This document discusses open source collaboration and quantum leaps in research infrastructure. It describes how a national research and education network in the Netherlands brings together campus infrastructures to support large-scale, collaborative research projects requiring high-bandwidth networks and shared resources. Examples of multi-disciplinary projects are provided, and it outlines how open source tools can provide identity management, groups management, and other services to enable virtual collaboration across domains.
Cutting Big Data Down to Size with AMD and DellAMD
Matt Kimball, AMD Server Solutions Marketing presentation on "Cutting Big Data Down to Size with AMD and Dell" from Dell World.
Learn how “Hadoop” solutions are helping companies overcome growing pressures on IT budgets with an innovative approach to Big Data.
Cutting Big Data Down to Size with AMD and DellAMD
Matt Kimball, AMD Server Solutions Marketing presentation on "Cutting Big Data Down to Size with AMD and Dell" from Dell World.
Learn how “Hadoop” solutions are helping companies overcome growing pressures on IT budgets with an innovative approach to Big Data.
EDF2013: Keynote Stefan Decker: Big Data In Ireland - Linked Data and beyondEuropean Data Forum
Keynote of Stefan Decker, Professor for Digital Enterprise & Director of DERI, National University of Ireland, Galway, at the European Data Forum 2013, 9 April 2013 in Dublin, Ireland: Big Data In Ireland - Linked Data and beyond
The Gnowsis Semantic Desktopapproach to Personal InformationManagement - Di...leobard
Slides of my phd dissertation "The Gnowsis Semantic Desktopapproach to Personal InformationManagement"
Presented on 5th June 2009 at University of Kaiserslautern to get a PhD in engineering science.
Save time, money & mitigate risk when managing your capital assets.
From feasibility through design, procurement, construction and facilities management. Our online software can help.
This was the opening keynote address at Content Convergence and Integration, an event convened in Vancouver during March 2008. This presentation traces the history of content and the associated technologies and takes us up to the present where convergence and integration are upon us.
Building the silver lining seminar slidesExponential_e
These slides explore report findings from a survey where 250 IT decision makers shared their views on the role of the network, data centre and downtime on their cloud strategies. The slides also examine how the UK’s underlying IT infrastructure is coping with the demands of the mature Cloud.
Strata 2017 (San Jose): Building a healthy data ecosystem around Kafka and Ha...Shirshanka Das
So, you finally have a data ecosystem with Kafka and Hadoop both deployed and operating correctly at scale. Congratulations. Are you done? Far from it.
As the birthplace of Kafka and an early adopter of Hadoop, LinkedIn has 13 years of combined experience using Kafka and Hadoop at scale to run a data-driven company. Both Kafka and Hadoop are flexible, scalable infrastructure pieces, but using these technologies without a clear idea of what the higher-level data ecosystem should be is perilous. Shirshanka Das and Yael Garten share best practices around data models and formats, choosing the right level of granularity of Kafka topics and Hadoop tables, and moving data efficiently and correctly between Kafka and Hadoop and explore a data abstraction layer, Dali, that can help you to process data seamlessly across Kafka and Hadoop.
Beyond pure technology, Shirshanka and Yael outline the three components of a great data culture and ecosystem and explain how to create maintainable data contracts between data producers and data consumers (like data scientists and data analysts) and how to standardize data effectively in a growing organization to enable (and not slow down) innovation and agility. They then look to the future, envisioning a world where you can successfully deploy a data abstraction of views on Hadoop data, like a data API as a protective and enabling shield. Along the way, Shirshanka and Yael discuss observations on how to enable teams to be good data citizens in producing, consuming, and owning datasets and offer an overview of LinkedIn’s governance model: the tools, process and teams that ensure that its data ecosystem can handle change and sustain #datasciencehappiness.
EVOLVING QUANTUM COMPUTERS: Harnessing a Vast Hidden Reality J On The Beach
At key points in human history, civilization took a leap forward because people discovered new ways of harnessing nature. Quantum computers, by harnessing an immense, usually hidden reality, promise unimaginable computing power if realized at scale … dramatically impacting our ability to solve the complex problems our civilization urgently needs to solve.
