This document discusses Phala Network, a permissionless global compute cloud that supports data privacy while remaining trustless. It aims to disrupt major cloud providers by providing a decentralized "Web3 cloud" that combines the performance of centralized programs with the trustlessness of distributed apps. The trustless nature is achieved through a NPoS system and using trusted execution environments (TEEs) on worker nodes. A roadmap outlines initial testnets leading to a parachain on Polkadot that will provide a private, scalable cloud to power decentralized finance and data marketplace applications.
Introducing Moonbeam: A Smart Contract Parachain with Ethereum CompatibilityPureStake
Derek Yoo, CEO of PureStake, introduced the Moonbeam network at the virtual Sub0 conference in April 2020. Moonbeam is focused on making it easier for developers to build applications that are natively interoperable with other blockchains and technologies by providing Ethereum compatibility. Learn more about Moonbeam: https://moonbeam.network/
Introducing Moonbeam: A Smart Contract Parachain with Ethereum CompatibilityPureStake
Derek Yoo, CEO of PureStake, introduced the Moonbeam network at the virtual Sub0 conference in April 2020. Moonbeam is focused on making it easier for developers to build applications that are natively interoperable with other blockchains and technologies by providing Ethereum compatibility. Learn more about Moonbeam: https://moonbeam.network/
Blockchain 101: An Introduction to the Blockchain EcosystemPureStake
Derek Yoo, CEO of PureStake, gave an introductory talk on blockchain to the Boston New Technology group in September 2019. In it, he covers: consensus mechanisms (proof of work vs. proof of stake), why blockchains are interesting, popular networks & potential applications for each, and the blockchain trilemma (optimizing for security, scalability, or decentralization). Learn more: www.purestake.com
This is an introduction to the basics of the multi-blockchain ecosystems built by Polkadot and Kusama. These multi-chain networks are enabling blockchain scalability, interoperability, on-chain governance, custom blockchains (parachains) built with Substrate, plug-and-play security, and self-upgrades. Parachains launching on Polkadot and Kusama include Acala and Karura for decentralized finance (DeFi).
This was presented at the "Microservices for Enterprises" meetup, March 31, 2016 in Palo Alto, California.
We review the experience of deploying Project Calico in enterprise container environments, and compare/contrast with traditional virtual networking approaches.
Istio Cloud Native Online Series - Intro to Istio SecurityMatt Baldwin
This talk was presented by Dr. Tao Li on 11/29/2017 at the Cloud Native Online meetup.
https://www.meetup.com/Cloud-Native-Online-Meetup/events/245027581/
Summary:
In today's talk, Tao will cover the general Istio Security roadmap, including authentication and authorization. And then he will focus on the authentication part from CA to node identity to workload identity.
Bio:
Dr. Tao Li is a software engineer at Google. He has been with Google for more than 5 years. Currently he serves as a TL of Istio Security, focusing on Authentication, which includes CA, identity provisioning, service-to-service communication, etc.
Organized by StackPointCloud - https://stackpoint.io
OpenStack Israel Meetup - Project Kuryr: Bringing Container Networking to Neu...Cloud Native Day Tel Aviv
Kuryr is a new project, started by Gal Sagie, that makes Neutron networking available to containers networking used in Docker / Kubernetes and others.
Kuryr aims at bridging the gap between containers orchestration engines and models to OpenStack networking abstraction and expose Neutron flexibility/features and advanced services to containers networking.
Dynamic routing in microservice oriented architectureDaniel Leon
When splitting an application into different micro-services and each application access URL is dynamically generated, the hell gets loose. If you are tired of manually setting a route in your ngnix, come see linkerd in action.
Ethermint 2.0: An Ethereum Scaling Solution by CosmosTendermint Inc
Cosmos & Tendermint announces the Ethereum Virtual Machine (EVM) module for the Cosmos SDK. The Cosmos SDK easily allows developers to build their own interoperable blockchain. The EVM module lets Ethereum developers start experimenting a Proof of Stake today.
HD Slides: https://github.com/cosmos/cosmos-academy/raw/master/presentations/2018-10-31-devcon4/ethermint-2.0.pdf
Website: https://cosmos.network
By Michael Catanzaro.
