SlideShare a Scribd company logo
M E G A T R I S C O M P . L L C
IoE:
Integration
Microservices - Machine Learning
12/17/2015
1
Internet of Everything
The Internet of Everything is a global entity organized at a
high level of self-regulation of interrelationships between
business units (enterprises, service centers, ...) , individuals
and intelligent objects able to cooperate with each other.
They conduct various types of effective transactions
preserving their independence in view of the shared results
or common goals. In this sense, the Internet of Everything
can be thought of in terms of organizational capacity
potentials that favors rapid aggregation for the exploitation
of opportunities.
12/17/2015
2
Microservices
12/17/2015
3
The microservice architectural
style is an approach to develop a
single application as a suite of small
services, each running in its own
process and communicating with
lightweight mechanisms, often an
HTTP resource API.
There is a bare minimum of
centralized management of these
services, which may be written in
different programming languages
and use different data storage
technologies
IoT & Microservices
12/17/2015
4
IoT (Internet of things) is expanding. More and more devices are now
connected, big companies like Samsung, Google and LG are working on the
home consumer sector to create a simple way to connect everything to
internet (IoE – internet of everything).
Every device becomes connected and intelligent thanks to the cloud.
We strongly think that a Microservices architecture based on cloud services
can monitor, analyze data and send- receive commands to/from every object
in the IoT cloud.
The object it’s not only a thing, but also an agent, that using his mobile
devices has the ability to use microservices.
It’s clear that we need a simple way to manage so different sources of data
and Microservices are the key to do that.
Contextual Microservices architecture for the IoT
12/17/2015
5
A possible solution to easily control the IoT systems is to
create an intelligent platform using a microservices
architecture.
Each service has one and simple behavior and it’s called
when a specific event occours in the system.
Everything is event driven and the flow from the start to the
end is influenced by the context.
What is machine learning?
12/17/2015
6
• Machine reads the data, learns from the data, uses
it to make predictions
• Can show you correlation but not necessarily
causation
• Can find relationships and patterns within volumes
of data that the human mind is incapable of
processing
Why Machine Learning?
12/17/2015
7
Why Machine Learning?
12/17/2015
8
 Volume of data collected growing day by day.
 Data production will be 44 times greater in 2020 than in
2009.
 Every day, 2.5 quintillion bytes of data are created, with 90
percent of the world's data created in the past two years.
 Very little data will ever be looked at by a human.
 Data is cheap and abundant (data warehouses, data marts);
knowledge is expensive and scarce.
 Knowledge Discovery is NEEDED to make sense and use of
data.
 Machine Learning is a technique in which computers learn
from data to obtain insight and help in knowledge discovery.
Machine Learning Methods in #IoE
12/17/2015
9
Supervised learning – class labels/ target variable known
Overview (Contd)
12/17/2015
10
 Unsupervised learning – no class labels provided, need to detect
clusters of similar items in the data.
Parametric Vs Nonparametric
12/17/2015
11
 Parametric Models:
 Assumes prob. distribution for data, and learn parameters from
data
 E.g. Naïve Bayes classifier, linear regression etc.
 Non-parametric Models:
 No fixed number of parameters.
 E.g. K-NN, histograms etc.
Generative Vs Discriminative
12/17/2015
12
 Generative model – learns model for generating data, given some
hidden parameters.
 Learns the joint probability distribution p(x,y). e.g. HMM, GMM,
Naïve Bayes etc.
 Discriminative model – learns dependence of unobserved variable y on
observed variable x.
 Tries to model the separation between classes.
 Learns the conditional probability distribution p(y|x). e.g. Logistic
Regression, SVM, Neural networks etc.
Classification
12/17/2015
13
 Classification – Supervised learning.
 Commonly used Methods for Classification –
Naïve Bayes
Decision tree
K nearest neighbors
Deep learning: Neural Networks
Support Vector Machines.
Classification
12/17/2015
14
