SlideShare a Scribd company logo
1 of 31
Download to read offline
Introduction
Architecture
Policy language
Evaluation
Conclusions

A Distributed Self-management Service
Ioanna Tsalouchidou
Universitat Polit`cnica De Catalunya
e
Kungliska Tekniska H¨gskolan
o
ioannatsalouchidou@gmail.com
Supervisor: Leandro Navarro Moldes

July 1, 2013

1 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Overview
1. Introduction
2. Architecture
3. Policy language
4. Evaluation
5. Conclusions

2 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Autonomic Computing
The CONFINE Testbed
Motivation

Overview
1. Introduction
1.1 Autonomic Computing
1.2 The CONFINE Testbed
1.3 Motivation

3 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Autonomic Computing
The CONFINE Testbed
Motivation

Autonomic Computing

Self-configuration: install/configure according to policies.
Self-optimization: parameter tuning to perform optimally.
Self-healing: identify, trace, diagnose and repair the cause
failure.
Self-protection: anticipate, detect and auto-defend against
problems

4 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Autonomic Computing
The CONFINE Testbed
Motivation

Overview of the testbed

CONFINE: Community Network Testbed for the Future
Internet
Community networks
Scale up thousands of nodes, distributed geographically
Users allocate resources to run experiments
Multiple experiments run concurrently, sharing resources

5 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Autonomic Computing
The CONFINE Testbed
Motivation

Architecture

6 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Autonomic Computing
The CONFINE Testbed
Motivation

Motivation

Address possible challenges in CONFINE testbed
Predefined policies and automatic actions
Self-management system for CONFINE testbed
Policy specification language

7 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Autonomic Computing
The CONFINE Testbed
Motivation

Related Work

Self management: MyOps, Puppet
Policy languages: KAoS, Rei, Ponder

8 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

The Monitoring System
The Self-management system

Overview
2. Architecture
2.1 The Monitoring System
2.2 The Self-management system

9 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

The Monitoring System
The Self-management system

The monitoring system

Large scale of infrequently-used data
Slice and sliver specific information
Metrics provided by the operating system or synthesized
Receiver-pull model

10 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

The Monitoring System
The Self-management system

Architecture of the monitoring system

11 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

The Monitoring System
The Self-management system

The Self-management system

Self-protection
Cooperating with the monitoring system
Components on server and research devices
Collect, policy and action components

12 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

The Monitoring System
The Self-management system

Architecture of the self-management system

13 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Theory
Syntax

Overview
3. Policy language
3.1 Theory
3.2 Syntax

14 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Theory
Syntax

Objectives of the language

Simple, extensible, expressive, easy to process
Everything allowed unless explicitly prohibited
If-then-else logic
Describe the stable state of the testbed nodes
Define actions when the system exceeds the stable state

15 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Theory
Syntax

The syntax of the language

Define the resource of reference
CPU, memory, network
One general block for each resource
Smaller blocks within the general for each policy

16 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Theory
Syntax

Example of the syntax I

17 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Theory
Syntax

Example of the syntax II

18 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

The Method
Scenario CPU

Overview
4. Evaluation
4.1 The Method
4.2 Scenario CPU

19 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

The Method
Scenario CPU

Method

Policy scenarios and experiments
No performance metrics
Quality of the design

20 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

The Method
Scenario CPU

Method

Scenarios for CPU
Definition of the stable state
Actions

21 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

The Method
Scenario CPU

Scenario CPU I

22 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

The Method
Scenario CPU

Scenario CPU II

23 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

The Method
Scenario CPU

Scenario CPU II

24 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Discussion
Future Work
Conclusion

Overview
5. Conclusions
5.1 Discussion
5.2 Future Work
5.3 Conclusion

25 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Discussion
Future Work
Conclusion

Discussion: Self-management system

Self-management system
Cooperation with the monitoring system
Architecture: server and node side
Sliver and slice view

26 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Discussion
Future Work
Conclusion

Discussion: Policy language

Policy specification language
Easy to comprehend, expressive and extensible
Define resource, stable state, exceeding duration, action

27 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Discussion
Future Work
Conclusion

Future Work

Aggregation of data during duration period
More fine-grained actions
Prioritizing and grouping