Major Linux distributions have a problem with WebKit security. Whereas major desktop browsers push automatic security updates directly to users on a regular basis so that users don’t have to worry about updates, Linux users are dependent on their distributions to release updates. Well over 100 vulnerabilities that could allow remote code execution were fixed in WebKit last year, so getting updates out to users is critical. This talk examines the disconnect between how the WebKit project handles security issues upstream and how different major distributions do (or do not) handle security issues, shows that WebKit security issues have widespread impact even for users who do not use a WebKit-based web browser, and discusses the security consequences of the split between the original WebKit API and WebKit2.
Patterns for Asynchronous Microservices with NATSApcera
Presentation from a talk by Raul Perez (@repejota) of R3Labs on asynchronous microservices patterns using NATS (@nats_io), the lightweight, high performance open source messaging system written in Go.
You can learn more about NATS at http://www.nats.io
Device connectivity is one of the most common issues IoT developers need to solve. Having an open source solution based on the standardized protocols that solves recurring connectivity problems is a very useful tool to have. Meet Eclipse Hono, a cloud-based IoT connectivity platform which provides remote interfaces for device connectivity and mechanisms for uniform interaction with devices regardless of the communication protocol. This session will explain basic ideas and concepts behind Eclipse Hono project, like APIs and communication patterns that Hono provides, its architecture and deployment options. Next, we'll get into the recent development efforts and explain architectural changes made in order to provide more flexibility and better integration with other components of the IoT stack, like messaging, identity management solutions and device registration services.
While scalable messaging is one of the crucial pre-requirements for device connectivity, the goal of Eclipse Hono is not to provide its own solution in this space but rather work with other cloud-based messaging platforms. One such project is called EnMasse (https://github.com/EnMasseProject/enmasse) and it provides an open source solution for deploying scalable messaging infrastructure in the cloud. The rest of the session will introduce basics of the EnMasse project and show how Hono and EnMasse can work together to provide a truly scalable device connectivity. The session will end with a demo showing Hono and EnMasse in action providing scalable device connectivity for IoT applications.
Despite the fact that the Web3 developer ecosystem is a small part of the greater online developer ecosystem, it appears to be rapidly increasing, so it makes sense to try to figure out what makes up the Web3 tech stack. This is the main reason why companies have started investing their time in it. As a result of which various Web3 Development Company
have emerged as per the changing trends in the market.
ITPC Building Modern Data Streaming AppsTimothy Spann
ITPC Building Modern Data Streaming Apps
https://princetonacm.acm.org/tcfpro/
17th Annual IEEE IT Professional Conference (ITPC)
Armstrong Hall at The College of New Jersey
Friday, March 17th, 2023 at 8:30 AM to 5:00 PM
TCF Photo
In continuous operation since 1976, the Trenton Computer Festival (TCF) is the nation's longest running personal computer. For the seventeenth year, the TCF is extending its program to provide Information Technology and computer professionals with an additional day of conference. It is intended, in an economical way, to provide attendees with insight and information pertinent to their jobs, and to keep them informed of emerging technologies that could impact their work.
The IT Professional Conference is co-sponsored by the Institute of Electrical and Electronics Engineers (IEEE) Computer Society Chapter of Princeton / Central Jersey.
11:00am Building Modern Data Streaming Apps
presented by
Timothy Spann
Building Modern Data Streaming Apps
In this session, I will show you some best practices I have discovered over the last seven years in building data streaming applications including IoT, CDC, Logs, and more.
In my modern approach, we utilize several Apache frameworks to maximize the best features of all. We often start with Apache NiFi as the orchestrator of streams flowing into Apache Pulsar. From there we build streaming ETL with Spark, enhance events with Pulsar Functions for ML and enrichment. We build continuous queries against our topics with Flink SQL.