D-Wave Systems has been rapidly evolving commercial quantum computing systems .. (being explored by Google, NASA, Lockheed, USC, Los Alamos and others) that are showing signs of being at a “tipping point” .. matching state of the art solvers for some problems and sometimes dramatically exceeding them… portending the exciting possibility that in just a few short years D-Wave processors could exceed the capabilities of any existing or foreseeable classical computers in the areas of machine learning, AI and optimization.
This lecture will describe the basic ideas behind quantum computation , Dwave’s unique approach, , the current status and future development of D-Wave’s processors and how future quantum computers could be used to solve our most pressing problems.
Big Data and Content Management. SkyDox and the European Court of Human Righ...SkyDox LTD
SkyDox Business Development Director, Josh Gilbertson & Head of IT at the ECHR John Hunter, discuss how SkyDox cloud-enabled file collaboration platform has improved the content management at the ECHR at Info360 in New York.
EDF2013: Keynote Stefan Decker: Big Data In Ireland - Linked Data and beyondEuropean Data Forum
Keynote of Stefan Decker, Professor for Digital Enterprise & Director of DERI, National University of Ireland, Galway, at the European Data Forum 2013, 9 April 2013 in Dublin, Ireland: Big Data In Ireland - Linked Data and beyond
The Gnowsis Semantic Desktopapproach to Personal InformationManagement - Di...leobard
Slides of my phd dissertation "The Gnowsis Semantic Desktopapproach to Personal InformationManagement"
Presented on 5th June 2009 at University of Kaiserslautern to get a PhD in engineering science.
Save time, money & mitigate risk when managing your capital assets.
From feasibility through design, procurement, construction and facilities management. Our online software can help.
This was the opening keynote address at Content Convergence and Integration, an event convened in Vancouver during March 2008. This presentation traces the history of content and the associated technologies and takes us up to the present where convergence and integration are upon us.
Building the silver lining seminar slidesExponential_e
These slides explore report findings from a survey where 250 IT decision makers shared their views on the role of the network, data centre and downtime on their cloud strategies. The slides also examine how the UK’s underlying IT infrastructure is coping with the demands of the mature Cloud.
Strata 2017 (San Jose): Building a healthy data ecosystem around Kafka and Ha...Shirshanka Das
So, you finally have a data ecosystem with Kafka and Hadoop both deployed and operating correctly at scale. Congratulations. Are you done? Far from it.
As the birthplace of Kafka and an early adopter of Hadoop, LinkedIn has 13 years of combined experience using Kafka and Hadoop at scale to run a data-driven company. Both Kafka and Hadoop are flexible, scalable infrastructure pieces, but using these technologies without a clear idea of what the higher-level data ecosystem should be is perilous. Shirshanka Das and Yael Garten share best practices around data models and formats, choosing the right level of granularity of Kafka topics and Hadoop tables, and moving data efficiently and correctly between Kafka and Hadoop and explore a data abstraction layer, Dali, that can help you to process data seamlessly across Kafka and Hadoop.
Beyond pure technology, Shirshanka and Yael outline the three components of a great data culture and ecosystem and explain how to create maintainable data contracts between data producers and data consumers (like data scientists and data analysts) and how to standardize data effectively in a growing organization to enable (and not slow down) innovation and agility. They then look to the future, envisioning a world where you can successfully deploy a data abstraction of views on Hadoop data, like a data API as a protective and enabling shield. Along the way, Shirshanka and Yael discuss observations on how to enable teams to be good data citizens in producing, consuming, and owning datasets and offer an overview of LinkedIn’s governance model: the tools, process and teams that ensure that its data ecosystem can handle change and sustain #datasciencehappiness.
EVOLVING QUANTUM COMPUTERS: Harnessing a Vast Hidden Reality J On The Beach
At key points in human history, civilization took a leap forward because people discovered new ways of harnessing nature. Quantum computers, by harnessing an immense, usually hidden reality, promise unimaginable computing power if realized at scale … dramatically impacting our ability to solve the complex problems our civilization urgently needs to solve.
