Alert	me	when	
these	happen:
Today’s	schedule:
• Logs	today
• Machine	Learning	to	the	rescue!
• Types	of	Machine	Learning
• Possible	log	analysis	pipeline
Log	analysis	pipeline	- clustering
• Cluster	log	records	(raw	strings)	into	log	prototypes:
I. Find	a	distance	metric	to	compare	log	records
II. Create	a	new	type	of	log	if	distance	is	too	far
III. Find	the	variables	within	log	types
Log	1: “Creating	tag	on	Stream:	-1	Position:	42”
Log	2: “Creating	tag	on	Stream:	2	Position:	65”
Log	analysis	pipeline	- clustering
Log	analysis	pipeline	- clustering
• Problem:	comparing	all	log	sub-strings	is	expensive!
• Solution:	use	heuristic	distance	methods
“Creating	tag	on	Stream:	-1	Position:	42”
{Creating}
{tag}
{on}
{Stream:}
{-1}
.
.
.
Locality-sensitive	hashing	(LSH)
0011000010…0100
Log	1	Hash
Log	2	Hash
…
Log	n	Hash
Log	analysis	pipeline	- clustering
• Result:	M	raw	log	records	à N	log	prototypes
(N	<<	M)
• M	is	in	the	billions;	N	is	in	the	thousands
“Creating	tag	on	Stream:	-1	Position:	42”
“Creating	tag	on	Stream:	2	Position:	65”
“Creating	tag	on	Stream:	{var1}	Position:	{var2}”
Log	analysis	pipeline	– variable	statistics
• Model	distribution	of	variables	within	log	prototypes
• Define	anomaly	boundaries
“Creating	tag	on	Stream:	{var1}	Position:	{var2}”
ValuesVariable
[-1	,	2	,	…	,	1]var1
[42	,	65	,	… ,	53]var2
Anomalous	
values
Log	analysis	pipeline	– sequence	finding
• Find	sequences	of	log	prototypes	that	are	statistically-related
• Independence	assumption	– if	logs	are	unrelated,	all	pairs	should	
have	the	same	probability
• Sequences	with	related	logs	will	have	higher	counts,	and	break
the G-Test:
Authenticate
payment
Log	analysis	pipeline	– sequence	finding
Purchase
request
Get	cart
from	DB
Process	DB	
response
Send	response	
to	client
Update	BI	
system	2
Mark	as	
complete
1 2 3
4
6
7
Update	BI	
system	1
55
Log	analysis	pipeline	– sequence	finding
• Count	all	log	sequences	of	length	2	(2-sequences)
• L1L2 will	be	a	frequent	2-sequence
• We	expect	not	to	find	any	occurrences	of	L1L4
Log	analysis	pipeline	– sequence	finding
• After	mapping	all	2-sequences,	normalize	their	scores:
• Subtract	by	the	average
• Divide	by	the	variance
• Try	to	lengthen	all	2-sequences	by	one	log	to	3-sequences
𝑆#
$ %
=
𝐹𝑟𝑒𝑞 𝑆#
$
	− 𝜇 𝑆 $
𝜎 𝑆 $
Log	analysis	pipeline	– sequence	finding
• Repeat	the	process:
• For	each	k-sequence	try	to	construct	a	longer	(k+1)-sequence
• Stop	when	failing	the	G-Test	or	when	the	normalized	score	decreases:
• Save	the	k-sequence	as	valid	(an	action	in	the	system)
𝑆#
/ %
< 𝑆#
/1# %
Log	analysis	pipeline
• Determine	the	ratio	of	each	log	within	the	sequence
• E.g.	1:1:1	is	a	3-sequence	where	the	ratio	of	each	log	prototype	is	the	same
• In	our	example:
• 1:1:1:1:2:1:1,	a	7-sequence	with	one	log	prototype	expected	twice	as	much
as	the	others
Log	analysis	pipeline
• Alert about a sequence anomaly when ratio is distant enough from
the valid sequence, e.g. 𝑝 < 0.001
• Software is constantly changing – update all models all the time
• Of course, there is much more then we explored here!
Summary
• Everyone	will	analyze	their	Big	Data	– including	logs
• Hard	to	do	by	yourself	– but	extremely	rewarding!
• Most	importantly:
You	can	focus	on	your	product	instead	of	its	bugs
Questions?
• Please	feel	free	to	contact	me	directly:
Lior	Redlus,	Chief	Scientist,	lior@coralogix.com
http://www.coralogix.com

