The document discusses software architecture and development. It covers various programming languages and frameworks, how applications are built from code, data, and interfaces, and factors like performance, scalability, and costs that must be considered. Examples are given around system calls and development time for simple programs in different languages.
This document discusses using Subversion for PHP deployment. It covers setting up a source control repository with Subversion, collaboration features like merging and resolving conflicts. It also discusses strategies for code deployment to multiple environments like development, testing and live sites, using branches, tags and automated deployment scripts. Database versioning and rollback is also addressed.
This document discusses using Fluentd for logging infrastructure in Platform as a Service (PaaS). It describes how Fluentd can be used to collect and persist logs from applications running on Cloud Foundry PaaS in a way that logs are not lost when applications are updated or restarted. A Fluentd daemon is attached to each application instance to monitor and forward logs to log storage servers.
The document provides an agenda and information about a Concourse workshop at the SpringOne Platform 2019 conference. The agenda includes welcome remarks, talks on Concourse 102 and the Concourse roadmap, breakout sessions, and a wrap-up. Several Concourse sessions are also listed that will take place at the conference. The rest of the document outlines features and updates for Concourse version 5.5.3, including performance improvements, audit logging, UI refinements, and automated SSL certificate support.
Implementing Continuous Delivery with Enterprise MiddlewareXebiaLabs
This document discusses implementing continuous delivery with enterprise middleware. It begins with introductions of the speakers and an overview of ThoughtWorks Studios and XebiaLabs. It then provides definitions and explanations of continuous delivery. The remainder of the document discusses approaches to continuous delivery in the enterprise including dealing with complex dependency trees, diverse deployment landscapes, and integration with release management. It provides an example continuous delivery pipeline for a Java EE application and how it can be optimized for an enterprise approach.
This document discusses debugging CPython processes with gdb. It begins by stating the goals of making gdb a useful option for debugging and highlighting common issues. It then discusses why debugging is important for large open source projects like OpenStack. Several typical problems that gdb can help with are described, such as hung processes, stepping into native code, and interpreter crashes. Advantages of gdb over pdb are outlined. Prerequisites for using gdb to debug Python are covered, including ensuring gdb has Python support and obtaining CPython debugging symbols. Various gdb commands for debugging Python processes are demonstrated, such as attaching to a process, printing tracebacks and locals, and executing Python code in the debugged process. Finally, some common gotchas are highlighted around virtual environments
This document provides an overview of a presentation titled "AP4R" given at RubyConf 07 by Kiwamu Kato and Shun'ichi Shinohara of Future Architect, Inc. It introduces AP4R as an asynchronous processing library for Ruby that uses messaging to enable loose coupling. Key points covered include the motivation for developing AP4R based on their experience with an in-house messaging middleware, typical use cases for load distribution and quicker response times, and advantages like being lightweight, robust, and having simple APIs. Examples of companies using AP4R are also provided.
Improving code quality with continuous integration (PHPBenelux Conference 2011)Martin de Keijzer
Continuous Integration is the combination of any number of the available tools used to improve quality of both code and process. In this session we will look at these available tools and how these can be used. We will also look at Continuous Integration in general and CruiseControl in particular, at how to set it up and built a platform for robust and high-quality code. This session is a must-see for development leaders and technical managers alike, to understand the available options and the advantages offered by this approach.
This document discusses using Subversion for PHP deployment. It covers setting up a source control repository with Subversion, collaboration features like merging and resolving conflicts. It also discusses strategies for code deployment to multiple environments like development, testing and live sites, using branches, tags and automated deployment scripts. Database versioning and rollback is also addressed.
This document discusses using Fluentd for logging infrastructure in Platform as a Service (PaaS). It describes how Fluentd can be used to collect and persist logs from applications running on Cloud Foundry PaaS in a way that logs are not lost when applications are updated or restarted. A Fluentd daemon is attached to each application instance to monitor and forward logs to log storage servers.
The document provides an agenda and information about a Concourse workshop at the SpringOne Platform 2019 conference. The agenda includes welcome remarks, talks on Concourse 102 and the Concourse roadmap, breakout sessions, and a wrap-up. Several Concourse sessions are also listed that will take place at the conference. The rest of the document outlines features and updates for Concourse version 5.5.3, including performance improvements, audit logging, UI refinements, and automated SSL certificate support.
Implementing Continuous Delivery with Enterprise MiddlewareXebiaLabs
This document discusses implementing continuous delivery with enterprise middleware. It begins with introductions of the speakers and an overview of ThoughtWorks Studios and XebiaLabs. It then provides definitions and explanations of continuous delivery. The remainder of the document discusses approaches to continuous delivery in the enterprise including dealing with complex dependency trees, diverse deployment landscapes, and integration with release management. It provides an example continuous delivery pipeline for a Java EE application and how it can be optimized for an enterprise approach.
This document discusses debugging CPython processes with gdb. It begins by stating the goals of making gdb a useful option for debugging and highlighting common issues. It then discusses why debugging is important for large open source projects like OpenStack. Several typical problems that gdb can help with are described, such as hung processes, stepping into native code, and interpreter crashes. Advantages of gdb over pdb are outlined. Prerequisites for using gdb to debug Python are covered, including ensuring gdb has Python support and obtaining CPython debugging symbols. Various gdb commands for debugging Python processes are demonstrated, such as attaching to a process, printing tracebacks and locals, and executing Python code in the debugged process. Finally, some common gotchas are highlighted around virtual environments
This document provides an overview of a presentation titled "AP4R" given at RubyConf 07 by Kiwamu Kato and Shun'ichi Shinohara of Future Architect, Inc. It introduces AP4R as an asynchronous processing library for Ruby that uses messaging to enable loose coupling. Key points covered include the motivation for developing AP4R based on their experience with an in-house messaging middleware, typical use cases for load distribution and quicker response times, and advantages like being lightweight, robust, and having simple APIs. Examples of companies using AP4R are also provided.
