DDS on the Web: Quick Recipes for Real-Time Web ApplicationsAngelo Corsaro
The Web is nowadays inextricably intertwined with our lives and our systems. The ability for a system to interact with web-based applications is not anymore a feature — it is the thin line that separates démodé from contemporary!
DDS-based systems are not exception to this rule and as a consequence more and more people are trying bring DDS data to web applications. In a technology rich environment such as the web there is no lack of choice when it comes to selecting the set of tools and technologies to integrate DDS and Web applications. Options are Web Services, REST,
REST Frameworks such as CometD, Silverlight, WebSockets, DART, the Play! Framework etc.
To help shed light, give insight and factually show that the DDS/Web integration is indeed easily achievable, this presentation will first provide an overview of the Web technologies that are most suited for integrating Web- and DDS-applications, such as plain REST, CometD, WebSockets, Google Dart, and Play! Then it will demonstrate how the integration can be achieved with just a few lines of code by using the OpenSplice Gateway.
The front cover of a book or magazine is an important part of the overall design and needs to be carefully produced. Key details like the title, author name, and images must be clearly presented in an eye-catching layout to attract potential readers browsing in a store. Producing the front cover involves coordinating input from various teams to finalize all graphic elements and text before printing and distribution.
The document discusses key cost drivers and financial challenges for trucking fleets, including average operating margins of 2-4%. A survey found that 66% of fleets said payments programs help lower costs, and 71% are more likely to buy from suppliers offering payments. The top decision factors for payments program participation are parts pricing and purchasing controls. Consolidated billing and appropriate credit allocations are also important. To maximize fleet participation and usage, payments programs must address fleet needs and provide clear value.
Este documento discute o contexto histórico e organizacional do Sistema Único de Saúde (SUS) no Brasil. Ele aborda a luta pelo movimento sanitário, a criação do SUS na Constituição de 1988, seus princípios e diretrizes, as leis e instâncias de gestão, controle social e promoção da saúde no SUS.
RFLP analysis involves fragmenting DNA samples with restriction enzymes, separating the fragments by length through gel electrophoresis, and detecting length polymorphisms between individuals. Any single nucleotide change can create or destroy a restriction site, altering the length of the resulting fragment. RFLP analysis has applications in forensics, disease research, genetics, and paternity testing by detecting differences in fragment lengths between DNA samples.
Haiku is a free and open-source operating system compatible with BeOS. It began development in 2001 as the OpenBeOS project after Be Inc. discontinued BeOS development. The first alpha version was released in 2009. Haiku aims to provide compatibility with BeOS at the source code and binary level to allow existing BeOS software to run on Haiku without modification. Development involves recreating BeOS components like the kernel, file system, and GUI toolkit. While some components are complete, others remain in development stages.
DDS on the Web: Quick Recipes for Real-Time Web ApplicationsAngelo Corsaro
The Web is nowadays inextricably intertwined with our lives and our systems. The ability for a system to interact with web-based applications is not anymore a feature — it is the thin line that separates démodé from contemporary!
DDS-based systems are not exception to this rule and as a consequence more and more people are trying bring DDS data to web applications. In a technology rich environment such as the web there is no lack of choice when it comes to selecting the set of tools and technologies to integrate DDS and Web applications. Options are Web Services, REST,
REST Frameworks such as CometD, Silverlight, WebSockets, DART, the Play! Framework etc.
To help shed light, give insight and factually show that the DDS/Web integration is indeed easily achievable, this presentation will first provide an overview of the Web technologies that are most suited for integrating Web- and DDS-applications, such as plain REST, CometD, WebSockets, Google Dart, and Play! Then it will demonstrate how the integration can be achieved with just a few lines of code by using the OpenSplice Gateway.
The front cover of a book or magazine is an important part of the overall design and needs to be carefully produced. Key details like the title, author name, and images must be clearly presented in an eye-catching layout to attract potential readers browsing in a store. Producing the front cover involves coordinating input from various teams to finalize all graphic elements and text before printing and distribution.
The document discusses key cost drivers and financial challenges for trucking fleets, including average operating margins of 2-4%. A survey found that 66% of fleets said payments programs help lower costs, and 71% are more likely to buy from suppliers offering payments. The top decision factors for payments program participation are parts pricing and purchasing controls. Consolidated billing and appropriate credit allocations are also important. To maximize fleet participation and usage, payments programs must address fleet needs and provide clear value.
Este documento discute o contexto histórico e organizacional do Sistema Único de Saúde (SUS) no Brasil. Ele aborda a luta pelo movimento sanitário, a criação do SUS na Constituição de 1988, seus princípios e diretrizes, as leis e instâncias de gestão, controle social e promoção da saúde no SUS.
RFLP analysis involves fragmenting DNA samples with restriction enzymes, separating the fragments by length through gel electrophoresis, and detecting length polymorphisms between individuals. Any single nucleotide change can create or destroy a restriction site, altering the length of the resulting fragment. RFLP analysis has applications in forensics, disease research, genetics, and paternity testing by detecting differences in fragment lengths between DNA samples.
Haiku is a free and open-source operating system compatible with BeOS. It began development in 2001 as the OpenBeOS project after Be Inc. discontinued BeOS development. The first alpha version was released in 2009. Haiku aims to provide compatibility with BeOS at the source code and binary level to allow existing BeOS software to run on Haiku without modification. Development involves recreating BeOS components like the kernel, file system, and GUI toolkit. While some components are complete, others remain in development stages.
