Cloud Computing is gaining momentum as one of the technologies that promises to subvert our own idea of computing. With an increasing usage of cloud applications and their consequent dependency from connectivity, the nowadays Personal Computer is becoming merely a mobile device acting as a front-end to on-line applications and services. This huge paradigm shift in computing is witnessed for example by big market players who announced the imminent launch of innovative products and Operating Systems (like Chrome notebooks and the accompanying Chrome OS2. by Google), which are capable of projecting the user into the network in a few seconds by booting and starting immediately a web browser and (mostly) nothing else. In such a challenging scenario, more and more of the applications that we traditionally used locally on our PC are being hosted on cloud infrastructures and operated remotely through the Internet. This includes not only batch tasks, but also interactive applications which need to operate inherently with good levels of responsiveness.
In this paper, the challenging problem is discussed of how to ensure predictable levels of Quality of Service (QoS) to cloud applications across the multiple layers of a typical cloud infrastructure, and how a reasonable Service Level Agreement (SLA) management and enforcement policy might look like. The scope of this paper represents a hands-on experience that was gained by the authors realising the IRMOS real-time cloud-computing infrastructure in the context of the IRMOS European Project
Improving Responsiveness for Virtualized Networking Under Intensive Computing...tcucinotta
In this paper the problem of providing network response guarantees to multiple Virtual Machines (VMs) co-scheduled on the same set of CPUs is tackled, where the VMs may have to host both responsive real-time applications and batch compute-intensive workloads. When trying to use a real-time reservation-based CPU scheduler for providing stable performance guarantees to such a VM, the compute-intensive workload would be scheduled better with high time granularities, to increase performance and reduce system overheads, whilst the real-time workload would need lower time granularities in order to keep the response-time under acceptable levels. The mechanism that is proposed in this paper mixes both concepts, allowing the scheduler to dynamically switch between fine-grain and coarse-grain scheduling intervals depending on whether the VM is performing network operations or not. A prototype implementation of the proposed mechanism has been realized for the KVM hypervisor when running on Linux, modifying a deadline-based real-time scheduling strategy for the Linux kernel developed previously. The gathered experimental results show that the proposed technique is effective in controlling the response-times of the real-time workload inside a VM while at the same time it allows for an efficient execution of the batch compute-intensive workload.
Task-aware Virtual Machine Scheduling for I/O PerformanceHwanju Kim
Hwanju Kim, Hyeontaek Lim, Jinkyu Jeong, Heeseung Jo, and Joonwon Lee, “Task-aware Virtual Machine Scheduling for I/O Performance”, ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE), Washington, DC, USA, Mar. 2009.
Slides of the talk I did at Zendcon 09. It tells PHP developers what they need to know about the cloud and gives exampes of how to interact with cloud services and applications.
This presentation shows how to use an IBM Blade Center for Virtualization with VMware Virtual Infrastructure 3.5. It shows the current state of the Blade, the technology to improve virtualization and the futur directions.
Improving Responsiveness for Virtualized Networking Under Intensive Computing...tcucinotta
In this paper the problem of providing network response guarantees to multiple Virtual Machines (VMs) co-scheduled on the same set of CPUs is tackled, where the VMs may have to host both responsive real-time applications and batch compute-intensive workloads. When trying to use a real-time reservation-based CPU scheduler for providing stable performance guarantees to such a VM, the compute-intensive workload would be scheduled better with high time granularities, to increase performance and reduce system overheads, whilst the real-time workload would need lower time granularities in order to keep the response-time under acceptable levels. The mechanism that is proposed in this paper mixes both concepts, allowing the scheduler to dynamically switch between fine-grain and coarse-grain scheduling intervals depending on whether the VM is performing network operations or not. A prototype implementation of the proposed mechanism has been realized for the KVM hypervisor when running on Linux, modifying a deadline-based real-time scheduling strategy for the Linux kernel developed previously. The gathered experimental results show that the proposed technique is effective in controlling the response-times of the real-time workload inside a VM while at the same time it allows for an efficient execution of the batch compute-intensive workload.