Improving code quality with continuous integration (PHPBenelux Conference 2011)Martin de Keijzer
Continuous Integration is the combination of any number of the available tools used to improve quality of both code and process. In this session we will look at these available tools and how these can be used. We will also look at Continuous Integration in general and CruiseControl in particular, at how to set it up and built a platform for robust and high-quality code. This session is a must-see for development leaders and technical managers alike, to understand the available options and the advantages offered by this approach.
[COSCUP 2021] LLVM Project: The Good, The Bad, and The UglyMin-Yih Hsu
The document provides an overview of Min Hsu's talk on the LLVM Project. It introduces Min Hsu and their background working on LLVM. The talk covers an overview of LLVM's design advantages over traditional compilers, some new features like GlobalISel and ThinLTO that improve compilation speed and optimization, and notes on LLVM's federated community structure and contribution process.
This slide was presented at FPGA Extreme Conference #6 held at Dowango on Feb 1st, 2015. (It was originally in Japanese but translated to English)
Audience of the presentation was people new to OpenFlow and network processing using hardware, but interested in how FPGA is used in network processing.
Event home page (only Japanese)
http://connpass.com/event/10638/
This document introduces Docker containers and provides examples of using Docker for networking containers across virtual machines. It discusses setting up a GRE tunnel between two VMs to connect their Docker interfaces and allow containers running on different VMs to communicate. Specific commands are provided to configure the Docker and overlay networks on each VM, establish the GRE tunnel, and run a sample container to test the connectivity.
BKK16-409 VOSY Switch Port to ARMv8 Platforms and ODP IntegrationLinaro
Virtual Open Systems has developed VOSYSwitch, a high-performance user space networking virtual switch solution enabling NFV, based on the open source packet processing framework SnabbSwitch. In this talk, the experience of porting VOSYSwitch from x86 to ARMv8 will be shared, along with the integration of ODP as a driver layer for the available hardware resources. In addition to this presentation, a live demonstration will showcase chained VNFs connected through VOSYSwitch, where an OpenFastPath web server is implemented behind an ODP enabled packet filtering firewall. The targeted platforms are Freescale (NXP) LS2085A and Cavium's ThunderX.
Open Source Toolchains to Manage Cloud InfrastructureMark Hinkle
Open Source Toolchains to Manage Cloud Infrastructure presentation for Cloud Computing Expo East - June 6, 2011.
Added APIs (jclouds, fog, libcloud, deltacloud)
DEF CON 27 - workshop - ISAAC EVANS - discover exploit and eradicate entire v...Felipe Prado
This document provides documentation for the r2c analysis platform and command line interface (CLI). It describes how to install and set up the r2c CLI, create an example analyzer, write analysis code using Python, run the analyzer locally on a test codebase, and publish the analyzer to the r2c platform to run at larger scale. The example analyzer counts the percentage of whitespace in JavaScript files to identify potentially minified code. The document guides the reader through each step of developing and testing an analyzer locally before publishing it for cloud-based analysis.
Brno Perl Mongers 28.5.2015 - Perl family by mj41Michal Jurosz
This document summarizes the 15-year history of Perl 6 and Perl 5 development from 1987 to 2015. It describes the early versions of Perl from 1.0 to 5.0 in the late 1980s and 1990s. It then covers the beginnings of Perl 6 in 2000, the development of implementations like Pugs and Rakudo, and the long journey to a stable 1.0 release in 2010. It discusses key people, technologies like Parrot and MoarVM, and the ongoing progress toward finalizing Perl 6 features and performance.
Transferring Changes Between Perforce ServersPerforce
Transferring changes between two unrelated Perforce Servers can be a challenge. This talk explains how this can be done using a Python tool called PerforceTransfer. The concepts of this tool, its internal workings as well as its applications and limitations are explained.
How to implement a simple dalvik virtual machineChun-Yu Wang
This slide is an introduction to Android Dalvik Virtual Machine on a short course.
We use two hand-made JVM and DVM which called Simple JVM and Simple DVM respectively, to tell student how they work. A Foo Class was provided as a target for verifying the execution results of those VM. We hope it will help student to understand JVM and DVM quickly.
Dayta AI Seminar - Kubernetes, Docker and AI on CloudJung-Hong Kim
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes services expose these units to enable dynamic load balancing while maintaining session affinity. It also provides self-healing capabilities by restarting containers that fail, replacing them, and killing containers that don't respond to their health check.
This document discusses adding nodes to an Oracle Grid Infrastructure (GI) configuration in Oracle Database 11g Release 2. It notes some differences when adding nodes in 11gR2 GI compared to 10gR2. Key steps include:
1. Performing prerequisite checks like verifying user equivalence between nodes and disabling the ntpd service if using octssd.
2. Running the cluvfy command to verify the new node meets cluster requirements.
3. Using the addNode.sh script to add the new node, either through interactive mode which does not work correctly or through silent mode by specifying parameters.
