SlideShare a Scribd company logo
> Solving      Big problems with OS: Condor
 > Antonio Sanz (ansanz@unizar.es)
 > 09 / Nov / 11
2
3
             > Antonio Sanz
       > I3A System Manager
> HERMES HPC cluster sysadmin
          > ansanz@unizar.es
           > @antoniosanzalc
4
5




Show   /   Know   /   Use
Problema inicial                                                 6
                                           > Dr. Good
                                           > Neurologist
                                           > Alzheimer research
                                           > Process 20000
                                             brain image scans
                                             (1h/image)
                                           > A thousand times.
                                             Maybe two.




3. Sistemas de gestión de colas : Condor
Problema inicial                                7
                   > Mrs. Nice
                   > Santa’s Logistic Officer
                   > Gift transportation
                   > Analize 6x10e7 possible
                     load/reindeers/routes
                     (10min/analysis)
                   > Before Christmas!
8




Hey … ! It’s a   64K one !
9




Queue   distribution systems
Condor Basics                             10




    Single queue


3. Sistemas de gestión de colas : Condor
11
Condor Basics                             12




          Multiple queues


3. Sistemas de gestión de colas : Condor
13
14




Problem   partitioning
Problem can be broken into   independent pieces 15
Condor Basics      16




 Oh        Yeah!
Condor Basics                             17




         For loops are
         your best friends




3. Sistemas de gestión de colas : Condor
Condor Basics                             18



         While loops …
         can sometimes be
         convinced



3. Sistemas de gestión de colas : Condor
Condor Basics                             19




   Do it           yourself !
3. Sistemas de gestión de colas : Condor
Condor Basics   20



    >
Condor Basics               21

  Heterogeneous computing
22

Resource   harvesting
23




Requirements
24

Job   Surveillance
Condor Basics                                     25




  Fair use                          of resources




3. Sistemas de gestión de colas : Condor
26

Checkpoints
Condor Basics         27


  Nested jobs (DAG)
Condor Basics                   28



  Email         Notifications
29




Grid & Cloud
Computing
Condor Basics   30


  Flexibility
31




… with Hadoop, MPI, OpenMP, GPU
Condor Basics                             32




3. Sistemas de gestión de colas : Condor
33




How   Condor works
34



Management




   [Hello, Dave]
35




Compute
Condor Basics                                       36




    Job list                               ClassAd




3. Sistemas de gestión de colas : Condor
37




Resource   list   ClassAd
38




Matchmaking
Condor Basics          39


 Priority Management
40
    Data
Transfer
Condor Basics                             41




         Job           running
3. Sistemas de gestión de colas : Condor
42




Job   Monitoring
43




Job   End
44




Example
45

 #!/bin/sh
 # I’m hola.sh
 echo Hola mundo desde `hostname`

 #
 # A Hello World .. In Condor!
 #
 # I’m hello.sub
 Universe    = vanilla
 Executable = hola.sh
 Log        = hola.log
 Output       = hola.out
 Error         = hola.err
 Queue




Hello, World !!
Lanzar el cálculo                    46


 condor_submit




4. Condor Basics – Un cálculo fácil
Lanzar el cálculo          47




                    condor_q
48

Something tastier…
 #!/bin/sh
 # I’m hello2.sh
 OUTPUT=hello${1}.result
 cat hello.input >> $OUTPUT
 cat echo Hello world, I’m job $1 here from
    `hostname` > $OUTPUT

 # Execute n times with different outputs
 Universe   = vanilla
 Executable = hello2.sh
 Transfer_input_files = hello.input
 WhenToTransferOutput = ON_EXIT_OR_EVICT
 Arguments = $(Process)
 Log        = hello.log
 Output     = hello.out
 Queue 10
49




                                      Perfect
                                      Simulation



4. Condor Basics – Un cálculo fácil
50




Extra Bonus
51




Dynamic Partitioning
Condor Basics       52




Configurable Jobs
53




Advanced Accounting
54




Dynamic Checkpointing
Condor Basics                             55



      Hadoop Integration




3. Sistemas de gestión de colas : Condor
56




Green Computing
Condor Basics     57

GPU Integration
58




I3A & Condor
59

Gaming IA
60




MRI
Brain
Analysis
61
Communication
  Systems
62




Tissue Modelling
Condor Basics                             63




3. Sistemas de gestión de colas : Condor
Condor Basics                             64



      > Conclusiones




3. Sistemas de gestión de colas : Condor
65




Example
66

                       Antonio Sanz
                    ansanz@unizar.es
                     @antoniosanzalc