Data Science Concept:
• Classification is the
process of taking an
input and assigning a
label to it.
• The labels could be
binomial (Yes, No) or
multinomial (High,
Medium, Low).
Business Applications:
• Will customers
upgrade to new
software?
• What age groups tested
well for this new TV
show? (marketing
campaigns)
• Nigerian 419 (spam
classification)
Regression
12/17/2015
15
 Regression – Predicting an output variable given input
variables.
 Algorithms used :
Ordinary least squares
 Partial least squares
 Logistic Regression
 Stepwise Regression
 Support Vector Regression
Neural Networks
Regression
12/17/2015
16
Data Science Concept:
• Regression predict a
continuous numerical
value output
• Examples of
algorithms and
models: Linear
Regression, Random
Forest
Business Applications:
• How much money
would a user who has
reached level 200 in
Candy Crush spend on
in-app purchases?
(forecasting)
• How much would a
customer expect to pay
for car insurance based
on age, gender and car
type? (prediction)
Clustering
12/17/2015
17
 Clustering:
Group data into clusters using similarity measures.
 Algorithms:
K-means clustering
 Density based EM algorithm
 Hierarchical clustering.
 Spectral Clustering
Naïve Bayes
12/17/2015
18
 Naïve Bayes classifier
Assumes conditional independence among features.
 P(xi,xj,xk|C) = P(xi|C)P(xj|C)P(xk|C)
K-Nearest Neighbors
12/17/2015
19
 K-nearest neighbors: Classifies the data point with the class of
the k nearest neighbors.
 Value of k decided using cross validation
Decision trees
12/17/2015
20
 Leaves indicate classes.
 Non-terminal nodes – decisions on attribute values
 Algorithms used for decision tree learning
 C4.5
 ID3
 CART.
Deep Learning: Neural Networks
12/17/2015
21
 Artificial Neural Networks
Modeled after the human brain
 Consists of an input layer,
many hidden layers, and an
output layer.
 Multi-Layer Perceptrons,
Radial Basis Functions,
Kohonen Networks etc.
Evaluation of Machine Learning Methods
12/17/2015
22
Validation methods
 Cross validation techniques
K-fold cross validation
Leave one out Cross
Validation
 ROC curve (for binary classifier)
 Confusion Matrix
Real life applications
12/17/2015
23
Some real life applications of machine learning:
 Recommender systems – suggesting similar people on
Facebook/LinkedIn, similar movies/ books etc. on Amazon,
 Business applications – Customer segmentation, Customer
retention, Targeted Marketing etc.
 Medical applications – Disease diagnosis,
 Banking – Credit card issue, fraud detection etc.
 Language translation, text to speech or vice versa.
SSB IoE Reference Architecture
12/17/2015
24
Web/Portal DashBoard API
Machine
Learning
Event Processing and Analytics
Identity&AccessManagement
DeviceManager
Example of Micro Services Cloud for the IoE
12/17/2015
25
Micro
Services
Health Rules
Engine
Orders
Management
Running
Companion
Machine
Learning
Behavior
Engine
Context
Controller
Security
Monitor
Notifications
Integration Machine Learning - MicroServices
12/17/2015
26
Process Pseudo Code
12/17/2015
27
1. CompanionRequest: update deep learning
parameter on running data
2. ServiceRequest: GenerateReportRunning last week
3. CompanionProcess: Read deep learning parameter
4. CompanionProcess: Decides using rules
5. CompanionProcess: Call microservices chain
6. MicroserviceProcess: prepares report pdf format
7. MicroserviceProcess: Send push msg to enduse
with report link
Process Pseudo Code
12/17/2015
28
1. CompanionRequest: update deep learning
parameter on running data
2. ServiceRequest: GenerateReportRunning last week
3. CompanionProcess: Read deep learning parameter
4. CompanionProcess: Decides using rules
5. CompanionProcess: Call microservices chain
6. MicroserviceProcess: prepares report pdf format
7. MicroserviceProcess: Send push msg to enduse
with report link
Summary
12/17/2015
29
 Microservices are an effective approach to
orchestrate services in the cloud.
 Machine Learning is a set of tools to extract meaning
from Big Data as Microservices were not written with
huge processing in mind. They must be smart and
speedy.
 Industries can have huge benefits from this
approach.
Megatris Comp. LLC
We create cloud services and mobile apps to make people life easier.
Our mobile apps are integrated with Megatris Cloud to sell services and
goods.
www.megatris.com
1250 Oakmead Pkwy, Sunnyvale, CA 94085, USA
12/17/201530
QUESTIONS?
12/17/201531

