Considerations for creating, storing and trusting a unified business approach to data in a distributed environment. In order to prevent disjointed and competing views of business facts.
Data in a distributed environment needs additional consideration in order to stop disjointed and competing approaches being implemented. This can lead to mistrust of datastores and its consumers re-inventing their own view of business facts.
Based on the blog post: https://tech.holidayextras.com/sharing-data-is-caring-data-f0b66f7c2f49
Blockchain can be defined as a decentralized & distributed digital ledger where the intended use is to record transactions across computers in a way that the record cannot be altered retroactively without altering subsequent blocks & the collusion of the network
Enhance Your Mobile Application with The Use of Blockchain TechnologyDivyaConsagous
When we talk about the latest technology, Blockchain instantly comes into our minds. So, if you want to know more about this technology and how it is useful to the development of mobile applications, then it would be worthy to dig deeper into this ppt because it will help you to give brief knowledge about Blockchain technology.
Major applications of blockchains, their different functional characteristics and some example use cases, security and trust mechanisms on which blockchains, containing regulated data, depend.
Author : David Watrin, Head of Security and Intelligence, Swisscom
Personal data and the blockchain – how will the GDPR influence blockchain app...BigchainDB
Simon Schwerin from BigchainDB talkst about privacy and blockchain:
There are many blockchain applications in the field of identity, IP, finance and energy that are working with personal data. As of May, 28 2018 the new EU GDPR will be implemented, with the aim to strengthen the human rights of individuals, by increasing protection and a feel of ownership of their personal data. It is also supposed to be designed to be technologically neutral and adaptable to processing personal data in different contexts, structures and manners. With regards to blockchain this leaves many questions open, to name a few:
Who will be the data controller in decentralized multi-node systems? – Is there an Accountability Gap? Difference of Private vs. Public set-ups?
Privacy by Design/Default and blockchain core features – Implementation or Clash of Principles? What about the right to be forgotten?
How could a blockchain privacy impact assessment (bPIA) look like to increase the chance of compliance with GDPR next year?
Denodo DataFest 2017: The Need for Speed and Agility in BusinessDenodo
Watch the live presentation here: https://goo.gl/c3sbGY
Speed is everything. Businesses that move fast leave their competition in the dust. But one needs high performance architecture to enable it.
Watch this Denodo DataFest 2017 session to discover:
• How businesses can move faster than their competitors with the right architecture.
• The critical technology component that enables speed and agility.
• How to build a data services layer to protect the data sources from corruption.
Blockchains and Smart Contracts provide a base framework for legal engineers to build scalable terms and conditions of relationships amongst actors in an ecosystem.
Data in a distributed environment needs additional consideration in order to stop disjointed and competing approaches being implemented. This can lead to mistrust of datastores and its consumers re-inventing their own view of business facts.
Based on the blog post: https://tech.holidayextras.com/sharing-data-is-caring-data-f0b66f7c2f49
Blockchain can be defined as a decentralized & distributed digital ledger where the intended use is to record transactions across computers in a way that the record cannot be altered retroactively without altering subsequent blocks & the collusion of the network
Enhance Your Mobile Application with The Use of Blockchain TechnologyDivyaConsagous
When we talk about the latest technology, Blockchain instantly comes into our minds. So, if you want to know more about this technology and how it is useful to the development of mobile applications, then it would be worthy to dig deeper into this ppt because it will help you to give brief knowledge about Blockchain technology.
Major applications of blockchains, their different functional characteristics and some example use cases, security and trust mechanisms on which blockchains, containing regulated data, depend.
Author : David Watrin, Head of Security and Intelligence, Swisscom
Personal data and the blockchain – how will the GDPR influence blockchain app...BigchainDB
Simon Schwerin from BigchainDB talkst about privacy and blockchain:
There are many blockchain applications in the field of identity, IP, finance and energy that are working with personal data. As of May, 28 2018 the new EU GDPR will be implemented, with the aim to strengthen the human rights of individuals, by increasing protection and a feel of ownership of their personal data. It is also supposed to be designed to be technologically neutral and adaptable to processing personal data in different contexts, structures and manners. With regards to blockchain this leaves many questions open, to name a few:
Who will be the data controller in decentralized multi-node systems? – Is there an Accountability Gap? Difference of Private vs. Public set-ups?
