This document discusses the Plan 9 operating system and network programming in Plan 9. It provides an overview of Plan 9's origins from UNIX and its networking APIs and model, including the use of file descriptors to represent network connections. It also demonstrates examples of echo clients and servers implemented using these networking APIs.
The document summarizes the MINIX operating system. It discusses the history and versions of MINIX, including MINIX 1 for the 8088 CPU, MINIX 2 adding support for 386 and POSIX standards, and MINIX 3 improving on the microkernel architecture. It also describes the layered architecture of MINIX 3 with user processes, servers, and a small kernel. Key components like process management, file systems, and device drivers are each run as separate servers that communicate through message passing.
This document summarizes Martin Geisler's presentation on using Python in Mercurial. It discusses:
1) How Mercurial uses Python for its rapid prototyping abilities and clean syntax which helps contributions.
2) How Mercurial speeds up startup time by using demandimport to lazily load modules, reducing imported modules from 305 to 69.
3) How Mercurial optimizes performance through efficient data structures like storing revisions sequentially and maintaining file ordering, as well as rewriting critical parts in C.
This document discusses setting up a network bridge without Docker. It provides a Vagrantfile to configure a virtual machine environment with Ubuntu 18.04, along with tools like Go and Docker installed. Instructions are given to create a bridge between two network namespaces called RED and BLUE using IP addresses in the 11.11.11.0/24 range. Tests show that hosts can ping each other within this network but not across the real interface and IP range of the host machine. Additional routing and IP configuration is needed to allow outside communication.
The document discusses using netlink and netlink families to enable communication between the kernel and user space processes. Netlink allows a more flexible alternative to ioctl calls by providing a socket-based interface for exchanging information. Various netlink families exist for communicating with different kernel modules, including NETLINK_ROUTE for routing functions. The document then discusses using netlink and the arpd tool to dynamically update ARP and bridge forwarding database tables in response to layer 2 and layer 3 miss events. This allows maintaining overlay networks by handling ARP requests between network namespaces.
Make container without_docker_6-overlay-network_1 Sam Kim
분산환경에서 컨테이너 간의 통신은 어떻게 이루어 지는 것일까요? 3,4편에서는 호스트 안에 가상네트워크를 만들어보았습니다. 6편에서는 이를 바탕으로 분산환경에서 호스트 간에 가상 네트워크로 통신이 가능하도록 만들어 봅니다. 이 방법은 실제 쿠버네티스 flannel 등의 CNI에서 사용하고 있는 vxlan 기반의 오버레이 네트워크 구성을 다룹니다.
The document provides examples of how Python is used in different domains such as websites, desktop applications, science, embedded systems, and more. It also discusses why Python is popular due to its readability, ease of learning, rich libraries, and ability to be sped up with tools like Numba and Cython. The document outlines topics for learning Python including primitives, control flow with if/while statements, composites like lists and dictionaries, and for loops. It recommends keeping learning through tutorials, documentation, and communities.
Kernel Recipes 2019 - Faster IO through io_uringAnne Nicolas
io_uring provides a new asynchronous I/O interface in Linux that aims to address limitations with existing interfaces like aio and libaio. It uses a ring-based model for submission and completion queues to efficiently support asynchronous I/O operations with low latency and high throughput. Though initially skeptical, Linus Torvalds ultimately merged io_uring into the Linux kernel due to improvements in missing features, ease of use, and efficiency over alternatives.
This document provides a summary of a presentation on updates to the GemStone Smalltalk environment. It discusses recent releases of GemStone/S including performance improvements, new platform support, and additional features. It also covers an upcoming MagLev Ruby demo, ways to get started with GemStone, current Seaside support, and an overview of the Metacello package management system. The presentation aims to inform attendees about new GemStone capabilities and tools.