More Related Content

What's hot

Into the Big Data Future with Watson Analytics
Into the Big Data Future with Watson AnalyticsInto the Big Data Future with Watson Analytics
Into the Big Data Future with Watson Analytics
IBM Innovation Center Silicon Valley
 
Integrating Structure and Analytics with Unstructured Data
Integrating Structure and Analytics with Unstructured DataIntegrating Structure and Analytics with Unstructured Data
Integrating Structure and Analytics with Unstructured Data
DATAVERSITY
 
Pivotal Digital Transformation Forum: Data Science
Pivotal Digital Transformation Forum: Data Science Pivotal Digital Transformation Forum: Data Science
Pivotal Digital Transformation Forum: Data Science
VMware Tanzu
 
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Precisely
 
Machine Learning for Fraud Detection
Machine Learning for Fraud DetectionMachine Learning for Fraud Detection
Machine Learning for Fraud Detection
Nitesh Kumar
 
Advanced Analytics and Data Science Expertise
Advanced Analytics and Data Science ExpertiseAdvanced Analytics and Data Science Expertise
Advanced Analytics and Data Science Expertise
SoftServe
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
Fight Fraud with Big Data Analytics
Fight Fraud with Big Data AnalyticsFight Fraud with Big Data Analytics
Fight Fraud with Big Data Analytics
Datameer
 
Predictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesPredictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use Cases
Kimberley Mitchell
 
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Denny Lee
 
Nvidia why every industry should be thinking about AI today
Nvidia why every industry should be thinking about AI todayNvidia why every industry should be thinking about AI today
Nvidia why every industry should be thinking about AI today
Justin Hayward
 
Real-time Big Data Analytics: From Deployment to Production
Real-time Big Data Analytics: From Deployment to ProductionReal-time Big Data Analytics: From Deployment to Production
Real-time Big Data Analytics: From Deployment to Production
Revolution Analytics
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
cscpconf
 
Industrial Analytics and Predictive Maintenance 2017 - 2022
Industrial Analytics and Predictive Maintenance 2017 - 2022Industrial Analytics and Predictive Maintenance 2017 - 2022
Industrial Analytics and Predictive Maintenance 2017 - 2022
Rising Media Ltd.
 
10 best practices in operational analytics
10 best practices in operational analytics 10 best practices in operational analytics
10 best practices in operational analytics
Decision Management Solutions
 
Cognitive computing in Insurance
Cognitive computing in InsuranceCognitive computing in Insurance
Cognitive computing in Insurance
Anders Quitzau
 
Come diventare data scientist - Paolo Pellegrini
Come diventare data scientist - Paolo PellegriniCome diventare data scientist - Paolo Pellegrini
Come diventare data scientist - Paolo Pellegrini
Donatella Cambosu
 
Privacy-preserving Analytics and Data Mining at LinkedIn
Privacy-preserving Analytics and Data Mining at LinkedInPrivacy-preserving Analytics and Data Mining at LinkedIn
Privacy-preserving Analytics and Data Mining at LinkedIn
Krishnaram Kenthapadi
 
"Industrializing Machine Learning – How to Integrate ML in Existing Businesse...
"Industrializing Machine Learning – How to Integrate ML in Existing Businesse..."Industrializing Machine Learning – How to Integrate ML in Existing Businesse...
"Industrializing Machine Learning – How to Integrate ML in Existing Businesse...
Dataconomy Media
 