                                   Slides here:
http://web.hermes.cps.unizar.es/doc/condor.pdf

More Related Content

Viewers also liked

Print™ Sample Analysis
Print™ Sample AnalysisPrint™ Sample Analysis
Print™ Sample Analysis
Sociagility
 
Domain driven design in a nutshell
Domain driven design in a nutshellDomain driven design in a nutshell
Domain driven design in a nutshell
Toni Esteves
 
Informatica forense
Informatica forenseInformatica forense
Informatica forense
mausmr
 
Por qué un Pecha Kucha es mejor que un Iphone (y casi tanto como el chocolate)
Por qué un Pecha Kucha es mejor  que un Iphone (y casi tanto como el chocolate)Por qué un Pecha Kucha es mejor  que un Iphone (y casi tanto como el chocolate)
Por qué un Pecha Kucha es mejor que un Iphone (y casi tanto como el chocolate)
Antonio Sanz Alcober
 
Manual oms[1]
Manual oms[1]Manual oms[1]
Manual oms[1]
Elizza Quezzad
 
La ciber guerra en las relaciones internacionales
La ciber guerra en las relaciones internacionalesLa ciber guerra en las relaciones internacionales
La ciber guerra en las relaciones internacionales
carinna_07
 
Capacidades de China para la ciberguerra
Capacidades de China para la ciberguerraCapacidades de China para la ciberguerra
Capacidades de China para la ciberguerra
Antonio Sanz Alcober
 
07 decreto ap.julio 2007.joaquin
07 decreto ap.julio 2007.joaquin07 decreto ap.julio 2007.joaquin
07 decreto ap.julio 2007.joaquin
mariajoseadamuzgracia
 
Phising
PhisingPhising
Seguridad para Pymes "Guerra de Guerrillas"
Seguridad para Pymes "Guerra de Guerrillas"Seguridad para Pymes "Guerra de Guerrillas"
Seguridad para Pymes "Guerra de Guerrillas"
Tuvika Tuvika
 
Zen y el arte de pescar APT
Zen y el arte de pescar APTZen y el arte de pescar APT
Zen y el arte de pescar APT
Antonio Sanz Alcober
 
Administracion electronica: Tecnologías al servicio del ciudadano
Administracion electronica: Tecnologías al servicio del ciudadanoAdministracion electronica: Tecnologías al servicio del ciudadano
Administracion electronica: Tecnologías al servicio del ciudadano
Antonio Sanz Alcober
 
Propuestas para mejorar la calidad de vida de los enfermos terminales
Propuestas para mejorar la calidad de vida de los enfermos terminalesPropuestas para mejorar la calidad de vida de los enfermos terminales
Propuestas para mejorar la calidad de vida de los enfermos terminales
EIDEC
 
Seguridad de la banca online - Consejos para usuarios
Seguridad de la banca online - Consejos para usuariosSeguridad de la banca online - Consejos para usuarios
Seguridad de la banca online - Consejos para usuarios
Antonio Sanz Alcober
 
Ciberguerra y terrorismo digital
Ciberguerra y terrorismo digitalCiberguerra y terrorismo digital
Ciberguerra y terrorismo digital
Hacking Bolivia
 
(H)ac(k)tivismo, Ciberterrorismo y Ciberguerra
(H)ac(k)tivismo, Ciberterrorismo y Ciberguerra(H)ac(k)tivismo, Ciberterrorismo y Ciberguerra
(H)ac(k)tivismo, Ciberterrorismo y Ciberguerra
Joel A. Gómez Treviño
 
Pablo González & Juan Antonio Calles – Cyberwar: Looking for… touchdown! [Roo...
Pablo González & Juan Antonio Calles – Cyberwar: Looking for… touchdown! [Roo...Pablo González & Juan Antonio Calles – Cyberwar: Looking for… touchdown! [Roo...
Pablo González & Juan Antonio Calles – Cyberwar: Looking for… touchdown! [Roo...
RootedCON
 
