Sand Piles and software systems can both reach a critical point where small perturbations can cause large changes or failures. To prevent reaching this critical point, software needs to be designed and developed in a way that dampens complexity through practices like optimizing decision pathways, balancing responsibilities across components, and keeping dependencies loose. Reflection on processes and values is important for continuously improving software quality and stability over time.
Jamie Clark's preso on cloud computing and legal issues at the OASIS International Cloud Symposium (#intcloudsymp) at Ditton Manor, Windsor, UK, October 2011
Jamie Clark's preso on cloud computing and legal issues at the OASIS International Cloud Symposium (#intcloudsymp) at Ditton Manor, Windsor, UK, October 2011
SOIL STRUCTURE INTERACTION STUDY ON PLANE BUILDING FRAME SUPPORTED ON PILE GR...IAEME Publication
Background/Objectives: The main objective of this work is to determine the soil interaction of a plane building frame underpinned by pile groups which are embedded in cohesive soil (clayey soil).Methods: The impact of Soil-Structure Interaction on response of a 4 storey framed Building underpinned by Pile group is reported in this paper. The four storey frame consists of three bays and columns of the frame supported by a pile group. The Pile group is presumed to be embedded in the Cohesive soil mass (clayey soil). The soil mass is represented by equivalent springs. The displacement of the building frame caused due to the deflection of the foundation with and without Soil Structure Interaction is analyzed using ANSYS. Findings: Soil non-linearity in lateral direction is indicated by the P-Y curve developed using Matlock equations. The soil properties which are used for clay (cohesive soil) are from the Triaxial Consolidated Undrained Compression Test on soil. Shear Force and Bending Moments at the base of the columns are determined for the frame which is analyzed with and without consideration of soil structure interaction.
Geotechnical applications
K0, active & passive states
Rankine’s earth pressure theory
Design of retaining walls
A Mini Quiz
In geotechnical engineering, it is often necessary to prevent lateral soil movements.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Moving to Microservices with the Help of Distributed TracesKP Kaiser
Moving away from a monolith to a microservices architecture is a process fraught with hidden challenges. There's legacy code, infrastructure, and organizational processes that all need to change, in order to make the switch successful.
But microservices come with a huge increase in infrastructure complexity. We'll see how distributed traces empower developers to work with greater autonomy, in increasingly complex deployment environments.
The Impact of Emerging Technology on Digital TransformationRichard Esplin
Keynote given by John Newton, CTO at Alfresco, during Alfresco DevCon 2018.
Content management has been called a mature discipline, but emerging technologies like machine learning, cloud services, consumer friendly interfaces, and the block chain promise new capabilities that we need to be prepared to embrace in order for our organizations to successfully navigate the industry's digital transformation.
https://www.youtube.com/watch?v=VwC_Ko6Wk-0&list=PLyJdWuUHM3igOUt49uiFqs-6DCQAgJ1vs&index=2
DevOps is much more than tooling and technical details, it’s first and foremost a cultural and operational shift. This deck was given at www.devopscon.com, and covers some of the principles and best practices preached for by devops thought leaders such as John Allspaw, Jesse Robbins, Adrian Cockroft, Jez Humble and others.
SOIL STRUCTURE INTERACTION STUDY ON PLANE BUILDING FRAME SUPPORTED ON PILE GR...IAEME Publication
Background/Objectives: The main objective of this work is to determine the soil interaction of a plane building frame underpinned by pile groups which are embedded in cohesive soil (clayey soil).Methods: The impact of Soil-Structure Interaction on response of a 4 storey framed Building underpinned by Pile group is reported in this paper. The four storey frame consists of three bays and columns of the frame supported by a pile group. The Pile group is presumed to be embedded in the Cohesive soil mass (clayey soil). The soil mass is represented by equivalent springs. The displacement of the building frame caused due to the deflection of the foundation with and without Soil Structure Interaction is analyzed using ANSYS. Findings: Soil non-linearity in lateral direction is indicated by the P-Y curve developed using Matlock equations. The soil properties which are used for clay (cohesive soil) are from the Triaxial Consolidated Undrained Compression Test on soil. Shear Force and Bending Moments at the base of the columns are determined for the frame which is analyzed with and without consideration of soil structure interaction.