What's hot (20)

Into the Big Data Future with Watson Analytics
Into the Big Data Future with Watson AnalyticsInto the Big Data Future with Watson Analytics
Into the Big Data Future with Watson Analytics
 
Integrating Structure and Analytics with Unstructured Data
Integrating Structure and Analytics with Unstructured DataIntegrating Structure and Analytics with Unstructured Data
Integrating Structure and Analytics with Unstructured Data
 
Pivotal Digital Transformation Forum: Data Science
Pivotal Digital Transformation Forum: Data Science Pivotal Digital Transformation Forum: Data Science
Pivotal Digital Transformation Forum: Data Science
 
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
 
Machine Learning for Fraud Detection
Machine Learning for Fraud DetectionMachine Learning for Fraud Detection
Machine Learning for Fraud Detection
 
Advanced Analytics and Data Science Expertise
Advanced Analytics and Data Science ExpertiseAdvanced Analytics and Data Science Expertise
Advanced Analytics and Data Science Expertise
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
Ieee itmsb20
 
Fight Fraud with Big Data Analytics
Fight Fraud with Big Data AnalyticsFight Fraud with Big Data Analytics
Fight Fraud with Big Data Analytics
 
Predictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesPredictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use Cases
 
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
 
Nvidia why every industry should be thinking about AI today
Nvidia why every industry should be thinking about AI todayNvidia why every industry should be thinking about AI today
Nvidia why every industry should be thinking about AI today
 
Real-time Big Data Analytics: From Deployment to Production
Real-time Big Data Analytics: From Deployment to ProductionReal-time Big Data Analytics: From Deployment to Production
Real-time Big Data Analytics: From Deployment to Production
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
 
Industrial Analytics and Predictive Maintenance 2017 - 2022
Industrial Analytics and Predictive Maintenance 2017 - 2022Industrial Analytics and Predictive Maintenance 2017 - 2022
Industrial Analytics and Predictive Maintenance 2017 - 2022
 
10 best practices in operational analytics
10 best practices in operational analytics 10 best practices in operational analytics
10 best practices in operational analytics
 
Cognitive computing in Insurance
Cognitive computing in InsuranceCognitive computing in Insurance
Cognitive computing in Insurance
 
Come diventare data scientist - Paolo Pellegrini
Come diventare data scientist - Paolo PellegriniCome diventare data scientist - Paolo Pellegrini
Come diventare data scientist - Paolo Pellegrini
 
Privacy-preserving Analytics and Data Mining at LinkedIn
Privacy-preserving Analytics and Data Mining at LinkedInPrivacy-preserving Analytics and Data Mining at LinkedIn
Privacy-preserving Analytics and Data Mining at LinkedIn
 
"Industrializing Machine Learning – How to Integrate ML in Existing Businesse...
"Industrializing Machine Learning – How to Integrate ML in Existing Businesse..."Industrializing Machine Learning – How to Integrate ML in Existing Businesse...
"Industrializing Machine Learning – How to Integrate ML in Existing Businesse...
 

Viewers also liked

An Architecture for Agile Machine Learning in Real-Time Applications
An Architecture for Agile Machine Learning in Real-Time ApplicationsAn Architecture for Agile Machine Learning in Real-Time Applications
An Architecture for Agile Machine Learning in Real-Time Applications
Johann Schleier-Smith
 
Apply Machine Learning to Microservices
Apply Machine Learning to MicroservicesApply Machine Learning to Microservices
Apply Machine Learning to Microservices
Kai Wähner
 
BSSML16 L8. REST API, Bindings, and Basic Workflows
BSSML16 L8. REST API, Bindings, and Basic WorkflowsBSSML16 L8. REST API, Bindings, and Basic Workflows
BSSML16 L8. REST API, Bindings, and Basic Workflows
BigML, Inc
 