The document summarizes the MINIX operating system. It discusses the history and versions of MINIX, including MINIX 1 for the 8088 CPU, MINIX 2 adding support for 386 and POSIX standards, and MINIX 3 improving on the microkernel architecture. It also describes the layered architecture of MINIX 3 with user processes, servers, and a small kernel. Key components like process management, file systems, and device drivers are each run as separate servers that communicate through message passing.
This document summarizes Martin Geisler's presentation on using Python in Mercurial. It discusses:
1) How Mercurial uses Python for its rapid prototyping abilities and clean syntax which helps contributions.
2) How Mercurial speeds up startup time by using demandimport to lazily load modules, reducing imported modules from 305 to 69.
3) How Mercurial optimizes performance through efficient data structures like storing revisions sequentially and maintaining file ordering, as well as rewriting critical parts in C.
This document discusses setting up a network bridge without Docker. It provides a Vagrantfile to configure a virtual machine environment with Ubuntu 18.04, along with tools like Go and Docker installed. Instructions are given to create a bridge between two network namespaces called RED and BLUE using IP addresses in the 11.11.11.0/24 range. Tests show that hosts can ping each other within this network but not across the real interface and IP range of the host machine. Additional routing and IP configuration is needed to allow outside communication.
The document discusses using netlink and netlink families to enable communication between the kernel and user space processes. Netlink allows a more flexible alternative to ioctl calls by providing a socket-based interface for exchanging information. Various netlink families exist for communicating with different kernel modules, including NETLINK_ROUTE for routing functions. The document then discusses using netlink and the arpd tool to dynamically update ARP and bridge forwarding database tables in response to layer 2 and layer 3 miss events. This allows maintaining overlay networks by handling ARP requests between network namespaces.
Make container without_docker_6-overlay-network_1 Sam Kim
분산환경에서 컨테이너 간의 통신은 어떻게 이루어 지는 것일까요? 3,4편에서는 호스트 안에 가상네트워크를 만들어보았습니다. 6편에서는 이를 바탕으로 분산환경에서 호스트 간에 가상 네트워크로 통신이 가능하도록 만들어 봅니다. 이 방법은 실제 쿠버네티스 flannel 등의 CNI에서 사용하고 있는 vxlan 기반의 오버레이 네트워크 구성을 다룹니다.
The document provides examples of how Python is used in different domains such as websites, desktop applications, science, embedded systems, and more. It also discusses why Python is popular due to its readability, ease of learning, rich libraries, and ability to be sped up with tools like Numba and Cython. The document outlines topics for learning Python including primitives, control flow with if/while statements, composites like lists and dictionaries, and for loops. It recommends keeping learning through tutorials, documentation, and communities.
Kernel Recipes 2019 - Faster IO through io_uringAnne Nicolas
io_uring provides a new asynchronous I/O interface in Linux that aims to address limitations with existing interfaces like aio and libaio. It uses a ring-based model for submission and completion queues to efficiently support asynchronous I/O operations with low latency and high throughput. Though initially skeptical, Linus Torvalds ultimately merged io_uring into the Linux kernel due to improvements in missing features, ease of use, and efficiency over alternatives.
This document provides a summary of a presentation on updates to the GemStone Smalltalk environment. It discusses recent releases of GemStone/S including performance improvements, new platform support, and additional features. It also covers an upcoming MagLev Ruby demo, ways to get started with GemStone, current Seaside support, and an overview of the Metacello package management system. The presentation aims to inform attendees about new GemStone capabilities and tools.
We build tribes. We help find, profile and activite your customer base into a tribe so you grow your customers and make more money from each of them. Simply put we help you win friends and influence people.
This document discusses optimizations for TCP/IP networking performance on multicore systems. It describes several inefficiencies in the Linux kernel TCP/IP stack related to shared resources between cores, broken data locality, and per-packet processing overhead. It then introduces mTCP, a user-level TCP/IP stack that addresses these issues through a thread model with pairwise threading, batch packet processing from I/O to applications, and a BSD-like socket API. mTCP achieves a 2.35x performance improvement over the kernel TCP/IP stack on a web server workload.