Timothy Spann
Tim Spann is a Principal Developer Advocate in Data In Motion for Cloudera. He works with Apache NiFi, Apache Pulsar, Apache Kafka, Apache Flink, Flink SQL, Apache Pinot, Trino, Apache Iceberg, DeltaLake, Apache Spark, Big Data, IoT, Cloud, AI/DL, machine learning, and deep learning. Tim has over ten years of experience with the IoT, big data, distributed computing, messaging, streaming technologies, and Java programming.
Previously, he was a Developer Advocate at StreamNative, Principal DataFlow Field Engineer at Cloudera, a Senior Solutions Engineer at Hortonworks, a Senior Solutions Architect at AirisData, a Senior Field Engineer at Pivotal and a Team Leader at HPE. He blogs for DZone, where he is the Big Data Zone leader, and runs a popular meetup in Princeton & NYC on Big Data, Cloud, IoT, deep learning, streaming, NiFi, the blockchain, and Spark.
Tim is a frequent speaker at conferences such as ApacheCon, DeveloperWeek, Pulsar Summit and many more. He holds a BS and MS in computer science.
Blockchain 101: An Introduction to the Blockchain EcosystemPureStake
Derek Yoo, CEO of PureStake, gave an introductory talk on blockchain to the Boston New Technology group in September 2019. In it, he covers: consensus mechanisms (proof of work vs. proof of stake), why blockchains are interesting, popular networks & potential applications for each, and the blockchain trilemma (optimizing for security, scalability, or decentralization). Learn more: www.purestake.com
This is an introduction to the basics of the multi-blockchain ecosystems built by Polkadot and Kusama. These multi-chain networks are enabling blockchain scalability, interoperability, on-chain governance, custom blockchains (parachains) built with Substrate, plug-and-play security, and self-upgrades. Parachains launching on Polkadot and Kusama include Acala and Karura for decentralized finance (DeFi).
This was presented at the "Microservices for Enterprises" meetup, March 31, 2016 in Palo Alto, California.
We review the experience of deploying Project Calico in enterprise container environments, and compare/contrast with traditional virtual networking approaches.
Istio Cloud Native Online Series - Intro to Istio SecurityMatt Baldwin
This talk was presented by Dr. Tao Li on 11/29/2017 at the Cloud Native Online meetup.
https://www.meetup.com/Cloud-Native-Online-Meetup/events/245027581/
Summary:
In today's talk, Tao will cover the general Istio Security roadmap, including authentication and authorization. And then he will focus on the authentication part from CA to node identity to workload identity.
Bio:
Dr. Tao Li is a software engineer at Google. He has been with Google for more than 5 years. Currently he serves as a TL of Istio Security, focusing on Authentication, which includes CA, identity provisioning, service-to-service communication, etc.
Organized by StackPointCloud - https://stackpoint.io
OpenStack Israel Meetup - Project Kuryr: Bringing Container Networking to Neu...Cloud Native Day Tel Aviv
Kuryr is a new project, started by Gal Sagie, that makes Neutron networking available to containers networking used in Docker / Kubernetes and others.
Kuryr aims at bridging the gap between containers orchestration engines and models to OpenStack networking abstraction and expose Neutron flexibility/features and advanced services to containers networking.
Dynamic routing in microservice oriented architectureDaniel Leon
When splitting an application into different micro-services and each application access URL is dynamically generated, the hell gets loose. If you are tired of manually setting a route in your ngnix, come see linkerd in action.
Ethermint 2.0: An Ethereum Scaling Solution by CosmosTendermint Inc
Cosmos & Tendermint announces the Ethereum Virtual Machine (EVM) module for the Cosmos SDK. The Cosmos SDK easily allows developers to build their own interoperable blockchain. The EVM module lets Ethereum developers start experimenting a Proof of Stake today.
HD Slides: https://github.com/cosmos/cosmos-academy/raw/master/presentations/2018-10-31-devcon4/ethermint-2.0.pdf
Website: https://cosmos.network
By Michael Catanzaro.
Major Linux distributions have a problem with WebKit security. Whereas major desktop browsers push automatic security updates directly to users on a regular basis so that users don’t have to worry about updates, Linux users are dependent on their distributions to release updates. Well over 100 vulnerabilities that could allow remote code execution were fixed in WebKit last year, so getting updates out to users is critical. This talk examines the disconnect between how the WebKit project handles security issues upstream and how different major distributions do (or do not) handle security issues, shows that WebKit security issues have widespread impact even for users who do not use a WebKit-based web browser, and discusses the security consequences of the split between the original WebKit API and WebKit2.