HPMC 2014 - Optimizing customer value - Pega Systems
HPMC 2014 - Optimizing customer value - Pega SystemsHPMC 2014 - Optimizing customer value - Pega Systems
HPMC 2014 - Optimizing customer value - Pega Systems
Accenture the Netherlands
 
Microservices, Containers, and Machine Learning
Microservices, Containers, and Machine LearningMicroservices, Containers, and Machine Learning
Microservices, Containers, and Machine Learning
Paco Nathan
 
Machine Learning and Logging for Monitoring Microservices
Machine Learning and Logging for Monitoring Microservices Machine Learning and Logging for Monitoring Microservices
Machine Learning and Logging for Monitoring Microservices
Daniel Berman
 
Lessons Learned from Building Machine Learning Software at Netflix
Lessons Learned from Building Machine Learning Software at NetflixLessons Learned from Building Machine Learning Software at Netflix
Lessons Learned from Building Machine Learning Software at Netflix
Justin Basilico
 
Microservices, containers, and machine learning
Microservices, containers, and machine learningMicroservices, containers, and machine learning
Microservices, containers, and machine learning
Paco Nathan
 
MicroServices at Netflix - challenges of scale
MicroServices at Netflix - challenges of scaleMicroServices at Netflix - challenges of scale
MicroServices at Netflix - challenges of scale
Sudhir Tonse
 

Viewers also liked (9)

An Architecture for Agile Machine Learning in Real-Time Applications
An Architecture for Agile Machine Learning in Real-Time ApplicationsAn Architecture for Agile Machine Learning in Real-Time Applications
An Architecture for Agile Machine Learning in Real-Time Applications
 
Apply Machine Learning to Microservices
Apply Machine Learning to MicroservicesApply Machine Learning to Microservices
Apply Machine Learning to Microservices
 
BSSML16 L8. REST API, Bindings, and Basic Workflows
BSSML16 L8. REST API, Bindings, and Basic WorkflowsBSSML16 L8. REST API, Bindings, and Basic Workflows
BSSML16 L8. REST API, Bindings, and Basic Workflows
 
HPMC 2014 - Optimizing customer value - Pega Systems
HPMC 2014 - Optimizing customer value - Pega SystemsHPMC 2014 - Optimizing customer value - Pega Systems
HPMC 2014 - Optimizing customer value - Pega Systems
 
Microservices, Containers, and Machine Learning
Microservices, Containers, and Machine LearningMicroservices, Containers, and Machine Learning
Microservices, Containers, and Machine Learning
 
Machine Learning and Logging for Monitoring Microservices
Machine Learning and Logging for Monitoring Microservices Machine Learning and Logging for Monitoring Microservices
Machine Learning and Logging for Monitoring Microservices
 
Lessons Learned from Building Machine Learning Software at Netflix
Lessons Learned from Building Machine Learning Software at NetflixLessons Learned from Building Machine Learning Software at Netflix
Lessons Learned from Building Machine Learning Software at Netflix
 
Microservices, containers, and machine learning
Microservices, containers, and machine learningMicroservices, containers, and machine learning
Microservices, containers, and machine learning
 
MicroServices at Netflix - challenges of scale
MicroServices at Netflix - challenges of scaleMicroServices at Netflix - challenges of scale
MicroServices at Netflix - challenges of scale
 

Similar to Meetup7 integration microservices_machine_learning

Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)
Megatris Comp
 
Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1
Francesco Rago
 
DataAquitaine February 2022
DataAquitaine February 2022DataAquitaine February 2022
DataAquitaine February 2022
Yves Caseau
 
HEC Digital Business. Sharing Economy and other trends
HEC Digital Business. Sharing Economy and other trendsHEC Digital Business. Sharing Economy and other trends
HEC Digital Business. Sharing Economy and other trends
André Blavier
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
Den Reymer
 
The value of our data
The value of our dataThe value of our data
The value of our data
EnterpriseGRC Solutions, Inc.
 