D-Wave Systems has been rapidly evolving commercial quantum computing systems .. (being explored by Google, NASA, Lockheed, USC, Los Alamos and others) that are showing signs of being at a “tipping point” .. matching state of the art solvers for some problems and sometimes dramatically exceeding them… portending the exciting possibility that in just a few short years D-Wave processors could exceed the capabilities of any existing or foreseeable classical computers in the areas of machine learning, AI and optimization.
This lecture will describe the basic ideas behind quantum computation , Dwave’s unique approach, , the current status and future development of D-Wave’s processors and how future quantum computers could be used to solve our most pressing problems.
Big Data and Content Management. SkyDox and the European Court of Human Righ...SkyDox LTD
SkyDox Business Development Director, Josh Gilbertson & Head of IT at the ECHR John Hunter, discuss how SkyDox cloud-enabled file collaboration platform has improved the content management at the ECHR at Info360 in New York.
This business briefing discussion focuses on:
What is this new IPv6 everyone is talking about?
What new features is IPv6 going to give us?
Technically, IPv6 offers very little that IPv4 cannot do presently. However, it does offer your business a chance for continual growth and expansion into areas that are developing rapidly, and a chance to have a business edge on some of your competitors.
Big data expert and Infochimps CEO, Jim Kaskade presents the Infinite Monkey Theorem at CloudCon Expo. He provides an energetic, inspiring, and practical perspective on why Big Data is disrupting. It’s more than historic data analyzed on Hadoop. It’s also more than real-time streaming data stored and queried using NoSQL. Learn more at www.Infochimps.com
Development teams are challenged to deliver more content with less time and with greater agility. In some cases, Lines of Businesses are examining alternative strategies involving a mixture of public and private cloud to deliver their business applications. Sometimes, the need for speed leads to bad decision making and the adoption of non-compliant technologies. These "shadow ops" activities may not meet the compliance and standards set by your organization. You can discourage these practices by improving your responsiveness to the needs of development. Come learn about how Continuous Delivery technology from Rational & Tivoli can help you defeat Shadow Ops by providing a better alternative!
Bala Rajaraman, IBM Distinguished Engineer
Michael D. Elder, IBM Senior Technical Staff Member
Because we can. No seriously, because we want to! Innovation is our passion and since we dwell in a sea of data and information we cannot dwindle on the side and feel dwarfed. We like action, we want to surf the data waves! But before you can surf, you need to know how high are the waves, what is the wind speed, water temperature, are there sharks? We can take this metaphor a long way of course but data is all around us. Be careful, data is not information. You need to surf it before it becomes information. When your genes are coded it is data. But for your insurance company it can be interesting information. You get the picture.
In 2018 higher education institutions offer adequate services and have the right expertise to enable personalised and flexible education that corresponds to the learning needs of the individual student in the best possible way.
From Cubes to Spheres — The transition of higher education towards the cloud.Harold Teunissen
We would like to present the experience of setting up a cloud offering for the R&E community in the Netherlands. Within SURF we have developed a hybrid cloud solution; combining in-house developed services and services commercially available. The services range from personal storage services to full data center replacements and Infrastructure as a Service.
In close collaboration with 6 institutes (i.e. the six sides of a Cube), we have developed a hybrid cloud proposition that allows for optimal flexibility of (virtual) data center capacity under the highest level of trust. This SURFcloud service consist of SURF owned data center facilities and a selection of commercial cloud providers: Microsoft Azure, Amazon, etc.. Using the Cloud Manager Broker the institution is to select a service based on predetermined criteria and functionality: cost, data center location, level of data trust, backup and disaster recover. SURF is adapting its organization and processes to accommodate the transition of the institutions towards the cloud. The resulting cloud sphere and ecosystem is the ultimate stepping stone for the institutes towards the cloud.
The last several years have seen a dramatic surge in the effective use of Distributed Denial of Service (DDoS) as a weapon of cyber attack. These attacks have grown from humble beginnings as an occasional nuisance to one of the biggest threats to network stability and security. No longer only the domain of elite attackers, today’s DDoS attacks can be easily launched by those with limited technical skills, and the results can seriously impair the operations of the victim.