Task-aware Virtual Machine Scheduling for I/O PerformanceHwanju Kim
Hwanju Kim, Hyeontaek Lim, Jinkyu Jeong, Heeseung Jo, and Joonwon Lee, “Task-aware Virtual Machine Scheduling for I/O Performance”, ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE), Washington, DC, USA, Mar. 2009.
Slides of the talk I did at Zendcon 09. It tells PHP developers what they need to know about the cloud and gives exampes of how to interact with cloud services and applications.
This presentation shows how to use an IBM Blade Center for Virtualization with VMware Virtual Infrastructure 3.5. It shows the current state of the Blade, the technology to improve virtualization and the futur directions.
Low-Latency Audio on Linux by Means of Real-Time Schedulingtcucinotta
In this paper, we propose to use resource reservations scheduling and feedback-based allocation techniques for the provisioning of proper timeliness guarantees to audio processing applications. This allows real-time audio tasks to meet the tight timing constraints characterizing them, even if other interactive activities are present in the system. The JACK sound infrastructure has been modified, leveraging the real-time scheduler present in the Adaptive Quality of Service Architecture (AQuoSA). The effectiveness of the proposed approach, which does not require any modifiction to existing JACK clients, is validated through extensive experiments under different load conditions.
Optimum Scalability Point for Parallelisable Real-Time Componentstcucinotta
Distributing the workload of computationally intensive software components across a set of homogeneous computing resources (nodes, hosts, processors, cores), for the purpose of allowing them to meet precise timing (response-time) constraints, is often a pain due to the difficulties in understanding how the software will actually scale. Often, such a problem is faced by recurring to a trial-and-error process. In this paper, a methodology is introduced to tackle the problem of finding the optimum number of processors for deploying parallelisable real-time software components. Basic building blocks of the methodology are: a generic performance model for the response-time of a parallel software component; a concrete procedure for tuning optimally the parameters of the model; the application of optimisation techniques that allow to compute what is the minimum allocation needed to meet precise deadline constraints, as well as the one that minimises the response-time; the consideration of multiple real-time (independent) components to be deployed on the same multi/many-core hardware.
Virtualised e-Learning with Real-Time Guarantees on the IRMOS Platformtcucinotta
In this paper we focus on how Quality of Service guarantees are provided to virtualised applications in the Cloud Computing infrastructure that is being developed in the context of the IRMOS European Project. Provisioning of proper timeliness guarantees to distributed real-time applications involves the careful use of real-time scheduling mechanisms at the virtual-machine hypervisor level, of QoS-aware networking protocols and of proper design methodologies and tools for stochastic modelling of the application. The paper focuses on how we applied these techniques to a case-study involving a real eLearning mobile content delivery application that has been integrated into the IRMOS platform and its achieved performance.
The Wizard of OS: a Heartbeat for Legacy Multimedia Applicationstcucinotta
This presentation describes a technique for automagic provisioning of real-time scheduling guarantees for legacy multimedia applications, that does not require any modification to the application source-code.
Self-tuning Schedulers for Legacy Real-Time Applicationstcucinotta
We present an approach for adaptive scheduling of soft real-time legacy applications (for which no timing information is exposed to the system). Our strategy is based on the combination of two techniques: 1) a real-time monitor that observes the sequence of events generated by the application to infer its activation period, 2) a feedback mechanism
that adapts the scheduling parameters to ensure a timely execution of the application. By a thorough experimental evaluation of an implementation of our approach, we show its performance and its efficiency.
Innovation with Open Source: The New South Wales Judicial Commission experienceLinuxmalaysia Malaysia
Innovation with Open Source: The New South Wales Judicial Commission experience. MyGOSSCON 2008. Mr. Murali Sagi
Director,
Information Management & Corporate Services,
JUDICIAL COMMISSION OF NSW, SYDNEY, AUSTRALIA
reliability based design optimization for cloud migrationNishmitha B
reliability based design optimization for cloud migration is an application designed to manage applications..more precisely legacy applications..whose extraction n magmt. is crucial n troublesome.