How To Build Mature SM - final
How To Build Mature SM - finalHow To Build Mature SM - final
How To Build Mature SM - final
Danijel Božić
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
Daniel Katz
 
Big Data : Risks and Opportunities
Big Data : Risks and OpportunitiesBig Data : Risks and Opportunities
Big Data : Risks and Opportunities
Kenny Huang Ph.D.
 
Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...
International Federation for Information Technologies in Travel and Tourism (IFITT)
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
PayamBarnaghi
 
20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai
Frank Chee-Da TSAI (蔡其達)
 
10-Hot-Data-Analytics-Tre-8904178.ppsx
10-Hot-Data-Analytics-Tre-8904178.ppsx10-Hot-Data-Analytics-Tre-8904178.ppsx
10-Hot-Data-Analytics-Tre-8904178.ppsx
SangeetaTripathi8
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdf
Karishma Chaudhary
 
Digitalization: A Challenge and An Opportunity for Banks
Digitalization: A Challenge and An Opportunity for BanksDigitalization: A Challenge and An Opportunity for Banks
Digitalization: A Challenge and An Opportunity for Banks
Jérôme Kehrli
 
Data Pioneers - Roland Haeve (Atos Nederland) - Big data in organisaties
Data Pioneers - Roland Haeve (Atos Nederland) - Big data in organisatiesData Pioneers - Roland Haeve (Atos Nederland) - Big data in organisaties
Data Pioneers - Roland Haeve (Atos Nederland) - Big data in organisaties
Multiscope
 
Smart Data for Smart Labs
Smart Data for Smart Labs Smart Data for Smart Labs
Smart Data for Smart Labs
OSTHUS
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Neil Raden
 
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
SnapLogic
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
MLconf
 

Similar to Meetup7 integration microservices_machine_learning (20)

Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)
 
Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1
 
DataAquitaine February 2022
DataAquitaine February 2022DataAquitaine February 2022
DataAquitaine February 2022
 
HEC Digital Business. Sharing Economy and other trends
HEC Digital Business. Sharing Economy and other trendsHEC Digital Business. Sharing Economy and other trends
HEC Digital Business. Sharing Economy and other trends
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
How To Build Mature SM - final
How To Build Mature SM - finalHow To Build Mature SM - final
How To Build Mature SM - final
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
 
Big Data : Risks and Opportunities
Big Data : Risks and OpportunitiesBig Data : Risks and Opportunities
Big Data : Risks and Opportunities
 
Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai
 
10-Hot-Data-Analytics-Tre-8904178.ppsx
10-Hot-Data-Analytics-Tre-8904178.ppsx10-Hot-Data-Analytics-Tre-8904178.ppsx
10-Hot-Data-Analytics-Tre-8904178.ppsx
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdf
 
Digitalization: A Challenge and An Opportunity for Banks
Digitalization: A Challenge and An Opportunity for BanksDigitalization: A Challenge and An Opportunity for Banks
Digitalization: A Challenge and An Opportunity for Banks
 
Data Pioneers - Roland Haeve (Atos Nederland) - Big data in organisaties
Data Pioneers - Roland Haeve (Atos Nederland) - Big data in organisatiesData Pioneers - Roland Haeve (Atos Nederland) - Big data in organisaties
Data Pioneers - Roland Haeve (Atos Nederland) - Big data in organisaties
 
Smart Data for Smart Labs
Smart Data for Smart Labs Smart Data for Smart Labs
Smart Data for Smart Labs
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
 