Privacy by Design/Default and blockchain core features – Implementation or Clash of Principles? What about the right to be forgotten?
How could a blockchain privacy impact assessment (bPIA) look like to increase the chance of compliance with GDPR next year?
Denodo DataFest 2017: The Need for Speed and Agility in BusinessDenodo
Watch the live presentation here: https://goo.gl/c3sbGY
Speed is everything. Businesses that move fast leave their competition in the dust. But one needs high performance architecture to enable it.
Watch this Denodo DataFest 2017 session to discover:
• How businesses can move faster than their competitors with the right architecture.
• The critical technology component that enables speed and agility.
• How to build a data services layer to protect the data sources from corruption.
Blockchains and Smart Contracts provide a base framework for legal engineers to build scalable terms and conditions of relationships amongst actors in an ecosystem.
Technology tipping points Big Data and Blockchain use case presentationVinod Kumar Nerella
In this presentation, I am talking about the two technology tipping points big data and Blockchain.
In big data area, the presentation covers use cases in retails, financial and manufacturing sector.
Block chain and its main concepts are explained with the use case smart contracts is introduction and Blockchain can help manufacturing firms for efficient operations.
In my quest to #DevelopNextGenLeaders, shared my thoughts on Blockchain in Manufacturing at World Blockchain Technology Conclave, Bangalore on 22nd March 2018. Invite all to connect and join hands to co-create future.
Application of blockchain in manufacturing industryCeline George
The adoption of blockchain technology in Manufacturing is revolutionizing the way the industry is performing. From operational excellence to product authenticity, consumer experience to quality of care.
Overview Of Blockchain Technology And Architecture Powerpoint Presentation Sl...SlideTeam
Enhance your audiences knowledge with this well researched complete deck. Showcase all the important features of the deck with perfect visuals. This deck comprises of total of thirty two slides with each slide explained in detail. Each template comprises of professional diagrams and layouts. Our professional PowerPoint experts have also included icons, graphs and charts for your convenience. All you have to do is DOWNLOAD the deck. Make changes as per the requirement. Yes, these PPT slides are completely customizable. Edit the colour, text and font size. Add or delete the content from the slide. And leave your audience awestruck with the professionally designed Overview Of Blockchain Technology And Architecture Powerpoint Presentation Slides complete deck. https://bit.ly/3cJ7GmX
How to Apply Blockchain to Supply-Chain ManagementFluence.sh
Today, supply chains are inherently complex. They sometimes face difficulties in terms of cost, speed, or quality. Still, the benefits of the supply-chain system are obvious, and there are certain ways to improve its efficiency with the blockchain technologies.
Blockchain in Banking Bucharest Meetup C1 “The fourth industrial revolution will be built upon a Machine-to-Machine economy with autonomous vehicles, 3D printer, robots, drones and IoT.
Conferencia Blockchain/ Madrid 2017. Una jornada para descubrir más sobre la tecnología blockchain en españa, los casos de uso y startups que están trabajando en el ecosistema español. Autor: Manuel Machado, Responsable Global de soluciones blockchain, WorldLine.
PSCU follows PCI Compliance Guidelines for Self-Service BI through Webi - SAB...CCG
PSCU offers its credit union members a self-service environment to access pre-authored reports as well as provide members with the ability to analyze data through ad-hoc report creation. In this presentation, presenters will discuss how they used SAP BusinessObjects Information Design Tool and the BI Platform 4.1 CMC to implement a security model that met PCI compliance guidelines. Techniques included custom user groups and custom variables for row level data restrictions as well as specific data masking based on the user's login information. This solution gives PSCU members a secure and flexible way to gain insights into their business.
Blockchain has been a big buzz lately. There are a lot of demand for DApps (Decentralised Applications) developers in the market right now.