This document discusses different methods for virtualizing I/O in virtual machines. It covers virtual I/O approaches like virtio, PCI passthrough, and SR-IOV. It also explains the role of the VMM/hypervisor in managing I/O between VMs and physical devices using techniques like VT-d, Open vSwitch, and single root I/O virtualization. Finally, it discusses emerging standards for virtual switching like virtual Ethernet bridging.
The document discusses the performance of three SPEC CPU2006 benchmarks - 483.xalancbmk, 462.libquantum, and 471.omnetpp - under different last-level cache (LLC) configurations and when subjected to LLC cache interference from a background workload. Key findings include reduced performance for the benchmarks when run with a smaller LLC size or when interfered with by a LLC jammer workload, but maintained performance when QoS techniques were applied to isolate the benchmark workload in the LLC.
Rob Pike discusses Plan 9, an operating system developed at Bell Labs as the successor to UNIX. Some key points of Plan 9 include its use of /proc instead of /dev for I/O, its distributed file system design with everything treated as a file, and its emphasis on concurrency through lightweight processes and message passing. Plan 9 aims to improve on UNIX with a more unified and simplified design.
This document provides an overview of the Plan 9 operating system developed at Bell Labs, including:
- Plan 9 was developed starting in the 1980s as a successor to UNIX.
- It uses a distributed kernel architecture with separate processes for file servers, window servers, and other functions.
- Notable features include the 9P protocol for communication between servers, lightweight processes called threads, and a focus on UTF-8 and internationalization.
- Plan 9 software and sources are still maintained and available to use on modern systems through projects like 9vx and Plan 9 from User Space.
The document provides tips and tricks for when things go wrong, including customizing configuration files like .bashrc and .inputrc, debugging with pdb and ipdb, managing Zope processes, accessing Zope as different users, using portal_setup and portal_workflow, reloading code, and helpful Firefox plugins and validators. It also recommends packages like plone.reload and mr.freeze for reloading and freezing code.
Ruby & Machine Vision - Talk at Sheffield Hallam University Feb 2009Jan Wedekind
This talk gives an introduction to the properties of the Ruby language and it presents the basics of the HornetsEye Ruby extension for doing machine vision. The end of the talk points out a few must-see videos and must-read books if you got excited about either Ruby or machine vision or both.
Source Code Management and Version Control Systems are tools for helping you track your file based assets (typically source code). Traditional SCM systems are centralised (CVS, Subversion, Visual Source Safe), Distributed version control systems systems provide new capabilities, work-flows, are becoming mature and are gaining mind share in the open source community.
Git is one of those Distributed Version Control Systems. It was invented by the creator of Linux (Linus Torvalds) for protecting the Linux kernel source code and coordinating the activity of hundreds of developers. This talk discusses what Distributed Version Control is, the history of Git, basic version control features and some very uncommon and amazing capabilities of git. Time permitting it will include live demonstration of the tools.
1. The document discusses Internet Link (IL), a protocol for connecting Plan 9 machines over IP networks like the Internet.
2. IL uses 9P to implement remote file and process access, and can run commands on remote machines using the 'rx' program over TCP/IP.
3. The Tokyo Inferno/Plan 9 Users Group (TIP9UG) meets to discuss Plan 9, and the document provides information on implementing IL in Plan 9 systems and the IL protocol stack.
We build tribes. We help find, profile and activite your customer base into a tribe so you grow your customers and make more money from each of them. Simply put we help you win friends and influence people.
This document discusses optimizations for TCP/IP networking performance on multicore systems. It describes several inefficiencies in the Linux kernel TCP/IP stack related to shared resources between cores, broken data locality, and per-packet processing overhead. It then introduces mTCP, a user-level TCP/IP stack that addresses these issues through a thread model with pairwise threading, batch packet processing from I/O to applications, and a BSD-like socket API. mTCP achieves a 2.35x performance improvement over the kernel TCP/IP stack on a web server workload.