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 

Meetup7 integration microservices_machine_learning

  • 1. M E G A T R I S C O M P . L L C IoE: Integration Microservices - Machine Learning 12/17/2015 1
  • 2. Internet of Everything The Internet of Everything is a global entity organized at a high level of self-regulation of interrelationships between business units (enterprises, service centers, ...) , individuals and intelligent objects able to cooperate with each other. They conduct various types of effective transactions preserving their independence in view of the shared results or common goals. In this sense, the Internet of Everything can be thought of in terms of organizational capacity potentials that favors rapid aggregation for the exploitation of opportunities. 12/17/2015 2
  • 3. Microservices 12/17/2015 3 The microservice architectural style is an approach to develop a single application as a suite of small services, each running in its own process and communicating with lightweight mechanisms, often an HTTP resource API. There is a bare minimum of centralized management of these services, which may be written in different programming languages and use different data storage technologies
  • 4. IoT & Microservices 12/17/2015 4 IoT (Internet of things) is expanding. More and more devices are now connected, big companies like Samsung, Google and LG are working on the home consumer sector to create a simple way to connect everything to internet (IoE – internet of everything). Every device becomes connected and intelligent thanks to the cloud. We strongly think that a Microservices architecture based on cloud services can monitor, analyze data and send- receive commands to/from every object in the IoT cloud. The object it’s not only a thing, but also an agent, that using his mobile devices has the ability to use microservices. It’s clear that we need a simple way to manage so different sources of data and Microservices are the key to do that.
  • 5. Contextual Microservices architecture for the IoT 12/17/2015 5 A possible solution to easily control the IoT systems is to create an intelligent platform using a microservices architecture. Each service has one and simple behavior and it’s called when a specific event occours in the system. Everything is event driven and the flow from the start to the end is influenced by the context.
  • 6. What is machine learning? 12/17/2015 6 • Machine reads the data, learns from the data, uses it to make predictions • Can show you correlation but not necessarily causation • Can find relationships and patterns within volumes of data that the human mind is incapable of processing
  • 8. Why Machine Learning? 12/17/2015 8  Volume of data collected growing day by day.  Data production will be 44 times greater in 2020 than in 2009.  Every day, 2.5 quintillion bytes of data are created, with 90 percent of the world's data created in the past two years.  Very little data will ever be looked at by a human.  Data is cheap and abundant (data warehouses, data marts); knowledge is expensive and scarce.  Knowledge Discovery is NEEDED to make sense and use of data.  Machine Learning is a technique in which computers learn from data to obtain insight and help in knowledge discovery.
  • 9. Machine Learning Methods in #IoE 12/17/2015 9 Supervised learning – class labels/ target variable known
  • 10. Overview (Contd) 12/17/2015 10  Unsupervised learning – no class labels provided, need to detect clusters of similar items in the data.
  • 11. Parametric Vs Nonparametric 12/17/2015 11  Parametric Models:  Assumes prob. distribution for data, and learn parameters from data  E.g. Naïve Bayes classifier, linear regression etc.  Non-parametric Models:  No fixed number of parameters.  E.g. K-NN, histograms etc.
  • 12. Generative Vs Discriminative 12/17/2015 12  Generative model – learns model for generating data, given some hidden parameters.  Learns the joint probability distribution p(x,y). e.g. HMM, GMM, Naïve Bayes etc.  Discriminative model – learns dependence of unobserved variable y on observed variable x.  Tries to model the separation between classes.  Learns the conditional probability distribution p(y|x). e.g. Logistic Regression, SVM, Neural networks etc.
  • 13. Classification 12/17/2015 13  Classification – Supervised learning.  Commonly used Methods for Classification – Naïve Bayes Decision tree K nearest neighbors Deep learning: Neural Networks Support Vector Machines.