This document is a response from OASIS, a global standards consortium, to the European Commission's public consultation on cloud computing. OASIS provides details about its organization and work producing data standards. It discusses issues around clarity of rights and responsibilities for cloud users and providers. OASIS also comments on topics like jurisdiction, interoperability, public sector use of clouds, and future research needs like improved identity management and testing tools to foster cloud adoption.
The document summarizes the WISDOM initiative for grid-enabled drug discovery against neglected and emerging diseases. It describes how WISDOM deployed large-scale virtual screening of potential drug compounds against malaria and avian influenza on various grid infrastructures. Over 400 CPU years were used to screen over 1 million compounds in 3 months. Results identified potential drug hits that are now undergoing further testing. The document concludes that WISDOM demonstrates the potential of grid computing to accelerate drug discovery for neglected diseases.
This document provides an overview of HTML5 semantic elements and how they can be used to mark up a standard WordPress blog. It includes code examples of integrating these new elements into the header, posts, and other sections. Key elements discussed are <section>, <nav>, <article>, <aside>, <header>, <footer>, and <time>. The document suggests these elements are well-suited for structuring blog content in a semantically meaningful way.
This document provides instructions for using the ping and traceroute commands to test TCP/IP network connectivity. It describes pinging the local loopback address and default gateway to verify local IP stack functionality. Traceroute is used to identify the network path and devices between the local host and a remote server, and can help locate connectivity issues along the path. The lab demonstrates using these commands on the local host to test connectivity to on-link and off-link devices and networks.
Workshopvin6 User Interface Adaptationimec.archive
This document discusses user interface adaptation and social interfaces. It proposes adapting the user interface based on a user's social relations and current situation. This is achieved through a client-server structure where the interface is rendered on the client, but functionality is provided by adaptable services on the server. The interface of a service is defined using a language like UIML, and clients can adapt the UI using UIML filters for content, style, and structure. Moving forward, interfaces need to adapt based on modeling a user's personal, social, and device profiles to map to a set of UIML filters.
¿Cómo gestionar los Riesgos de la Innovación? Foro Cañada Blanch 2016Ivie
1) El documento analiza los riesgos de la innovación y cómo gestionarlos. 2) Identifica riesgos tecnológicos, de mercado, organizativos y financieros de la innovación. 3) Argumenta que el mayor riesgo es no innovar y que gestionando bien el sistema de innovación se pueden reducir los riesgos.
Workshopvin2 A Socio Legal View On Virtual Individual Networksimec.archive
This document discusses several topics related to virtual individual networks (VIN) and user-generated content. It examines socio-legal challenges of computer-mediated communication within open and closed online communities. It also explores regulatory issues regarding content on VIN and analyzes dimensions of online and offline networks and communities. Finally, it outlines several research streams within the project, including analyzing clashes between new user-centric networks and old regulations and creating recommendations for a future-proof content regulation framework.
Project portfolio management (PPM) involves the logical selection and execution of projects to achieve strategic business goals. An effective PPM system identifies, analyzes, and prioritizes projects based on value. The primary benefit of PPM is that only projects aligned with strategic goals will be selected. PPM evaluates projects throughout their lifecycle to ensure continued alignment. PPM uses various tools and techniques to prioritize projects based on financial, strategic, and other organizational factors. The goal is to select a mix of projects that does not exceed resources and delivers maximum value.
Ehip1 caring through-sharing the-e health-landscape dirk de langhe veronique ...imec.archive
The document discusses trends in healthcare and the potential for eHealth to help address challenges in the industry. It notes that the world population is growing and aging, placing more demands on healthcare systems. New technologies are needed to help improve quality of care, access, and efficiency. eHealth aims to transform healthcare through more integrated and collaborative systems that support prevention, early diagnosis, and targeted treatments. This can help move healthcare from a focus on treating late-stage disease to emphasizing early health and wellness. However, key issues around standards, funding, change management, privacy, and coordination of innovation still need to be addressed for eHealth to realize its full potential.
Ingrid moerman isbo ng wi nets - overview of the projectimec.archive
The document describes an event for the NG Wireless project. It includes an agenda with presentations on monitoring interference using sensing technology, avoiding interference with adaptive protocols, and minimizing interference with cooperative networks. There will also be a presentation on accounting for the impact of interference on revenue modeling and results. After the presentations, there will be demonstration booths and a networking drink.
Joeri van Bogaert / Timber Haaker - GIPPa: a joint innovation platform for Ft...imec.archive
Presentation at the Workshop on Municipal Fiber Networks, October 24th 2011 in Ghent, Belgium. The workshop was organised by Ghent University - IBCN / IBBT. More information about this event can be found at http://http://events.ibbt.be/en/workshop-municipal-fiber-networks.
Romas04 User Driven Living Lab Innovation For Mobile City Applications Jo Pi...imec.archive
User-driven living lab innovation for mobile city applications documents an initiative that tapped into users' knowledge to develop new mobile applications. It generated 80 ideas from focus groups, surveyed interests, and identified 13 application clusters and 6 user archetypes. The most promising concepts were further developed through ethnographic research, persona creation, and testing to optimize the user experience.
Electronic meal vouchers for NFC phones . An overview of the IBBT/NFC-Voucher...imec.archive
This document discusses using near field communication (NFC) technology for electronic meal vouchers on phones. It provides an overview of NFC, describing it as short-range contactless communication that works similarly to existing contactless cards. The document then summarizes the current paper voucher system in Belgium and its disadvantages related to logistics, processing, and lost vouchers. It proposes a multi-disciplinary approach to developing one of the first NFC voucher applications in Belgium to address these issues and explore new opportunities through mobile vouchering.