4. The process involves pre-checks, modifying configuration files like hosts, and installing Oracle
Going FaaSter, Functions as a Service at NetflixYunong Xiao
The document discusses Netflix's use of serverless computing via its own Function as a Service (FaaS) platform. Some key points:
- Netflix built its own FaaS platform called Titus that runs functions at scale using containers for portability and efficiency.
- The platform handles operations concerns so developers can focus on business logic. It provides a full runtime API and handles updates, metrics, and management automatically.
- Netflix developed tools like NEWT to improve the developer experience with one-click setup, local development and debugging, testing, and CI/CD integration for fast and reliable software development.
Architecting The Future - WeRise Women in TechnologyDaniel Barker
Kubernetes and Docker are two of the top open source projects, and they’re built around abstractions and metadata. These two concepts are the key to architecting in the future. Come with me as I dig a little deeper into these concepts within k8s and Docker and provide some examples from my own work.
Overview: Building Open Source Cloud Computing EnvironmentsMark Hinkle
This document provides a summary of open source cloud computing. It begins with an introduction and overview of cloud computing concepts. It then discusses various open source building blocks for cloud computing, including open source hypervisors, compute clouds, storage solutions, and cloud APIs. Finally, it outlines open source tools for managing clouds, including provisioning, configuration management, monitoring, and automation/orchestration tools. The goal is to provide an introduction to developing and managing clouds with open source software.
“Identity management (IdM) describes the management of individual principals, their
authentication, authorization, and privileges within or across system and enterprise
boundaries with the goal of increasing security and productivity while decreasing cost,
downtime and repetitive tasks.”
I demonstrate in this short guide how to upgrade Red Hat IdM (freeIPA) from rhel 6 into 7.x
BSD/macOS Sed and GNU Sed both support additional features beyond POSIX Sed, such as extended regular expressions with -E/-r, but using only POSIX features ensures portability. GNU Sed defaults allow some non-POSIX behaviors, so --posix is recommended for strict POSIX compliance. The most portable Sed scripts use only basic regular expressions and features defined in the POSIX specification.
This document announces the Go 1.8 release and summarizes some of its key changes and improvements, including performance enhancements to the garbage collector and compiler, tooling changes, and additions to the standard library like graceful HTTP server shutdown. It provides technical details on compiler optimizations, new features like plugins, and fixes issues like concurrent map access detection.
This document discusses using APC and Memcached to improve PHP performance. It summarizes APC as an opcode cache that caches compiled PHP scripts to reduce parsing and compilation overhead. Memcached is described as a distributed memory caching system that stores objects in memory for fast retrieval to offload processing from databases. Examples are given of how APC and Memcached can each speed up a PHP application and improve concurrency. Installation and usage of both is briefly outlined.
FortranCon2020: Highly Parallel Fortran and OpenACC DirectivesJeff Larkin
Fortran has long been the language of computational math and science and it has outlived many of the computer architectures on which it has been used. Modern Fortran must be able to run on modern, highly parallel, heterogeneous computer architectures. A significant number of Fortran programmers have had success programming for heterogeneous machines by pairing Fortran with the OpenACC language for directives-based parallel programming. This includes some of the most widely-used Fortran applications in the world, such as VASP and Gaussian. This presentation will discuss what makes OpenACC a good fit for Fortran programmers and what the OpenACC language is doing to promote the use of native language parallelism in Fortran, such as do concurrent and Co-arrays.
Video Recording: https://www.youtube.com/watch?v=OXZ_Wkae63Y
[COSCUP 2021] LLVM Project: The Good, The Bad, and The UglyMin-Yih Hsu
The document provides an overview of Min Hsu's talk on the LLVM Project. It introduces Min Hsu and their background working on LLVM. The talk covers an overview of LLVM's design advantages over traditional compilers, some new features like GlobalISel and ThinLTO that improve compilation speed and optimization, and notes on LLVM's federated community structure and contribution process.
This slide was presented at FPGA Extreme Conference #6 held at Dowango on Feb 1st, 2015. (It was originally in Japanese but translated to English)
Audience of the presentation was people new to OpenFlow and network processing using hardware, but interested in how FPGA is used in network processing.
Event home page (only Japanese)
http://connpass.com/event/10638/
This document introduces Docker containers and provides examples of using Docker for networking containers across virtual machines. It discusses setting up a GRE tunnel between two VMs to connect their Docker interfaces and allow containers running on different VMs to communicate. Specific commands are provided to configure the Docker and overlay networks on each VM, establish the GRE tunnel, and run a sample container to test the connectivity.
BKK16-409 VOSY Switch Port to ARMv8 Platforms and ODP IntegrationLinaro
Virtual Open Systems has developed VOSYSwitch, a high-performance user space networking virtual switch solution enabling NFV, based on the open source packet processing framework SnabbSwitch. In this talk, the experience of porting VOSYSwitch from x86 to ARMv8 will be shared, along with the integration of ODP as a driver layer for the available hardware resources. In addition to this presentation, a live demonstration will showcase chained VNFs connected through VOSYSwitch, where an OpenFastPath web server is implemented behind an ODP enabled packet filtering firewall. The targeted platforms are Freescale (NXP) LS2085A and Cavium's ThunderX.
Open Source Toolchains to Manage Cloud InfrastructureMark Hinkle
Open Source Toolchains to Manage Cloud Infrastructure presentation for Cloud Computing Expo East - June 6, 2011.