  • 14. Classification 12/17/2015 14 Data Science Concept: • Classification is the process of taking an input and assigning a label to it. • The labels could be binomial (Yes, No) or multinomial (High, Medium, Low). Business Applications: • Will customers upgrade to new software? • What age groups tested well for this new TV show? (marketing campaigns) • Nigerian 419 (spam classification)
  • 15. Regression 12/17/2015 15  Regression – Predicting an output variable given input variables.  Algorithms used : Ordinary least squares  Partial least squares  Logistic Regression  Stepwise Regression  Support Vector Regression Neural Networks
  • 16. Regression 12/17/2015 16 Data Science Concept: • Regression predict a continuous numerical value output • Examples of algorithms and models: Linear Regression, Random Forest Business Applications: • How much money would a user who has reached level 200 in Candy Crush spend on in-app purchases? (forecasting) • How much would a customer expect to pay for car insurance based on age, gender and car type? (prediction)
  • 17. Clustering 12/17/2015 17  Clustering: Group data into clusters using similarity measures.  Algorithms: K-means clustering  Density based EM algorithm  Hierarchical clustering.  Spectral Clustering
  • 18. Naïve Bayes 12/17/2015 18  Naïve Bayes classifier Assumes conditional independence among features.  P(xi,xj,xk|C) = P(xi|C)P(xj|C)P(xk|C)
  • 19. K-Nearest Neighbors 12/17/2015 19  K-nearest neighbors: Classifies the data point with the class of the k nearest neighbors.  Value of k decided using cross validation
  • 20. Decision trees 12/17/2015 20  Leaves indicate classes.  Non-terminal nodes – decisions on attribute values  Algorithms used for decision tree learning  C4.5  ID3  CART.
  • 21. Deep Learning: Neural Networks 12/17/2015 21  Artificial Neural Networks Modeled after the human brain  Consists of an input layer, many hidden layers, and an output layer.  Multi-Layer Perceptrons, Radial Basis Functions, Kohonen Networks etc.
  • 22. Evaluation of Machine Learning Methods 12/17/2015 22 Validation methods  Cross validation techniques K-fold cross validation Leave one out Cross Validation  ROC curve (for binary classifier)  Confusion Matrix
  • 23. Real life applications 12/17/2015 23 Some real life applications of machine learning:  Recommender systems – suggesting similar people on Facebook/LinkedIn, similar movies/ books etc. on Amazon,  Business applications – Customer segmentation, Customer retention, Targeted Marketing etc.  Medical applications – Disease diagnosis,  Banking – Credit card issue, fraud detection etc.  Language translation, text to speech or vice versa.
  • 24. SSB IoE Reference Architecture 12/17/2015 24 Web/Portal DashBoard API Machine Learning Event Processing and Analytics Identity&AccessManagement DeviceManager
  • 25. Example of Micro Services Cloud for the IoE 12/17/2015 25 Micro Services Health Rules Engine Orders Management Running Companion Machine Learning Behavior Engine Context Controller Security Monitor Notifications
  • 26. Integration Machine Learning - MicroServices 12/17/2015 26
  • 27. Process Pseudo Code 12/17/2015 27 1. CompanionRequest: update deep learning parameter on running data 2. ServiceRequest: GenerateReportRunning last week 3. CompanionProcess: Read deep learning parameter 4. CompanionProcess: Decides using rules 5. CompanionProcess: Call microservices chain 6. MicroserviceProcess: prepares report pdf format 7. MicroserviceProcess: Send push msg to enduse with report link
  • 28. Process Pseudo Code 12/17/2015 28 1. CompanionRequest: update deep learning parameter on running data 2. ServiceRequest: GenerateReportRunning last week 3. CompanionProcess: Read deep learning parameter 4. CompanionProcess: Decides using rules 5. CompanionProcess: Call microservices chain 6. MicroserviceProcess: prepares report pdf format 7. MicroserviceProcess: Send push msg to enduse with report link
  • 29. Summary 12/17/2015 29  Microservices are an effective approach to orchestrate services in the cloud.  Machine Learning is a set of tools to extract meaning from Big Data as Microservices were not written with huge processing in mind. They must be smart and speedy.  Industries can have huge benefits from this approach.
  • 30. Megatris Comp. LLC We create cloud services and mobile apps to make people life easier. Our mobile apps are integrated with Megatris Cloud to sell services and goods. www.megatris.com 1250 Oakmead Pkwy, Sunnyvale, CA 94085, USA 12/17/201530