Patterns for Asynchronous Microservices with NATSApcera
Presentation from a talk by Raul Perez (@repejota) of R3Labs on asynchronous microservices patterns using NATS (@nats_io), the lightweight, high performance open source messaging system written in Go.
You can learn more about NATS at http://www.nats.io
Device connectivity is one of the most common issues IoT developers need to solve. Having an open source solution based on the standardized protocols that solves recurring connectivity problems is a very useful tool to have. Meet Eclipse Hono, a cloud-based IoT connectivity platform which provides remote interfaces for device connectivity and mechanisms for uniform interaction with devices regardless of the communication protocol. This session will explain basic ideas and concepts behind Eclipse Hono project, like APIs and communication patterns that Hono provides, its architecture and deployment options. Next, we'll get into the recent development efforts and explain architectural changes made in order to provide more flexibility and better integration with other components of the IoT stack, like messaging, identity management solutions and device registration services.
While scalable messaging is one of the crucial pre-requirements for device connectivity, the goal of Eclipse Hono is not to provide its own solution in this space but rather work with other cloud-based messaging platforms. One such project is called EnMasse (https://github.com/EnMasseProject/enmasse) and it provides an open source solution for deploying scalable messaging infrastructure in the cloud. The rest of the session will introduce basics of the EnMasse project and show how Hono and EnMasse can work together to provide a truly scalable device connectivity. The session will end with a demo showing Hono and EnMasse in action providing scalable device connectivity for IoT applications.
Despite the fact that the Web3 developer ecosystem is a small part of the greater online developer ecosystem, it appears to be rapidly increasing, so it makes sense to try to figure out what makes up the Web3 tech stack. This is the main reason why companies have started investing their time in it. As a result of which various Web3 Development Company
have emerged as per the changing trends in the market.
ITPC Building Modern Data Streaming AppsTimothy Spann
ITPC Building Modern Data Streaming Apps
https://princetonacm.acm.org/tcfpro/
17th Annual IEEE IT Professional Conference (ITPC)
Armstrong Hall at The College of New Jersey
Friday, March 17th, 2023 at 8:30 AM to 5:00 PM
TCF Photo
In continuous operation since 1976, the Trenton Computer Festival (TCF) is the nation's longest running personal computer. For the seventeenth year, the TCF is extending its program to provide Information Technology and computer professionals with an additional day of conference. It is intended, in an economical way, to provide attendees with insight and information pertinent to their jobs, and to keep them informed of emerging technologies that could impact their work.
The IT Professional Conference is co-sponsored by the Institute of Electrical and Electronics Engineers (IEEE) Computer Society Chapter of Princeton / Central Jersey.
11:00am Building Modern Data Streaming Apps
presented by
Timothy Spann
Building Modern Data Streaming Apps
In this session, I will show you some best practices I have discovered over the last seven years in building data streaming applications including IoT, CDC, Logs, and more.
In my modern approach, we utilize several Apache frameworks to maximize the best features of all. We often start with Apache NiFi as the orchestrator of streams flowing into Apache Pulsar. From there we build streaming ETL with Spark, enhance events with Pulsar Functions for ML and enrichment. We build continuous queries against our topics with Flink SQL.
Timothy Spann
Tim Spann is a Principal Developer Advocate in Data In Motion for Cloudera. He works with Apache NiFi, Apache Pulsar, Apache Kafka, Apache Flink, Flink SQL, Apache Pinot, Trino, Apache Iceberg, DeltaLake, Apache Spark, Big Data, IoT, Cloud, AI/DL, machine learning, and deep learning. Tim has over ten years of experience with the IoT, big data, distributed computing, messaging, streaming technologies, and Java programming.