More Related Content

Viewers also liked

Real Photography
Real PhotographyReal Photography
Real Photography
Daniel Oscar Baskoro
 
Grow digital
Grow digitalGrow digital
Grow digital
SappiHouston
 
2ª Sesión Aprende a Cuidarte: Doctor estoy infoxicado, ¿es grave? Prevención,...
2ª Sesión Aprende a Cuidarte: Doctor estoy infoxicado, ¿es grave? Prevención,...2ª Sesión Aprende a Cuidarte: Doctor estoy infoxicado, ¿es grave? Prevención,...
2ª Sesión Aprende a Cuidarte: Doctor estoy infoxicado, ¿es grave? Prevención,...
Kronikoen Sarea La red vasca de pacientes
 
Sol Talks n.7
Sol Talks n.7Sol Talks n.7
Sol Talks n.7
VivisolSlide
 
Weblogs
WeblogsWeblogs
Weblogs
juancm
 
ELIX Viviendas con encanto
ELIX Viviendas con encantoELIX Viviendas con encanto
ELIX Viviendas con encanto
elixviviendasconencanto
 
Social media (ICT Month)
Social media (ICT Month)Social media (ICT Month)
Social media (ICT Month)
Ruben Canlas
 
Applicative style programming
Applicative style programmingApplicative style programming
Applicative style programming
José Luis García Hernández
 
Presentación t2.pptx a 1per audi
Presentación t2.pptx a 1per audiPresentación t2.pptx a 1per audi
Presentación t2.pptx a 1per audi
Marc Macia Sans
 
Bitcoin: salto tecnológico en los sistemas de pago
Bitcoin: salto tecnológico en los sistemas de pagoBitcoin: salto tecnológico en los sistemas de pago
Bitcoin: salto tecnológico en los sistemas de pago
Daniel Vicent Lluesa
 
Instal·lació solar aïllada
Instal·lació solar aïlladaInstal·lació solar aïllada
Instal·lació solar aïllada
Eduard Pla Mestras
 
Solinex
SolinexSolinex
Solinex
persolato
 
Enfermedad de cutting
Enfermedad de cuttingEnfermedad de cutting
Enfermedad de cutting
Juan Cruz Torres
 
The 2012 Channel Marketing Preference Survey
The 2012 Channel Marketing Preference SurveyThe 2012 Channel Marketing Preference Survey
The 2012 Channel Marketing Preference Survey
Ryan Bonnici
 
Returns basedstyleanalysisinexcel mcdermott
Returns basedstyleanalysisinexcel mcdermottReturns basedstyleanalysisinexcel mcdermott
Returns basedstyleanalysisinexcel mcdermott
bfmresearch
 
Trabajo y economia humana
Trabajo y economia humanaTrabajo y economia humana
Trabajo y economia humana
MAX GALARZA HERNANDEZ
 
Software Libre/Código Abierto - Enunciado
Software Libre/Código Abierto - EnunciadoSoftware Libre/Código Abierto - Enunciado
Software Libre/Código Abierto - Enunciado
martinp
 
SEO Audit Workshop: Framework, Techniques And Tools
SEO Audit Workshop: Framework, Techniques And ToolsSEO Audit Workshop: Framework, Techniques And Tools
SEO Audit Workshop: Framework, Techniques And Tools
Digital Vidya
 
Criterio y funcionamiento de un sniffer (cain & abel) (www.dragon jar.us)
Criterio y funcionamiento de un sniffer (cain & abel)  (www.dragon jar.us)Criterio y funcionamiento de un sniffer (cain & abel)  (www.dragon jar.us)
Criterio y funcionamiento de un sniffer (cain & abel) (www.dragon jar.us)
Gabriel Romero Pastrana
 