In this session, the audience will understand the fundamentals of a Blockchain platform, what it means for businesses and what to expect from Blockchain.
Find out the risk & challenges in banking and how blockchain is gonna overcome them. Also, get to know about the use-cases of blockchain in banking.
VISIT>>https://www.bitdeal.net/blockchain-in-banking
Blockchain technology is probably the biggest game changer for the Internet. Is this for good or bad? Will it help to make the Internet safer and more secure – and more beneficial?
Author : Patrick Curry, BBFA
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationDenodo
Watch full webinar here: https://bit.ly/3sumuL5
Join KashTech and Denodo to discover how Data Virtualization can help accelerate your time-to-value from data while reducing the costs at the same time.
Gartner has predicted that organizations using Data Virtualization will spend 40% less on data integration than those using traditional technologies. Denodo customers have experienced time-to-deliver improvements of up to 90% within their data provisioning processes and cost savings of 50% or more. As Rod Tidwell (Cuba Gooding Jr.) said in the movie 'Jerry Maguire', "Show me the money!"
Register to attend and learn how Data Virtualization can:
- Accelerate the delivery of data to users
- Drive digital transformation initiatives
- Reduce project costs and timelines
- Quickly deliver value to your organization
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
Detecting Opportunities and Threats with Complex Event Processing: Case Studies in Predictive Customer Interaction Management and Fraud Detection, February 27, 2007 FINAL DRAFT 2, 8th Annual Japan\'s International Banking & Securities System Forum, Tim Bass, CISSP, Principal Global Architect, Director
Technology tipping points Big Data and Blockchain use case presentationVinod Kumar Nerella
In this presentation, I am talking about the two technology tipping points big data and Blockchain.
In big data area, the presentation covers use cases in retails, financial and manufacturing sector.
Block chain and its main concepts are explained with the use case smart contracts is introduction and Blockchain can help manufacturing firms for efficient operations.
In my quest to #DevelopNextGenLeaders, shared my thoughts on Blockchain in Manufacturing at World Blockchain Technology Conclave, Bangalore on 22nd March 2018. Invite all to connect and join hands to co-create future.
Application of blockchain in manufacturing industryCeline George
The adoption of blockchain technology in Manufacturing is revolutionizing the way the industry is performing. From operational excellence to product authenticity, consumer experience to quality of care.
Overview Of Blockchain Technology And Architecture Powerpoint Presentation Sl...SlideTeam
Enhance your audiences knowledge with this well researched complete deck. Showcase all the important features of the deck with perfect visuals. This deck comprises of total of thirty two slides with each slide explained in detail. Each template comprises of professional diagrams and layouts. Our professional PowerPoint experts have also included icons, graphs and charts for your convenience. All you have to do is DOWNLOAD the deck. Make changes as per the requirement. Yes, these PPT slides are completely customizable. Edit the colour, text and font size. Add or delete the content from the slide. And leave your audience awestruck with the professionally designed Overview Of Blockchain Technology And Architecture Powerpoint Presentation Slides complete deck. https://bit.ly/3cJ7GmX
How to Apply Blockchain to Supply-Chain ManagementFluence.sh
Today, supply chains are inherently complex. They sometimes face difficulties in terms of cost, speed, or quality. Still, the benefits of the supply-chain system are obvious, and there are certain ways to improve its efficiency with the blockchain technologies.
Blockchain in Banking Bucharest Meetup C1 “The fourth industrial revolution will be built upon a Machine-to-Machine economy with autonomous vehicles, 3D printer, robots, drones and IoT.
Conferencia Blockchain/ Madrid 2017. Una jornada para descubrir más sobre la tecnología blockchain en españa, los casos de uso y startups que están trabajando en el ecosistema español. Autor: Manuel Machado, Responsable Global de soluciones blockchain, WorldLine.
