Using Familiar BI Tools and Hadoop to Analyze Enterprise NetworksMapR Technologies
From the Hadoop Summit 2015 Session with Nick Amato.
This session examines practical ways you can begin leveraging network data sources in Hadoop using familiar technologies like SQL and BI tools. Using the diverse sets of sources available, such as traces, routing protocol data, and direct packet captures from critical network locations, we will examine the capabilities of BI tools in the network context and examine cases for extracting value from data collected from the network infrastructure.
De Raspberry Pi is een minicomputer (de grootte van een bankkaart) met ARM-processors die tegen een minimale prijs (v.a. 30 euro) wordt vervaardigd en verkocht. De Raspberry Pi werd ontwikkeld aan de Universiteit van Cambridge en is bedoeld voor educatieve doeleinden. Sinds zijn introductie in januari 2012 kent de Raspberry Pi een enorm succes bij technici allerhande (academici, onderzoekers, bedrijfswereld, hobbyisten, kunstenaars, ...).
Mogelijke toepassingen van de Raspberry Pi zijn:
bestandsserver of NAS (Network Attached Storage), mailserver, webserver
HTPC (Home Theater PC)
telefooncentrale (Asterisk PBX SIP)
voordeur-monitor (webcam)
enzoverder
In deze sessie geeft Koen De Smet een korte introductie en demontreert hij enkele voorbeeldprojectjes met de Raspberry Pi.
Cursus: Deel 3 - Raspberry Pi als compact mediacenterIDG Nederland
Vind je het onhandig dat je jouw computer ‘s avonds niet kunt uitschakelen omdat hij nog torrents aan het downloaden is? Met de Raspberry Pi kan je zelf een energiezuinige computer maken die torrents downloadt en die je probleemloos aan laat staan. We hangen er een externe harde schijf aan en installeren Deluge, een opensource bittorrent-pakket. Op een Windows-pc draai je de desktopclient van Deluge, die dan al je bittorrent-taken afhandelt in combinatie met de Deluge-server op je Raspberry Pi. Tot slot zorgen we ervoor dat je Raspberry Pi de gedownloade bestanden op je netwerk deelt, zodat je er eenvoudig toegang tot hebt. Kortom: bouw je eigen torrentbox!
Using Familiar BI Tools and Hadoop to Analyze Enterprise NetworksMapR Technologies
From the Hadoop Summit 2015 Session with Nick Amato.
This session examines practical ways you can begin leveraging network data sources in Hadoop using familiar technologies like SQL and BI tools. Using the diverse sets of sources available, such as traces, routing protocol data, and direct packet captures from critical network locations, we will examine the capabilities of BI tools in the network context and examine cases for extracting value from data collected from the network infrastructure.
De Raspberry Pi is een minicomputer (de grootte van een bankkaart) met ARM-processors die tegen een minimale prijs (v.a. 30 euro) wordt vervaardigd en verkocht. De Raspberry Pi werd ontwikkeld aan de Universiteit van Cambridge en is bedoeld voor educatieve doeleinden. Sinds zijn introductie in januari 2012 kent de Raspberry Pi een enorm succes bij technici allerhande (academici, onderzoekers, bedrijfswereld, hobbyisten, kunstenaars, ...).
Mogelijke toepassingen van de Raspberry Pi zijn:
bestandsserver of NAS (Network Attached Storage), mailserver, webserver
HTPC (Home Theater PC)
telefooncentrale (Asterisk PBX SIP)
voordeur-monitor (webcam)
enzoverder
In deze sessie geeft Koen De Smet een korte introductie en demontreert hij enkele voorbeeldprojectjes met de Raspberry Pi.
Cursus: Deel 3 - Raspberry Pi als compact mediacenterIDG Nederland
Vind je het onhandig dat je jouw computer ‘s avonds niet kunt uitschakelen omdat hij nog torrents aan het downloaden is? Met de Raspberry Pi kan je zelf een energiezuinige computer maken die torrents downloadt en die je probleemloos aan laat staan. We hangen er een externe harde schijf aan en installeren Deluge, een opensource bittorrent-pakket. Op een Windows-pc draai je de desktopclient van Deluge, die dan al je bittorrent-taken afhandelt in combinatie met de Deluge-server op je Raspberry Pi. Tot slot zorgen we ervoor dat je Raspberry Pi de gedownloade bestanden op je netwerk deelt, zodat je er eenvoudig toegang tot hebt. Kortom: bouw je eigen torrentbox!