Previously, he was a Developer Advocate at StreamNative, Principal DataFlow Field Engineer at Cloudera, a Senior Solutions Engineer at Hortonworks, a Senior Solutions Architect at AirisData, a Senior Field Engineer at Pivotal and a Team Leader at HPE. He blogs for DZone, where he is the Big Data Zone leader, and runs a popular meetup in Princeton & NYC on Big Data, Cloud, IoT, deep learning, streaming, NiFi, the blockchain, and Spark.
Tim is a frequent speaker at conferences such as ApacheCon, DeveloperWeek, Pulsar Summit and many more. He holds a BS and MS in computer science.
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
https://www.youtube.com/watch?v=Yeua8NlzQ3Y
https://www.conf42.com/Large_Language_Models_LLMs_2024_Tim_Spann_generative_ai_streaming
Adding Generative AI to Real-Time Streaming Pipelines
Abstract
Let’s build streaming pipelines that convert streaming events into prompts, call LLMs, and process the results.
Summary
Tim Spann: My talk is adding generative AI to real time streaming pipelines. I'm going to discuss a couple of different open source technologies. We'll touch on Kafka, Nifi, Flink, Python, Iceberg. All the slides, all the code and GitHub are out there.
Llm, if you didn't know, is rapidly evolving. There's a lot of different ways to interact with models. That enrichment, transformation, processing really needs tools. The amount of models and projects and software that are available is massive.
Nifi supports hundreds of different inputs and can convert them on the fly. Great way to distribute your data quickly to whoever needs it without duplication, without tight coupling. Fun to find new things to integrate into.
So what we can do is, well, I want to get a meetup chat going. I have a processor here that just listens for events as they come from slack. And then I'm going to clean it up, add a couple fields and push that out to slack. Every model is a little bit of different tweaking.
Nifi acts as a whole website. And as you see here, it can be get, post, put, whatever you want. We send that response back to flink and it shows up here. Thank you for attending this talk. I'm going to be speaking at some other events very shortly.
Transcript
This transcript was autogenerated. To make changes, submit a PR.
Hi, Tim Spann here. My talk is adding generative AI to real time streaming pipelines, and we're here for the large language model conference at Comp 42, which is always a nice one, great place to be. I'm going to discuss a couple of different open source technologies that work together to enable you to build real time pipelines using large language models. So we'll touch on Kafka, Nifi, Flink, Python, Iceberg, and I'll show you a little bit of each one in the demos. I've been working with data machine learning, streaming IoT, some other things for a number of years, and you could contact me at any of these places, whether Twitter or whatever it's called, some different blogs, or in person at my meetups and at different conferences around the world. I do a weekly newsletter, cover streaming ML, a lot of LLM, open source, Python, Java, all kinds of fun stuff, as I mentioned, do a bunch of different meetups. They are not just in the east coast of the US, they are available virtually live, and I also put them on YouTube, and if you need them somewhere else, let me know. We publish all the slides, all the code and GitHub. Everything you need is out there. Let's get into the talk. Llm, if you didn't know, is rapidly evolving. While you're typing down the things that you use, it
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxtodd581
Running head: NETWORK INFRASTRUCTURE AND SECURITY
1
NETWORK INFRASTRUCTURE AND SECURITY
2
Project Deliverable 5: Network Infrastructure and Security
CIS 499 – Information Systems Capstone
November 25, 2018
Project Scope
The project will comprise of a network design to meet Acme Corporation network infrastructure requirements. The network should accommodate occasional guest users of up to 10 users. The network design will incorporate an FTP server that will use for sharing files. The project should involve separate subnet for guest and LAN networks; the guest network should be restricted to access only FTP service on the FTP server while all other access to the LAN network will be blocked. The project will also involve IP Network Design as well as identification and configuration details of the hardware utilized (Switches and Routers). Included in the network design is the implementation of a Wireless LAN (WLAN) that minimizes the management effort to configure and manage while allowing effective data transmission between the Wireless Application Protocols (WAPs).
Network design
The network will use a star topology where it provides centralized handling of the network and its’ associated security. Each of the floors of the building will have a central server which host switches that link the different rooms via ethernet cables. Each of the rooms will have a switch that is linked to the central server's router. The servers will be linked via fiber optic cables. The ethernet cables will be utilized for connecting individual devices to their associated switches. The network design will involve the utilization of both wired and wireless media. The wireless media will allow for a network connection for portable devices like tablets, cell phones, and laptops.