Added APIs (jclouds, fog, libcloud, deltacloud)
DEF CON 27 - workshop - ISAAC EVANS - discover exploit and eradicate entire v...Felipe Prado
This document provides documentation for the r2c analysis platform and command line interface (CLI). It describes how to install and set up the r2c CLI, create an example analyzer, write analysis code using Python, run the analyzer locally on a test codebase, and publish the analyzer to the r2c platform to run at larger scale. The example analyzer counts the percentage of whitespace in JavaScript files to identify potentially minified code. The document guides the reader through each step of developing and testing an analyzer locally before publishing it for cloud-based analysis.
Brno Perl Mongers 28.5.2015 - Perl family by mj41Michal Jurosz
This document summarizes the 15-year history of Perl 6 and Perl 5 development from 1987 to 2015. It describes the early versions of Perl from 1.0 to 5.0 in the late 1980s and 1990s. It then covers the beginnings of Perl 6 in 2000, the development of implementations like Pugs and Rakudo, and the long journey to a stable 1.0 release in 2010. It discusses key people, technologies like Parrot and MoarVM, and the ongoing progress toward finalizing Perl 6 features and performance.
Transferring Changes Between Perforce ServersPerforce
Transferring changes between two unrelated Perforce Servers can be a challenge. This talk explains how this can be done using a Python tool called PerforceTransfer. The concepts of this tool, its internal workings as well as its applications and limitations are explained.
How to implement a simple dalvik virtual machineChun-Yu Wang
This slide is an introduction to Android Dalvik Virtual Machine on a short course.
We use two hand-made JVM and DVM which called Simple JVM and Simple DVM respectively, to tell student how they work. A Foo Class was provided as a target for verifying the execution results of those VM. We hope it will help student to understand JVM and DVM quickly.
Dayta AI Seminar - Kubernetes, Docker and AI on CloudJung-Hong Kim
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes services expose these units to enable dynamic load balancing while maintaining session affinity. It also provides self-healing capabilities by restarting containers that fail, replacing them, and killing containers that don't respond to their health check.
This document discusses adding nodes to an Oracle Grid Infrastructure (GI) configuration in Oracle Database 11g Release 2. It notes some differences when adding nodes in 11gR2 GI compared to 10gR2. Key steps include:
1. Performing prerequisite checks like verifying user equivalence between nodes and disabling the ntpd service if using octssd.
2. Running the cluvfy command to verify the new node meets cluster requirements.
3. Using the addNode.sh script to add the new node, either through interactive mode which does not work correctly or through silent mode by specifying parameters.
4. The process involves pre-checks, modifying configuration files like hosts, and installing Oracle
Going FaaSter, Functions as a Service at NetflixYunong Xiao
The document discusses Netflix's use of serverless computing via its own Function as a Service (FaaS) platform. Some key points:
- Netflix built its own FaaS platform called Titus that runs functions at scale using containers for portability and efficiency.
- The platform handles operations concerns so developers can focus on business logic. It provides a full runtime API and handles updates, metrics, and management automatically.
- Netflix developed tools like NEWT to improve the developer experience with one-click setup, local development and debugging, testing, and CI/CD integration for fast and reliable software development.
Architecting The Future - WeRise Women in TechnologyDaniel Barker
Kubernetes and Docker are two of the top open source projects, and they’re built around abstractions and metadata. These two concepts are the key to architecting in the future. Come with me as I dig a little deeper into these concepts within k8s and Docker and provide some examples from my own work.
Overview: Building Open Source Cloud Computing EnvironmentsMark Hinkle
This document provides a summary of open source cloud computing. It begins with an introduction and overview of cloud computing concepts. It then discusses various open source building blocks for cloud computing, including open source hypervisors, compute clouds, storage solutions, and cloud APIs. Finally, it outlines open source tools for managing clouds, including provisioning, configuration management, monitoring, and automation/orchestration tools. The goal is to provide an introduction to developing and managing clouds with open source software.
“Identity management (IdM) describes the management of individual principals, their
authentication, authorization, and privileges within or across system and enterprise
boundaries with the goal of increasing security and productivity while decreasing cost,
downtime and repetitive tasks.”
I demonstrate in this short guide how to upgrade Red Hat IdM (freeIPA) from rhel 6 into 7.x
BSD/macOS Sed and GNU Sed both support additional features beyond POSIX Sed, such as extended regular expressions with -E/-r, but using only POSIX features ensures portability. GNU Sed defaults allow some non-POSIX behaviors, so --posix is recommended for strict POSIX compliance. The most portable Sed scripts use only basic regular expressions and features defined in the POSIX specification.
This document announces the Go 1.8 release and summarizes some of its key changes and improvements, including performance enhancements to the garbage collector and compiler, tooling changes, and additions to the standard library like graceful HTTP server shutdown. It provides technical details on compiler optimizations, new features like plugins, and fixes issues like concurrent map access detection.
This document discusses using APC and Memcached to improve PHP performance. It summarizes APC as an opcode cache that caches compiled PHP scripts to reduce parsing and compilation overhead. Memcached is described as a distributed memory caching system that stores objects in memory for fast retrieval to offload processing from databases. Examples are given of how APC and Memcached can each speed up a PHP application and improve concurrency. Installation and usage of both is briefly outlined.