28 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Discussion
Future Work
Conclusion

Conclusion

Autonomic computing
CONFINE testbed
Self-management system for CONFINE testbed
Policy Specification language

29 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Discussion
Future Work
Conclusion

References I

Confine project.
http://confine-project.eu/.
T. Koch, C. Krell, and B. Kramer.
Policy definition language for automated management of distributed systems.
In Systems Management, 1996., Proceedings of Second IEEE International Workshop on, pages 55–64,
1996.
Planetlab.
http://www.planet-lab.org/.
Stephen Soltesz, Marc Fiuczynski, and Larry Peterson.
Myops: A monitoring and management framework for planetlab deployments.
Gianluca Tonti, Jeffrey M. Bradshaw, Renia Jeffers, Rebecca Montanari, Niranjan Suri, and Andrzej Uszok.
Semantic web languages for policy representation and reasoning: A comparison of kaos, rei, and ponder.
In International Semantic Web Conference, pages 419–437, 2003.

30 / 31
Introduction
Architecture
Policy language
Evaluation
Conclusions

Discussion
Future Work
Conclusion

A Distributed Self-management Service
Ioanna Tsalouchidou
Universitat Polit`cnica De Catalunya
e
Kungliska Tekniska H¨gskolan
o
ioannatsalouchidou@gmail.com
Supervisor: Leandro Navarro Moldes

July 1, 2013

31 / 31

More Related Content

What's hot

Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
sumitjain2013
 
Distributed Processing
Distributed ProcessingDistributed Processing
Distributed Processing
Imtiaz Hussain
 
Distributed & parallel system
Distributed & parallel systemDistributed & parallel system
Distributed & parallel system
Manish Singh
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System Structures
Wayne Jones Jnr
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
Rupsee
 

What's hot (20)

Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
CMM
CMMCMM
CMM
 
Synchronization in distributed computing
Synchronization in distributed computingSynchronization in distributed computing
Synchronization in distributed computing
 
SQA - chapter 13 (Software Quality Infrastructure)
SQA - chapter 13 (Software Quality Infrastructure)SQA - chapter 13 (Software Quality Infrastructure)
SQA - chapter 13 (Software Quality Infrastructure)
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Distributed Processing
Distributed ProcessingDistributed Processing
Distributed Processing
 
OS UNIT – 2 - Process Management
OS UNIT – 2 - Process ManagementOS UNIT – 2 - Process Management
OS UNIT – 2 - Process Management
 
Naming in Distributed Systems
Naming in Distributed SystemsNaming in Distributed Systems
Naming in Distributed Systems
 
Over view of system analysis and design
Over view of system analysis and designOver view of system analysis and design
Over view of system analysis and design
 
Distributed & parallel system
Distributed & parallel systemDistributed & parallel system
Distributed & parallel system
 
Security and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity ConstantSecurity and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity Constant
 
Structural modeling and analysis
Structural modeling and analysisStructural modeling and analysis
Structural modeling and analysis
 
Distributed information system
Distributed information systemDistributed information system
Distributed information system
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System Structures
 
Distributed System - Security
Distributed System - SecurityDistributed System - Security
Distributed System - Security
 
File concept and access method
File concept and access methodFile concept and access method
File concept and access method
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)
 
Collaboration diagram- UML diagram
Collaboration diagram- UML diagram Collaboration diagram- UML diagram
Collaboration diagram- UML diagram
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
System interconnect architecture
System interconnect architectureSystem interconnect architecture
System interconnect architecture
 

Viewers also liked (6)

Use JMeter as a Performance Testing Tool
Use JMeter as a Performance Testing ToolUse JMeter as a Performance Testing Tool
Use JMeter as a Performance Testing Tool
 
Scalable Dynamic Graph Summarization
Scalable Dynamic Graph SummarizationScalable Dynamic Graph Summarization
Scalable Dynamic Graph Summarization
 
Graphic Drawings Proposal
Graphic Drawings ProposalGraphic Drawings Proposal
Graphic Drawings Proposal
 
New Seo Proposal
New Seo ProposalNew Seo Proposal
New Seo Proposal
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to A Distributed Self-management Service