The switch links allow the traffic getting into the Acme’s LAN from the MAN not to be congested. As more tablets are utilized in the company, the WLAN bandwidth increases significantly to each room. This requires that the WAPs supporting the 802.11n protocol as well as faster 802.11ac standard require additional power. As a result, switches with PoE+ give the required power. These Switches utilize the existing Category-6 cable (Ethernet cables) that allow for remote administration and configuration (Karris, 2009).
Virtual LANs (VLAN) will be used to enables the network administrator to group users into shared broadcast domains irrespective of their physical position in the internetwork. For instance, computer devices utilized by employees on two different floors may be placed on the same VLAN. The staff has their VLAN while the Guest VLAN is used by guests when using wireless access points.
The company's network perimeter that detaches it from the Internet comprises of two border core routers. The border routers should then link to the Virtual Private Network (VPN) Gateway. The Routers link to the servers, wireless access points and switches as well as the LAN (internal network)..
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxglendar3
Running head: NETWORK INFRASTRUCTURE AND SECURITY
1
NETWORK INFRASTRUCTURE AND SECURITY
2
Project Deliverable 5: Network Infrastructure and Security
CIS 499 – Information Systems Capstone
November 25, 2018
Project Scope
The project will comprise of a network design to meet Acme Corporation network infrastructure requirements. The network should accommodate occasional guest users of up to 10 users. The network design will incorporate an FTP server that will use for sharing files. The project should involve separate subnet for guest and LAN networks; the guest network should be restricted to access only FTP service on the FTP server while all other access to the LAN network will be blocked. The project will also involve IP Network Design as well as identification and configuration details of the hardware utilized (Switches and Routers). Included in the network design is the implementation of a Wireless LAN (WLAN) that minimizes the management effort to configure and manage while allowing effective data transmission between the Wireless Application Protocols (WAPs).
Network design
The network will use a star topology where it provides centralized handling of the network and its’ associated security. Each of the floors of the building will have a central server which host switches that link the different rooms via ethernet cables. Each of the rooms will have a switch that is linked to the central server's router. The servers will be linked via fiber optic cables. The ethernet cables will be utilized for connecting individual devices to their associated switches. The network design will involve the utilization of both wired and wireless media. The wireless media will allow for a network connection for portable devices like tablets, cell phones, and laptops.
The switch links allow the traffic getting into the Acme’s LAN from the MAN not to be congested. As more tablets are utilized in the company, the WLAN bandwidth increases significantly to each room. This requires that the WAPs supporting the 802.11n protocol as well as faster 802.11ac standard require additional power. As a result, switches with PoE+ give the required power. These Switches utilize the existing Category-6 cable (Ethernet cables) that allow for remote administration and configuration (Karris, 2009).
Virtual LANs (VLAN) will be used to enables the network administrator to group users into shared broadcast domains irrespective of their physical position in the internetwork. For instance, computer devices utilized by employees on two different floors may be placed on the same VLAN. The staff has their VLAN while the Guest VLAN is used by guests when using wireless access points.
The company's network perimeter that detaches it from the Internet comprises of two border core routers. The border routers should then link to the Virtual Private Network (VPN) Gateway. The Routers link to the servers, wireless access points and switches as well as the LAN (internal network)..
Using Tetration for application security and policy enforcement in multi-vend...Joel W. King
Network engineers increasingly must view the network as one big software system, which streams telemetry data from software sensors and network devices to an analytics engine.
To implement the whitelist-based segmentation and zero-trust policy model generated from the data analysis, automation is a requirement when dealing with tens of thousands of workloads and complex rules.
This session examines how Cisco Tetration Analytics combined with automation can be used to implement a zero-trust policy model on multi-vendor network fabrics, firewalls and application delivery controllers.