Memory forensics using VMI for cloud computingPriyanka Aash
The relocation of systems and services into cloud environments is on the rise. Because of this trend users lose direct control over their machines and depend on the offered services from cloud providers. These services are especially in the field of digital forensics very rudimentary. The possibilities for users to analyze their virtual machines with forensic methods are very limited. In the underlying research of this talk a practical approach has been developed that gives the user additional capabilities in the field of forensic investigations. The solution focuses on a memory forensic service offering. To reach this goal, a management solution for cloud environments has been extended with memory forensic services. Self-developed memory forensic services, which are installed on each cloud node and are managed through the cloud management component, are the basis for this solution. Forensic data is gained via virtual machine introspection techniques. Compared to other approaches it is possible to get trustworthy data without influencing the running system. Additionally, a general overview about the underlying technologies is provided and the pros and cons are discussed. The solution approach is discussed in a generic way and practically implemented in a prototype. In this prototype OpenNebula is used for managing the cloud infrastructure in combination with Xen as virtualization component, LibVMI as Virtual Machine Introspection library and Volatility as forensic tool.
(Source: Black Hat USA 2016, Las Vegas)
Performance trends and alerts with ThingSpeak IoTAnoush Najarian
We use data analysis and visualization capabilities of ThingSpeak, our favorite Internet of Things platform to capture and analyze performance data, to help with performance monitoring and to generate alerts
Using Java Script and COMPOSE to build cool IoT applications, SenZations 2015SenZations Summer School
Presentation by Charalampos Doukas: Learn how to use Node.js and JavaScript to program both your IoT hardware and your Cloud application using Open Source tools and the COMPOSE platform. Device sensing and interaction from the Cloud through JavaScript
Memory forensics using VMI for cloud computingPriyanka Aash
The relocation of systems and services into cloud environments is on the rise. Because of this trend users lose direct control over their machines and depend on the offered services from cloud providers. These services are especially in the field of digital forensics very rudimentary. The possibilities for users to analyze their virtual machines with forensic methods are very limited. In the underlying research of this talk a practical approach has been developed that gives the user additional capabilities in the field of forensic investigations. The solution focuses on a memory forensic service offering. To reach this goal, a management solution for cloud environments has been extended with memory forensic services. Self-developed memory forensic services, which are installed on each cloud node and are managed through the cloud management component, are the basis for this solution. Forensic data is gained via virtual machine introspection techniques. Compared to other approaches it is possible to get trustworthy data without influencing the running system. Additionally, a general overview about the underlying technologies is provided and the pros and cons are discussed. The solution approach is discussed in a generic way and practically implemented in a prototype. In this prototype OpenNebula is used for managing the cloud infrastructure in combination with Xen as virtualization component, LibVMI as Virtual Machine Introspection library and Volatility as forensic tool.
(Source: Black Hat USA 2016, Las Vegas)
Performance trends and alerts with ThingSpeak IoTAnoush Najarian
We use data analysis and visualization capabilities of ThingSpeak, our favorite Internet of Things platform to capture and analyze performance data, to help with performance monitoring and to generate alerts
Using Java Script and COMPOSE to build cool IoT applications, SenZations 2015SenZations Summer School
Presentation by Charalampos Doukas: Learn how to use Node.js and JavaScript to program both your IoT hardware and your Cloud application using Open Source tools and the COMPOSE platform. Device sensing and interaction from the Cloud through JavaScript
Ben Kehoe - Serverless Architecture for the Internet of ThingsServerlessConf
Presented at ServerlessConf NYC 2016.
iRobot is transitioning the cloud infrastructure for our IoT system to AWS with the goal of using zero EC2 instances. I'll cover our general architecture (AWS IoT, API Gateway, Lambda, etc.), our CloudFormation+Lambda deployment strategy, and the hardest patterns to make serverless on AWS.
"In love with Open Source : Past, Present and Future" : Keynote OSDConf 2014Piyush Kumar
OPEN SOURCE DEVELOPERS CONFERENCE http://osdconf.in/
★ April 26-27th, Noida ★
Keynote Session By Piyush Kumar (Lead of Infrastructure and Website Operations at MakeMyTrip)
10 Big Data Technologies you Didn't Know About Jesus Rodriguez
This session covers 9 new and exciting big data technologies that are starting to become relevant in the enterprise. The session focuses on technologies that are still not mainstream but that have the potential to influence the next generation of enterprise big data solutions
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1Adam Dunkels
How to build the Internet of Things - what is an Internet of things device and how do we connect it? This is the first Thingsquare IoT workshop slide deck.