5 Cloud Migration Experiences Not to Be RepeatedHostway|HOSTING
As a project manager at HOSTING, Kellen Amobi has assisted in many customer data migrations over the years. Kellen shares the top five migration mistakes that companies have made in the past and what experience has taught her about resolving the issues quickly, including:
-Developing realistic project scopes
-Managing timelines
-Avoiding security risks
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...SLA-Ready Network
The cloud is both a risk and an opportunity depending on the service. Despite the opportunities, security is a top concern for a growing number of cloud service customers, and rightfully so. A key challenge is representing security and measuring it in a service level agreement? How can a cloud service provider grant the security level? And how can a cloud service customer automatically enforce it?
Prof. Massimiliano Raks, University of Naples, talks us through Security Service Level Agreement (SecureSLAs), looking at
Security SLA Negotiation, Security SLA (Automatic) Enforcement and Security SLA Continuous Monitoring with the SPECS platform for SecSLAs.
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...Open Data Center Alliance
While public cloud computing continues to mature as a technology, those in charge of public cloud solutions within enterprises adopt the technology at their own pace, and for their own reasons. Indeed, they are all on separate journeys, but with many of the same business objectives. In order to determine the progress of enterprises’ journey to the public cloud, Gigaom created a survey designed to understanding what is happening within enterprises that are adopting public cloud computing.
Key items discovered in this survey include:
1. The use of public cloud computing is quickly expanding, and most organizations already exploit public cloud-based resources to run both critical and non-critical business systems.
2. Application development and testing are among the highest value uses of leveraging the public cloud, and most enterprises have moved from proof of concept to actual deployments in the last few years.
3. A larger number of business units leverage public cloud resources that are made up largely of AWS and a few other public cloud providers.
4. A surprising number of public cloud instances support the daily operations of many businesses, with a smaller percentage emerging as heavy users that leverage a massive amount of public cloud resources.
5. First cloud projects are a thing of the past, with most working on their second, third, or more major cloud deployments.
6. Change management and cloud governance are becoming more commonplace and accepted by enterprises.
In this lunchtime keynote presentation, David Linthicum provides a look at what’s occurring right now as enterprises move to public clouds using real data from real adopters. What’s more, Linthicum will provide predictions around what is likely to occur in the world of cloud computing in 2015 and 2016, as well as recommendations around how you can exploit changes and growth of cloud-based platforms to your own best advantage.
Tens thousands of customers, a few millions of users, frequent deployments and immediate feedback about bugs. This is how I would shortly describe the context of deploying JIRA Cloud releases. In Spartez, based on our partnership with Atlassian, not only we take part in the process of developing new functionalities but also we take care of the quality of JIRA Cloud releases. It is not difficult to notice that taking into account above mentioned context measuring the quality of our product is a challenge. How to manage thousands of customer tickets a year? How to handle the fact that in case of Cloud solutions we are service providers and not only product providers? How to automate the process of measuring quality at least partially? These are the kind of challenges we as Quality Assistance Engineers have to face.
During the presentation I will answer the above questions. I will present our approach to measuring quality, its advantages and disadvantages, data and experiences. I will also go beyond the specifics of our product and process. Measuring quality of any product is difficult. Very often either we give up getting valid data completely or we have metrics in which no one believes. What is even worse, sometimes although we have proper data we do not use them to improve our process and product. In the presentation I will describe our best practices to get valid measurements and how we use this information to avoid defects in the future.
Planning for a (Mostly) Hassle-Free Cloud Migration | VTUG 2016 Winter WarmerJoe Conlin
There is no "one right way" when it comes to a cloud migration or cloud transformation, and in this 2016 VTUG talk I explore some of the methods that have proven successful in my experience.
Providing Performance Guarantees to Virtual Machines using Real-Time Schedulingtcucinotta
In this paper we tackle the problem of providing Quality of Service
guarantees to virtualized applications, focusing on computing and networking
guarantees. We propose a mechanism for providing temporal isolation based on
a CPU real time scheduling strategy. This allows not only to have control over
the individual virtual machine throughput, but also on the activation latency and
response-time by which virtualized software components react to external events.
We show experimental results gathered on a real system validating the approach.
[Confidence0902] The Glass Cage - Virtualization SecurityClaudio Criscione
The Glass Cage, the presentation I gave at Confidence 2009-02 about virtualization security, detailing various attack patterns to virtualization infrastructures.