UE20CS971+%E2%80%93++Project+Phase+%E2%80%93+1+-+END+SEMESTER+ASSESSMENT.pptx
UE20CS971+%E2%80%93++Project+Phase+%E2%80%93+1+-+END+SEMESTER+ASSESSMENT.pptxUE20CS971+%E2%80%93++Project+Phase+%E2%80%93+1+-+END+SEMESTER+ASSESSMENT.pptx
UE20CS971+%E2%80%93++Project+Phase+%E2%80%93+1+-+END+SEMESTER+ASSESSMENT.pptx
BharathVaak
 
Iterative usability evaluation of DSLs
Iterative usability evaluation of DSLsIterative usability evaluation of DSLs
Iterative usability evaluation of DSLs
Ankica Barisic
 
15 implementing architectures
15 implementing architectures15 implementing architectures
15 implementing architectures
Majong DevJfu
 
An Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security EducationAn Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security Education
Xiao Qin
 
software development methodologies
software development methodologiessoftware development methodologies
software development methodologies
UTeM
 

Similar to A Distributed Self-management Service (20)

UE20CS971+%E2%80%93++Project+Phase+%E2%80%93+1+-+END+SEMESTER+ASSESSMENT.pptx
UE20CS971+%E2%80%93++Project+Phase+%E2%80%93+1+-+END+SEMESTER+ASSESSMENT.pptxUE20CS971+%E2%80%93++Project+Phase+%E2%80%93+1+-+END+SEMESTER+ASSESSMENT.pptx
UE20CS971+%E2%80%93++Project+Phase+%E2%80%93+1+-+END+SEMESTER+ASSESSMENT.pptx
 
Towards Software Sustainability Guides for Industrial Software Systems
Towards Software Sustainability Guides for Industrial Software SystemsTowards Software Sustainability Guides for Industrial Software Systems
Towards Software Sustainability Guides for Industrial Software Systems
 
Iterative usability evaluation of DSLs
Iterative usability evaluation of DSLsIterative usability evaluation of DSLs
Iterative usability evaluation of DSLs
 
SAVE ENERGY Project Overview
SAVE ENERGY Project OverviewSAVE ENERGY Project Overview
SAVE ENERGY Project Overview
 
15 implementing architectures
15 implementing architectures15 implementing architectures
15 implementing architectures
 
A Study on MDE Approaches for Engineering Wireless Sensor Networks
A Study on MDE Approaches  for Engineering Wireless Sensor Networks A Study on MDE Approaches  for Engineering Wireless Sensor Networks
A Study on MDE Approaches for Engineering Wireless Sensor Networks
 
CS8461 Operating System Lab Manual S.Selvi
CS8461 Operating System Lab Manual S.SelviCS8461 Operating System Lab Manual S.Selvi
CS8461 Operating System Lab Manual S.Selvi
 
Presentation Master thesis defense
Presentation Master thesis defensePresentation Master thesis defense
Presentation Master thesis defense
 
An Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security EducationAn Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security Education
 
MODELS OF IT-PROJECT MANAGEMENT
MODELS OF IT-PROJECT MANAGEMENTMODELS OF IT-PROJECT MANAGEMENT
MODELS OF IT-PROJECT MANAGEMENT
 
MODELS OF IT-PROJECT MANAGEMENT
MODELS OF IT-PROJECT MANAGEMENTMODELS OF IT-PROJECT MANAGEMENT
MODELS OF IT-PROJECT MANAGEMENT
 
Software Architecture: Introduction to the abstraction (May 2014_Split)
Software Architecture: Introduction to the abstraction (May 2014_Split)Software Architecture: Introduction to the abstraction (May 2014_Split)
Software Architecture: Introduction to the abstraction (May 2014_Split)
 
6&8-Design.ppt
6&8-Design.ppt6&8-Design.ppt
6&8-Design.ppt
 
Methodology and Campaign Design for the Evaluation of Semantic Search Tools
Methodology and Campaign Design for the Evaluation of Semantic Search ToolsMethodology and Campaign Design for the Evaluation of Semantic Search Tools
Methodology and Campaign Design for the Evaluation of Semantic Search Tools
 
Model-driven Design-Runtime Interaction in Safety Critical System Development...
Model-driven Design-Runtime Interaction in Safety Critical System Development...Model-driven Design-Runtime Interaction in Safety Critical System Development...
Model-driven Design-Runtime Interaction in Safety Critical System Development...
 