This document discusses B cell immunodeficiencies, which are antibody deficiency disorders caused by impaired B lymphocyte development or failure of B cells to respond to T cell signals. It describes several specific types of B cell immunodeficiencies, including X-linked agammaglobulinemia, Hyper-IgM syndrome, IgA deficiency, and Common variable immunodeficiency. These deficiencies are characterized by reduced levels of certain antibodies and increased susceptibility to recurrent bacterial infections.
NSTIC draft bylaws August 2012 w commentsJamie Clark
This document contains draft bylaws for the Identity Ecosystem Steering Group. It defines key terms related to the steering group's structure and governance, including the Plenary, Management Council, membership classifications, and roles of chairs, delegates, and representatives. The bylaws are annotated with proposed changes and references to align with the steering group's charter.
Ddo8 Peter Anker Digital Dividend In Nlimec.archive
This document discusses competition in broadcasting services and the potential use of the digital dividend in the Netherlands. It finds that a large part of the digital dividend is already used for digital terrestrial television, which competes with cable broadband. The remaining digital dividend could be used to either strengthen digital terrestrial television or to enhance mobile coverage in rural areas. It considers these two scenarios and concludes that a flexible auction process that allows either outcome could maximize the benefits to consumers.
Leen Thielemans - M HKA Game for interactive & mobile museum visitimec.archive
1) M HKA PP is a game developed for the M HKA museum to facilitate interactive and mobile visits using tools like QR codes and a 3D environment on iPods.
2) A pilot program tested the game with 24 young people to evaluate the experience, accessibility, educational value, and needs/expectations of users.
3) Preliminary results found that participants found the mobility, on-demand information, and ability to share experiences through the game facilitated a more intense museum visit. However, the 3D environment may not be suitable for the general public.
- Distributed software systems are increasingly important as organizations collaborate over networks. This requires appropriate distributed software architectures, development methods, and management techniques.
- Key architectures discussed include service-oriented, peer-to-peer, sensor networks, and cloud/grid computing. Middleware is important for supporting distributed applications across different platforms.
- Managing the total cost of ownership of complex distributed software systems is a growing concern, requiring techniques for provisioning, policy definition, load balancing, and more. Autonomic and self-managing techniques aim to increase system autonomy.
- Several example distributed software platforms and applications are presented, including for telecom, healthcare, personal content sharing, and sensor networks. Security and policy-driven approaches
How to Get Cloud Architecture and Design Right the First TimeDavid Linthicum
The document discusses best practices for designing cloud architecture and getting cloud implementation right the first time. It covers proper ways to leverage, design, and build cloud-based systems and infrastructure, going beyond hype to advice from those with real-world experience making cloud computing work. The document provides guidance on common mistakes to avoid and emerging architectural patterns to follow.
Cloud lockin and interoperability v2 indic threads cloud computing conferen...IndicThreads
This document discusses cloud lock-in and interoperability. It begins with recapping cloud computing concepts like deployment models and service models. It then defines cloud lock-in and discusses how portability and interoperability can help address lock-in concerns. Emerging standards from groups like DMTF, SNIA, and CSA that aim to improve interoperability are presented. Best practices for vendors and customers to reduce lock-in are outlined. While lock-in exists now due to proprietary systems, the future of interoperability is promising. Standards and informed customer decisions can help minimize negative impacts of lock-in.
This document is a response from OASIS, a global standards consortium, to the European Commission's public consultation on cloud computing. OASIS provides details about its organization and work producing data standards. It discusses issues around clarity of rights and responsibilities for cloud users and providers. OASIS also comments on topics like jurisdiction, interoperability, public sector use of clouds, and future research needs like improved identity management and testing tools to foster cloud adoption.
The document summarizes the WISDOM initiative for grid-enabled drug discovery against neglected and emerging diseases. It describes how WISDOM deployed large-scale virtual screening of potential drug compounds against malaria and avian influenza on various grid infrastructures. Over 400 CPU years were used to screen over 1 million compounds in 3 months. Results identified potential drug hits that are now undergoing further testing. The document concludes that WISDOM demonstrates the potential of grid computing to accelerate drug discovery for neglected diseases.
This document provides an overview of HTML5 semantic elements and how they can be used to mark up a standard WordPress blog. It includes code examples of integrating these new elements into the header, posts, and other sections. Key elements discussed are <section>, <nav>, <article>, <aside>, <header>, <footer>, and <time>. The document suggests these elements are well-suited for structuring blog content in a semantically meaningful way.
This document provides instructions for using the ping and traceroute commands to test TCP/IP network connectivity. It describes pinging the local loopback address and default gateway to verify local IP stack functionality. Traceroute is used to identify the network path and devices between the local host and a remote server, and can help locate connectivity issues along the path. The lab demonstrates using these commands on the local host to test connectivity to on-link and off-link devices and networks.
Workshopvin6 User Interface Adaptationimec.archive
This document discusses user interface adaptation and social interfaces. It proposes adapting the user interface based on a user's social relations and current situation. This is achieved through a client-server structure where the interface is rendered on the client, but functionality is provided by adaptable services on the server. The interface of a service is defined using a language like UIML, and clients can adapt the UI using UIML filters for content, style, and structure. Moving forward, interfaces need to adapt based on modeling a user's personal, social, and device profiles to map to a set of UIML filters.
¿Cómo gestionar los Riesgos de la Innovación? Foro Cañada Blanch 2016Ivie
1) El documento analiza los riesgos de la innovación y cómo gestionarlos. 2) Identifica riesgos tecnológicos, de mercado, organizativos y financieros de la innovación. 3) Argumenta que el mayor riesgo es no innovar y que gestionando bien el sistema de innovación se pueden reducir los riesgos.