Low-Latency Audio on Linux by Means of Real-Time Schedulingtcucinotta
In this paper, we propose to use resource reservations scheduling and feedback-based allocation techniques for the provisioning of proper timeliness guarantees to audio processing applications. This allows real-time audio tasks to meet the tight timing constraints characterizing them, even if other interactive activities are present in the system. The JACK sound infrastructure has been modified, leveraging the real-time scheduler present in the Adaptive Quality of Service Architecture (AQuoSA). The effectiveness of the proposed approach, which does not require any modifiction to existing JACK clients, is validated through extensive experiments under different load conditions.
Optimum Scalability Point for Parallelisable Real-Time Componentstcucinotta
Distributing the workload of computationally intensive software components across a set of homogeneous computing resources (nodes, hosts, processors, cores), for the purpose of allowing them to meet precise timing (response-time) constraints, is often a pain due to the difficulties in understanding how the software will actually scale. Often, such a problem is faced by recurring to a trial-and-error process. In this paper, a methodology is introduced to tackle the problem of finding the optimum number of processors for deploying parallelisable real-time software components. Basic building blocks of the methodology are: a generic performance model for the response-time of a parallel software component; a concrete procedure for tuning optimally the parameters of the model; the application of optimisation techniques that allow to compute what is the minimum allocation needed to meet precise deadline constraints, as well as the one that minimises the response-time; the consideration of multiple real-time (independent) components to be deployed on the same multi/many-core hardware.
Virtualised e-Learning with Real-Time Guarantees on the IRMOS Platformtcucinotta
In this paper we focus on how Quality of Service guarantees are provided to virtualised applications in the Cloud Computing infrastructure that is being developed in the context of the IRMOS European Project. Provisioning of proper timeliness guarantees to distributed real-time applications involves the careful use of real-time scheduling mechanisms at the virtual-machine hypervisor level, of QoS-aware networking protocols and of proper design methodologies and tools for stochastic modelling of the application. The paper focuses on how we applied these techniques to a case-study involving a real eLearning mobile content delivery application that has been integrated into the IRMOS platform and its achieved performance.
The Wizard of OS: a Heartbeat for Legacy Multimedia Applicationstcucinotta
This presentation describes a technique for automagic provisioning of real-time scheduling guarantees for legacy multimedia applications, that does not require any modification to the application source-code.
Self-tuning Schedulers for Legacy Real-Time Applicationstcucinotta
We present an approach for adaptive scheduling of soft real-time legacy applications (for which no timing information is exposed to the system). Our strategy is based on the combination of two techniques: 1) a real-time monitor that observes the sequence of events generated by the application to infer its activation period, 2) a feedback mechanism
that adapts the scheduling parameters to ensure a timely execution of the application. By a thorough experimental evaluation of an implementation of our approach, we show its performance and its efficiency.
Innovation with Open Source: The New South Wales Judicial Commission experienceLinuxmalaysia Malaysia
Innovation with Open Source: The New South Wales Judicial Commission experience. MyGOSSCON 2008. Mr. Murali Sagi
Director,
Information Management & Corporate Services,
JUDICIAL COMMISSION OF NSW, SYDNEY, AUSTRALIA
reliability based design optimization for cloud migrationNishmitha B
reliability based design optimization for cloud migration is an application designed to manage applications..more precisely legacy applications..whose extraction n magmt. is crucial n troublesome.
5 Cloud Migration Experiences Not to Be RepeatedHostway|HOSTING
As a project manager at HOSTING, Kellen Amobi has assisted in many customer data migrations over the years. Kellen shares the top five migration mistakes that companies have made in the past and what experience has taught her about resolving the issues quickly, including:
-Developing realistic project scopes
-Managing timelines
-Avoiding security risks
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...SLA-Ready Network
The cloud is both a risk and an opportunity depending on the service. Despite the opportunities, security is a top concern for a growing number of cloud service customers, and rightfully so. A key challenge is representing security and measuring it in a service level agreement? How can a cloud service provider grant the security level? And how can a cloud service customer automatically enforce it?
Prof. Massimiliano Raks, University of Naples, talks us through Security Service Level Agreement (SecureSLAs), looking at
Security SLA Negotiation, Security SLA (Automatic) Enforcement and Security SLA Continuous Monitoring with the SPECS platform for SecSLAs.
