SlideShare a Scribd company logo
1 of 41
Download to read offline
Cloud Computing Elasticity
N. R. Herbst, S. Kounev, and R. Reussner, “Elasticity in Cloud Computing: What It Is, and What It Is Not,” ICAC, pp. 23–27, 2013.
M. M. Bersani, D. Bianculli, S. Dustdar, A. Gambi, C. Ghezzi, and S. Krstić, “Towards the Formalization of Properties of Cloud-based Elastic
Systems,” in Proceedings of the 6th International Workshop on Principles of Engineering Service-Oriented and Cloud Systems, New York,
NY, USA, 2014, pp. 38–47.
Elastic Behavior : threshold-based elasticity
Time
Resource
(CPUs)
2
1
0.3
0.8
0.6
1.2
Ready
Resource Allocation
Resource Demand
Scale-out Threshold
Scale-in Threshold
Elastic Behavior : threshold-based elasticity
Ready
Time
Resource
(CPUs)
2
1
scale-out reaction time
0.3
0.8
0.6
1.2
Resource Allocation
Resource Demand
Scale-out Threshold
Scale-in Threshold
Elastic Behavior : threshold-based elasticity
Time
Resource
(CPUs)
2
1
scale-out reaction time
scale-out time
0.3
0.8
0.6
1.2
Ready
Scaling-Out
Resource Allocation
Resource Demand
Scale-out Threshold
Scale-in Threshold
Elastic Behavior : threshold-based elasticity
Time
Resource
(CPUs)
2
1
scale-out reaction time
scale-out time
0.3
0.8
0.6
1.2
Ready
Scaling-Out
Resource Allocation
Resource Demand
Scale-out Threshold
Scale-in Threshold
Elastic Behavior : threshold-based elasticity
Time
Resource
(CPUs)
2
1
scale-out reaction time
scale-out time
0.3
0.8
0.6
1.2
scale-in
reaction time
Ready
Scaling-Out
Resource Allocation
Resource Demand
Scale-out Threshold
Scale-in Threshold
Elastic Behavior : threshold-based elasticity
Time
Resource
(CPUs)
2
1
scale-out reaction time
scale-out time
scale-in
time
scale-in
reaction time
0.3
0.8
0.6
1.2
Ready
Scaling-Out
Scaling-In
Resource Allocation
Resource Demand
Scale-out Threshold
Scale-in Threshold
Elastic Behavior : threshold-based elasticity
Ready
Scaling-Out
Scaling-In
Resource Allocation
Resource Demand
Scale-out Threshold
Scale-in Threshold
Time
Resource
(CPUs)
2
1
scale-out reaction time
scale-out time
scale-in
reaction time
scale-in
time
0.3
0.8
0.6
1.2
Motivation : MongoDB’s bug 7974
“ A secondary server shuts down when it
detects a replication error, ... “
●
○
○
○
■
Motivation : MongoDB’s bug 7974
Primary
Ready
Motivation : MongoDB’s bug 7974
Primary
Ready
Scaling-out
Motivation : MongoDB’s bug 7974
Primary
Secondary Secondary
Ready
Scaling-out
Motivation : MongoDB’s bug 7974
Primary
Ready
Secondary
Scaling-In
Secondary
Motivation : MongoDB’s bug 7974
Primary
Ready
Secondary
Scaling-InCreate Index
Motivation : MongoDB’s bug 7974
Primary
Ready
Secondary
Scaling-InCreate Index
Motivation : MongoDB’s bug 7974
Primary
Ready
Secondary
Scaling-In
Secondary
Scaling-Out
Motivation : MongoDB’s bug 7974
Primary
Ready
Secondary
Scaling-In
Secondary
Scaling-Out
Add doc. with
duplicated key
Motivation : MongoDB’s bug 7974
Primary
Ready
Secondary
Scaling-In
Secondary
Scaling-Out
Add doc. with
duplicated key
Motivation : MongoDB’s bug 7974
Primary
Ready
Secondary
Scaling-In
Secondary
Scaling-Out
Add doc. with
duplicated key
Motivation : MongoDB’s bug 7974
Primary
Ready
Secondary
Scaling-In
Secondary
Scaling-Out
Duplicate Key
Error
Requirements for Elasticity Testing Reproduction
●
○
●
○
●
○
Elasticity Testing Reproduction
Case Studies
●
Prototype’s Architecture
Elasticity
Controller
Mock
Event
Scheduler
Workload
Generator
Cloud-Based
System
Cloud
Monitor
Prototype’s Architecture
Elasticity
Controller
Mock
Event
Scheduler
EC = {ec1
=(es1
,W1
), …, ecn
}
SER = {(ec1
, ser1
), …, (ecn
, sern
)}
Workload
Generator
Cloud-Based
System
Cloud
Monitor
S={(ec1
, e1
), …, (ecn
, en
)}
Prototype’s Architecture
Elasticity
Controller
Mock
Event
Scheduler
EC = {ec1
=(es1
,W1
), …, ecn
}
SER = {(ec1
, ser1
), …, (ecn
, sern
)}
S={(ec1
, e1
), …, (ecn
, en
)}
Workload
Generator
Wi Cloud-Based
System
Cloud
Monitor
Elasticity
Controller
Mock
Event
Scheduler
EC = {ec1
=(es1
,W1
), …, ecn
}
SER = {(ec1
, ser1
), …, (ecn
, sern
)}
S={(ec1
, e1
), …, (ecn
, en
)}
Workload
Generator
Wi Cloud-Based
System
Workload
Cloud
Monitor
Prototype’s Architecture
Elasticity
Controller
Mock
Event
Scheduler
EC = {ec1
=(es1
,W1
), …, ecn
}
SER = {(ec1
, ser1
), …, (ecn
, sern
)}
S={(ec1
, e1
), …, (ecn
, en
)}
Workload
Generator
Wi Cloud-Based
System
Workload
Resource Variation
Cloud
Monitor
Prototype’s Architecture
Elasticity
Controller
Mock
Event
Scheduler
EC = {ec1
=(es1
,W1
), …, ecn
}
SER = {(ec1
, ser1
), …, (ecn
, sern
)}
S={(ec1
, e1
), …, (ecn
, en
)}
Workload
Generator
Wi Cloud-Based
System
Workload
NewElasticityState
Resource Variation
Cloud
Monitor
Prototype’s Architecture
Elasticity
Controller
Mock
Event
Scheduler
EC = {ec1
=(es1
,W1
), …, ecn
}
SER = {(ec1
, ser1
), …, (ecn
, sern
)}
S={(ec1
, e1
), …, (ecn
, en
)}
Workload
Generator
Wi Cloud-Based
System
Workload
Event Execution
Resource Variation
Cloud
Monitor
NewElasticityState
Prototype’s Architecture
Elasticity
Controller
Mock
Event
Scheduler
EC = {ec1
=(es1
,W1
), …, ecn
}
SER = {(ec1
, ser1
), …, (ecn
, sern
)}
S={(ec1
, e1
), …, (ecn
, en
)}
Workload
Generator
Wi Cloud-Based
System
Workload
Event Execution
Resource Variation
Cloud
Monitor
NewElasticityState
Prototype’s Architecture
Reproduction of Bugs
●
●
●
Reproduction of Bugs
Bug Success of Reproduction
Using Our Approach
Success of Reproduction
Without Our Approach
MongoDB-7974 3 0
ZooKeeper-2164 3 1
ZooKeeper-2172 3 0
●
Reproduction of Bugs
Bug Success of Reproduction
Using Our Approach
Success of Reproduction
Without Our Approach
MongoDB-7974 3 0
ZooKeeper-2164 3 1
ZooKeeper-2172 3 0
● Comercial elastic controllers natively removes either the oldest (first added) or the newest (last
added) resource;
● In our experiment, ZooKeeper node on the oldest resource (VM) is elected the leader;
● At one of the three executions, we configure elastic controller to remove the oldest node;
○ Then, the bug is reproduced.
● If the leader was the node in the middle, the bug would never be reproduced without our
approach.
●
●
○
●
Conclusion
●
●
○
●
Perspectives
Cloud Computing Elasticity Testing

