A presentation on how and why to engage upstream projects productively, and ensure that work is accepted upstream first.
Originally delivered at Linux Foundation Collaboration Summit 2015 in Santa Rosa.
his workshop will shed light on a modern solution to solve application portability, building, delivery, packaging, and system dependency issues. Containers especially Docker have seen accelerated adoption in the web, cloud and recently the enterprise. HPC environments are seeing something similar to the introduction of HPC containers Singularity and Shifter. They provide a good use case for solving software portability, not to mention ensure repeatability of results. Not to mention their ECO system provides for the better development, delivery, testing workflows that were alien to most of HPC environments. This workshop will cover the Theory and hands-on of containers and Its ecosystem. Introducing Docker and singularity containers; Docker as a general-purpose container for almost any app, Singularity as the particular container technology for HPC. The workshop will go over the foundations of the containers platform, including an overview of the platform system components: images, containers, repositories, clustering, and orchestration. The strategy is to demonstrate through "live demo, and hands-on exercises." The reuse case of containers in building a portable distributed application cluster running a variety of workloads including HPC workload.
The lessons I learned is that Open source quickly becomes the natural choice wherever commoditization is happening in the software stack. Thus we expect business-to-business open source, which is already a significant trend in recent history, to become an increasingly common form of open source collaboration. Companies who understand the ground rules of business-to-business open source will be better positioned to identify and take advantage of open source opportunities in the competitive spaces that they share with other companies.
So I will share why open strategy is import for the enterprise. And how to do contributions for the open source projects n today’s topic.
http://walidshaari.blogspot.com/2016/12/devops-and-traditional-hpc.html
Cloud, Web, Big Data operations and DevOps mindsets are changing the Internet, IT and Enterprise services and applications scene rapidly. What can HPC community learn from these technologies, processes, and culture? From the IT unicorns "Google, Facebook, Twitter, Linkedin, and Etsy" that are in the lead? What could be applied to tackle HPC operations challenges? The problem of efficiency, better use of resources? A use case of automation and version control system in HPC enterprise data centre, as well a proposal for utilising containers and new schedulers to drive better utilizations and diversify the data centre workloads, not just HPC but big data, interactive, batch, short and long-lived scientific jobs.
Docker "Global Mentor Week" is your opportunity to #learndocker. to learn how to build, ship, and run modern distributed applications with ease. thanks to the Docker platform.
Right now, Docker has developed out a series of self-paced online labs that will be available during the meetup. Docker’s meetup groups worldwide are hosting a series of complimentary events to help newcomers and intermediate users learn Docker.
We'll have hands-on labs for both beginners and intermediate users, labs targeting both developers and operations. There is something for everyone. Docker mentor will be on hand at this event to help you prepare. and work through the self-paced materials. Bring your laptop, have fun and learn Docker!
Talk from 05 June 2014 NYLUG meeting at Bloomberg NYC. Short history of where Ceph came from, an architectural overview, and the current state of the community.
his workshop will shed light on a modern solution to solve application portability, building, delivery, packaging, and system dependency issues. Containers especially Docker have seen accelerated adoption in the web, cloud and recently the enterprise. HPC environments are seeing something similar to the introduction of HPC containers Singularity and Shifter. They provide a good use case for solving software portability, not to mention ensure repeatability of results. Not to mention their ECO system provides for the better development, delivery, testing workflows that were alien to most of HPC environments. This workshop will cover the Theory and hands-on of containers and Its ecosystem. Introducing Docker and singularity containers; Docker as a general-purpose container for almost any app, Singularity as the particular container technology for HPC. The workshop will go over the foundations of the containers platform, including an overview of the platform system components: images, containers, repositories, clustering, and orchestration. The strategy is to demonstrate through "live demo, and hands-on exercises." The reuse case of containers in building a portable distributed application cluster running a variety of workloads including HPC workload.
The lessons I learned is that Open source quickly becomes the natural choice wherever commoditization is happening in the software stack. Thus we expect business-to-business open source, which is already a significant trend in recent history, to become an increasingly common form of open source collaboration. Companies who understand the ground rules of business-to-business open source will be better positioned to identify and take advantage of open source opportunities in the competitive spaces that they share with other companies.
So I will share why open strategy is import for the enterprise. And how to do contributions for the open source projects n today’s topic.
http://walidshaari.blogspot.com/2016/12/devops-and-traditional-hpc.html
Cloud, Web, Big Data operations and DevOps mindsets are changing the Internet, IT and Enterprise services and applications scene rapidly. What can HPC community learn from these technologies, processes, and culture? From the IT unicorns "Google, Facebook, Twitter, Linkedin, and Etsy" that are in the lead? What could be applied to tackle HPC operations challenges? The problem of efficiency, better use of resources? A use case of automation and version control system in HPC enterprise data centre, as well a proposal for utilising containers and new schedulers to drive better utilizations and diversify the data centre workloads, not just HPC but big data, interactive, batch, short and long-lived scientific jobs.
Docker "Global Mentor Week" is your opportunity to #learndocker. to learn how to build, ship, and run modern distributed applications with ease. thanks to the Docker platform.
Right now, Docker has developed out a series of self-paced online labs that will be available during the meetup. Docker’s meetup groups worldwide are hosting a series of complimentary events to help newcomers and intermediate users learn Docker.
We'll have hands-on labs for both beginners and intermediate users, labs targeting both developers and operations. There is something for everyone. Docker mentor will be on hand at this event to help you prepare. and work through the self-paced materials. Bring your laptop, have fun and learn Docker!
Talk from 05 June 2014 NYLUG meeting at Bloomberg NYC. Short history of where Ceph came from, an architectural overview, and the current state of the community.