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...Open Data Center Alliance
While public cloud computing continues to mature as a technology, those in charge of public cloud solutions within enterprises adopt the technology at their own pace, and for their own reasons. Indeed, they are all on separate journeys, but with many of the same business objectives. In order to determine the progress of enterprises’ journey to the public cloud, Gigaom created a survey designed to understanding what is happening within enterprises that are adopting public cloud computing.
Key items discovered in this survey include:
1. The use of public cloud computing is quickly expanding, and most organizations already exploit public cloud-based resources to run both critical and non-critical business systems.
2. Application development and testing are among the highest value uses of leveraging the public cloud, and most enterprises have moved from proof of concept to actual deployments in the last few years.
3. A larger number of business units leverage public cloud resources that are made up largely of AWS and a few other public cloud providers.
4. A surprising number of public cloud instances support the daily operations of many businesses, with a smaller percentage emerging as heavy users that leverage a massive amount of public cloud resources.
5. First cloud projects are a thing of the past, with most working on their second, third, or more major cloud deployments.
6. Change management and cloud governance are becoming more commonplace and accepted by enterprises.
In this lunchtime keynote presentation, David Linthicum provides a look at what’s occurring right now as enterprises move to public clouds using real data from real adopters. What’s more, Linthicum will provide predictions around what is likely to occur in the world of cloud computing in 2015 and 2016, as well as recommendations around how you can exploit changes and growth of cloud-based platforms to your own best advantage.
Tens thousands of customers, a few millions of users, frequent deployments and immediate feedback about bugs. This is how I would shortly describe the context of deploying JIRA Cloud releases. In Spartez, based on our partnership with Atlassian, not only we take part in the process of developing new functionalities but also we take care of the quality of JIRA Cloud releases. It is not difficult to notice that taking into account above mentioned context measuring the quality of our product is a challenge. How to manage thousands of customer tickets a year? How to handle the fact that in case of Cloud solutions we are service providers and not only product providers? How to automate the process of measuring quality at least partially? These are the kind of challenges we as Quality Assistance Engineers have to face.
During the presentation I will answer the above questions. I will present our approach to measuring quality, its advantages and disadvantages, data and experiences. I will also go beyond the specifics of our product and process. Measuring quality of any product is difficult. Very often either we give up getting valid data completely or we have metrics in which no one believes. What is even worse, sometimes although we have proper data we do not use them to improve our process and product. In the presentation I will describe our best practices to get valid measurements and how we use this information to avoid defects in the future.
Planning for a (Mostly) Hassle-Free Cloud Migration | VTUG 2016 Winter WarmerJoe Conlin
There is no "one right way" when it comes to a cloud migration or cloud transformation, and in this 2016 VTUG talk I explore some of the methods that have proven successful in my experience.
Providing Performance Guarantees to Virtual Machines using Real-Time Schedulingtcucinotta
In this paper we tackle the problem of providing Quality of Service
guarantees to virtualized applications, focusing on computing and networking
guarantees. We propose a mechanism for providing temporal isolation based on
a CPU real time scheduling strategy. This allows not only to have control over
the individual virtual machine throughput, but also on the activation latency and
response-time by which virtualized software components react to external events.
We show experimental results gathered on a real system validating the approach.
[Confidence0902] The Glass Cage - Virtualization SecurityClaudio Criscione
The Glass Cage, the presentation I gave at Confidence 2009-02 about virtualization security, detailing various attack patterns to virtualization infrastructures.
Windows Azure + PHP, Java, MySQL, LOLCODE?
This session explores the interop possiblities Windows Azure has to offer starting from the architecture that leverages The Freedom of Choice and ending up with relevant examples and usage scenarios.
At this year's FOSE 2011 conference, Government Computer News (GCN) awarded Phantom Virtual Tap the Best of FOSE / Best Networking Product for Government award. The Tap delivers unprecedented total visibility into formerly murky traffic passing between VMs on hypervisor stacks. With its ability to tap traffic between virtual servers (VMs) on a physical server, the Phantom Virtual Tap heralds a new era of network compliance, management, and security for virtualized data centers.