More Related Content

Similar to Cloud Computing Elasticity Testing

SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENEWorkshop
 
SERENE 2014 School: Gabor karsai serene2014_school
SERENE 2014 School: Gabor karsai serene2014_schoolSERENE 2014 School: Gabor karsai serene2014_school
SERENE 2014 School: Gabor karsai serene2014_schoolHenry Muccini
 
Bruce Damer's presentation of Digital Spaces, an open source 3D simulation pl...
Bruce Damer's presentation of Digital Spaces, an open source 3D simulation pl...Bruce Damer's presentation of Digital Spaces, an open source 3D simulation pl...
Bruce Damer's presentation of Digital Spaces, an open source 3D simulation pl...Bruce Damer
 
Expert systems for advanced FE modelling of bridges and buildings using OpenSees
Expert systems for advanced FE modelling of bridges and buildings using OpenSeesExpert systems for advanced FE modelling of bridges and buildings using OpenSees
Expert systems for advanced FE modelling of bridges and buildings using OpenSeesopenseesdays
 
Transfer Learning for Software Performance Analysis: An Exploratory Analysis
Transfer Learning for Software Performance Analysis: An Exploratory AnalysisTransfer Learning for Software Performance Analysis: An Exploratory Analysis
Transfer Learning for Software Performance Analysis: An Exploratory AnalysisPooyan Jamshidi
 
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERING
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERINGINFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERING
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERINGcscpconf
 
Influence of priors over multityped object in evolutionary clustering
Influence of priors over multityped object in evolutionary clusteringInfluence of priors over multityped object in evolutionary clustering
Influence of priors over multityped object in evolutionary clusteringcsandit
 
A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...
A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...
A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...ijccsa
 
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...aciijournal
 
A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...
A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...
A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...ijccsa
 