This document discusses different methods for virtualizing I/O in virtual machines. It covers virtual I/O approaches like virtio, PCI passthrough, and SR-IOV. It also explains the role of the VMM/hypervisor in managing I/O between VMs and physical devices using techniques like VT-d, Open vSwitch, and single root I/O virtualization. Finally, it discusses emerging standards for virtual switching like virtual Ethernet bridging.
The document discusses the performance of three SPEC CPU2006 benchmarks - 483.xalancbmk, 462.libquantum, and 471.omnetpp - under different last-level cache (LLC) configurations and when subjected to LLC cache interference from a background workload. Key findings include reduced performance for the benchmarks when run with a smaller LLC size or when interfered with by a LLC jammer workload, but maintained performance when QoS techniques were applied to isolate the benchmark workload in the LLC.
Rob Pike discusses Plan 9, an operating system developed at Bell Labs as the successor to UNIX. Some key points of Plan 9 include its use of /proc instead of /dev for I/O, its distributed file system design with everything treated as a file, and its emphasis on concurrency through lightweight processes and message passing. Plan 9 aims to improve on UNIX with a more unified and simplified design.
This document provides an overview of the Plan 9 operating system developed at Bell Labs, including:
- Plan 9 was developed starting in the 1980s as a successor to UNIX.
- It uses a distributed kernel architecture with separate processes for file servers, window servers, and other functions.
- Notable features include the 9P protocol for communication between servers, lightweight processes called threads, and a focus on UTF-8 and internationalization.
- Plan 9 software and sources are still maintained and available to use on modern systems through projects like 9vx and Plan 9 from User Space.
The document provides tips and tricks for when things go wrong, including customizing configuration files like .bashrc and .inputrc, debugging with pdb and ipdb, managing Zope processes, accessing Zope as different users, using portal_setup and portal_workflow, reloading code, and helpful Firefox plugins and validators. It also recommends packages like plone.reload and mr.freeze for reloading and freezing code.
Ruby & Machine Vision - Talk at Sheffield Hallam University Feb 2009Jan Wedekind
This talk gives an introduction to the properties of the Ruby language and it presents the basics of the HornetsEye Ruby extension for doing machine vision. The end of the talk points out a few must-see videos and must-read books if you got excited about either Ruby or machine vision or both.
Source Code Management and Version Control Systems are tools for helping you track your file based assets (typically source code). Traditional SCM systems are centralised (CVS, Subversion, Visual Source Safe), Distributed version control systems systems provide new capabilities, work-flows, are becoming mature and are gaining mind share in the open source community.
Git is one of those Distributed Version Control Systems. It was invented by the creator of Linux (Linus Torvalds) for protecting the Linux kernel source code and coordinating the activity of hundreds of developers. This talk discusses what Distributed Version Control is, the history of Git, basic version control features and some very uncommon and amazing capabilities of git. Time permitting it will include live demonstration of the tools.
1. The document discusses Internet Link (IL), a protocol for connecting Plan 9 machines over IP networks like the Internet.
2. IL uses 9P to implement remote file and process access, and can run commands on remote machines using the 'rx' program over TCP/IP.
3. The Tokyo Inferno/Plan 9 Users Group (TIP9UG) meets to discuss Plan 9, and the document provides information on implementing IL in Plan 9 systems and the IL protocol stack.
How OpenNTF Open Source Solutions Can Save You Time, Money And Your HairBruce Elgort
The document describes a presentation given by Bruce Elgort on how OpenNTF open source solutions can save time and money. The presentation covers what OpenNTF is, why use open source software, an overview of the OpenNTF site and applications like OpenLog, and how to get started on your own open source project. OpenLog is highlighted as a tool that can help log and track errors in applications to assist with compliance audits and troubleshooting.
Followup Session in Asia-Pacific Geant4 Workshop and Training Course 2009 hel...Go Iwai
The document discusses a follow up session on December 11, 2009 at the Asia-Pacific Geant4 Workshop and Training Course 2009 in Tsukuba, Japan, where the trainer Go Iwai will answer individual questions from participants, discuss common questions from the previous training session, and encourage knowledge sharing among participants and colleagues.