Presented by Net Optics' Senior Solutions Engineer, David Pham, this webinar will briefly introduce you to the Phantom Virtual Tap as well as provide insight into some of the security and compliance challenges created by data center virtualiztion. Additionally:
Advantages of gaining visibility into your virtualized network infrastructure
How to eliminate visibility challenges in the virtual network
Provide attendees the opportunity to learn more about this new technology
An Evaluation of Adaptive Partitioning of Real-Time Workloads on Linuxtcucinotta
This paper provides an open implementation and an experimental evaluation of an adaptive partitioning approach for scheduling real-time tasks on symmetric multicore systems. The proposed technique is based on combining partitioned EDF scheduling with an adaptive migration policy that moves tasks across processors only when strictly needed to respect their temporal constraints. The implementation of the technique within the Linux kernel, via modifications to the SCHED DEADLINE code base, is presented. An extensive experimentation has been conducted by applying the technique on a real multi-core platform with several randomly generated synthetic task sets. The obtained experimental results highlight that the approach exhibits a promising performance to schedule real-time workloads on a real system, with a greatly reduced number of migrations compared to the original global EDF available in SCHED DEADLINE.
More information about the paper is available at:
http://retis.sssup.it/~tommaso/papers/isorc21.php
Modeling and simulation of power consumption and execution times for real-tim...tcucinotta
In this work, we introduce a power-consumption model for heterogeneous multicore architectures that captures the variability of energy consumption based on processing workload type, in addition to the classical variables considered in the literature, like type and frequency of the CPU.
We motivate the approach presenting experimental results gathered on a Odroid-XU3 board equipped with an Arm big.LITTLE CPU, showing that power consumption has a non-negligible dependency on the workload type. We also present a model to define the execution time of the tasks, which depends on both the workload, and the CPU frequency and architecture. We present our modifications to the open-source RTSIM real-time scheduling simulator to extend its CPU power consumption and execution time duration models, integrating results taken from the real platform.
The presented work constitutes a useful base for future research in power-aware real-time scheduling on heterogeneous platforms.
For more information about the paper, see:
http://retis.sssup.it/~tommaso/papers/ewili18-rtsim.php
Virtual Network Functions as Real-Time Containers in Private Cloudstcucinotta
This paper presents preliminary results from our on-going research for ensuring stable performance of co-located distributed cloud services in a resource-efficient way. It is based on using a real-time CPU scheduling policy to achieve a fine-grain control of the temporal interferences among real-time services running in co-located containers. We present results obtained applying the method to a synthetic application running within LXC containers on Linux, where a modified kernel has been used that includes our real-time scheduling policy.
More information about the paper is available at:
http://retis.sssup.it/~tommaso/papers/cloud18.php
There are a set of new real-time scheduling algorithms being developed for the Linux kernel, which provide temporal isolation among tasks.
These include an implementation of the POSIX sporadic server (SS) and a deadline-based scheduler. These are based on the specification of
the scheduling guarantees needed by the kernel in terms of a budget and a period.
This presentation aims to tackle the issues related to how to design a proper kernel-space / user-space interface for accessing such new
functionality. For the SS, a POSIX compliant implementation would break binary compatibility. However, the currently implemented API seems to be lacking some important features, like a sufficient level of extensibility. This would be required for example for adding further parameters in the future, e.g., deadlines different from periods, or soft (i.e., work-conserving) reservations, or how to mix power management in the looop (if ever).
An Exception Based Approach to Timing Constraints Violations in Real-Time and...tcucinotta
In this paper, an exception-based programming
paradigm is envisioned to deal with timing constraints violations occurring in soft real-time and multimedia applications written in the C language. In order to prove viability of the approach, a mechanism allowing to use such paradigm has been designed and implemented as an open-source library of C macros making use of the standard POSIX API (a few Linux-specific optimizations are also briefly discussed).