Ha 2000 Anos
Ha 2000 AnosHa 2000 Anos
Ha 2000 Anos
celulaespirita
 

Viewers also liked (20)

Real Photography
Real PhotographyReal Photography
Real Photography
 
Grow digital
Grow digitalGrow digital
Grow digital
 
2ª Sesión Aprende a Cuidarte: Doctor estoy infoxicado, ¿es grave? Prevención,...
2ª Sesión Aprende a Cuidarte: Doctor estoy infoxicado, ¿es grave? Prevención,...2ª Sesión Aprende a Cuidarte: Doctor estoy infoxicado, ¿es grave? Prevención,...
2ª Sesión Aprende a Cuidarte: Doctor estoy infoxicado, ¿es grave? Prevención,...
 
Sol Talks n.7
Sol Talks n.7Sol Talks n.7
Sol Talks n.7
 
Weblogs
WeblogsWeblogs
Weblogs
 
ELIX Viviendas con encanto
ELIX Viviendas con encantoELIX Viviendas con encanto
ELIX Viviendas con encanto
 
Social media (ICT Month)
Social media (ICT Month)Social media (ICT Month)
Social media (ICT Month)
 
Applicative style programming
Applicative style programmingApplicative style programming
Applicative style programming
 
Presentación t2.pptx a 1per audi
Presentación t2.pptx a 1per audiPresentación t2.pptx a 1per audi
Presentación t2.pptx a 1per audi
 
Bitcoin: salto tecnológico en los sistemas de pago
Bitcoin: salto tecnológico en los sistemas de pagoBitcoin: salto tecnológico en los sistemas de pago
Bitcoin: salto tecnológico en los sistemas de pago
 
Instal·lació solar aïllada
Instal·lació solar aïlladaInstal·lació solar aïllada
Instal·lació solar aïllada
 
Solinex
SolinexSolinex
Solinex
 
Enfermedad de cutting
Enfermedad de cuttingEnfermedad de cutting
Enfermedad de cutting
 
The 2012 Channel Marketing Preference Survey
The 2012 Channel Marketing Preference SurveyThe 2012 Channel Marketing Preference Survey
The 2012 Channel Marketing Preference Survey
 
Returns basedstyleanalysisinexcel mcdermott
Returns basedstyleanalysisinexcel mcdermottReturns basedstyleanalysisinexcel mcdermott
Returns basedstyleanalysisinexcel mcdermott
 
Trabajo y economia humana
Trabajo y economia humanaTrabajo y economia humana
Trabajo y economia humana
 
Software Libre/Código Abierto - Enunciado
Software Libre/Código Abierto - EnunciadoSoftware Libre/Código Abierto - Enunciado
Software Libre/Código Abierto - Enunciado
 
SEO Audit Workshop: Framework, Techniques And Tools
SEO Audit Workshop: Framework, Techniques And ToolsSEO Audit Workshop: Framework, Techniques And Tools
SEO Audit Workshop: Framework, Techniques And Tools
 
Criterio y funcionamiento de un sniffer (cain & abel) (www.dragon jar.us)
Criterio y funcionamiento de un sniffer (cain & abel)  (www.dragon jar.us)Criterio y funcionamiento de un sniffer (cain & abel)  (www.dragon jar.us)
Criterio y funcionamiento de un sniffer (cain & abel) (www.dragon jar.us)
 
Ha 2000 Anos
Ha 2000 AnosHa 2000 Anos
Ha 2000 Anos
 

Similar to Machine Learning Concepts for Software Monitoring - Lior Redlus, Coralogix - DevOpsDays Tel Aviv 2016

Library Management System
Library Management SystemLibrary Management System
Library Management System
Martins Okoi
 
Machine Learning & Predictive Maintenance
Machine Learning &  Predictive MaintenanceMachine Learning &  Predictive Maintenance
Machine Learning & Predictive Maintenance
Arnab Biswas
 
SE-MODULE-1-chap1.pptx
SE-MODULE-1-chap1.pptxSE-MODULE-1-chap1.pptx
SE-MODULE-1-chap1.pptx
ssuser9d6aac
 