PSCU follows PCI Compliance Guidelines for Self-Service BI through Webi - SAB...CCG
PSCU offers its credit union members a self-service environment to access pre-authored reports as well as provide members with the ability to analyze data through ad-hoc report creation. In this presentation, presenters will discuss how they used SAP BusinessObjects Information Design Tool and the BI Platform 4.1 CMC to implement a security model that met PCI compliance guidelines. Techniques included custom user groups and custom variables for row level data restrictions as well as specific data masking based on the user's login information. This solution gives PSCU members a secure and flexible way to gain insights into their business.
Blockchain has been a big buzz lately. There are a lot of demand for DApps (Decentralised Applications) developers in the market right now.
In this session, the audience will understand the fundamentals of a Blockchain platform, what it means for businesses and what to expect from Blockchain.
Find out the risk & challenges in banking and how blockchain is gonna overcome them. Also, get to know about the use-cases of blockchain in banking.
VISIT>>https://www.bitdeal.net/blockchain-in-banking
Blockchain technology is probably the biggest game changer for the Internet. Is this for good or bad? Will it help to make the Internet safer and more secure – and more beneficial?
Author : Patrick Curry, BBFA
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationDenodo
Watch full webinar here: https://bit.ly/3sumuL5
Join KashTech and Denodo to discover how Data Virtualization can help accelerate your time-to-value from data while reducing the costs at the same time.
Gartner has predicted that organizations using Data Virtualization will spend 40% less on data integration than those using traditional technologies. Denodo customers have experienced time-to-deliver improvements of up to 90% within their data provisioning processes and cost savings of 50% or more. As Rod Tidwell (Cuba Gooding Jr.) said in the movie 'Jerry Maguire', "Show me the money!"
Register to attend and learn how Data Virtualization can:
- Accelerate the delivery of data to users
- Drive digital transformation initiatives
- Reduce project costs and timelines
- Quickly deliver value to your organization
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
Detecting Opportunities and Threats with Complex Event Processing: Case Studies in Predictive Customer Interaction Management and Fraud Detection, February 27, 2007 FINAL DRAFT 2, 8th Annual Japan\'s International Banking & Securities System Forum, Tim Bass, CISSP, Principal Global Architect, Director
Squirreling Away $640 Billion: How Stripe Leverages Flink for Change Data Cap...Flink Forward
Flink Forward San Francisco 2022.
Being in the payments space, Stripe requires strict correctness and freshness guarantees. We rely on Flink as the natural solution for delivering on this in support of our Change Data Capture (CDC) infrastructure. We heavily rely on CDC as a tool for capturing data change streams from our databases without critically impacting database reliability, scalability, and maintainability. Data derived from these streams is used broadly across the business and powers many of our critical financial reporting systems totalling over $640 Billion in payment volume annually. We use many components of Flink’s flexible DataStream API to perform aggregations and abstract away the complexities of stream processing from our downstreams. In this talk, we’ll walk through our experience from the very beginning to what we have in production today. We’ll share stories around the technical details and trade-offs we encountered along the way.
by
Jeff Chao
Watch full webinar here: https://buff.ly/2mHGaLA
What started to evolve as the most agile and real-time enterprise data fabric, data virtualization is proving to go beyond its initial promise and is becoming one of the most important enterprise big data fabrics.
Attend this session to learn:
• What data virtualization really is
• How it differs from other enterprise data integration technologies
• Why data virtualization is finding enterprise-wide deployment inside some of the largest organizations
Introduction to Modern Data Virtualization 2021 (APAC)Denodo
Watch full webinar here: https://bit.ly/2XXyc3R
“Through 2022, 60% of all organisations will implement data virtualization as one key delivery style in their data integration architecture," according to Gartner. What is data virtualization and why is its adoption growing so quickly? Modern data virtualization accelerates that time to insights and data services without copying or moving data.
Watch on-demand this webinar to learn:
- Why organizations across the world are adopting data virtualization
- What is modern data virtualization
- How data virtualization works and how it compares to alternative approaches to data integration and management
- How modern data virtualization can significantly increase agility while reducing costs
Réinventez le Data Management avec la Data Virtualization de DenodoDenodo
Regardez la version complète du webinar à la demande ici: https://goo.gl/ZxRqmX
"D'ici à 2020, 50% des entreprises mettront en œuvre une forme de virtualisation des données comme une option pour l'intégration de données", selon le cabinet d’analystes Gartner. La virtualisation des données ou data virtualization est devenue une force motrice pour les entreprises pour la mise en œuvre d’une architecture de données d'entreprise agile, temps réel et flexible.