The envisioned approach has been validated by modifying mplayer, one of the most widely used multimedia player for Linux, so as to use the introduced library. Experimental results demonstrate how the exception-based paradigm is effective in improving the audio/video delay exhibited by the player.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
SLAs in Virtualized Cloud Computing Infrastructures with QoS Assurance
1. SLAs in Virtualized Cloud Computing
Infrastructures with QoS Assurance
Tommaso Cucinotta G. Gogouvitis, K. Kostanteli
Scuola Superiore Sant'Anna National Technical University of Athens
Italy Greece
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
2. Motivations & background
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
3. Introduction
Towards a new computing paradigm
●
Computing, network, storage in the cloud
●
Not only batch computing and storage
●
but also interactive real-time applications
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
4. Virtualization
Virtualization is a key technology
For IaaS providers (Cloud Computing)
Enables server consolidation
Physical Host
Physical Host
OS
OS
...
Physical Host
Physical Host
OS
OS
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
5. Virtualization
Virtualization is a key technology
For IaaS providers (Cloud Computing)
Enables server consolidation
Physical Host
Physical Host Physical Host
Physical Host
OS
OS VM/OS
VM/OS
... ...
Physical Host VM/OS
VM/OS
Physical Host
OS
OS
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
6. Need for Performance Isolation
Resource sharing
→ Temporal interference
Physical Host
Physical Host
VM
VM
VM
VM
VM
VM
VM
VM
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
7. Need for Performance Isolation
Resource sharing ~30ms
VM Alone
→ Temporal interference
Physical Host
Physical Host
VM
VM
VM
VM
VM
VM
VM
VM
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
8. Need for Performance Isolation
Resource sharing ~30ms
VM Alone
→ Temporal interference
Physical Host
Physical Host
VM
VM
VM
VM τ1 = (30ms, 150ms)
τ2 = (50ms, 200ms)
~120ms
VM
VM 2 VMs
VM
VM
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
9. Need for Performance Isolation
Resource sharing How it looks like when you buy
→ Temporal interference
Physical Host
Physical Host
VM
VM
VM
VM
VM
VM
VM
VM
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
10. Need for Performance Isolation
Resource sharing How it looks like when you buy
→ Temporal interference
Physical Host
Physical Host
VM
VM
VM
VM
How it looks like when you use
VM
VM
VM
VM
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
11. Possible Solutions
Hardware replication and
static partitioning Physical Host
Physical Host
Computing VM
VM
• Multi-core (1 core per VM)
• NUMA awareness
VM
VM
Networking
• Multiple network adapters
(1 network adapter per VM)
VM
VM
• Multi-queue adapters
Drawbacks
VM
VM
Limitation of flexibility
Under-utilization of resources
• e.g., with real-time/interactive workloads (cloud computing)
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
12. Possible Solutions
Another approach
• Let multiple VMs use the same resources
• Use proper resource scheduling strategies
For example
• Computing
• Xen credit-based and SEDF schedulers
• Networking
• QoS-aware protocols (IntServ, MPLS, WF2Q+)
Advantages
• Increased flexibility
• Increased resource saturation levels
• Reduced infrastructure costs
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
13. Objectives: Resource Sharing in Distributed
Applications with RT Constraints
Optimum/reasonable deployment of VSNs on PNs
Given computing/network/memory requirements
Respecting end-to-end timing constraints Physical Host
Physical Host
Computing/Memory Networking
Requirements Requirements Physical
Subnet
Physical
Link
Physical Host
Virtual Service Network
Maximum response-time Physical Host
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
14. The IRMOS Approach
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
15. IRMOS
Focus: Interactive Real-time Multimedia
on SOIs
Application Scenarios
SaaS
Framework Services
PaaS
Intelligent Service-Oriented
Networking Infrastructure
IaaS (ISONI)
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
16. The IRMOS Vision
A Service Oriented Infrastructure, which allows the adoption of
interactive real-time applications
We faced with a set of challenges:
Enabling real-time attributes at various levels of the infrastructure (network,
storage, processing, application, business)
QoS Guarantees
Automated SLA Negotiation
Mapping between high-level application terms and fine-grained resource-level
attributes
Specification Languages to describe real-time applications
...