1
11
Introduction to Software engineering ch03
Introduction to Software engineering ch03Introduction to Software engineering ch03
Introduction to Software engineering ch03
YousefYassin5
 
Unit 1 introduction tosoftengg_mba tech ii year
Unit 1  introduction tosoftengg_mba tech ii yearUnit 1  introduction tosoftengg_mba tech ii year
Unit 1 introduction tosoftengg_mba tech ii year
Preeti Mishra
 
Unit 1 importance ofsoftengg_b.tech iii year
Unit 1  importance ofsoftengg_b.tech iii yearUnit 1  importance ofsoftengg_b.tech iii year
Unit 1 importance ofsoftengg_b.tech iii year
Preeti Mishra
 
SE
SESE
Sdlc 4
Sdlc 4Sdlc 4
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
university of education,Lahore
 
Agile maintenance
Agile maintenanceAgile maintenance
Agile maintenance
aralikatte
 
Week_01-Intro to Software Engineering-1.ppt
Week_01-Intro to Software Engineering-1.pptWeek_01-Intro to Software Engineering-1.ppt
Week_01-Intro to Software Engineering-1.ppt
23017156038
 
ch1_introduction (1).ppt
ch1_introduction (1).pptch1_introduction (1).ppt
ch1_introduction (1).ppt
AleksandraArsic6
 
ch1_introduction (2).ppt
ch1_introduction (2).pptch1_introduction (2).ppt
ch1_introduction (2).ppt
AleksandraArsic6
 
ch1_introduction.ppt
ch1_introduction.pptch1_introduction.ppt
ch1_introduction.ppt
BhargaviChaitanya2
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
MrsRBoomadeviIT
 
SE UNIT 1 NOTES OF SE SOFTWARE ENGG AND SE
SE UNIT 1 NOTES OF SE SOFTWARE ENGG AND SESE UNIT 1 NOTES OF SE SOFTWARE ENGG AND SE
SE UNIT 1 NOTES OF SE SOFTWARE ENGG AND SE
AbhishekTripathi709328
 
You build it - Cyber Chicago Keynote
You build it -  Cyber Chicago KeynoteYou build it -  Cyber Chicago Keynote
You build it - Cyber Chicago Keynote
John Willis
 
Introduction Software engineering
Introduction   Software engineeringIntroduction   Software engineering
Introduction Software engineering
Jennifer O. Contreras Coloma
 
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinEnterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Anton Chuvakin
 

Similar to Machine Learning Concepts for Software Monitoring - Lior Redlus, Coralogix - DevOpsDays Tel Aviv 2016 (20)

Library Management System
Library Management SystemLibrary Management System
Library Management System
 
Machine Learning & Predictive Maintenance
Machine Learning &  Predictive MaintenanceMachine Learning &  Predictive Maintenance
Machine Learning & Predictive Maintenance
 
SE-MODULE-1-chap1.pptx
SE-MODULE-1-chap1.pptxSE-MODULE-1-chap1.pptx
SE-MODULE-1-chap1.pptx
 
1
11
1
 
Introduction to Software engineering ch03
Introduction to Software engineering ch03Introduction to Software engineering ch03
Introduction to Software engineering ch03
 
Unit 1 introduction tosoftengg_mba tech ii year
Unit 1  introduction tosoftengg_mba tech ii yearUnit 1  introduction tosoftengg_mba tech ii year
Unit 1 introduction tosoftengg_mba tech ii year
 
Unit 1 importance ofsoftengg_b.tech iii year
Unit 1  importance ofsoftengg_b.tech iii yearUnit 1  importance ofsoftengg_b.tech iii year
Unit 1 importance ofsoftengg_b.tech iii year
 
SE
SESE
SE
 
Sdlc 4
Sdlc 4Sdlc 4
Sdlc 4
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Agile maintenance
Agile maintenanceAgile maintenance
Agile maintenance
 