FortranCon2020: Highly Parallel Fortran and OpenACC DirectivesJeff Larkin
Fortran has long been the language of computational math and science and it has outlived many of the computer architectures on which it has been used. Modern Fortran must be able to run on modern, highly parallel, heterogeneous computer architectures. A significant number of Fortran programmers have had success programming for heterogeneous machines by pairing Fortran with the OpenACC language for directives-based parallel programming. This includes some of the most widely-used Fortran applications in the world, such as VASP and Gaussian. This presentation will discuss what makes OpenACC a good fit for Fortran programmers and what the OpenACC language is doing to promote the use of native language parallelism in Fortran, such as do concurrent and Co-arrays.
Video Recording: https://www.youtube.com/watch?v=OXZ_Wkae63Y
PRoot allows running programs from a recent guest distro on an obsolete host distro by emulating kernel features and system calls not present in the older host kernel. It does this through syscall emulation, flag emulation, modifying ELF auxiliary vectors, and replacing heap allocation calls. This provides kernel compatibility that allows running a program like VLC 2.0.8 from Ubuntu 13.04 on Redhat 4.7, overcoming the "kernel too old" error, and works for any host/guest combination.
Presentation on basics of computer programming and programming Raspberry Pi's using the Python Programming Language at the Raspberry Pi Demo Day at Toronto Reference Library on May 28, 2016.
This document describes WHYP, a version of Forth designed for embedded systems. WHYP can be used on Motorola 68HC11 and 68332 microcontrollers. It allows interactive development on a PC connected to the target system. WHYP words are executed as subroutines on the target. The document provides an example of using WHYP to design a digital compass that reads analog hall-effect sensors and displays the reading on 7-segment displays.
PHP isn't only used as a web-based scripting language, it can also be used on the command line.
This talks explains the benefits of command line PHP. Additionally, process control using CLI PHP is explained.
This document provides an overview of OPCache, PHP's opcode cache. It begins with introductions to PHP, how PHP works by parsing, compiling and executing code, and the need for an opcode cache. It then discusses what opcodes are and how OPCache works by caching compiled opcodes in shared memory to improve performance by avoiding recompilation. The document outlines various OPCache configuration settings and optimizations like interned strings. It provides examples of opcodes generated from PHP code and discusses tuning OPCache for best performance.
The document provides an introduction to the PIC16F877 microcontroller. It discusses that PICs are Harvard architecture microcontrollers made by Microchip with a RISC design. The PIC16F877 has an 8KB program memory, 368 bytes of data memory, and 256 bytes of EEPROM. It features ports, timers, ADC, and communication peripherals. Programming involves writing code, compiling to a hex file, and burning the file onto the PIC's flash memory using a programmer.
1) Hardware upgrades are often cheaper and provide more performance gains than slow, error-prone code optimizations. Profiling and caching can provide gains without changing code.
2) Premature optimization wastes time; optimize only after identifying bottlenecks through profiling. Simplify code through modularization instead of over-engineering.
3) Caching queries, pages, and computation results in memory provides major speedups with little effort compared to direct code optimizations. Match buffer sizes for efficient PHP-to-OS communication.
Baby Demuxed's First Assembly Language FunctionKieran Kunhya
This document discusses assembly language and provides an example of writing an assembly language function. It begins with introductions and definitions of assembly language concepts. It then walks through writing an 8x8 horizontal block prediction function in x86 assembly language. Benchmarks show the assembly function is 2x faster than a C implementation. Other examples show speedups of up to 62x faster than C for pixel packing functions. The conclusion emphasizes the importance of optimization through assembly language for real-time encoding and decoding.
PHP & Performance document discusses various techniques to improve PHP and web server performance. Some key points:
- Compilation of PHP scripts can consume significant time, opcode caches like APC reduce this.
- Profiling tools like APD and XDebug help identify bottlenecks in PHP code. Optimizations like output buffering, reducing output, content compression and database tuning can improve performance.
- Server configuration like Apache optimizations for file I/O, syscalls and KeepAlive headers also impact performance. PHP settings like disabling register_globals and using opcaches help.
- Application techniques like avoiding unnecessary functions, using class constants, and reducing regex usage in PHP code provide performance benefits.
The document provides an introduction to exploit development. It discusses preparing a virtual lab with tools like Immunity Debugger, Mona.py, pvefindaddr.py and Metasploit. It covers basic buffer overflow exploitation techniques like overwriting EIP and using RETURN oriented programming. The document demonstrates a basic stack-based buffer overflow exploit against the FreeFloat FTP server as a tutorial, covering steps like generating a cyclic pattern, finding the offset and using mona to find a JMP ESP instruction to redirect execution. It also discusses using msfpayload to generate Windows bind shellcode and msfencode to escape bad characters before testing the proof of concept exploit.
This presentation is a preparation for PHP Test Fest 2009 (http://qa.php.net/testfest). See your local PHP user group for details of this world wide event.
This webinar explains why PISA chips are inevitable, provides overview of machine architecture of such switches, presents a brief primer on the P4 language with sample programs for a variety of networks and demonstrates a powerful network diagnostics application implemented in P4.
Programmability in SDNs is confined to the network control plane. The forwarding plane is still largely dictated by fixed-function switching chips. Our goal is to change that, and to allow programmers to define how packets are to be processed all the way down to the wire.
This is made possible by a new generation of high-performance forwarding chips. At the high-end, PISA (Protocol-Independent Switch Architecture) chips promise multi-Tb/s of packet processing. At the mid- and low-end of the performance spectrum, CPUs, GPUs, FPGAs, and NPUs already offer great flexibility with performance of a few tens to hundreds of Gb/s.