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
17. IRMOS Two-Phase Approach
Design
Tools
Benchmarking Application
Concretion Discovery
Negotiation
Mechanisms for
Mechanisms for Reservation
Modeling,
Methodology for the
Methodology for the
Analysis, precise allocation of
precise allocation of
Planning identification of
identification of resources
resources Service
resource requirements
resource requirements to applications Instantiation
to applications
Service
Component
Configuration
Execution &
Monitoring
Cleanup
Offline
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
18. IRMOS Two-Phase Approach
Design
Tools
Benchmarking Application
Concretion Discovery
Negotiation
Modeling, Reservation
Analysis,
Planning
Service
Instantiation
Service
Component
Configuration
Execution &
Monitoring
Cleanup
Offline
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
19. Demonstrators
Collaborative Digital Film Post-production
Virtual and Augmented Reality
Interactive collaborative e-learning
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
20. Challenging Issues
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
21. Cloud Players: Different Views & Interests
The Customer
Minimum costs
Proper/acceptable performance
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
22. Cloud Players: Different Views & Interests
The Customer
Minimum costs
Proper/acceptable performance
The User
Maximum performance
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
23. Cloud Players: Different Views & Interests
The Customer
Minimum costs
Proper/acceptable performance
The User
Maximum performance
The IaaS Provider
Maximum revenues, minimum costs
Maximum consolidation levels
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
24. Cloud Players: Different Views & Interests
?
The Customer
Minimum costs
Proper/acceptable performance
The User
Maximum performance
The IaaS Provider
Maximum revenues, minimum costs
Maximum consolidation levels
Agreement ?
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
25. *aaS Provisioning and Risks
IaaS Provider
May rent physical resources (e.g., 1 GHz AMD for 1 year)
• Easy, low risk
May rent computing power (e.g., 10 GFLOPS for 1 year)
• More difficult
SaaS Provider
QoS parameters in the domain of applications (e.g., fps)
• Very difficult, high risk
• Requires performance stability, models & prediction
Adaptation is key
• Monitoring
• Feedback Loops
• Scalability
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
26. Predicting Applications Performance
Performance Prediction
●
Benchmarking/Profiling (via Monitoring)
●
Stochastic Models
●
Neural Networks (black-box approach)
●
Temporal isolation for computing & data flows makes the job
easier
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
27. Future Research
How to formally specify QoS requirements in SLAs ?
●
So that the offered and provided QoS is verifiable by parties ?
●
What is the observation window over which the levels of QoS
should be granted/verified ?
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
28. Future Research
How to formally specify QoS requirements in SLAs ?
●
So that the offered and provided QoS is verifiable by parties ?
●
What is the observation window over which the levels of QoS
should be granted/verified ?
How to solve disputes among parties ?
●
Certification ?
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
29. Future Research
What business models may account for
Imprecise QoS guarantees
Probabilistic QoS/availability guarantees
Pay-back penalties in case of SLA violation
?
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
30. References
T. Cucinotta, K. Konstanteli, T. Varvarigou, "Advance Reservations for Distributed Real-
TimeWorkflows with Probabilistic Service Guarantees", IEEE International Conference on Service-
Oriented Computing and Applications (SOCA 2009), December 2009, Taipei, Taiwan
K. Kostanteli, D. Kyriazis, T. Varvarigou, T. Cucinotta, G. Anastasi, "Real-time guarantees in
flexible advance reservations", 2nd IEEE International Workshop on Real-Time Service-Oriented
Architecture and Applications (RTSOAA 2009), Seattle, Washington, July 2009
F. Checconi, T. Cucinotta, D. Faggioli, G. Lipari, "Hierarchical Multiprocessor CPU Reservations for
the Linux Kernel", in 5th International Workshop on Operating Systems Platforms for Embedded
Real-Time Applications (OSPERT 2009), Dublin, Ireland, June 2009
T. Cucinotta, G. Anastasi, L. Abeni, "Real-Time Virtual Machines", in 29th Real-Time System
Symposium (RTSS 2008) -- Work in Progress Session, Barcelona, December 2008
YouTube Video on e-Learning performance isolation:
http://www.youtube.com/watch?v=8FbHZ4ytNoQ
IRMOS YouTube channel:
http://www.youtube.com/user/irmosproject
IRMOS Project Website: http://www.irmosproject.eu
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna
31. Thanks for your attention
Questions ?
Workshop “eContracting in the Clouds” – Oct 26th 2011 – Tommaso Cucinotta – Real-Time Systems Laboratory – Copyright 2011 Scuola Superiore Sant'Anna