Ken Thompson and Dennis Ritchie created Unix in 1969 while working on the Multics project at Bell Labs. They developed it as a smaller and simpler alternative to Multics. Key developments included writing the kernel in C, making it portable across hardware, and releasing the source code, which led to various flavors of Unix spreading to universities and companies. Important early Unix creators and contributors included Brian Kernighan, Ken Thompson, Dennis Ritchie, Steve Bourne, and Bill Joy. Key features of Unix included being multi-user, multi-tasking, its portable kernel and modular tools approach.
This document discusses Python and FreeBSD. It begins with an introduction to FreeBSD, highlighting some of the companies and websites that use it. It then discusses the python@FreeBSD mailing list and resources for using Python on FreeBSD, including installing Python via ports or packages. The document provides guidance on running Python applications and developing Python projects on FreeBSD using tools like virtualenv, ZFS, and jails. It also covers creating Python ports and submitting them to be included in the FreeBSD ports collection.
Filip palian mateuszkocielski. simplest ownage human observed… routersYury Chemerkin
This document discusses identifying and exploiting vulnerabilities in consumer routers. It provides examples of analyzing firmware from various router models, including the (--E)-LINK DIR-120 and DIR-300, to gain unauthorized access. Methods discussed include reverse engineering firmware, exploiting services like telnet that are exposed without authentication, and modifying the read-only filesystem. The document also talks about using these compromised routers as bots for botnets performing activities like DDoS attacks, cryptocurrency mining, and spam/phishing campaigns. It provides examples of real botnets like Psyb0t that have exploited routers.
This document discusses setting up Plan 9 from Bell Labs as a virtual machine on Mac OS X 10.6.2 using VMWare Fusion 3.0.2. It provides steps for configuring the filesystem, installing Plan 9 in a virtual disk, and basic commands for configuring networking and using the Acme text editor within the Plan 9 virtual machine.
Droid-FF is an Android fuzzing framework that aims to automate the fuzzing process on mobile devices like Android. It generates test input data using techniques like bit flipping, integrates with other fuzzers like Peach and Pyzuff, implements custom crash logging and triaging. It can identify exploitable crashes using a GDB plugin, map crashes to source code locations, and has been used to find many crashes, helping to improve Android security. The tool is open source and customizable to make fuzzing easier and more accessible.
The reports of Perl's death have been greatly exaggeratedDominique Dumont
Despite the rumors, Perl is still alive and progressing well. This slide set provides a quick overview of Perl's strong points: its modern usage, its versatility and its community.
This was presented during a human talks session in Grenoble, France
Configuration surgery with Augeas (OggCamp 12)Dominic Cleal
Lightning talk for an intro to Augeas at OggCamp 12. Briefly explains the library, examples of what it can do and where it's used. Based on a presentation by Raphaël Pinson (search for RMLL 2012).
Performing quantitative software analytics studies can be an immensely rewarding activity for scientists performing empirical research. However, such studies often pose numerous engineering challenges. The researcher must hunt down appropriate data sets, devise bespoke collection and processing tools, and optimise performance to match the size of the collected data. I will discuss principles and strategies that can be used to deal with these problems, and present examples of associated tools and techniques. Some particularly effective strategies associated with data set construction involve recursion, web searching, synthesis, probing, instrumentation, and the nurturing of alliances. On the processing front approaches include the opportunistic scavenging of tool front-ends, the exploratory development of pipelines, as well as the exploitation of tool interoperability, scripting languages, and their rich libraries. The required performance can be obtained through parallelism, stream processing, the judicious use of low-level facilities, and the choice of appropriate samples. I will finish the presentation with an overview of open problems and challenges in software analytics in vertical domains, data analysis, and under-represented stakeholders.