Building Modern Digital Services on Scalable Private Government Infrastructur...Andrés Colón Pérez
These are a series of presentations and knowledge collected from the web to help knowledge sharing at the government of Puerto Rico, created with the hope of helping transform government culture by engaging key personnel in diverse areas of central government IT. We discussed design and development methodologies as well as implementation, network and server technologies that led to the successful launch of the most popular online service in PR.gov, in the hope that the knowledge is retained and used to prevent problems that have plagued digital services of the past.
How did Puerto Rico build the New Good standing Certificate Online Service? How did it scale to handle millions of visitors while having 0 licensing costs? This is the technical overview of the design, philosophy and implementation.
- Good standing certificate knowledge transfer presentation by Andrés Colón
Note on attribution: some content such as logos and designs were used from the web. Rights remain with their original authors. Thanks for sharing with the world.
Cloud Services Powered by IBM SoftLayer and NetflixOSSaspyker
This presentation covers our work starting with Acme Air web scale and transitioning to operational lessons learned in HA, automatic recovery, continuous delivery, and operational visibility. It shows the port of the Netflix OSS cloud platform to IBM's cloud - SoftLayer and use of RightScale.
How to scale your PaaS with OVH infrastructure?OVHcloud
ForePaaS has developed an “as-a-service” platform which lets you automate an infrastructure designed for analytical applications. The company has formed a cloud partnership with OVH in order to deliver flexible solutions for containerised and high-performance tools, such as Kunernetes and Docker.
Scalable Open-Source IoT Solutions on Microsoft AzureMaxim Ivannikov
Scalable Open-Source IoT Solutions from gateways to the Cloud using DeviceHive, Ubuntu Snappy Core and Microsoft Azure.
The presentation was used during the NY Open-Source IoT Solutions Summit on November 12, 2015.
DNUG46 - Build your own private Cloud environmentpanagenda
Visit Nicos presentation to learn how you can build your own private on-premises cloud. The aim of this session is to give you an overview of how to build a private cloud environment, taking into account necessary requirements based on Kubernetes.
Nico will talk to you about cluster provisioning itself and the Toolchain you need to run your environment successfully. In the foreground are topics like infrastructure as code, CI/CD, storage, monitoring, high availability and security. Gain the knowledge and best practices you need to build your own private cloud environment.
Follow Nico on: https://pan.news/NicoMeisenzahlSlideShare
Besuchen Sie Nicos Vortrag um zu erfahren wie Sie Ihre eigene Private Cloud on-premises aufbauen können. Ziel dieser Session ist es, dass Sie einen Überblick erhalten, wie man eine Private Cloud Umgebung auf Basis von Kubernetes, unter Berücksichtigung notwendiger Anforderungen, aufbaut.
Nico wird mit Ihnen über das Cluster Provisioning selbst sowie die benötigte Toolchain sprechen, die Sie benötigen um die eigene Umgebung erfolgreich zu betreiben. Im Vordergrund stehen dabei Themen wie Infrastructure as Code, CI/CD, Storage, Monitoring, Hochverfügbarkeit und Sicherheit. Erhalten Sie das notwendige Wissen sowie Best Practices, die Ihnen beim Aufbau Ihrer eigenen Private Cloud-Umgebung helfen.
Unified Device Management via Java-enabled Network DevicesTal Lavian Ph.D.
Java-enabled Network Devices
“Feature-on-demand” for devices
New class of system level Optivity applications in the form of distributed “Optlets”
characterized by system applications that require intensive interaction between NMS and device and/or across multiple devices
potential applications are topology, design analysis, diagnostics, policy implementations
Benefits and value:
Enabling component of a new intelligent network architecture
distributed applications-on-demand
component of AI (artificial intelligence) enabling infrastructure
roaming diagnostics and self-healing capabilities
built-in support for open industry ISV support
Similar to Open / Free Cloud platforms and Open Hardware Systems (20)
Fostering Connectivity & Interactivity Between all Urban EntitiesCharalampos Doukas
Talk about connectivity & interactivity in the context of IoT and citizen participation. Presented at RE.WORK - Future Cities Summit, London, December 2014
A Full End-to-End Platform as a Service for SmartCity ApplicationsCharalampos Doukas
Presentation at the 10th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications - WiMob2014, about using COMPOSE project components for building Smart City application
Building an IoT Marketplace for Makers & EntrepreneursCharalampos Doukas
This presentation was given at the BDigitla IoT Forum in Barcelona on December 12th, 2013. It presents the EU project COMPOSE (http://www.compose-project.eu/) and the concept of a PaaS and marketplace for IoT apps and services.