In addition to programmable forwarding chips, we also need a high-level language to dictate the forwarding behavior in a target independent fashion. "P4" (www.p4.org) is such a language. In P4, the programer declares how packets are to be processed, and a compiler generates a configuration for a PISA chip, or a programmable target in general. For example, the programmer might program the switch to be a top-of-rack switch, a firewall, or a load-balancer; and might add features to run automatic diagnostics and novel congestion control algorithms.
Compiler Construction | Lecture 1 | What is a compiler?Eelco Visser
This document provides an overview of the CS4200 Compiler Construction course at TU Delft. It discusses the organization of the course into two parts: CS4200-A which covers compiler concepts and techniques through lectures, papers, and homework assignments; and CS4200-B which involves building a compiler for a subset of Java as a semester-long project. Key topics covered include the components of a compiler like parsing, type checking, optimization, and code generation; intermediate representations; and different types of compilers.
This document discusses how to submit a Perl module to CPAN in 3 steps:
1. Generate the module files using h2xs and write documentation.
2. Post about the module on modules@perl.org to get feedback.
3. Upload the distribution files to PAUSE after testing and following the checklist.
Here are some ways to optimize the code:
1. Use strtr() instead of preg_replace() since it avoids the overhead of regular expressions.
2. Define the replacement array outside the loop to avoid redefining it on each iteration.
3. Use direct string concatenation instead of sprintf() for better performance.
4. Avoid function calls inside the loop like sizeof(). Define the length before the loop for better performance.
5. Consider using string replacement/manipulation functions like str_replace() instead of redefining/reconcatenating strings on each loop iteration.
So in summary, the optimized code would be:
$rep = ['-' => '*', '.' => '*
Malware Unicorn gives a presentation on reverse engineering (RE) and the common patterns seen in malware. She discusses how RE is the foundation for vulnerability research, malware analysis, exploit development, and more. The talk covers common malware techniques like packing, evasion, cryptography, and shellcode. For each technique, Malware Unicorn explains what to look for in disassembly and provides tips on using debuggers and static analysis to analyze malware that uses these techniques. The overall presentation provides an introduction to RE and guides attendees on identifying and understanding common malware routines through disassembly.
NativeBoost is a plugin for the VM that allows machine code generated in Smalltalk to run directly. It includes utilities to generate machine code from the language side without needing to recompile the VM. The philosophy is that all logic should happen in the language and code can be shipped as Smalltalk without external dependencies. It works by extending method trailers to carry native code, which is invoked via a primitive. It has components for assembly, core implementation, foreign call interfaces, and platform support.
Similar to Software And The Taste Of Mayo - Marco Tabini (20)
The document discusses the goals of eZ Components which include providing a solid PHP application development platform without forcing a framework structure, having a clean and simple API, excellent documentation, backward compatibility, stability, and being open source friendly under a permissive license. It also notes the naming conventions used for eZ Components classes.
Best Practices with Zend Framework - Matthew Weier O'Phinneydpc
The document outlines best practices for PHP development including testing code, using coding standards, learning and applying design patterns, documenting code and applications with documentation generators and XML, using source control like Subversion, and providing documentation for end users. The key messages are to test code instead of debugging, use an established coding standard to minimize politics and ensure consistency, and learn from existing design patterns that have proven solutions to common problems.
This document discusses the history and state of PHP. It notes that PHP began in the late 1990s and has grown tremendously in popularity since, becoming the most popular web language. Major milestones included the releases of PHP 3, 4, and 5 as well as endorsements from large companies like Yahoo, IBM, Oracle, and Microsoft. The document predicts PHP developers shifting from individual to corporate users. It argues PHP can replace Java in some cases due to being less complex. Overall it presents PHP as a mature language that is well-suited for web applications, services, and cloud computing.
Fabien Potencier is the founder of Sensio, a web agency with 45 employees and long-time corporate customers. He created the symfony PHP web framework based on 10 years of Sensio's experience and existing open-source projects. Version 1.1 of symfony is being released this month with new features like an improved command line interface, better test support, and multi-format response support. The symfony framework is based on decoupled and reusable components that communicate through events.
This document provides an overview and agenda for an "Advanced PHP" training session that will cover design patterns. The training will introduce several design patterns including Strategy, Observer, and others. It will use examples like a duck simulator, weather application, and coffee bar to demonstrate how design patterns can be applied to make code more flexible, maintainable and extensible. The document outlines the topics, examples, and goals for illustrating how design patterns align with object-oriented principles.
This document provides an overview of PHPUnit, a unit testing framework for PHP. It introduces Sebastian Bergmann, the creator of PHPUnit, and describes some of PHPUnit's key features like test frameworks, integration with other tools, code coverage, and more. Examples are provided of writing unit tests with PHPUnit using the PHPUnit_Framework_TestCase class. Additional features like annotations, data providers, exceptions, groups, and behavior-driven development styles are also demonstrated.
PHP 5.3 and PHP 6; a look ahead - Stefan Priebschdpc
The document discusses new features in PHP 5.3 including garbage collection, improved SPL data structures like stacks and queues, magic calls and static calls, namespaces, and improved error handling. It also mentions plans for PHP 6 which later became PHP 5.3, introducing features like Unicode support. Various deprecated PHP settings are also noted.
Quality Assurance in PHP projects - Sebastian Bergmanndpc
This document provides an overview of quality assurance testing for PHP projects. It discusses the importance of testing for enterprise applications built with PHP. It outlines different types of tests including unit tests, system tests, non-functional tests, developer tests, and acceptance tests. It also introduces PHPUnit as a popular testing framework for PHP that allows writing and running automated tests.