Cloud Computing and Security - by KLC Consultingkylelai
Here is the presentation about the cloud computing fundamentals, what it is, what it take to go to cloud computing environment, what questions to ask before you jump into cloud computing, what risk and security measures you should understand. Afterviewing this presentation you should have basic understanding about cloud computing and cloud security. This presentation also provides cloud computing and security resources and links for more informations on cloud computing security.
OSACon 2023_ Unlocking Financial Data with Real-Time PipelinesTimothy Spann
OSACon 2023_ Unlocking Financial Data with Real-Time Pipelines
Unlocking Financial Data with Real-Time Pipelines
Financial institutions thrive on accurate and timely data to drive critical decision-making processes, risk assessments, and regulatory compliance. However, managing and processing vast amounts of financial data in real-time can be a daunting task. To overcome this challenge, modern data engineering solutions have emerged, combining powerful technologies like Apache Flink, Apache NiFi, Apache Kafka, and Iceberg to create efficient and reliable real-time data pipelines. In this talk, we will explore how this technology stack can unlock the full potential of financial data, enabling organizations to make data-driven decisions swiftly and with confidence.
Introduction: Financial institutions operate in a fast-paced environment where real-time access to accurate and reliable data is crucial. Traditional batch processing falls short when it comes to handling rapidly changing financial markets and responding to customer demands promptly. In this talk, we will delve into the power of real-time data pipelines, utilizing the strengths of Apache Flink, Apache NiFi, Apache Kafka, and Iceberg, to unlock the potential of financial data.
Key Points to be Covered:
Introduction to Real-Time Data Pipelines: a. The limitations of traditional batch processing in the financial domain. b. Understanding the need for real-time data processing.
Apache Flink: Powering Real-Time Stream Processing: a. Overview of Apache Flink and its role in real-time stream processing. b. Use cases for Apache Flink in the financial industry. c. How Flink enables fast, scalable, and fault-tolerant processing of streaming financial data.
Apache Kafka: Building Resilient Event Streaming Platforms: a. Introduction to Apache Kafka and its role as a distributed streaming platform. b. Kafka's capabilities in handling high-throughput, fault-tolerant, and real-time data streaming. c. Integration of Kafka with financial data sources and consumers.
Apache NiFi: Data Ingestion and Flow Management: a. Overview of Apache NiFi and its role in data ingestion and flow management. b. Data integration and transformation capabilities of NiFi for financial data. c. Utilizing NiFi to collect and process financial data from diverse sources.
Iceberg: Efficient Data Lake Management: a. Understanding Iceberg and its role in managing large-scale data lakes. b. Iceberg's schema evolution and table-level metadata capabilities. c. How Iceberg simplifies data lake management in financial institutions.
Real-World Use Cases: a. Real-time fraud detection using Flink, Kafka, and NiFi. b. Portfolio risk analysis with Iceberg and Flink. c. Streamlined regulatory reporting leveraging all four technologies.
Best Practices and Considerations: a. Architectural considerations when building real-time financial data pipelines. b. Ensuring data integrity, security, and compliance in real-time pipelines. c. Scalability an
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
Public-key cryptosystems produce constant-size cipher texts with efficient delegation
of decryption rights for any set of cipher texts. One can aggregate any set of secret keys and make
them as compact as a single key. The secret key holder can release a constant-size aggregate key for
flexible choices of cipher text set in cloud storage. In KAC, users encrypt a message not only under a
public-key, but also under an identifier of cipher text called class. That means the cipher texts are
further categorized into different classes. The key owner holds a master-secret called master-secret
key, which can be used to extract secret keys for different classes. More importantly, the extracted
key have can be an aggregate key which is as compact as a secret key for a single class, but
aggregates the power of many such keys, i.e., the decryption power for any subset of cipher text
classes. The key aggregate cryptosystem is enhanced with boundary less cipher text classes. The
system is improved with device independent key distribution mechanism. The key distribution
process is enhanced with security features to protect key leakage. The key parameter transmission
process is integrated with the cipher text download process.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
3. We are building a permissionless global compute cloud that inherently supports data
privacy while remaining trustless, which is Phala Network.
It is going to disrupt AWS, Tencent Cloud, Azure, Alibaba Cloud and other permissioned
public cloud providers by catering to the next generation of web applications and new kind
of data economy.