Week_01-Intro to Software Engineering-1.ppt
Week_01-Intro to Software Engineering-1.pptWeek_01-Intro to Software Engineering-1.ppt
Week_01-Intro to Software Engineering-1.ppt
 
ch1_introduction (1).ppt
ch1_introduction (1).pptch1_introduction (1).ppt
ch1_introduction (1).ppt
 
ch1_introduction (2).ppt
ch1_introduction (2).pptch1_introduction (2).ppt
ch1_introduction (2).ppt
 
ch1_introduction.ppt
ch1_introduction.pptch1_introduction.ppt
ch1_introduction.ppt
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
SE UNIT 1 NOTES OF SE SOFTWARE ENGG AND SE
SE UNIT 1 NOTES OF SE SOFTWARE ENGG AND SESE UNIT 1 NOTES OF SE SOFTWARE ENGG AND SE
SE UNIT 1 NOTES OF SE SOFTWARE ENGG AND SE
 
You build it - Cyber Chicago Keynote
You build it -  Cyber Chicago KeynoteYou build it -  Cyber Chicago Keynote
You build it - Cyber Chicago Keynote
 
Introduction Software engineering
Introduction   Software engineeringIntroduction   Software engineering
Introduction Software engineering
 
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinEnterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
 

More from DevOpsDays Tel Aviv

YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
DevOpsDays Tel Aviv
 
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, SaltoGRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
DevOpsDays Tel Aviv
 
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
DevOpsDays Tel Aviv
 
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
DevOpsDays Tel Aviv
 
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDogPRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
DevOpsDays Tel Aviv
 
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...
DevOpsDays Tel Aviv
 
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
DevOpsDays Tel Aviv
 
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
DevOpsDays Tel Aviv
 
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider SecurityTHE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
DevOpsDays Tel Aviv
 
THE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABELTHE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABEL
DevOpsDays Tel Aviv
 
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPackCONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
DevOpsDays Tel Aviv
 
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, DeveleapSOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
DevOpsDays Tel Aviv
 
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
DevOpsDays Tel Aviv
 
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKHHOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
DevOpsDays Tel Aviv
 
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearBHOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
DevOpsDays Tel Aviv
 
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, IcingaFLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
DevOpsDays Tel Aviv
 
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
DevOpsDays Tel Aviv
 
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.ioSLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
DevOpsDays Tel Aviv
 
ONBOARDING IN LOCKDOWN, HILA FOX, Augury
ONBOARDING IN LOCKDOWN, HILA FOX, AuguryONBOARDING IN LOCKDOWN, HILA FOX, Augury
ONBOARDING IN LOCKDOWN, HILA FOX, Augury
DevOpsDays Tel Aviv
 
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, FireflyDON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DevOpsDays Tel Aviv
 

More from DevOpsDays Tel Aviv (20)

YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
 
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, SaltoGRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
 
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
 
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
 
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDogPRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
 
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...
 
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
 
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
 
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider SecurityTHE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
 
THE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABELTHE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABEL
 
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPackCONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
 
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, DeveleapSOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
 
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
 
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKHHOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
 
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearBHOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
 
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, IcingaFLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
 
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
 
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.ioSLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
 
ONBOARDING IN LOCKDOWN, HILA FOX, Augury
ONBOARDING IN LOCKDOWN, HILA FOX, AuguryONBOARDING IN LOCKDOWN, HILA FOX, Augury
ONBOARDING IN LOCKDOWN, HILA FOX, Augury
 
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, FireflyDON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 

Machine Learning Concepts for Software Monitoring - Lior Redlus, Coralogix - DevOpsDays Tel Aviv 2016

Editor's Notes

  1. 70% of developers use logs for production monitoring and production troubleshooting (add arrows to the two common usages) (have them in horizontal)
  2. Identify what “log types” are Explain why rare logs are important
  3. Frequent logs  core business, a lot of noise etc. Rare logs  Show text only after some explanation
  4. Insert business example visually And keep coming back to it along the explanation
  5. Take numbers off
  6. Sequence  log types which relate to the same action
  7. The more population a country has, the more “candidates” it has to fill up its 11 soccer player slots. The more money a country has (GDP per capita), the more resources it has to train its players.
  8. Take one graph and slice it manually to clarify how the algorithm works. Ditch all other plots Place in the next slide