Workshopvin2 A Socio Legal View On Virtual Individual Networksimec.archive
This document discusses several topics related to virtual individual networks (VIN) and user-generated content. It examines socio-legal challenges of computer-mediated communication within open and closed online communities. It also explores regulatory issues regarding content on VIN and analyzes dimensions of online and offline networks and communities. Finally, it outlines several research streams within the project, including analyzing clashes between new user-centric networks and old regulations and creating recommendations for a future-proof content regulation framework.
Project portfolio management (PPM) involves the logical selection and execution of projects to achieve strategic business goals. An effective PPM system identifies, analyzes, and prioritizes projects based on value. The primary benefit of PPM is that only projects aligned with strategic goals will be selected. PPM evaluates projects throughout their lifecycle to ensure continued alignment. PPM uses various tools and techniques to prioritize projects based on financial, strategic, and other organizational factors. The goal is to select a mix of projects that does not exceed resources and delivers maximum value.
Ehip1 caring through-sharing the-e health-landscape dirk de langhe veronique ...imec.archive
The document discusses trends in healthcare and the potential for eHealth to help address challenges in the industry. It notes that the world population is growing and aging, placing more demands on healthcare systems. New technologies are needed to help improve quality of care, access, and efficiency. eHealth aims to transform healthcare through more integrated and collaborative systems that support prevention, early diagnosis, and targeted treatments. This can help move healthcare from a focus on treating late-stage disease to emphasizing early health and wellness. However, key issues around standards, funding, change management, privacy, and coordination of innovation still need to be addressed for eHealth to realize its full potential.
Ingrid moerman isbo ng wi nets - overview of the projectimec.archive
The document describes an event for the NG Wireless project. It includes an agenda with presentations on monitoring interference using sensing technology, avoiding interference with adaptive protocols, and minimizing interference with cooperative networks. There will also be a presentation on accounting for the impact of interference on revenue modeling and results. After the presentations, there will be demonstration booths and a networking drink.
Joeri van Bogaert / Timber Haaker - GIPPa: a joint innovation platform for Ft...imec.archive
Presentation at the Workshop on Municipal Fiber Networks, October 24th 2011 in Ghent, Belgium. The workshop was organised by Ghent University - IBCN / IBBT. More information about this event can be found at http://http://events.ibbt.be/en/workshop-municipal-fiber-networks.
Romas04 User Driven Living Lab Innovation For Mobile City Applications Jo Pi...imec.archive
User-driven living lab innovation for mobile city applications documents an initiative that tapped into users' knowledge to develop new mobile applications. It generated 80 ideas from focus groups, surveyed interests, and identified 13 application clusters and 6 user archetypes. The most promising concepts were further developed through ethnographic research, persona creation, and testing to optimize the user experience.
Electronic meal vouchers for NFC phones . An overview of the IBBT/NFC-Voucher...imec.archive
This document discusses using near field communication (NFC) technology for electronic meal vouchers on phones. It provides an overview of NFC, describing it as short-range contactless communication that works similarly to existing contactless cards. The document then summarizes the current paper voucher system in Belgium and its disadvantages related to logistics, processing, and lost vouchers. It proposes a multi-disciplinary approach to developing one of the first NFC voucher applications in Belgium to address these issues and explore new opportunities through mobile vouchering.
This document discusses B cell immunodeficiencies, which are antibody deficiency disorders caused by impaired B lymphocyte development or failure of B cells to respond to T cell signals. It describes several specific types of B cell immunodeficiencies, including X-linked agammaglobulinemia, Hyper-IgM syndrome, IgA deficiency, and Common variable immunodeficiency. These deficiencies are characterized by reduced levels of certain antibodies and increased susceptibility to recurrent bacterial infections.
NSTIC draft bylaws August 2012 w commentsJamie Clark
This document contains draft bylaws for the Identity Ecosystem Steering Group. It defines key terms related to the steering group's structure and governance, including the Plenary, Management Council, membership classifications, and roles of chairs, delegates, and representatives. The bylaws are annotated with proposed changes and references to align with the steering group's charter.
Ddo8 Peter Anker Digital Dividend In Nlimec.archive
This document discusses competition in broadcasting services and the potential use of the digital dividend in the Netherlands. It finds that a large part of the digital dividend is already used for digital terrestrial television, which competes with cable broadband. The remaining digital dividend could be used to either strengthen digital terrestrial television or to enhance mobile coverage in rural areas. It considers these two scenarios and concludes that a flexible auction process that allows either outcome could maximize the benefits to consumers.
Leen Thielemans - M HKA Game for interactive & mobile museum visitimec.archive
1) M HKA PP is a game developed for the M HKA museum to facilitate interactive and mobile visits using tools like QR codes and a 3D environment on iPods.
2) A pilot program tested the game with 24 young people to evaluate the experience, accessibility, educational value, and needs/expectations of users.
3) Preliminary results found that participants found the mobility, on-demand information, and ability to share experiences through the game facilitated a more intense museum visit. However, the 3D environment may not be suitable for the general public.
- Distributed software systems are increasingly important as organizations collaborate over networks. This requires appropriate distributed software architectures, development methods, and management techniques.
- Key architectures discussed include service-oriented, peer-to-peer, sensor networks, and cloud/grid computing. Middleware is important for supporting distributed applications across different platforms.
- Managing the total cost of ownership of complex distributed software systems is a growing concern, requiring techniques for provisioning, policy definition, load balancing, and more. Autonomic and self-managing techniques aim to increase system autonomy.