Triagedeurgencias MÉDICA Y ENFERMERÍA
Triagedeurgencias MÉDICA Y ENFERMERÍATriagedeurgencias MÉDICA Y ENFERMERÍA
Triagedeurgencias MÉDICA Y ENFERMERÍA
Anelly May
 

Viewers also liked (18)

Print™ Sample Analysis
Print™ Sample AnalysisPrint™ Sample Analysis
Print™ Sample Analysis
 
Domain driven design in a nutshell
Domain driven design in a nutshellDomain driven design in a nutshell
Domain driven design in a nutshell
 
Informatica forense
Informatica forenseInformatica forense
Informatica forense
 
Por qué un Pecha Kucha es mejor que un Iphone (y casi tanto como el chocolate)
Por qué un Pecha Kucha es mejor  que un Iphone (y casi tanto como el chocolate)Por qué un Pecha Kucha es mejor  que un Iphone (y casi tanto como el chocolate)
Por qué un Pecha Kucha es mejor que un Iphone (y casi tanto como el chocolate)
 
Manual oms[1]
Manual oms[1]Manual oms[1]
Manual oms[1]
 
La ciber guerra en las relaciones internacionales
La ciber guerra en las relaciones internacionalesLa ciber guerra en las relaciones internacionales
La ciber guerra en las relaciones internacionales
 
Capacidades de China para la ciberguerra
Capacidades de China para la ciberguerraCapacidades de China para la ciberguerra
Capacidades de China para la ciberguerra
 
07 decreto ap.julio 2007.joaquin
07 decreto ap.julio 2007.joaquin07 decreto ap.julio 2007.joaquin
07 decreto ap.julio 2007.joaquin
 
Phising
PhisingPhising
Phising
 
Seguridad para Pymes "Guerra de Guerrillas"
Seguridad para Pymes "Guerra de Guerrillas"Seguridad para Pymes "Guerra de Guerrillas"
Seguridad para Pymes "Guerra de Guerrillas"
 
Zen y el arte de pescar APT
Zen y el arte de pescar APTZen y el arte de pescar APT
Zen y el arte de pescar APT
 
Administracion electronica: Tecnologías al servicio del ciudadano
Administracion electronica: Tecnologías al servicio del ciudadanoAdministracion electronica: Tecnologías al servicio del ciudadano
Administracion electronica: Tecnologías al servicio del ciudadano
 
Propuestas para mejorar la calidad de vida de los enfermos terminales
Propuestas para mejorar la calidad de vida de los enfermos terminalesPropuestas para mejorar la calidad de vida de los enfermos terminales
Propuestas para mejorar la calidad de vida de los enfermos terminales
 
Seguridad de la banca online - Consejos para usuarios
Seguridad de la banca online - Consejos para usuariosSeguridad de la banca online - Consejos para usuarios
Seguridad de la banca online - Consejos para usuarios
 
Ciberguerra y terrorismo digital
Ciberguerra y terrorismo digitalCiberguerra y terrorismo digital
Ciberguerra y terrorismo digital
 
(H)ac(k)tivismo, Ciberterrorismo y Ciberguerra
(H)ac(k)tivismo, Ciberterrorismo y Ciberguerra(H)ac(k)tivismo, Ciberterrorismo y Ciberguerra
(H)ac(k)tivismo, Ciberterrorismo y Ciberguerra
 
Pablo González & Juan Antonio Calles – Cyberwar: Looking for… touchdown! [Roo...
Pablo González & Juan Antonio Calles – Cyberwar: Looking for… touchdown! [Roo...Pablo González & Juan Antonio Calles – Cyberwar: Looking for… touchdown! [Roo...
Pablo González & Juan Antonio Calles – Cyberwar: Looking for… touchdown! [Roo...
 