An Infrastructure for Team Development - Gaylord Aulkedpc
This document discusses infrastructure and processes for team-based PHP development. It recommends using source control, continuous integration, automated testing, and packaging/deployment tools. Local development involves each developer working on their own copy, with changes committed to a shared repository. Development sandboxes provide isolated environments. Changes are merged and packaged for deployment.
This document discusses enterprise PHP development and provides 10 steps for building enterprise PHP applications. It begins by defining what an enterprise is and addressing whether PHP is ready for enterprise development. It then outlines the 10 steps which are: 1) assembling a skilled team, 2) defining requirements, 3) designing architecture, 4) using tools, 5) establishing a framework foundation, 6) applying design patterns, 7) testing, 8) optimizing, 9) deploying, and 10) operating the application. The document uses building construction metaphors and emphasizes skills, processes, and practices needed to develop robust enterprise applications in PHP.
This document provides information about the Dutch PHP Conference 2008 that took place on June 14, 2008. It includes the schedule of keynote speakers for the day, information about the locations of sessions, details on books available for sale at a discount, practical networking information for participants, and a reminder to enjoy the conference.
This document discusses creating a mashup application that combines the UPS and Google Maps APIs. It covers three versions of the mashup created with different technologies: 1) A PHP-based version using pre-existing classes to query UPS and display tracking data on a Google Map. 2) A JavaScript-based "SJAX" version that uses asynchronous calls to a PHP proxy script. 3) An asynchronous AJAX version that handles asynchronous calls and cross-browser issues. The goal is to demonstrate different approaches to creating a web mashup using various web technologies.
DPC2007 CodeGear, Delphi For PHP (Pawel Glowacki)dpc
This document discusses CodeGear's Delphi for PHP product. Delphi for PHP provides a visual RAD environment for developing PHP applications. It includes an integrated PHP debugger and source code editor. Delphi for PHP also includes VCL for PHP, an open source component library that allows building PHP applications using a visual component model. VCL for PHP is based on popular PHP scripts and libraries and provides over 50 reusable components. The presentation demonstrates Delphi for PHP's capabilities and promotes the free trial which is available for download.
The document discusses the Zend Framework, an open-source PHP framework. It provides the following key points:
1. The Zend Framework provides a high-quality PHP framework for developing web applications and web services, following principles of extreme simplicity and best practices.
2. It is developed by the PHP community led by Zend and is open-source under a BSD license.
3. Major companies like IBM and Google use the Zend Framework for various projects.
This document summarizes Kevlin Henney's presentation on modern object-oriented development at a PHP conference in 2007. The presentation covered a brief history of objects, linguistics as they relate to OO style, encapsulation, class hierarchies, design patterns, and testing. It posed questions on these topics and provided concise answers, giving attendees an overview of key concepts in OO development.
The document discusses PHP and Oracle best practices and roadmaps. It covers Oracle's long-term commitment to PHP, popular PHP extensions for Oracle like OCI8 and PDO_OCI, and best practices for performance and scalability including connection management, statement caching, and transaction handling. It also previews upcoming PHP features in Oracle Database 11g and provides resources for PHP developers.
DPC2007 Case Study Zoom & Webwereld (Sander vd Graaf)dpc
The document discusses various topics related to optimizing performance for websites built with PHP, MySQL, and Apache. It covers bottlenecks in these technologies, as well as caching, questions from Webwereld/Zoom, and how websites like Webwereld and Zoom.nl achieve millions of pageviews through techniques like PHP optimizations, MySQL background processing, and avoiding inefficient database queries.
The document discusses PHP Database Objects (PDO) and abstracting database interfaces. It provides background on the speaker, Lukas Kahwe Smith, and their experience with PHP. It then discusses reasons for abstracting database interfaces like supporting multiple database types, forward compatibility, and reducing vendor lock-in. The remainder of the document focuses on different types of abstraction layers that can be built on top of PDO including database APIs, SQL abstraction, active records, and object-relational mapping (ORM) layers. It provides examples of several popular abstraction frameworks and how they implement different levels of abstraction.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