Geotechnical applications
K0, active & passive states
Rankine’s earth pressure theory
Design of retaining walls
A Mini Quiz
In geotechnical engineering, it is often necessary to prevent lateral soil movements.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Moving to Microservices with the Help of Distributed TracesKP Kaiser
Moving away from a monolith to a microservices architecture is a process fraught with hidden challenges. There's legacy code, infrastructure, and organizational processes that all need to change, in order to make the switch successful.
But microservices come with a huge increase in infrastructure complexity. We'll see how distributed traces empower developers to work with greater autonomy, in increasingly complex deployment environments.
The Impact of Emerging Technology on Digital TransformationRichard Esplin
Keynote given by John Newton, CTO at Alfresco, during Alfresco DevCon 2018.
Content management has been called a mature discipline, but emerging technologies like machine learning, cloud services, consumer friendly interfaces, and the block chain promise new capabilities that we need to be prepared to embrace in order for our organizations to successfully navigate the industry's digital transformation.
https://www.youtube.com/watch?v=VwC_Ko6Wk-0&list=PLyJdWuUHM3igOUt49uiFqs-6DCQAgJ1vs&index=2
DevOps is much more than tooling and technical details, it’s first and foremost a cultural and operational shift. This deck was given at www.devopscon.com, and covers some of the principles and best practices preached for by devops thought leaders such as John Allspaw, Jesse Robbins, Adrian Cockroft, Jez Humble and others.
Incident Management in the Age of DevOps and SRE Rundeck
Presented by Damon Edwards, co-founder of Rundeck, at QCon San Francisco 2019.
See a Demo of Rundeck Enterprise :
https://www.rundeck.com/see-demo
--or--
Download Rundeck Open Source here:
https://rundeck.com/open-source
Connect:
Stack Overflow community: https://stackoverflow.com/questions/tagged/rundeck
Github: https://github.com/rundeck/rundeck/issues
Twitter: https://twitter.com/Rundeck
Facebook: https://www.facebook.com/RundeckInc/
LinkedIn: www.linkedin.com › company › rundeck-inc
Presentation slides of the workshop on "Introduction to Pig" at Fifth Elephant, Bangalore, India on 26th July, 2012.
http://fifthelephant.in/2012/workshop-pig
Emergent behavior in complex systems is our reality. Root Cause Analysis, as a framework, is insufficient to properly manage the patterns present in our continuously changing world.
Incident Management in the Age of DevOps and SRE Rundeck
Keynote presentation at DevOps Con Munich, December 3, 2019, presented by Damon Edwards, co-founder of Rundeck.
Responding to incidents has always been the core job of Operations. With the rise of DevOps and SRE, how Operations work gets done — and who is doing the work — is changing. This talk will look at how high-performing organizations are applying DevOps and SRE practices to shorten incidents and reduce escalations.
See a Demo of Rundeck Enterprise :
https://www.rundeck.com/see-demo
--or--
Download Rundeck Open Source here:
https://rundeck.com/open-source
Connect:
Stack Overflow community: https://stackoverflow.com/questions/tagged/rundeck
Github: https://github.com/rundeck/rundeck/issues
Twitter: https://twitter.com/Rundeck
Facebook: https://www.facebook.com/RundeckInc/
LinkedIn: www.linkedin.com › company › rundeck-inc
This is a presentation I gave to 100+ people at Rev1 Ventures in Columbus, OH. The presentation was about how to define DevOps. Like any new concept, there are multiple and sometimes competing definitions. I've found that implementations of DevOps can change but there are some very common anti-patterns. Lastly, I talk about how we implement DevOps at Bold Penguin.
High time to add machine learning to your information security stackMinhaz A V
Machine learning might never be the silver bullet for cybersecurity compared to areas where it is thriving. There will always be a person who tries to find issues in our systems and bypass them. They may even use it to assist the attacks.