The Web3 Cloud
4. A Web3 cloud is open, permissionless and sharing
IAAS, PAAS own
Data Center
IAAS, PAAS
Security : how to make sure the
server owners can't be
malicious when they have total
control over data centers?
Availability: how to make sure
the servers maintain continuous
availability to users?
30%-60%
infrastructure
cost
Saved!
Key Constraints
AWS/Alicloud
Web3 cloud Decentralized Network
5. We want to combine the best of Web 2.0 and Web 3.0 - i.e. the performance of
centralized programs and trustlessness of distributed apps.
Web3 Cloud Main Properties
Features Decentralized Trustless Private Scalable
Web2 Cloud × × ✓ ✓
Blockchain ✓ ✓ × ×
Web3 Cloud ✓ ✓ ✓ ✓
7. The trustless is achieved by
NPoS system and Polkadot
shared security.
The trustless is achieved by TEE
workers and Phala’s special
economic design
Consensus Computation
Make sure cloud servers
can’t be evil, even we don’t
own them!
1. We Need to Detach Consensus from Computation
Challenge: How to Make Servers "Behave"?
14. -
OUR
TEAM
-
POA Khala Council Members
*subject to governance approval
Dr. Konstantin Shamruk
Ph.D. Economics, Toulouse School of Economics.
Studied under a Nobel prize winner Jean Tirole and
worked at IMF.
Led game-theoretic analysis of Phala Network
token economics model and wrote the Economic
White Paper
Joe Petrowski
Technical Integrations Lead at Web3 Foundation
and Parity, developer thought leader in the
Polkadot ecosystem and host of the Relay Chain
podcast.
Dr.Jonas Gehrlein
Ph.D Economics, University of Bern
Research Scientist at Web3 Foundation,
working on economic design issues in the
Polkadot ecosystem. Jonas' main focus is
on behavioral economics.
ZOÉ MECKBACH
COO of MH-IT & Service GmbH, Zoé
Meckbach is a senior Polkadot
ambassador, interviewer, and an advocate
for Web3 and cybersecurity.
17. Subsidy for Khala Network
- Initially 60,000 per
day
- Reduce 25% every
45 days
18. *The algorithm only represents the team's suggestion, and will be decided by public vote
Core theory for V0.9 Mining Model
Value Promise
Value
Promise
Stake Multiplier,
Khala Re=1.5
ConfidenceScore is
based on the miner's
SGX capabilities
For each miner, based on the amount of
mortgage, hardware cost, operating cost
and security, Phala's expected promise of
rewards (the min sum reward number of
all future rewards)
This value will dynamically change based
on the performance of a single miner: the
V of a normal miner will continue to
increase, and the V of a bad miner will be
reduced.
V determines the size of your reward, the
larger the V, the more rewards
Vmax=30000
Hardware
cost
19. We expect over 100k TEE cores online in
the first 24 hours after Khala launch
Worker Node Stats on Testnet
*based on testnet data
$60 mln worth of hardwares
21. Supply and Demand for Web3 Cloud
Cloud Platform
Defi
Data
market
Web2/Enterprise
Web3
Web2 /Enterprise:
- IAAS & PAAS
- Serverless
- Cheaper cloud with
trustless privacy
- Public cloud with
enhanced security
>> private infra
Supply end :
- Phala Blockchain
- Servers
management
- Token as subsidy
Web3:
- Confidential DeFi
- Data market
- DID
22. -
PROJECT
STAGES
-
-
PROJECT
STAGES
-
Privacy Defi
● Lite bridges with privacy
● Diem Bridge
● EVM family bridges
● BTC family long tail bridges...
● Mint pDOT, pKSM, pACA...
● Swap in good privacy
● Orber book for WHALES
● Safer from MEV attack
● Earn and farming
● Lending in good privacy
● Safer from MEV attack
● Protect your position
data from others
● Real blind box with
confidential content
● NFT for private keys
● Privacy Data box for future
data market
Bridges PhaSe Swaps
PhaSe Lending Mystery NFT