Au sommaire de ce webinar:
Denodo et son positionnement sur le marché de la Data Virtualization
Les principales fonctionnalités
Démo/vidéo
Les principaux cas d’usage. Présentation d'un cas client : comment Intel a repensé l’architecture de ses données avec la Data Virtualization
Les ressources
Questions/Réponses
As digital channels continue to grow, they drive greater diversity in our data landscape. At Yorkshire Building Society, our purpose is to provide real help with real life and this relies on data from a myriad of sources. This diversity creates a need for points of intersection, where data can unite to feed customer and business insights. How do we create these hubs of intersection and what can modern technology offer?
Speaker:
Mark Walters
Lead Enterprise Data Architect for Data & Information
Yorkshire Building Society
Building and deploying microservices with event sourcing, CQRS and Docker (QC...Chris Richardson
In this talk we share our experiences developing and deploying a microservices-based application. You will learn about the distributed data management challenges that arise in a microservices architecture. We will describe how we solved them using event sourcing to reliably publish events that drive eventually consistent workflows and pdate CQRS-based views. You will also learn how we build and deploy the application using a Jenkins-based deployment pipeline that creates Docker images that run on Amazon EC2.
Building and deploying microservices with event sourcing, CQRS and Docker (Ha...Chris Richardson
In this talk we share our experiences developing and deploying a microservices-based application. You will learn about the distributed data management challenges that arise in a microservices architecture. We will describe how we solved them using event sourcing to reliably publish events that drive eventually consistent workflows and pdate CQRS-based views. You will also learn how we build and deploy the application using a Jenkins-based deployment pipeline that creates Docker images that run on Amazon EC2.
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Tim Bass
Complex Event Processing (CEP) for Next-Generation Security Event Management, Fraud and Intrusion Detection , April 17, 2007 (First Draft), London, Tim Bass, CISSP, Director, Principal Global Architect
Emerging Technologies Group
Data Virtualization for Data Architects (New Zealand)Denodo
Watch full webinar here: https://bit.ly/3ogCJKC
Success or failure in the digital age will be determined by how effectively organisations manage their data. The speed, diversity and volume of data present today can overwhelm older data architectures, leaving business leaders lacking the insight and operational agility needed to respond to market opportunity or competitive challenges.
With the pace of today’s business, modernisation of a data architecture must be seamless, and ideally, built on existing capabilities. This webinar explores how data virtualization can help provide a seamless evolution to the capabilities of an existing data architecture without business disruption.
You will discover:
How to modernise your data architectures without disturbing the existing analytical workload
- How to extend your data architecture to more quickly exploit existing, and new sources of data
- How to enable your data architecture to present more low latency data
Developing Event-driven Microservices with Event Sourcing & CQRS (gotoams)Chris Richardson
Modern, cloud-native applications typically use a microservices architecture in conjunction with NoSQL and/or sharded relational databases. However, in order to successfully use this approach you need to solve some distributed data management problems including how to maintain consistency between multiple databases without using 2PC.
In this talk you will learn more about these issues and how to solve them by using an event-driven architecture. We will describe how event sourcing and Command Query Responsibility Separation (CQRS) are a great way to realize an event-driven architecture. You will learn about a simple yet powerful approach for building, modern, scalable applications.
Data Virtualization for Data Architects (Australia)Denodo
Watch full webinar here: https://bit.ly/35sp2Q0
Success or failure in the digital age will be determined by how effectively organisations manage their data. The speed, diversity and volume of data present today can overwhelm older data architectures, leaving business leaders lacking the insight and operational agility needed to respond to market opportunity or competitive challenges.