- Several example distributed software platforms and applications are presented, including for telecom, healthcare, personal content sharing, and sensor networks. Security and policy-driven approaches
How to Get Cloud Architecture and Design Right the First TimeDavid Linthicum
The document discusses best practices for designing cloud architecture and getting cloud implementation right the first time. It covers proper ways to leverage, design, and build cloud-based systems and infrastructure, going beyond hype to advice from those with real-world experience making cloud computing work. The document provides guidance on common mistakes to avoid and emerging architectural patterns to follow.
Cloud lockin and interoperability v2 indic threads cloud computing conferen...IndicThreads
This document discusses cloud lock-in and interoperability. It begins with recapping cloud computing concepts like deployment models and service models. It then defines cloud lock-in and discusses how portability and interoperability can help address lock-in concerns. Emerging standards from groups like DMTF, SNIA, and CSA that aim to improve interoperability are presented. Best practices for vendors and customers to reduce lock-in are outlined. While lock-in exists now due to proprietary systems, the future of interoperability is promising. Standards and informed customer decisions can help minimize negative impacts of lock-in.
Cloud lockin and interoperability v2 indic threads cloud computing conferen...IndicThreads
This document discusses cloud lock-in and interoperability. It begins with recapping cloud computing concepts like deployment models and service models. It then defines lock-in, portability, and interoperability. Lock-in occurs when there are significant costs to switch cloud vendors. The document discusses how portability and interoperability benefit customers by increasing choice and lowering costs. It provides examples of lock-in for different cloud platforms and analyzes emerging standards from groups like DMTF, SNIA, and CSA. Best practices are outlined to minimize lock-in for IaaS, PaaS and SaaS. The document concludes that while lock-in exists now, interoperability is improving and portability
It's easy to say... Microservices! Reality is we need to learn and apply concepts coming from many disciplines like SOA, EDA and DDD just to name a few! Mix them with some ALM and technical processes around Packaging and Deploying... and maybe then you get a true Microservices solution.
This document provides an overview of Software as a Service (SaaS). It discusses what SaaS is, the benefits it provides like low costs and scalability, and some drawbacks around robustness, privacy, and security. It also examines how Service Oriented Architectures power SaaS applications and discusses examples like Amazon Web Services and Google App Engine. Hybrid models combining traditional and SaaS applications are also reviewed.
This document discusses the concept of cloud computing and its implications for businesses. It begins with definitions of cloud computing and discusses various cloud service models (infrastructure as a service, platform as a service, software as a service) and deployment models (private cloud, public cloud, hybrid cloud). It then addresses how cloud computing provides opportunities for resellers to offer new services while some users still have concerns about security and reliability. The cloud market is growing rapidly but still makes up a small percentage of overall IT spending currently.
AWS Serverless Community Day Keynote and Vendia Launch 6-26-2020Tim Wagner
Hear Tim Wagner, CEO and co-founder of Vendia and "Father of Serverless" talk about the evolution of Serverless over the years and how Vendia is taking it into a cross-cloud future.
Slides for my architectural session at the event: Docker From Zero To Hero.
We talked about what kind of expertises are need in order to build a true Microservices Solution; you'll need to understand some of the fundamentals on which Microservices is built upon: SOA, EDA and DDD just to name a few, then you can move to the container world.
Original event link: https://www.eventbrite.it/e/biglietti-docker-from-zero-to-hero-83372825365#
This document discusses enabling technologies for cloud computing, focusing on service oriented architecture and representational state transfer (REST) systems. It describes service oriented architecture as a design approach involving independent services that communicate with each other over a network. It outlines the layered architecture for web services and grids, and compares grids and clouds, noting that grids apply static resources while clouds emphasize elastic resources. It provides a brief overview of REST, describing it as a way to get information content from websites by reading designated web pages containing XML files that describe and include preferred content.
This document discusses open source cloud computing. It begins with introductions to open source software and cloud computing. Key points covered include trends in cloud computing, characteristics of open source cloud, examples of open source infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Advantages of open source cloud include lower costs and no vendor lock-in, while disadvantages include requiring an internet connection and offering limited support. The conclusion states that open source cloud provides universal computational power, easy deployment and management of services, and broad availability of applications and data.
Cloud Computing:An Economic Solution for LibrariesAmit Shaw
This document discusses cloud computing and its potential applications and benefits for libraries. It begins with an introduction to cloud computing that defines it as enabling ubiquitous, convenient access to configurable computing resources. The document then covers cloud computing characteristics, models (IaaS, PaaS, SaaS), architecture, examples of current uses, and pros and cons. In particular, it explores how cloud computing could provide more efficient and flexible library services by reducing costs and increasing storage and mobility while allowing libraries to shift their focus from infrastructure maintenance. Real-world examples of academic libraries currently using cloud solutions are also presented.
Introduction to cloud computing - za garage talksVijay Rayapati
This document provides an introduction to cloud computing, including definitions, examples of existing cloud applications, benefits, and limitations. It discusses key cloud concepts like infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Popular cloud platforms like Amazon AWS, Google App Engine, and Windows Azure are briefly introduced. Potential concerns with security, data control, and migration are also outlined. The presentation aims to explain cloud computing fundamentals and tradeoffs for developers and startups.