44. Hello, World!
Language System Calls
C 46
Shell (TCSH) 37
PHP (CLI) 362
PHP (Apache) 881
11
45. Hello, World!
Language System Calls
C 46
Shell (TCSH) 37
PHP (CLI) 362
PHP (Apache) 881
11
46. Hello, World!
Language System Calls
C 46
Shell (TCSH) 37
PHP (CLI) 362
PHP (Apache) 881
11
47. Hello, World!
Language System Calls
C 46
Shell (TCSH) 37
PHP (CLI) 362
PHP (Apache) 881
11
48. Hello, World!
Language System Calls
C 46
Shell (TCSH) 37
PHP (CLI) 362
PHP (Apache) 881
11
49. Hello, World!
Language System Calls
Once
C 47
Language
C
System Calls
46 Shell (TCSH) 146
Shell (TCSH) 37
PHP (CLI) 362 PHP (CLI) 368
PHP (Apache) 881
PHP (Apache) 887
11
50. Hello, World!
Language System Calls
Once
C 47
Language
C
System Calls
46 Shell (TCSH) 146
Shell (TCSH) 37
PHP (CLI) 362 PHP (CLI) 368
PHP (Apache) 881
PHP (Apache) 887
11
51. Hello, World!
Language System Calls
Once
C 47
Language
C
System Calls
46 Shell (TCSH) 146
Shell (TCSH) 37
PHP (CLI) 362 PHP (CLI) 368
PHP (Apache) 881
PHP (Apache) 887
11
52. Hello, World!
Language System Calls
Once
C 47
Language
C
System Calls
46 Shell (TCSH) 146
Shell (TCSH) 37
PHP (CLI) 362 PHP (CLI) 368
PHP (Apache) 881
PHP (Apache) 887
11
53. Hello, World!
Language System Calls
Once
C 47
Language
C
System Calls
46 Shell (TCSH) 146
Shell (TCSH) 37
PHP (CLI) 362 PHP (CLI) 368
PHP (Apache) 881
PHP (Apache) 887
11
54. Hello, World!
Once Twice
Language System Calls Language System Calls
C 46 C 47
Shell (TCSH) 37 Shell (TCSH) 146
PHP (CLI) 362 PHP (CLI) 368
PHP (Apache) 881 PHP (Apache) 887
11
96. Example: AWS
Item Service Cost/mo
Storage S3 4.5
Data Transfer S3 30
Data Requests S3 1
DB Storage SimpleDB 45
DB CPU Usage SimpleDB 55
Server Usage EC2 144
TOTALS 279.5
25
97. Example: AWS
Item Service Cost/mo
Storage S3 4.5
Data Transfer S3 30
Data Requests S3 1
DB Storage SimpleDB 45
DB CPU Usage SimpleDB 55
Server Usage EC2 144
TOTALS 279.5
25
98. Example: AWS
Item Service Cost/mo
Storage S3 4.5
Data Transfer S3 30
Data Requests S3 1
DB Storage SimpleDB 45
DB CPU Usage SimpleDB 55
Server Usage EC2 144
TOTALS 279.5
25
99. Example: AWS
Item Service Cost/mo
Storage S3 4.5
Data Transfer S3 30
Data Requests S3 1
DB Storage SimpleDB 45
DB CPU Usage SimpleDB 55
Server Usage EC2 144
TOTALS 279.5
25
100. Example: AWS
Item Service Cost/mo
Storage S3 4.5
Data Transfer S3 30
Data Requests S3 1
DB Storage SimpleDB 45
DB CPU Usage SimpleDB 55
Server Usage EC2 144
TOTALS 279.5
25
101. Example: AWS
Item Service Cost/mo
Storage S3 4.5
Data Transfer S3 30
Data Requests S3 1
DB Storage SimpleDB 45
DB CPU Usage SimpleDB 55
Server Usage EC2 144
TOTALS 279.5
25
102. Example: AWS
Item Service Cost/mo
Storage S3 4.5
Data Transfer S3 30
Data Requests S3 1
DB Storage SimpleDB 45
DB CPU Usage SimpleDB 55
Server Usage EC2 144
TOTALS 279.5
25
103. Example: AWS
Item Service Cost/mo
Storage S3 4.5
Data Transfer S3 30
Data Requests S3 1
DB Storage SimpleDB 45
DB CPU Usage SimpleDB 55
Server Usage EC2 144
TOTALS 279.5
25
107. Example: AWS
Item Service Cost/mo
Storage S3 150
Data Transfer S3 4,300
Data Requests S3 9,000
DB Storage SimpleDB 1,500
DB CPU Usage SimpleDB 3,800
Server Usage EC2 2,500
TOTALS 21,250
28
108. Example: AWS
Item Service Cost/mo
Storage S3 150
Data Transfer S3 4,300
Data Requests S3 9,000
DB Storage SimpleDB 1,500
DB CPU Usage SimpleDB 3,800
Server Usage EC2 2,500
TOTALS 21,250
28
109. Example: AWS
Item Service Cost/mo
Storage S3 150
Data Transfer S3 4,300
Data Requests S3 9,000
DB Storage SimpleDB 1,500
DB CPU Usage SimpleDB 3,800
Server Usage EC2 2,500
TOTALS 21,250
28
110. Example: AWS
Item Service Cost/mo
Storage S3 150
Data Transfer S3 4,300
Data Requests S3 9,000
DB Storage SimpleDB 1,500
DB CPU Usage SimpleDB 3,800
Server Usage EC2 2,500
TOTALS 21,250
28
111. Example: AWS
Item Service Cost/mo
Storage S3 150
Data Transfer S3 4,300
Data Requests S3 9,000
DB Storage SimpleDB 1,500
DB CPU Usage SimpleDB 3,800
Server Usage EC2 2,500
TOTALS 21,250
28
112. Example: AWS
Item Service Cost/mo
Storage S3 150
Data Transfer S3 4,300
Data Requests S3 9,000
DB Storage SimpleDB 1,500
DB CPU Usage SimpleDB 3,800
Server Usage EC2 2,500
TOTALS 21,250
28
113. Example: AWS
Item Service Cost/mo
Storage S3 150
Data Transfer S3 4,300
Data Requests S3 9,000
DB Storage SimpleDB 1,500
DB CPU Usage SimpleDB 3,800
Server Usage EC2 2,500
TOTALS 21,250
28
114. Example: AWS
Item Service Cost/mo
Storage S3 150
Data Transfer S3 4,300
Data Requests S3 9,000
DB Storage SimpleDB 1,500
DB CPU Usage SimpleDB 3,800
Server Usage EC2 2,500
TOTALS 21,250
28