The Cyber Infrastructure (CI) vision has been around for a couple of years. The development of such infrastructure requires a radical design philosophy and a foundation to build upon. It needs the development of an architecture that defines the components, their organizations and their interactions. Since the CI has an international scope and connections, this specification will as much as possible be done in international cooperation and leads to international standards and agreements.
The main challenge of a CI is to provide an unified and standardized way for the composition of trustworthy, multi-domain and on-demand services for an international research group (or virtual organization). These services can be network resources, storage and HPC, but also collaboration tools for writing papers and exchanging research data. The CI demands a form of service orchestration where virtualization and management of services and resources in a distributed, heterogeneous environment is essential.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
2. Cyberinfra in the Netherlands
• All ICT activities for Higher Education and Research in the
Netherlands are brought under one umbrella
National Research & Commercial ICT Scientific Computing & Shared Professional and
Education Network Products & Services Storage Educational Services
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 2
3. Big Data — when size does matter
• More is not less...
- Large scale and global research
- Collaboration in Virtual Organizations
- Shared resources
- High dependence on ICT
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 3
4. Collaborations and Partnerships
• Virtual Research Team
Virtual Laboratory
- Focussed on doing research
Virtual Project
- Small scale
- Temporary and elastic Virtual Colla-
boration
- Little ICT awareness
• “Virtual” Infrastructure Provider Virtual Breeding Environment
- Focussed on providing infrastructure for specific discipline
- Well-organized with grands and budgets
- Longer term collaborations and better ICT awareness
- Not virtual (e.g. CLARIN, Lifewatch, LHC, Project Bamboo)
• Virtual Collaboration* = People + Groups + Resources +
Multi-Disciplines + Services + Policies + Funding + ...
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 4
5. Researchers knocking on our door
Radio Astronomy — Pulsar Climate Modeling for Scientist and CineGRID — 4K+ Video Distribution
Research Decision Makers Testbed
Centralized Imaging for Large Scale Jungle Computing and Multi-Model Next Generation DNA Sequencing
Population Imaging Studies Multi-Kernel Simulations
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 5
6. e-VBLI relies on intl. networks
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 6
7. Genomics in the Netherlands
• DNA reads of 750 individuals, 300 TB data
• Creating a “reference genome” and looking at variations
in individuals to find cause of diseases
• Hospitals generate data, and carry out the 1st analysis
• Next Generation Networking for Next Generation
Sequencing!
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 7
8. Multi-Disciplinary Collaboration
ƒ
Virtual Collaboration A
Virtual Collaboration B
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 8
10. e-Research without limits
ƒ
Network C
Network A
Network B
Open Lightpath
Exchange
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 9
11. e-Research without limits
ƒ
Enabled by
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 9
12. Circle of Pain...
Resources &
Services
Access
Authorization Control
Virtual Relationship Users
Collaboration
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 10
13. Multi-Domain Service Delivery
Key words — trust, mutual understanding and standardization!
Domain I Domain VII
Virtual Collaboration A
S3
Domain II Domain III Domain IV Domain V Domain VI
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 11
14. Multi-Domain Service Delivery
Key words — trust, mutual understanding and standardization!
Domain I Domain VII
Virtual Collaboration A
S3
What happens if if
What happens a
domain is removed,
domain is removed
added added?
or or modified?