Deep-dive into Microservices Patterns with Replication and Stream Analytics
Target Audience: Microservices and Data Architects
This is an informational presentation about microservices event patterns, GoldenGate event replication, and event stream processing with Oracle Stream Analytics. This session will discuss some of the challenges of working with data in a microservices architecture (MA), and how the emerging concept of a “Data Mesh” can go hand-in-hand to improve microservices-based data management patterns. You may have already heard about common microservices patterns like CQRS, Saga, Event Sourcing and Transaction Outbox; we’ll share how GoldenGate can simplify these patterns while also bringing stronger data consistency to your microservice integrations. We will also discuss how complex event processing (CEP) and stream processing can be used with event-driven MA for operational and analytical use cases.
Business pressures for modernization and digital transformation drive demand for rapid, flexible DevOps, which microservices address, but also for data-driven Analytics, Machine Learning and Data Lakes which is where data management tech really shines. Join us for this presentation where we take a deep look at the intersection of microservice design patterns and modern data integration tech.
Dr. Michael Valivullah, NASS/USDA - Cloud Computingikanow
This document provides an overview of cloud computing. It defines cloud computing as a model enabling ubiquitous, convenient access to a shared pool of configurable computing resources that can be rapidly provisioned with minimal management effort. The document discusses different types of cloud services including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It also covers public and private cloud models and highlights benefits of cloud computing such as agility, cost reduction, and increased efficiency.
#dbhouseparty - Should I be building Microservices?Tammy Bednar
This document discusses whether and how to build microservices. It includes:
1) Presentations by Sanjay Goil, VP of Product Management at Oracle, and Paul Parkinson, Cloud Platform Dev Lead at Oracle on microservices and building a sample microservices application.
2) Recommendations from Oracle ACEs Guido and Rolando on microservices approaches and modernizing existing SOA architectures for microservices.
3) A discussion of how a converged database can simplify building microservices by supporting messaging, multiple data types, and cloud services.
4) A demo of building a microservices application for a food delivery app using technologies like Helidon and a converged database.
This presentation includes cloud security overview, Could Security Access Broker, CASB's four pillars, proxy and API deployment mode and advantage and limitation of deployment modes
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
This presentation discuss how the Israeli banks should cope with the Israeli central bank cloud regulations. In the slide we examine different articles inside the cloud regulation and discuss the challenges and controls to be used.
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudMark Hinkle
Perhaps one of the perplexing things about cloud computing is the choice around renting time in someone else’s cloud (Amazon, Google, Rackspace or a myriad of others) or building your own. It’s not unlike the age-old car buyer’s dilemma, take the lower payments and lower total miles lease or buy the car and drive it for the long haul. Cloud computing users are often faced with the same conundrum. This presentation will focus on how to buy and build a cloud that can be fulfill the needs of most users including strategies for making use of the open source private cloud or managing workloads in both the private and public cloud using open source software.
This document discusses cloud computing and its potential applications and benefits for libraries. It begins by defining cloud computing as the delivery of computing resources such as storage, software, and processing over a network. It then outlines different cloud service models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Examples of each service model are provided. The document also discusses characteristics of cloud computing such as rapid elasticity, resource pooling, and pay-per-use billing. Potential uses for libraries are suggested, such as using cloud services for storage or hosting applications like WordPress or Omeka. Security concerns with cloud services are also briefly addressed.
A1 keynote oracle_infrastructure_as_a_service_move_any_workload_to_the_cloudDr. Wilfred Lin (Ph.D.)
This document discusses Oracle IaaS and its strategy to run any type of enterprise workload in the cloud. It highlights Oracle's breadth of compute, storage, and networking offerings including bare metal servers, virtual machines, containers, and dedicated compute. It emphasizes Oracle's performance leadership and the ability to run demanding workloads due to its global infrastructure of regions, availability domains, and ultra low latency/high bandwidth. The document also discusses Oracle's engineered systems, Cloud at Customer offering, and tools for migration and workload portability including Ravello.
Similar to Oasis: Standards & the Cloud June2011 (20)
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...Jamie Clark
This document summarizes a presentation given by Jamie Clark from OASIS on open standards and open source. Some key points include:
- OASIS is a global consortium that develops open standards through technical committees with over 5,000 participants.
- 5G is a priority area for standardization to support the digital single market in Europe and elsewhere.
- OASIS has a long history of collaborating with open source communities and promoting open standards and open source partnerships. When projects share goals and move at a similar pace, they can work very well together.
Complementary trust: IDEF Registry and Kantara cross-attestationJamie Clark
Slides (with no audio) from presentation at Kantara's CISNOLA June 2016 workshop - IDESG introduces the new IDEF Registry, and its study of complementary requirements among Kantara and IDESG.
Briefing on OASIS XLIFF OMOS TC 20160121Jamie Clark
The briefing provided an overview of the XLIFF OMOS TC, which aims to develop an abstract object model and JSON serialization for the XLIFF 2.0 standard to improve interoperability. The TC is chaired by David Filip and has members from various organizations. It plans to deliver an object model for XLIFF 2.x, a JSON version called JLIFF 1.0, and work on a new version of TMX with an inline data model consistent with XLIFF 2.0. The TC uses a non-assertion IPR mode and invites participation from stakeholders in multilingual content and localization.
PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)Jamie Clark
Unofficial copy of the text drafted for PM-ISE's Standards Coordinating Council (standardscoordination.org), in response to the US DHS request for comment in March 2015 on implementation aspects of White House Executive Order 13691.