Agency benefits of its standards how to use us dot its standards - imsa 20...
Agency benefits of its standards    how to use us dot its standards - imsa 20...Agency benefits of its standards    how to use us dot its standards - imsa 20...
Agency benefits of its standards how to use us dot its standards - imsa 20...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
EngD in Systems (thinking)
EngD in Systems (thinking)EngD in Systems (thinking)
EngD in Systems (thinking)
 
NISI Introductie Continuous Delivery 3.0
NISI Introductie Continuous Delivery 3.0NISI Introductie Continuous Delivery 3.0
NISI Introductie Continuous Delivery 3.0
 
software development methodologies
software development methodologiessoftware development methodologies
software development methodologies
 

More from Ioanna Tsalouchidou

Observation, Experiment, Conclusion: the Three Princes of Serendip_essay_Phil...
Observation, Experiment, Conclusion: the Three Princes of Serendip_essay_Phil...Observation, Experiment, Conclusion: the Three Princes of Serendip_essay_Phil...
Observation, Experiment, Conclusion: the Three Princes of Serendip_essay_Phil...
Ioanna Tsalouchidou
 
The Chubby lock service for loosely- coupled distributed systems
The Chubby lock service for loosely- coupled distributed systems The Chubby lock service for loosely- coupled distributed systems
The Chubby lock service for loosely- coupled distributed systems
Ioanna Tsalouchidou
 
7.howcompanieslearnyoursecrets 120318193259-phpapp01
7.howcompanieslearnyoursecrets 120318193259-phpapp017.howcompanieslearnyoursecrets 120318193259-phpapp01
7.howcompanieslearnyoursecrets 120318193259-phpapp01
Ioanna Tsalouchidou
 
Simulation vs experimental-testbeds_ioanna_tsalouchidou
Simulation vs experimental-testbeds_ioanna_tsalouchidouSimulation vs experimental-testbeds_ioanna_tsalouchidou
Simulation vs experimental-testbeds_ioanna_tsalouchidou
Ioanna Tsalouchidou
 
Intelligent placement of_datacenters_for_internet_services_ioanna_tsalouchidou
Intelligent placement of_datacenters_for_internet_services_ioanna_tsalouchidouIntelligent placement of_datacenters_for_internet_services_ioanna_tsalouchidou
Intelligent placement of_datacenters_for_internet_services_ioanna_tsalouchidou
Ioanna Tsalouchidou
 

More from Ioanna Tsalouchidou (7)

Observation, Experiment, Conclusion: the Three Princes of Serendip_essay_Phil...
Observation, Experiment, Conclusion: the Three Princes of Serendip_essay_Phil...Observation, Experiment, Conclusion: the Three Princes of Serendip_essay_Phil...
Observation, Experiment, Conclusion: the Three Princes of Serendip_essay_Phil...
 
The Chubby lock service for loosely- coupled distributed systems
The Chubby lock service for loosely- coupled distributed systems The Chubby lock service for loosely- coupled distributed systems
The Chubby lock service for loosely- coupled distributed systems
 
7.howcompanieslearnyoursecrets 120318193259-phpapp01
7.howcompanieslearnyoursecrets 120318193259-phpapp017.howcompanieslearnyoursecrets 120318193259-phpapp01
7.howcompanieslearnyoursecrets 120318193259-phpapp01
 
Simulation vs experimental-testbeds_ioanna_tsalouchidou
Simulation vs experimental-testbeds_ioanna_tsalouchidouSimulation vs experimental-testbeds_ioanna_tsalouchidou
Simulation vs experimental-testbeds_ioanna_tsalouchidou
 
Intelligent placement of_datacenters_for_internet_services_ioanna_tsalouchidou
Intelligent placement of_datacenters_for_internet_services_ioanna_tsalouchidouIntelligent placement of_datacenters_for_internet_services_ioanna_tsalouchidou
Intelligent placement of_datacenters_for_internet_services_ioanna_tsalouchidou
 
Cap in depth
Cap in depthCap in depth
Cap in depth
 
Rest vs soap
Rest vs soapRest vs soap
Rest vs soap
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

A Distributed Self-management Service