Triagedeurgencias MÉDICA Y ENFERMERÍA
Triagedeurgencias MÉDICA Y ENFERMERÍATriagedeurgencias MÉDICA Y ENFERMERÍA
Triagedeurgencias MÉDICA Y ENFERMERÍA
 

Similar to Solving BIG problems with Open Source: Condor

condor_user_tutorial.ppt
condor_user_tutorial.pptcondor_user_tutorial.ppt
condor_user_tutorial.ppt
vlaaade
 
Basics_of_Kernel_Panic_Hang_and_ Kdump.pdf
Basics_of_Kernel_Panic_Hang_and_ Kdump.pdfBasics_of_Kernel_Panic_Hang_and_ Kdump.pdf
Basics_of_Kernel_Panic_Hang_and_ Kdump.pdf
stroganovboris
 
"A rootkits writer’s guide to defense" - Michal Purzynski
"A rootkits writer’s guide to defense" - Michal Purzynski"A rootkits writer’s guide to defense" - Michal Purzynski
"A rootkits writer’s guide to defense" - Michal Purzynski
PROIDEA
 
Solaris Kernel Debugging V1.0
Solaris Kernel Debugging V1.0Solaris Kernel Debugging V1.0
Solaris Kernel Debugging V1.0
Jarod Wang
 
GOD MODE Unlocked: Hardware backdoors in x86 CPUs
GOD MODE Unlocked: Hardware backdoors in x86 CPUsGOD MODE Unlocked: Hardware backdoors in x86 CPUs
GOD MODE Unlocked: Hardware backdoors in x86 CPUs
Priyanka Aash
 
100 bugs in Open Source C/C++ projects
100 bugs in Open Source C/C++ projects 100 bugs in Open Source C/C++ projects
100 bugs in Open Source C/C++ projects
Andrey Karpov
 
Ako využiť (ukradnúť) kolegove CPU cykly
Ako využiť (ukradnúť) kolegove CPU cyklyAko využiť (ukradnúť) kolegove CPU cykly
Ako využiť (ukradnúť) kolegove CPU cykly
cloudcampsk
 
2011 ecoop
2011 ecoop2011 ecoop
2011 ecoop
bergel
 
Intro to Arduino Programming.pdf
Intro to Arduino Programming.pdfIntro to Arduino Programming.pdf
Intro to Arduino Programming.pdf
HimanshuDon1
 
Making Security Invisible
Making Security InvisibleMaking Security Invisible
Making Security Invisible
J On The Beach
 
Exploring Boto3 Events With Mitmproxy
Exploring Boto3 Events With MitmproxyExploring Boto3 Events With Mitmproxy
Exploring Boto3 Events With Mitmproxy
Michael Twomey
 
Lab Manual Combaring Redis with Relational
Lab Manual Combaring Redis with RelationalLab Manual Combaring Redis with Relational
Lab Manual Combaring Redis with Relational
Amazon Web Services
 
Ruun commands
Ruun commandsRuun commands
Ruun commands
Queen Lumanta
 
Monitoring a program that monitors computer networks
Monitoring a program that monitors computer networksMonitoring a program that monitors computer networks
Monitoring a program that monitors computer networks
PVS-Studio
 
PythonBrasil[8] - CPython for dummies
PythonBrasil[8] - CPython for dummiesPythonBrasil[8] - CPython for dummies
PythonBrasil[8] - CPython for dummies
Tatiana Al-Chueyr
 
What the CRaC - Superfast JVM startup
What the CRaC - Superfast JVM startupWhat the CRaC - Superfast JVM startup
What the CRaC - Superfast JVM startup
Gerrit Grunwald
 
Skiron - Experiments in CPU Design in D
Skiron - Experiments in CPU Design in DSkiron - Experiments in CPU Design in D
Skiron - Experiments in CPU Design in D
Mithun Hunsur
 
Stealthy, Hypervisor-based Malware Analysis
Stealthy, Hypervisor-based Malware AnalysisStealthy, Hypervisor-based Malware Analysis
Stealthy, Hypervisor-based Malware Analysis
Tamas K Lengyel
 
WWCode Dallas - Kubernetes: Learning from Zero to Production
WWCode Dallas - Kubernetes: Learning from Zero to ProductionWWCode Dallas - Kubernetes: Learning from Zero to Production
WWCode Dallas - Kubernetes: Learning from Zero to Production
Rosemary Wang
 
Hands-on Lab - Combaring Redis with Relational
Hands-on Lab - Combaring Redis with RelationalHands-on Lab - Combaring Redis with Relational
Hands-on Lab - Combaring Redis with Relational
Amazon Web Services
 