But adding it to our general information security stack can surely help us be more prepared while defending. Different categories like regression, classification, clustering, recommendations & reinforcement learning can be leveraged to build efficient & faster monitoring, threat response, network traffic analysis and more.
Along with introduction to different aspects and how it can be leveraged - I'd like to present a case study on how ML/AI can be used in distinguishing between benign and Malicious traffic data by means of anomaly detection techniques with 100% True Positive Rate with live demo.
Two years ago at Devoxx UK we talked about DevOps, what it was, why it was important and how to get started. Boy, was it scary. Now we’re wiser. More battle-scarred. The large scale of the challenge for application writers exploiting cloud and DevOps is clearer, but so is the path forward. Understanding the DevOps approach is important, but equally you must understand specific deployment technologies, security issues, operational reliability, and how to drive organisational transformation. Whether creating simple applications or sophisticated microservice architectures many of the challenges are the same. Join us to learn how you can apply this within your team and company.
Dynamo Systems - QCon SF 2012 PresentationShanley Kane
A look at Dynamo-based systems: the architectural principles, use cases and requirements; where they differ from relational databases; and where they are going.
BTLE (Bluetooth Low Energy) and CoreBluetooth Zach Dennis
This presentation is on Bluetooth low energy and how Apple's Core Bluetooth framework works to expose the higher level application layer to iOS and Mac developers.
This slide-deck is from a learning session given at Mutually Human Software in on February 2nd. It is a brief refresher and re-introduction for the concept of design patterns in the world of software development and what they mean to us as software craftsmen.
Slides from a presentation I gave on SSH. Covers basics of ssh, password|keys|host-based authentication, agent/key forwarding, configuration files (global and user-specific), local/remote port forwarding, scp, rsync, and briefly mentions git's support.
Balancing the Pendulum: Reflecting on BDD in PracticeZach Dennis
Here are the slides that I used for my talk on "Balancing the pendulum: Reflecting on BDD in Practice" at the Great Lakes Ruby Bash, April 17th, 2010 in Lansing, MI.
This talk was aimed at sharing my reflections and experiences on how BDD and outside-in development has been working over the past few years.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
30. Problem Good
None Little A lot
Understanding Amount
Random Intentional Nailed it
Solution Quick fix
Attempts
31. If you do ______________ today,
you’ll likely do ___________ tomorrow.
If you don’t do ______________ today,
you’ll likely won’t do ___________ tomorrow.
32. Our brains don’t compute probabilities
and then choose the best possible outcome
when it can avoid it.
33.
34.
35.
36. Dependencies
Cheeps
Data
Structure
File System
Person Subscription
DailyCheeper
#cheep!
Mobile Push
Library - know about where and how to load cheeps
data
- know about how person is related to - know
about subscriptions
- know about time zone conversion
- know about about to use mobile push library
- localizations???
37.
38. Dependencies after balancing responsibilities
Person Subscription
DailyCheeper
#cheep! - knows how to determine eligibility based
on subscription
- knows how to use cheeps data
Mobile Push - knows how to use Person Cheeps File System
Library interface to find eligible
subscribers
- knows how to use mobile push - message_for_day
library - localization for accessing cheeps
42. Cohesion
the focus of an individual software component
given its function or purpose to exist
Array#push Cheeper#delivery_daily Cheeps#load
Array#pop Cheeper#delivery_weekly Cheeps#add
Array#[] Cheeper#deliver_monthly Cheeps#save
Array#count Cheeps#remove
Array#<<
45. Coupling
The relationship between software components, the
extent to which a component of our software depends
on other components.
Cheeps
Data
Structure
File System
Person Subscription
DailyCheeper
#cheep!
Mobile Push
Library
46.
47.
48. Connassence
a single measure combining coupling and cohesion,
measured in terms of strength or weakness (preferred)
weaker Name
Type
Meaning
Position http://en.wikipedia.org/wiki/
Connascent_software_components
Algorithm
Execution http://vimeo.com/10837903
Timing
http://onestepback.org/articles/connascence/
Identity index.html
stronger
49.