OASIS: open source and open standards: internet of thingsJamie Clark
How FOSS projects and open ICT standards often interact in a virtuous cycle. Recent examples, and a list of IoT-relevant open standards projects at OASIS. Feb 2014
NSTIC draft charter August 2012 w commentsJamie Clark
The document provides a draft charter for the Identity Ecosystem Steering Group. The charter establishes the mission, objectives, scope, and operating principles of the steering group. The steering group will govern and administer the Identity Ecosystem Framework in accordance with the guiding principles of the National Strategy for Trusted Identities in Cyberspace. It will establish standards, policies, and processes to develop and sustain an identity ecosystem that is privacy enhancing, secure, interoperable, and cost effective. The steering group will include a Plenary and Management Council composed of public and private stakeholders.
This document contains draft bylaws for the Identity Ecosystem Steering Group. It defines key terms related to the governance structure and outlines membership classifications, participation levels, stakeholder groups, and rights and responsibilities of members. The steering group will be made up of a Plenary and Management Council and will work to adopt standards, develop policies and procedures, and accredit identity ecosystem entities in support of the National Strategy for Trusted Identities in Cyberspace.
The document outlines a recommended charter for an Identity Ecosystem Steering Group to govern the implementation of the National Strategy for Trusted Identities in Cyberspace. The charter establishes that the steering group will develop and administer standards, policies, and processes to build an identity ecosystem that conforms to four guiding principles: being privacy-enhancing, voluntary, secure and resilient, and interoperable. The steering group will bring together public and private stakeholders to establish baseline requirements for participating in the identity ecosystem framework.
Beijing MoST standards + IPR conference Clark-OASIS-2011Jamie Clark
(1) OASIS is the largest standards organization for electronic commerce, with over 5,000 participants from 600 organizations developing global standards through 70 technical committees.
(2) The document discusses problems with patents, including vague claims, competing policy goals, and uncertainty around validity. It notes standards aim to have fair, open processes to be safe from regulation.
(3) Standards organizations have rules for patents disclosed in standards, including preferring broad licenses, committing to license terms, sharing licenses, and resolving conflicts. However, the rules and their clarity vary between organizations.
Jamie Clark's preso on cloud computing and legal issues at the OASIS International Cloud Symposium (#intcloudsymp) at Ditton Manor, Windsor, UK, October 2011
The document discusses a proposed plan to gather at the Internet Identity Workshop 13 (IIW13) to collaboratively identify and map existing identity and authentication standards in order to help inform the development of the US National Strategy for Trusted Identities in Cyberspace (NSTIC) project. The plan involves holding three sessions at IIW13 to brainstorm and begin compiling lists of known standards and gaps within different categories. Representatives from six standards organizations will help moderate the sessions, which aim to produce an initial draft of an "existing-standards map" to highlight gaps.
Ontolog Forum: Semantic Interop March 2008Jamie Clark
Clark comments on the practical challenges of semantic interoperability in e-commerce documents. At Ontolog Forum March 2008. Some parts come from presentation at W3C workshop on e-government in Washington, January 2007.
This document discusses international content standards developed by OASIS and LISA to remove communication barriers. OASIS is an international non-profit consortium with over 650 members and 70 technical committees producing open standards. Key OASIS standards discussed include DocBook for structured document authoring, DITA for modular topic-based information, CMIS for content management interoperability, and XLIFF for localization interchange. The document emphasizes that open standards must be publicly available, stable, published with open rules and processes, and have explicit intellectual property terms.
Potential OASIS Geothermal Energy standards projectJamie Clark
Early-stage open standards proposal for a new OASIS technical committee for locational, volumetric, condition and asset quality references to natural geothermal power sources. Provided to us for the purposes of gathering comment on feasibility and scope.
The document discusses tensions between intellectual property rights (IPR) and standardization in open source and freely available software. It notes that while stable open standards regimes can address patent claims, not all "open" licenses and standards are fully interoperable. The document examines issues regarding non-assertion clauses, differing approaches in countries like China, the relationship between standards and innovation, and whether patent and copyright laws still make sense for information technologies. It concludes that policymakers must balance the rights of public access and technological competition.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
3. "The largest
standards
group for
electronic Over 5,000 participants
commerce on representing more than
the Web" 600 organizations and
individuals, since 1993
60+ technical
committees producing
royalty-free and RAND
standards
5. Why Open Standards? Safety.
Real open standards are:
Publicly & persistently visible for review
Developed fairly under transparent, published rules
Open to comment: public comments, no NDAs
Available to use under clear, irrevocable licenses
Anything else is proprietary (vendor-centric).
Nothing wrong with that; but it doesn't provide the same
kind of interoperability and stability assurance.
6. Why Open Standards?
Open Standards are
Reliable and Stable
Open access from stakeholders
The standard on which you build is less likely to
disappear, be obsoleted or invisibly modified
Stable rules & neutral management help assure against
invisible lock-in to unilateral viewpoints: auditable
sources, drafts and licensing
This is why governments prefer open standards: WTO
Technical Barriers to Trade Agreement, Annex 3
http://www.wto.org/english/ docs_e/ legal_e/final_e.htm
7. Why Open Standards?
Real Standards, versus
Drafts and Proposals
Final open standards have the benefits of open
process protection and licensing rules
Drafts, notes & proposals may just be one
company's idea - or property
Publication of work in neutral, archival forms
on which implementers can safely build
10. But maybe not as complex
as it sounds
software-as-a-service
In the 1980s paradigm, your
In the
platform-as-a-service 1980s paradigm, your
microcomputer was on your
microcomputer was on your
application-as-a-serviceandititwas your problem. your
desk, and idea youryour data,
desk, was
Theidea that
that
problem.
The my desk, youris my your
andisdata,
Mineis on my desk, resources, and your
is on
Mine computing resources, and your
computing and my
storage-as-a-service
problem.
problem.softwaremay be elsewhere,
software may be elsewhere,
They were connected. But by
They were new.
isn't new.
isn't
infrastructure-as-a-service connected. But by
obvious, episodic connections.
obvious, episodic connections.