The document discusses different eras of software deployment:
1. The shared hosting era involved editing files, uploading, and refreshing the browser frequently with many issues.
2. The dedicated server era used Linux distros like Debian and involved more command line work like sudo and vim but still had restart issues.
3. The cloud era saw the rise of tools like Capistrano, Vlad, and Mina to automate deploys but still had restart problems.
4. Every era had issues with daemons not running, crashes, and bugs after restarts due to a lack of process supervision. Runit and systemd help address this by making applications into supervised services.
The document discusses different eras of software deployment:
1. The shared hosting era involved editing files, uploading, and refreshing the browser frequently with many issues.
2. The dedicated server era used Linux distros like Debian and involved more command line work like sudo and vim but still had restart issues.
3. The cloud era saw the rise of tools like Capistrano, Vlad, and Mina to automate deployments but restarts were still an issue.
4. No matter the era, issues with daemons not persisting through restarts and bugs were common. Solutions like init scripts, Passenger, and systemd helped but Runit provides even better service supervision and restart capabilities when
1) The document explores a new concept called error permissive computing that improves computing capabilities and reduces power consumption by allowing and managing hardware errors through system software instead of eliminating errors through general purpose hardware error correction.
2) It describes several approaches for implementing error permissive computing including a software framework called BITFLEX that enables approximate computing, an FPGA-based memory emulator for evaluating new system software mechanisms, and techniques for sparse and topology-aware communication that can accelerate large-scale deep learning and reduce communication costs.
3) The goal is to take a holistic approach across hardware and software layers to perform lightweight error correction at the software level while eliminating general purpose error correction in hardware for improved efficiency.
Opportunities of ML-based data analytics in ABCIRyousei Takano
This document discusses opportunities for using machine learning-based data analytics on the ABCI supercomputer system. It summarizes:
1) An introduction to the ABCI system and how it is being used for AI research.
2) How sensor data from the ABCI system and job logs could be analyzed using machine learning to optimize data center operation and improve resource utilization and scheduling.
3) Two potential use cases - using workload prediction to enable more efficient cooling system control, and applying machine learning to better predict job execution times to improve scheduling.
ABCI: An Open Innovation Platform for Advancing AI Research and DeploymentRyousei Takano
AI Infrastructure for Everyone (Democratization AI) aims to build an AI infrastructure platform that is accessible to everyone from beginners to experts. The platform provides up to 512-node computing resources, ready-to-use software, datasets, and pre-trained models. It also offers services like an easy-to-use web-based IDE for beginners and an AI cloud with on-demand, reserved, and batch processing options. The goal is to accelerate AI research and promote social implementation of AI technologies.
The document summarizes four presentations from the USENIX NSDI 2016 conference session on resource sharing:
1. "Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics" proposes a framework that uses results from small training jobs to efficiently predict performance of data analytics workloads in cloud environments and reduce the number of required training jobs.
2. "Cliffhanger: Scaling Performance Cliffs in Web Memory Caches" presents algorithms to dynamically allocate memory across queues in Memcached to smooth out performance cliffs and potentially save memory usage.
3. "FairRide: Near-Optimal, Fair Cache Sharing" introduces a caching policy that provides isolation guarantees, prevents strategic behavior, and
Flow-centric Computing - A Datacenter Architecture in the Post Moore EraRyousei Takano
1) The document proposes a new "flow-centric computing" data center architecture for the post-Moore era that focuses on data flows.
2) It involves disaggregating server components and reassembling them as "slices" consisting of task-specific processors and storage connected by an optical network to efficiently process data.
3) The authors expect optical networks to enable high-speed communication between processors, replacing general CPUs, and to potentially revolutionize how data is processed in future data centers.
A Look Inside Google’s Data Center NetworksRyousei Takano
1) Google has been developing their own data center network architectures using merchant silicon switches and centralized network control since 2005 to keep up with increasing bandwidth demands.