With the pace of today’s business, modernisation of a data architecture must be seamless, and ideally, built on existing capabilities. This webinar explores how data virtualization can help provide a seamless evolution to the capabilities of an existing data architecture without business disruption.
You will discover:
- How to modernise your data architectures without disturbing the existing analytical workload
- How to extend your data architecture to more quickly exploit existing, and new sources of data
- How to enable your data architecture to present more low latency data
Time Difference: How Tomorrow's Companies Will Outpace Today'sInside Analysis
The Briefing Room with Mark Madsen and WebAction
Live Webcast Feb. 10, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=fa83c6283de99dfb6f38b9d7199cb452
In our increasingly interconnected world, the windows of opportunity for meaningful action are shrinking. Where hours once sufficed, minutes are now the norm. For some transactions, seconds make all the difference, even sub-seconds. Meeting these demands requires a new approach to information architecture, one that embraces the many innovations that are fundamentally changing the data-driven economy.
Register for this episode of The Briefing Room to hear veteran Analyst Mark Madsen of Third Nature as he explains how a confluence of advances are changing the nature of data management. He'll be briefed by Sami Akbay of WebAction, who will showcase his company's real-time data platform, designed from the ground up to meet the challenges of leveraging Big Data in concert with all manner of operational enterprise systems.
Visit InsideAnalysis.com for more information.
Similar to Sharing Data is Caring Data by Mark Terry (codeHarbour June 2019) (20)
No Onions, No Tiers - An Introduction to Vertical Slice Architecture by Bill ...Alex Cachia
Vertical Slice Architecture helps us build maintainable applications by separating concerns around features rather than technical responsibilities allowing us to add features without modifying existing code.
OWASP Top 10 2021 - let's take a closer look by Glenn WilsonAlex Cachia
In this talk Glenn will walk you through the OWASP top 10 published towards the end of 2021 to explain what's hot and what's hotter. He will give a brief description of each weakness and explain how these they are exploited and, more importantly, what you can do to mitigate against attackers exploiting them in your code
If you think open source is not for you, think again by Jane ChakravortyAlex Cachia
Years ago open source was considered unsuitable for the mainstream. We had Windows, didn’t we? Times have changed, we all use open source these days, but often don’t know it. So, let’s take a closer look at open source.
Chaos Engineering – why we should all practice breaking things on purpose by ...Alex Cachia
What can we learn from fire fighters to make the systems we come to depend upon become more robust and resilient? In this talk, I will introduce what Chaos Engineering is and why it is important and share some real case studies of how people like Netflix and Amazon are applying these techniques to create more resilient systems for the benefit of their customers.
Treating your career path and training like leveling up in games by Raymond C...Alex Cachia
Treating your career path and training like leveling up in games
We will take a look at how you can actively plan your career through learning specific skills. Picking a moon-shot job and working out the path to get there. Then how to start taking practical steps to get started
Digital forensics and giving evidence by Jonathan Haddock Alex Cachia
Digital forensics is being used more and more as computers become increasingly prevalent in our lives. In this talk, Jonathan will walk us through a basic forensic process and discuss some of the complications. Jonathan will highlight some key forensics principles that you can follow without specialist software, allowing you to implement them as part of your own incident response process.
There are many ways to secure software. In this talk, I will explain some of the different techniques used to prevent introducing security vulnerabilities into your software, using threat modelling, automated testing and dependency validation.
Data Preparation and the Importance of How Machines Learn by Rebecca VickeryAlex Cachia
Machine learning is the ability of a machine to perform a task without being explicitly programmed. In this talk, I will cover how to manipulate data into a state that a machine can understand and make accurate predictions, and introduce a Python library that makes this easier.
Why Rust? by Edd Barrett (codeHarbour December 2019)Alex Cachia
For longer than I have existed, memory errors have plagued systems programming. Although many such errors are benign, sadly many end up being security vulnerabilities, or worse, exploits. In this talk, I will discuss how a security exploit is born, and how the Rust
programming language tries to prevent them.