Similar to Solving BIG problems with Open Source: Condor (20)

condor_user_tutorial.ppt
condor_user_tutorial.pptcondor_user_tutorial.ppt
condor_user_tutorial.ppt
 
Basics_of_Kernel_Panic_Hang_and_ Kdump.pdf
Basics_of_Kernel_Panic_Hang_and_ Kdump.pdfBasics_of_Kernel_Panic_Hang_and_ Kdump.pdf
Basics_of_Kernel_Panic_Hang_and_ Kdump.pdf
 
"A rootkits writer’s guide to defense" - Michal Purzynski
"A rootkits writer’s guide to defense" - Michal Purzynski"A rootkits writer’s guide to defense" - Michal Purzynski
"A rootkits writer’s guide to defense" - Michal Purzynski
 
Solaris Kernel Debugging V1.0
Solaris Kernel Debugging V1.0Solaris Kernel Debugging V1.0
Solaris Kernel Debugging V1.0
 
GOD MODE Unlocked: Hardware backdoors in x86 CPUs
GOD MODE Unlocked: Hardware backdoors in x86 CPUsGOD MODE Unlocked: Hardware backdoors in x86 CPUs
GOD MODE Unlocked: Hardware backdoors in x86 CPUs
 
100 bugs in Open Source C/C++ projects
100 bugs in Open Source C/C++ projects 100 bugs in Open Source C/C++ projects
100 bugs in Open Source C/C++ projects
 
Ako využiť (ukradnúť) kolegove CPU cykly
Ako využiť (ukradnúť) kolegove CPU cyklyAko využiť (ukradnúť) kolegove CPU cykly
Ako využiť (ukradnúť) kolegove CPU cykly
 
2011 ecoop
2011 ecoop2011 ecoop
2011 ecoop
 
Intro to Arduino Programming.pdf
Intro to Arduino Programming.pdfIntro to Arduino Programming.pdf
Intro to Arduino Programming.pdf
 
Making Security Invisible
Making Security InvisibleMaking Security Invisible
Making Security Invisible
 
Exploring Boto3 Events With Mitmproxy
Exploring Boto3 Events With MitmproxyExploring Boto3 Events With Mitmproxy
Exploring Boto3 Events With Mitmproxy
 
Lab Manual Combaring Redis with Relational
Lab Manual Combaring Redis with RelationalLab Manual Combaring Redis with Relational
Lab Manual Combaring Redis with Relational
 
Ruun commands
Ruun commandsRuun commands
Ruun commands
 
Monitoring a program that monitors computer networks
Monitoring a program that monitors computer networksMonitoring a program that monitors computer networks
Monitoring a program that monitors computer networks
 
PythonBrasil[8] - CPython for dummies
PythonBrasil[8] - CPython for dummiesPythonBrasil[8] - CPython for dummies
PythonBrasil[8] - CPython for dummies
 
What the CRaC - Superfast JVM startup
What the CRaC - Superfast JVM startupWhat the CRaC - Superfast JVM startup
What the CRaC - Superfast JVM startup
 
Skiron - Experiments in CPU Design in D
Skiron - Experiments in CPU Design in DSkiron - Experiments in CPU Design in D
Skiron - Experiments in CPU Design in D
 
Stealthy, Hypervisor-based Malware Analysis
Stealthy, Hypervisor-based Malware AnalysisStealthy, Hypervisor-based Malware Analysis
Stealthy, Hypervisor-based Malware Analysis
 
WWCode Dallas - Kubernetes: Learning from Zero to Production
WWCode Dallas - Kubernetes: Learning from Zero to ProductionWWCode Dallas - Kubernetes: Learning from Zero to Production
WWCode Dallas - Kubernetes: Learning from Zero to Production
 
Hands-on Lab - Combaring Redis with Relational
Hands-on Lab - Combaring Redis with RelationalHands-on Lab - Combaring Redis with Relational
Hands-on Lab - Combaring Redis with Relational
 

More from Antonio Sanz Alcober

Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?
Antonio Sanz Alcober
 
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
Antonio Sanz Alcober
 
Cyberthreats: Are we screwed ?
Cyberthreats: Are we screwed ?Cyberthreats: Are we screwed ?
Cyberthreats: Are we screwed ?
Antonio Sanz Alcober
 