2) Their network designs have evolved from Firehose and Watchtower to the current Saturn and Jupiter networks, increasing port speeds from 1/10Gbps to 40/100Gbps and aggregate bandwidth from terabits to petabits per second.
3) Their network architectures employ Clos topologies with merchant silicon switches at the top-of-rack, aggregation, and spine layers and centralized control of traffic routing.
- Hardware such as DRAM and NAND flash are facing scaling challenges as density increases, which could impact performance and cost. New non-volatile memory (NVM) technologies may provide opportunities to address these challenges but require software and system architecture changes to realize their full potential. Key considerations include persistence, performance, and programming models.
AIST Super Green Cloud: lessons learned from the operation and the performanc...Ryousei Takano
This document discusses lessons learned from operating the AIST Super Green Cloud (ASGC), a fully virtualized high-performance computing (HPC) cloud system. It summarizes key findings from the first six months of operation, including performance evaluations of SR-IOV virtualization and HPC applications. It also outlines conclusions and future work, such as improving data movement efficiency across hybrid cloud environments.
The document summarizes the author's participation report at the IEEE CloudCom 2014 conference. Some key points include:
- The author attended sessions on virtualization and HPC on cloud.
- Presentations had a strong academic focus and many presenters were Asian.
- Eight papers on HPC on cloud covered topics like reliability, energy efficiency, performance metrics, and applications like Monte Carlo simulations.
Exploring the Performance Impact of Virtualization on an HPC CloudRyousei Takano
The document evaluates the performance impact of virtualization on high-performance computing (HPC) clouds. Experiments were conducted on the AIST Super Green Cloud, a 155-node HPC cluster. Benchmark results show that while PCI passthrough mitigates I/O overhead, virtualization still incurs performance penalties for MPI collectives as node counts increase. Application benchmarks demonstrate overhead is limited to around 5%. The study concludes HPC clouds are promising due to utilization improvements from virtualization, but further optimization of virtual machine placement and pass-through technologies could help reduce overhead.
From Rack scale computers to Warehouse scale computersRyousei Takano
This document discusses the transition from rack-scale computers to warehouse-scale computers through the disaggregation of technologies. It provides examples of rack-scale architectures like Open Compute Project and Intel Rack Scale Architecture. For warehouse-scale computers, it examines HP's The Machine project using application-specific cores, universal memory, and photonics fabric. It also outlines UC Berkeley's FireBox project utilizing 1 terabit/sec optical fibers, many-core systems-on-chip, and non-volatile memory modules connected via high-radix photonic switches.
高性能かつスケールアウト可能なHPCクラウド AIST Super Green CloudRyousei Takano
The document contains configuration instructions for creating a cluster in a cloud computing environment called myCluster. It specifies creating a frontend node and 16 compute nodes using specified templates, compute and disk offerings. It also defines the cluster name, zone, network, and SSH key to use. The cluster can then be started and later destroyed along with a configuration file.
Iris: Inter-cloud Resource Integration System for Elastic Cloud Data CenterRyousei Takano
The document describes Iris, an inter-cloud resource integration system that enables elastic cloud data centers. Iris uses nested virtualization technologies including nested KVM to construct a virtual infrastructure spanning multiple distributed data centers. It provides a new Hardware as a Service (HaaS) model for inter-cloud federation at the infrastructure provider level. The authors demonstrate Apache CloudStack can seamlessly manage resources across emulated inter-cloud environments using Iris.
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...Ryousei Takano
This document describes a scalable and distributed electrical power monitoring system using cloud computing. Low-cost power measuring units collect data from current sensors and send it to data collecting units. These units then push the data to a data store hosted on Google App Engine. This cloud-based system allows visualization of power consumption across a large campus from any application accessing the data through a REST API. The system is scalable, low-cost, and easy to develop applications for power monitoring and planning energy savings.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
17. BSD
Plan 9 BSD socket
dial active open fd
socket
announce passive open fd
dial connect active open
- bind
announce listen
listen/accept accept
reject close
- shutdown
Thursday, November 5, 2009