Issue with tracking? Fail that build! by Steve Coppin-Smith (codeHarbour Nove...Alex Cachia
The analytics strategy must be a primary citizen of the software delivery process in a data driven business! This talk will include a live demo of extending the Nightwatch automated testing framework to uncover and resolve issues in tracking code that would have otherwise hit production.
Hack your voicemail with Javascript by Chris Willmott (codeHarbour October 2019)Alex Cachia
You're a developer, so you probably have working knowledge of Javascript. Its 2019, but people still leave you voicemails, pff. In this short practical talk, I'll show you how to hack and upgrade ANY mobile voicemail to do almost anything you want with the Twilio platform.
Developing for Africa by Jonathan Haddock (codeHarbour October 2019)Alex Cachia
There are always challenges developing an app to scale and these are compounded when set in an African context. African Pastors Fellowship’s eVitabu project, launched in March 2018, provides an Android app pastors can use to access multimedia teaching resources.
Revving up with Reinforcement Learning by Ricardo SueirasAlex Cachia
In this session I will share my journey that started with me taking my children discarded toys and trying to get them to drive themselves, to a fully autonomous driving model car.
Blockchain For Your Business by Kenneth Cox (codeHarbour July 2019)Alex Cachia
Blockchain is an emerging technology that has captured the attention of the financial experts, the media and the technical enthusiasts. In this talk we take a look at the technology; how it works, why you should consider it for your business and how it's given life to cryptocurrencies.
Seeking Simplicity by Phil Nash (codeHarbour June 2019)Alex Cachia
What is simplicity and why do we value it so much? How does it relate to complexity? When is complexity good and when is it bad? How does simplicity differ from ease? As we examine these questions we'll find that the situation is not quite as simple (!) as it might first appear. In the course of the discussion we'll come up with a mental model for framing problems that we can apply to many things - but we'll particularly look at how we can apply it to our designs and code. We'll also look at how some programming languages help us more than others in our drive towards simplicity.
Managing technical debt by Chris Willmott (codeHarbour April 2019)Alex Cachia
Managing technical debt by Chris Willmott
With the talk primarily aimed at those in technical roles, I'll be providing a number of practical methods to use when managing technical debt. About half the talk will be things we can do as developers to quickly identify then reduce the impact of technical debt, and half will be around how to explain technical debt to non-technical stakeholders.
Hosted by Alex Cachia, codeHarbour provides an opportunity for discussion and a platform for digital presenters to get their technological ideas out there to the people who need to hear it.
Telephone Systems and Voice over IP by Bob Eager (codeHarbour April 2019)Alex Cachia
Telephone Systems and Voice over IP by Bob Eager
The speaker will talk about his experiences with a gradually evolving SOHO telephone system, starting with a single POTS (landline), through ISDN, to the current VoIP solution, and the eventual removal of the original telephones. The majority of the talk will concern the use of the open source Asterisk platform to provide numerous facilities (including one or two quite unusual ones) in a large, rambling house used also as an office for part of the time. This will include an introduction to VoIP for beginners. Costs and savings will also be considered. There will be time for questions and discussion.
Hosted by Alex Cachia, codeHarbour provides an opportunity for discussion and a platform for digital presenters to get their technological ideas out there to the people who need to hear it.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
2. Sharing Data Is Caring Data
Is your data playing well with others?
3. Introduction / Motivation
20+ years experience in the
industry
Working at Holiday Extras
Sharing data is not easy
Microservices playing nice
with a data lake
We are still learning...
4. The monolith
Common in smaller organisations
Often seen as legacy or older tech
Unintended victims of their own success
Serving businesses well for years
15. Generating Even More Events!
Microservice Microservice
MicroserviceMicroservice
DB
DB
DB
DB
Event
Event
Event
Event
16. Positive Data Culture
What do we need
to report on?
What state is
changing?
Which business
entities are
involved?
How do we
measure success?
Can this data be
useful to others?
What future products
could the data enable?
Hi I’m mark terry
Thought I’d talk about a recent blog post about how we are sharing data at Holiday Extras between the various parts of the business and teams. Allowing us to implement a growing number of microservices and still maintain usable data warehouse.