Domain II Domain III Domain IV Domain V Domain VI
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 11
15. OpenConext
• Provides the glue and lubrication middleware to make
campus, cloud based services and resources usable
for collaboration for both inter campus and virtual
collaboration scenarios
• OpenConext offers the Identity and Group
Infrastructure
• Offer the platform software for large, virtual
collaboration-type collaboration to run-you-own
• OpenConext allows you to create your own
collaboration environment that organizes your
applications, services and resources
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 12
16. Core Components
• Federated Identity Management — SAML
• Groups Management — Grouper
• Social Network 'Portal' technology — OpenSocial
• Collaboration Services and Resources
- Document Sharing
Virtual Organization
- Video Collaboration
- Learning Systems
- Data Storage
- Data Mining
- Workspaces 9000
CALORIES
- Workflows
- Et cetera 100%
SATISFACTION
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 13
17. Eco-system and supply chain
Collaboration Portal Research Data Storage
ƒ
DNA Sequencer
Bandwidth on demand
Virtual
Collaboration
09 12 14
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 14
18. Dynamic Network Service 1.0
NOC
Engineer Users Application
• User Management
Admin GUI BoD GUI Legacy API • Resource Management
• Topology & Discovery
Network Management System • Path finding
• Scheduling & Reservation
• Network Element
Provisioning & Association
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 15
19. Resource Reservation 101
Bandwidth on Demand
APRIL
25
8am-10pm
ƒ
Network C
Network A
Network B
Open Lightpath Exchange
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 16
20. Resource Reservation 101
Bandwidth on Demand
APRIL APRIL
25
8am-10pm
26
10am-12pm
ƒ
Network C
Network A
Network B
Open Lightpath Exchange
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 16
21. Resource Reservation 101
Bandwidth on Demand
APRIL APRIL APRIL
25
8am-10pm
26
10am-12pm
26
12.10pm-3pm
ƒ
Network C
Network A
Network B
Open Lightpath Exchange
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 16
22. Dynamic Network Service 2.0
• Group Management NOC
• Resource Management Engineer Users Applications
BoD GUI NSI
Admin GUI
NSI Inter Domain NSI
NOC Bandwidth on Demand Service
Engineer CIENA NMS
Admin GUI Network Management
• Topology & Discovery
• Path finding System
• Scheduling & Reservation
• Network Element
Provisioning & Association
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 17
23. New SURFnet7 and BoD
• All Institutes are upgraded to a MultiService Port
• Allows for On Demand Lightpath Services
• Provide connectivity towards Cloud providers and
Netherlight
• Offers fixed lightpath Quality of Service (bandwidth,
latency, availability, et cetera)
• Separation of lightpaths through VLAN tagging
10 Gbps MultiService Port
Lightpath Lightpath On Demand Lightpath Available
2 Gbps 2 Gbps 4 Gbps 2 Gbps
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 18
24. Fusion between users and services
Virtual Collaboration
BoD Admin Group
Bandwidth on
BoD Physical Ports
Demand Service
Admin
Physical Resource Physical Resource Physical Resource
Group X Group Y Group Z
Ports are
allocated to
Institutes...
Users
Institute’s Admin Institute’s Institute’s Admin
Admin Virtual Resource Group Virtual
User Group
Institute X Institute Y Institute Z
...and can be
combined into a
+ + = Virtual Resource
Group and then used
by the collaboration
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 19
26. Simplified view
SAML2 ADFS TBD Identity Provider
SAML2 Federation
Web Portal Grouper Group Management
Gadget Conext TBD Attribute Management
Engine
OpenSocial XACML Policy Management
Container OpenSocial
Rest
JANUS Service Registry
OpenSocial Rest SAML2 SP XACML SAML2 Metadata
OAuth NSI
Bandwidth on Demand Service CIENA NMS
Network Management System NGE
NGE / Network
* Developed by SURFnet
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 21
27. BoD Service — Work in Progress
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 22
28. Virtual Ports Assignment
Bandwidth on Demand
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 23
29. Virtual Ports Overview
Bandwidth on Demand
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 24
30. Reservations
Bandwidth on Demand
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 25
31. Physical Ports
Bandwidth on Demand
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 26
32. BoD uptake in the Netherlands
Institute # of sites
Genome of the Netherlands 12 (2 Intl)
Population Imaging Studies 3
Visual Analysis of Flooding Scenarios 3
Connecting climate model data 3
Distributed Multi-Model / Multi-Kernel Simulations 3
Proteomics 4
CineGrid NL 4
Pulsar Research 3
FOM Rijnhuizen 2
Visualization of climate data 2
Visionair 2
DAS-4 5
NEXPReS 5+ (intl)
Quantum Leap in Open Source Collaboration - I2SMM12 - Arlington, VA 27