50. Being explicit
Making concepts and abstractions in your application
(technical or domain related) first-class citizens.
57. Testability
- simpler objects
- simpler interfaces
- lower number of unnecessary dependencies
- push external system interaction to the edge,
isolate when possible
- remove unnecessary conditionals when
possible
- promotes simpler code and more distributed,
balanced set of responsibilities
- stub less, mock less, spy only when necessary
59. Responsibility / Dependencies /
Collaborators / Boundaries
- Write a statement describing the responsibility a class or
module. If there are a bunch of ANDs consider it
suspicious.
- Identify “what” your object needs to fulfill that
responsibility
- Identify your collaborators to meet those needs
- Identify boundaries for primary dependencies and
everything else
60. Good statement:
#
# The DailyCheeper is responsible for sending mobile notifications via SMS
# to people have subscribed to them.
#
Suspicious statement:
#
# The DailyCheeper is responsible for sending mobile notifications via SMS
# to people have subscribed to them, building reports around cheeps statistics,
# subscribing users to cheeps, and updating/saving cheeps.
#
61. Dependencies list:
- find people who are eligible and have subscribed to
receiving cheeps for given time
- take into account timezones
- find out if locales/translations are necessary
- get/retrieve access to today’s cheep to send
- mobile library for sending out cheeps
- access to device_id (can get off from person)
62. Identify collaborators Load
Cheeps from
FileSystem
Cheeps
Mobile Push DailyCheeper
Library
Person
Subscription
Primary collaborators
Secondary collaborators
63. Identify boundaries Load
Cheeps from
FileSystem
Cheeps
Mobile Push DailyCheeper
Library
Person
Subscription
Unit testing scope
64. Identify boundaries Load
Cheeps from
FileSystem
Cheeps
Mobile Push DailyCheeper
Library
Person
Subscription
Unit testing scope
66. Shared Understanding /
Pattern Languages
- Make conventions and patterns an explicit part of your
vocabulary
- Make them up, or re-use useful patterns, etc you’ve found
- Evaluate, share, teach, learn
67. A few we use:
- Ruby module pattern for inheritance (for chaining behavior in
a loosely coupled way, ie: ActiveRecord uses this pattern a lot when for
#save)
- Constructor injection (for providing defaults but allowing object to
be more easily testable)
- Boundaries (for creating a clear distinction between one part of the
application and another, ie: Api, Kernel, and Border)
- Splatting/flattening conditionals (to indicate a conditional,
branch of code, should not exist, investigate ways to remove it)
- Everything’s private until it’s public
- No class variables (they should be banished)
71. Request comes in to find an Order
Application Domain
Delivery
ORM
Domain
Services
Application
Services
Infrastructure
72. Request comes into to process batch of
orders
Application Domain
Delivery
ORM
Domain
Services
Application
Services
Infrastructure
73. Request comes into to process batch of orders,
then notifies customer who placed order.
Application Domain
Delivery
ORM
Domain
Services
Application
Services
Infrastructure
74. Classes, Mixins, Inheritance, and
Composition
- Classes are great for representing entities and things which
have instances (Well-Grounded Rubyist)
- Mixins are great for characteristics or properties of entities,
cross-cutting concerns, explicit grouping of functionality
- Composition is a often under-used. You create a new class/
object and pass in an existing one as a collaborator/dependency.
75. Composition
- full control over your object and API
- reduces the ripple effects of change if the API of the
object you’re composing changes
- removes dependencies on parent objects you may or
may not own
- simplifies testing because you own it and its
dependencies
76. Reflection
- Give yourself time to reflect
- Personal growth
- Make mid-course corrections
- Keep complexity down
- if you’re only focused on add, add, add, then you don’t give
yourself time to do that
81. Complexity
critical point
The Vicious Stop n Go.
Functionality
More effort initially.
82. May the landscape of your
software be smooth rolling hills.
twitter: @zachdennis
github: zdennis
mutuallyhuman.com
Sand Piles & Software
Article
in April PragPub