For these slide I’ll be focusing on the implementation detail of how we are currently doing this.
But we are still learning here, and still making improvements in this space.
So this is where we started, years ago. Much like other companies I’ve worked in.
Companies spend either let them be, or spend years moving away from them, generally they work well so they are hard to just kill.
Monoliths do get a fair bit of bad press, but in data terms things are ok so far...
Probably the simplest diagram I’ve put on a slide.
Generally monolithic apps are paired with a large datastore too. This was the case in several places I’ve worked
Things are great data wise as there is a single place where engineers can store data, and no one needs to think about differing standards or schemas as it can be tightly coupled with the app.
From an engineering point of view this could be seen as a negative but from a data view often the data is just appended to in whatever format is already there. Consistency wins here.
Overtime this DB is also used for servicing reporting to the business and there might be some simple admin screens to give some insight into the data contained within it.
Once source of truth of the business data
One place to go to find the numbers.
These database often creak under the strain of needing to be quick for the application but contain enough data for good reporting. (pick one)
Enter the world of microservices.
Often there are reasons to break a monolith down into smaller services. Those reasons are a whole other talk but mostly relate to developer experience or deployment cadence.
A common pattern here is to identify components inside the larger app and move these out into their own service.
The new service will still use the original datastore, to limit the amount of refactoring required at each step. This a good example of not thinking about data first.
After several services are broken out of the larger app, you end up with this architecture anti-pattern, the monolithic datastore.
Multiple descent services still sharing the same datastore.
We had this problem at Holiday Extras. You will not be affected by it immediately but it will get you son enough.
This couples the data of services together so database schema changes require complicated deploys.
Services can access and update data without going through advertised interfaces of the services. Making it harder to cache and identity sources of truth.
Microservices should each have their own operational datastores that is only accessible by that service. The data stored in these relate to the function that the service provides.
Data might be duplicated in the different stores with tech and formats may differing.
The sole access to data is via the service’s advertised interface.
Operationally things are great at this point, but our precious data is locked away in many databases reporting and sharing is going to be much harder now.
We go through a process of identifying what business entity a service changes and we have that service emit an event when this happens.
An event is a payload describing something that has happened. For example a new customer account has been created or a booking has been made.
If there are multiple services that perform similar tasks that similar events should be sent, for example having two booking systems.
These events are the key to sharing business data, they serve as an abstraction layer from the implementation detail in a service.
Now the hardest part of this whole process.
Schema’ing!
Deciding what makes up an event.
When you go through this process even the smallest of points will take time. You’ll be surprised by the differences of opinion here.
These discussion do pay off in the long run, its upfront pain which the engineers need to go through. But it gets easier the more schemas that are created.
So what do we do with these events?
Well we collect them all into a single “pipeline”.
The pipeline is made up of several smaller components (microservices) to provide the features we need to use this new data in the business.
In this example we are storing raw data as files and then also storing the events into a single datastore for warehousing.
Other tasks could be added to the pipeline as required, redaction, segregation etc..
From the data warehouse we can then add reports required by the business from a singe source. Great for compliance and makes it much easier join related data together.
We can run large queries here as its completely separated from the operational space.
No data is deleted, great for having large datasets for trends, and predicting customer intents.
The other major feature of this approach is as you have service generating events, you can have services also consuming these events.
Advantages here can include looser coupling of services and queue processing for free.
Services can be built around business entities state changes rather than from current implementation details.
For example send and email when we have a booking event, rather than allow our booking API to send a booking confirmation when someone books online.
It makes the engineers think a bit more generic and how a new service might be useful to others. Services built for the individual team but can be used by the entire busines.
Then the whole process starts again, services consuming events will change state and generate more events, more microservices.
More data to report and analyse!
This whole process gives us a separation of business data from the implementation detail, allowing services to be changed but data consistency remains.
It makes engineers and stakeholders think about the data they need to report on or how a new service would alter business data.
Data driven development can be used if going to the extreme.
Some example questions shown that can help during the development process.
Twitter account if you want to get in touch or happy to chat later this evening.