SEA - Syrian Electronic Army - Cyberterrorism
SEA - Syrian Electronic Army - CyberterrorismSEA - Syrian Electronic Army - Cyberterrorism
SEA - Syrian Electronic Army - Cyberterrorism
Antonio Sanz Alcober
 
Sex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadminSex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadmin
Antonio Sanz Alcober
 
Cómo comprar seguro en internet
Cómo comprar seguro en internetCómo comprar seguro en internet
Cómo comprar seguro en internet
Antonio Sanz Alcober
 
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Antonio Sanz Alcober
 
Harry el Sucio te enseña Seguridad en Wordpress
Harry el Sucio te enseña Seguridad en WordpressHarry el Sucio te enseña Seguridad en Wordpress
Harry el Sucio te enseña Seguridad en Wordpress
Antonio Sanz Alcober
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadmin
Antonio Sanz Alcober
 
Supercomputación: Haciendo HOY la ciencia del mañana
Supercomputación: Haciendo HOY la ciencia del mañanaSupercomputación: Haciendo HOY la ciencia del mañana
Supercomputación: Haciendo HOY la ciencia del mañana
Antonio Sanz Alcober
 
Historia de la inteligencia china
Historia de la inteligencia chinaHistoria de la inteligencia china
Historia de la inteligencia china
Antonio Sanz Alcober
 
Análisis de la capacidad científica, tecnológica e innovadora de la república...
Análisis de la capacidad científica, tecnológica e innovadora de la república...Análisis de la capacidad científica, tecnológica e innovadora de la república...
Análisis de la capacidad científica, tecnológica e innovadora de la república...
Antonio Sanz Alcober
 
Seguridad en redes sociales
Seguridad en redes socialesSeguridad en redes sociales
Seguridad en redes sociales
Antonio Sanz Alcober
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
Antonio Sanz Alcober
 
Construyendo un cluster de supercomputación - Guía paso a paso
Construyendo un cluster de supercomputación - Guía paso a pasoConstruyendo un cluster de supercomputación - Guía paso a paso
Construyendo un cluster de supercomputación - Guía paso a paso
Antonio Sanz Alcober
 

More from Antonio Sanz Alcober (15)

Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?
 
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
 
Cyberthreats: Are we screwed ?
Cyberthreats: Are we screwed ?Cyberthreats: Are we screwed ?
Cyberthreats: Are we screwed ?
 
SEA - Syrian Electronic Army - Cyberterrorism
SEA - Syrian Electronic Army - CyberterrorismSEA - Syrian Electronic Army - Cyberterrorism
SEA - Syrian Electronic Army - Cyberterrorism
 
Sex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadminSex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadmin
 
Cómo comprar seguro en internet
Cómo comprar seguro en internetCómo comprar seguro en internet
Cómo comprar seguro en internet
 
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
 
Harry el Sucio te enseña Seguridad en Wordpress
Harry el Sucio te enseña Seguridad en WordpressHarry el Sucio te enseña Seguridad en Wordpress
Harry el Sucio te enseña Seguridad en Wordpress
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadmin
 
Supercomputación: Haciendo HOY la ciencia del mañana
Supercomputación: Haciendo HOY la ciencia del mañanaSupercomputación: Haciendo HOY la ciencia del mañana
Supercomputación: Haciendo HOY la ciencia del mañana
 
Historia de la inteligencia china
Historia de la inteligencia chinaHistoria de la inteligencia china
Historia de la inteligencia china
 
Análisis de la capacidad científica, tecnológica e innovadora de la república...
Análisis de la capacidad científica, tecnológica e innovadora de la república...Análisis de la capacidad científica, tecnológica e innovadora de la república...
Análisis de la capacidad científica, tecnológica e innovadora de la república...
 
Seguridad en redes sociales
Seguridad en redes socialesSeguridad en redes sociales
Seguridad en redes sociales
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Construyendo un cluster de supercomputación - Guía paso a paso
Construyendo un cluster de supercomputación - Guía paso a pasoConstruyendo un cluster de supercomputación - Guía paso a paso
Construyendo un cluster de supercomputación - Guía paso a paso
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Solving BIG problems with Open Source: Condor