Presentation given on the IoT Day (April 9th) at IoTItaly in Trento, Italy about IoT basics, projects, current trends and what the future shall look like
Enabling Data Protection through PKI encryption in IoT m-Health DevicesCharalampos Doukas
Short presentation about a gateway-based solution for medical data encryption and the Internet of Things. Paper presented at 12th IEEE International Conference on BioInformatics and BioEngineering
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Open / Free Cloud platforms and Open Hardware Systems
1. Open/Free Cloud Platforms and
Open Hardware Systems
Charalampos Doukas
Information & Communication Systems
Engineer
ch.doukas@gmail.com
www.buildinginternetofthings.com
2. Overview
• Cloud Computing – Some basic concepts
you should know
• Free / Open Platforms
• Open Hardware
• Communication Protocols M2M – M2Web
• Examples
9. Cloud Computing – The Basics
• Open Hardware communication
• What for?
– Applications (need Web interfaces)
– DB Communication - Data management
– Interfaces (REST APIs, …)
10. Cloud Computing – The Basics
• Open Hardware communication – An
example:
– I have an innovative idea for an application
– Devices– Sensors can become “friends” and
exchange data
– Based on common features – form groups
11. Cloud Computing – The Basics
• Open Hardware communication – An
example:
• Pro – Cloud era:
– Internet connection
– Server (CPU, RAM, HDD, Ethernet..)
12. Cloud Computing – The Basics
• Open Hardware communication – An
example:
• Pro – Cloud era:
– Apache (Web Interface)
– MySQL, NoSQL, ….
– Application server
13. Cloud Computing – The Basics
• Open Hardware communication – An
example:
• Pro – Cloud era:
– Backup
– UPS
– 2+… Servers (Failure node, Test node)
14. Cloud Computing – The Basics
• Open Hardware communication – An
example:
• Pro – Cloud era:
– One instance: 100-1000 sensors (?)
– Scalability?
– $$$$$$
15. Cloud Computing – The Basics
• Open Hardware communication – An
example:
• Cloud era:
– PaaS / IaaS Provider
– Focus on the Application / Data collection
– $$ .... ->$$$$$
23. Platforms for managing sensor
data
My Android client:
http://tinyurl.com/PachubeViewer
Free
24. Platforms for managing sensor
data
• ThingSpeak
Open
https://www.thingspeak.com
https://github.com/iobridge/Thi
ngSpeak
25. Platforms for managing sensor
data
• ThingSpeak
– Open Source API
– Real-time data collection
– Data processing Open
– Data visualizations
– Location-awareness
– Status context
– Application infrastructure
– Twitter proxy
– Apps, Plugins
29. Platforms for managing sensor
data
• EVRYTHNG
• Specs:
– REST API
Free
– Visualization
http://evrythng.net/
– Triggers
30. Platforms for managing sensor
data
• Nimbits Public Cloud Server nimbits.co
m
• Specs:
Open
– REST API
– Visualization
http://nimbits.com
– Triggers / Alarms
31. Platforms for managing sensor
data
• Nimbits Public Cloud Server nimbits.co
m
• Specs:
Open
– Social Networks
– M2M Επικοινωνία
http://nimbits.com
– Google App Engine
32. Platforms for managing sensor
data
• Nimbits Public Cloud Server nimbits.co
m
• Specs:
Open
– Intelligence!
• WolframAlpha
http://nimbits.com
33. Platforms for managing sensor
data
• Nimbits Public Cloud Server nimbits.co
m
• Specs:
Open
http://nimbits.com
35. Open Hardware
• What is Open Hardware?
– Free – Open Source Software (not free
hardware!)
– Open schematics – build instructions
– Mostly found as :
• Microcontrollers
• Linux boards
36. Open Hardware
• Arduino
– No special introduction needed!
– Microcontroller platforms
– Great community support
– A lot of apps + extensions
37. Open Hardware
• Arduino – Communication
– Ethernet
– WiFi
– GPRS
– Through Android - Computer
49. Communication Protocols
– Constrained Application Protocol (CoAP)
– Based on HTTP principles
• RESTful communication
• BUT: UDP protocol
– Supports multicast
(-) Needs special ports open (5683 not 80/8080)
Still Draft protocol
50. Communication Protocols
– Message Queue Telemetry Transport (MQTT)
– Machine 2 Machine
– Publish / Subscribe Model
– Already used by applications
• Facebook messenger (iPhone/Android)
– Open protocol
– You need special software server
– There is an Arduino library available!
51. Examples
• Anything that can be connected to the
Arduino
– Sensors
– Control (relay) switches
• Cloud ->
– Manage / Visualize data
– Remote Control
52. Examples
• Ideas for some Projects …
– Read barcodes + Send information on the
Cloud (Cloud-based shopping list)
– Control power consumption
(openenergymonitor.org)
– Web home automation (smart home)