LikeSneakerNet. No-one sat up
LikeSneakerNet.isNo-one sat up
acronyms-as-a-service Neither is outsourcing.
Neither outsourcing.
nightsworrying about where
nights worrying about where
boring-slides-as-a-service was.
the data
the data was.
Or who controls it.
Or who controls it.
oy-gevalt-as-a-service
11. Most of the challenges that
"the cloud" brings, we've
cloud we
already encountered.
Your data is somewhere else.
Your data and applications all must work
with each other (and there are a lot of
them).
You don’t know who all your users or
network nodes are (or will be later).
12. Your data is somewhere
else.
Answers: Remote storage methods,
Shared data repositories and registries
We had standards for those by the
early 2000s. (SNIA; OASIS’s UDDI,
ebXML Registry, and more recent
developments like S-RAMP.)
13. Your data and applications
are owned by someone else.
Answers: Application Service Provider duties
& licensure expressed either in SLAs (Service
Level Agreements), when the economics
support a contractual solution; or
reputational enforcement & incentive
systems, when they don't.
don
Basic contract law can solve the first case
Older market practices for reputational economy
can address the second. (Some standards are
being developed for the latter: ORMS.)
14. Your computational
platform has to work with
all the other
computational platforms,
and there are a lot of
them.
We have had a solution for that one for a
while, too, called "the Internet ."
Not much that’s new, in 2011, about getting
diverse machines to talk to each other.
It takes what it always did: standards.
15. Your computational
platform is somewhere
else, owned by someone
else.
Answers: Virtualization …
Evolving metadata standards. (DMTF’s OVF)
Hypervisor commoditization? (Open source tools?)
Evolution in server-counting for licensing fees
… Managed Service Providers > Cloud
providers; Traditional outsourcing
With an underpinning of contract law
16. Lots of different data
applications must work
with each other
Answers: Standard APIs, Service
Oriented Architecture
Well-established methods in stable standards
and web services work. (OASIS’s SOA
Reference Model, WS-* standards; work from
W3C, the Open Group, OMG, etc..)
Some standards are being refactored for cloud
optimization. (E.g, AS4 for WS-* adapted ebXML
MSG: see http://www.oagi.org/oagi/Website/Case_Studies/
OAGIS_AS4Cisco-final-1.pdf.)
17. Service Oriented Architecture: SOA
Services That Describe Themselves: devices
and users can find, and consume, data and
computation services across networks.
Loose Coupling: Services have defined
interfaces for shared data and signals, between
“block boxes”, but they are not required to work the
same way inside each “box.”
Late binding: Activities and operations can occur
(“run time”) without all pieces being specified in
advance (at “design time”).
Required: Open standards and open design
Results: Extensibility; no lock-in
18. You don’t know who all
your users or network
nodes are.
Answers: Federation ...
Formal functions for many-to-many cooperation.
Well-established, stable standards. (OASIS’s SAML
(used in OpenID & Kantara), WS-Federation.)
… and Provisioning
Account and access control management.
Well-established, stable standards & methods.
(OASIS’s XACML, PMRM, ID-Cloud, SPML, XSPA,
KMIP.)
19. Open cloud standards empower users
Identity in the Cloud TC SOA Reference Model TC
• Standards profiles for open • Abstract model of the basic
identity deployment, provisioning components, by function, of any
& management in cloud working service architecture
environments • Method-neutral
• Use cases & gap analysis • See: http://www.oasis-
• See: http://www.oasis- open.org/committees/soa-rm
open.org/committees/id-cloud
Privacy Management SOA Repository Artifact
Reference Model (PMRM) TC Model and Protocol (S-
• Service & interaction patterns for RAMP) TC
deploying and assessing formal, • Interaction protocol & common
reusable representations of privacy data model for federatable,
policies distributed data repositories
• See: http://www.oasis- • See: http://www.oasis-
open.org/committees/pmrm open.org/committees/s-ramp
20. Open access control standards empower users
Security Assertion ML XACML TC
(SAML) TC • Access control and authorization
• Reusable representations of user policy representation
authentication, entitlement and • Role-based access and
attribute data hierarchical resource profile
• Widely used in Kantara, OpenID, • See: http://www.oasis-
other frameworks open.org/committees/xacml
• See: http://www.oasis-
open.org/committees/security Provisioning Services
WS-Federation TC / WS-Trust (SPML) TC
• Message exchange and • Common XML language for
provisioning and allocation of
metadata/token policy control
enterprise identity
• Federation and brokered trust
• Builds on LDAP, Active Directory,
capabilities
DSML
• See: http://www.oasis-
• See: http://www.oasis-
open.org/committees/wsfed
open.org/committees/provision
21. The Open Cloud Manifesto:
from the mouths of buyers
CIOs, governments, IT users and business leaders establish a
set of core principles for cloud providers.
Cloud architecture should be scalable on demand; enable cost
savings by increasing opportunities via re-use and outsourcing;
and support portability among vendors and systems.
This can and should be achieved by using collaborative open
standards, most of which already are available and in use, to
fulfill cloud security, integration, data sharing, policy
governance, network management and monitoring functions.
Customers, vendors and standards bodies must work together
to make good use of existing methods, and avoid excessive
duplication, rather than “reinventing the wheel.”
22. Open Cloud means
Open Standards.
So far, so good.
James Bryce Clark
jamie.clark@oasis-open.org
+1.978.667.5115