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...ijccsa
 
2 achuthan c_pankaj--23-39
2 achuthan c_pankaj--23-392 achuthan c_pankaj--23-39
2 achuthan c_pankaj--23-39Alexander Decker
 
VARIATIONAL MONTE-CARLO APPROACH FOR ARTICULATED OBJECT TRACKING
VARIATIONAL MONTE-CARLO APPROACH FOR ARTICULATED OBJECT TRACKINGVARIATIONAL MONTE-CARLO APPROACH FOR ARTICULATED OBJECT TRACKING
VARIATIONAL MONTE-CARLO APPROACH FOR ARTICULATED OBJECT TRACKINGcsandit
 
IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...
IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...
IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...IRJET Journal
 
Workflow Provenance: From Modelling to Reporting
Workflow Provenance: From Modelling to ReportingWorkflow Provenance: From Modelling to Reporting
Workflow Provenance: From Modelling to ReportingRayhan Ferdous
 
Better Information Faster: Programming the Continuum
Better Information Faster: Programming the ContinuumBetter Information Faster: Programming the Continuum
Better Information Faster: Programming the ContinuumIan Foster
 
A Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingA Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingIRJET Journal
 
Top Viewed Articles from Academia in 2019- International Journal of Distribu...
 Top Viewed Articles from Academia in 2019- International Journal of Distribu... Top Viewed Articles from Academia in 2019- International Journal of Distribu...
Top Viewed Articles from Academia in 2019- International Journal of Distribu...ijdpsjournal
 

Similar to Cloud Computing Elasticity Testing (20)

SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
 
SERENE 2014 School: Gabor karsai serene2014_school
SERENE 2014 School: Gabor karsai serene2014_schoolSERENE 2014 School: Gabor karsai serene2014_school
SERENE 2014 School: Gabor karsai serene2014_school
 
Bruce Damer's presentation of Digital Spaces, an open source 3D simulation pl...
Bruce Damer's presentation of Digital Spaces, an open source 3D simulation pl...Bruce Damer's presentation of Digital Spaces, an open source 3D simulation pl...
Bruce Damer's presentation of Digital Spaces, an open source 3D simulation pl...
 
Expert systems for advanced FE modelling of bridges and buildings using OpenSees
Expert systems for advanced FE modelling of bridges and buildings using OpenSeesExpert systems for advanced FE modelling of bridges and buildings using OpenSees
Expert systems for advanced FE modelling of bridges and buildings using OpenSees
 
Transfer Learning for Software Performance Analysis: An Exploratory Analysis
Transfer Learning for Software Performance Analysis: An Exploratory AnalysisTransfer Learning for Software Performance Analysis: An Exploratory Analysis
Transfer Learning for Software Performance Analysis: An Exploratory Analysis
 
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERING
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERINGINFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERING
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERING
 
Influence of priors over multityped object in evolutionary clustering
Influence of priors over multityped object in evolutionary clusteringInfluence of priors over multityped object in evolutionary clustering
Influence of priors over multityped object in evolutionary clustering
 
A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...
A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...
A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...
 
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
 
A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...
A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...
A NOVEL OPTIMIZATION OF CLOUD INSTANCES WITH INVENTORY THEORY APPLIED ON REAL...
 
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
 
2 achuthan c_pankaj--23-39
2 achuthan c_pankaj--23-392 achuthan c_pankaj--23-39
2 achuthan c_pankaj--23-39
 
VARIATIONAL MONTE-CARLO APPROACH FOR ARTICULATED OBJECT TRACKING
VARIATIONAL MONTE-CARLO APPROACH FOR ARTICULATED OBJECT TRACKINGVARIATIONAL MONTE-CARLO APPROACH FOR ARTICULATED OBJECT TRACKING
VARIATIONAL MONTE-CARLO APPROACH FOR ARTICULATED OBJECT TRACKING
 
Sen spire os
Sen spire osSen spire os
Sen spire os
 
IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...
IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...
IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...
 
CLIM Program: Remote Sensing Workshop, An Introduction to Systems and Softwar...
CLIM Program: Remote Sensing Workshop, An Introduction to Systems and Softwar...CLIM Program: Remote Sensing Workshop, An Introduction to Systems and Softwar...
CLIM Program: Remote Sensing Workshop, An Introduction to Systems and Softwar...
 
Workflow Provenance: From Modelling to Reporting
Workflow Provenance: From Modelling to ReportingWorkflow Provenance: From Modelling to Reporting
Workflow Provenance: From Modelling to Reporting
 
Better Information Faster: Programming the Continuum
Better Information Faster: Programming the ContinuumBetter Information Faster: Programming the Continuum
Better Information Faster: Programming the Continuum
 
A Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingA Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud Computing
 
Top Viewed Articles from Academia in 2019- International Journal of Distribu...
 Top Viewed Articles from Academia in 2019- International Journal of Distribu... Top Viewed Articles from Academia in 2019- International Journal of Distribu...
Top Viewed Articles from Academia in 2019- International Journal of Distribu...
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Cloud Computing Elasticity Testing