Ceph, Open Source, and the Path to Ubiquity in Storage - AACS Meetup 2014Patrick McGarry
Everyone needs storage, but Open Source is changing how we think about storage infrastructure through new features, added durability, and reduced cost. New storage solutions like Ceph are providing distributed, flexible, powerful options that can support a myriad of use cases across object, block, and file system applications. This talk will explore the history and basics of Ceph, the current status of the community, and where the project is headed in the near future.
С переходом на новую версию интернет-протокола (IPv6) изменились и правила игры «Сетевая разведка»: использовать метод перебора адресов, как в случае с IPv4, не представляется возможным, так как на каждую подсеть приходится 264 адреса. На мастер-классе вы узнаете о новейших технологиях в области исследования сетей IPv6, описанных в RFC 7707. Вашему вниманию будет представлен интенсивный мастер-класс, посвященный отработке методов исследования и взлома сетей IPv6.
OpenDaylight: an open source SDN for your OpenStack cloudAnees Shaikh
Presented at the 2013 OpenStack Summit in Hong Kong.
Authors: Stephan Baucke, Kyle Mestery, Anees Shaikh, Chris Wright
OpenDaylight is an exciting new community-led, open source project focused on accelerating adoption of software-defined networking (SDN) by providing a robust SDN platform on which the industry can build and innovate. An OpenDaylight controller provides flexible management of both physical and virtual networks. The open source nature of the project and its flexible network management capabilities make it an ideal SDN platform to integrate with Neutron.
In this session, OpenDaylight community members from Cisco, IBM, RedHat, and Ericsson will describe the OpenDaylight project goals and platform architecture, as well as the roadmap and progress to date. OpenDaylight brings together a number of virtual networking approaches, and we will discuss integration approaches with OpenStack Neutron that provide flexibility for OpenStack administrators and users. Details of our initial Neutron integration will also be demonstrated for attendees.
Attendees will leave this session with a greater understanding of what OpenDaylight is, and how it can integrate with OpenStack Neutron to provide a powerful SDN-based networking solution for OpenStack Clouds.
NetBox as the Source of Truth for Cisco NSO ConfigurationsHank Preston
NetBox “knows” how the network is supposed to be configured, and Cisco NSO can ensure that configuration is actually applied. In this talk we’ll look at an example of how this can be done, and is used in production to manage the DevNet Sandbox Network.
In DevNet Sandbox we are on a journey to adopt NetDevOps design and operational principals throughout our platform. And “journey” is the right word. Like many of you, we have to balance the innovation and modernization of the approach with day to day “keep the lights on” activities and priority projects. But one of the first things we tackled was to adopt NetBox as our Source of Truth. We knew this was critical to being able to move forward in any meaningful way.
As part of making NetBox the Source of Truth, we knew we needed to drive the network configurations pushed out to the network from NetBox directly, having a second “Source of Truth” maintained in our configuration management tool, was counter to the goals of our project. Our network configuration management tool is Cisco NSO, and it has a “Configuration Database” or CDB that could be seen as a “Source of Truth” as well. What we worked on was a way to populate the relevant parts of the CDB from NetBox.
This talk will share how we approached this challenge and how we leverage the magic of Python to bring them together. And the work isn’t done yet or perfect. A few thoughts about areas we need to improve and how we plan to move forward will also be discussed.
How to be a Network Engineer in a Programmable AgeHank Preston
'Software Defined Network', 'Infrastructure as Code', 'Cloud', and 'Programmability' are trends that have already changed the nature of being a Network Engineer. That's yesterday's news... today we have 'NetDevOps', 'Network Reliability Engineering (NRE)', and whatever comes tomorrow. In this session we will explore the evolution of networking, the network engineer, and network operations. We'll look back fondly on the early days of networking, when it was simple. The biggest concerns we had were the number of Spanning-Tree instances to run and which side of the OSPF vs EIGRP debate we were on that day. We'll consider the impact Cloud, Open Source, DevOps, Python, and we can't forget 'SD-Everything' that the Network Renaissance has brought us. We'll dive into the challenges and opportunities that NetDevOps offers as we adopt the culture, technical methods, strategies, and best practices from DevOps.
You'll laugh, you'll groan, you might even get angry, but that's okay. Come join the evolution of the Network Engineer with open eyes and learn how to jumpstart your own transformation - Become the NetDevOps Engineer!
DevOps Live Meetup- NetDevOps session with Jay Shah (IEEE Published Paper)JAY SHAH
NetDevOps: A New Era Towards Networking and DevOps
1) The Presentation Slide-Deck is associated with a recorded video session on NetDevOps which was hosted on DevOps Live Youtube Channel (Youtube Link:-https://youtu.be/46-wTbBh5vE)
2) Refer Knowledge Base on IEEE Explore Digital Library (Website Link:-https://ieeexplore.ieee.org/document/8992969)
Kubernetes and lastminute.com: our course towards better scalability and proc...Michele Orsi
Kubernetes adoption is straight forward when starting from scratch or in public clouds, but what the journey looks like when your starting point is a legacy infrastructure with high-traffic?
In this talk we present our experience that begun almost 1 year ago and challenged everything inside our organisation. Developer teams changed the way they work, product owners benefit from the new speed achieved and the need of new roles emerged in IT department.
We will explain our lessons learnt and the way to get the best out of this solution.
This talk provides a 2017 updated view on SDN and the broader Network Softwarization trend (e.g., + NFV, P4) aiming and trying to provide a clarifying view on the evolving SDN definitions (beyond a purist view) by explaining the main characteristics of SDN embodiments in 2017+
Learn how and why John McDonough contributes to Ansible and how you can too. We’ll arm you with what you need to know, things like Python, Git, and YAML.
Securing the Software Supply Chain with TUF and Docker - Justin Cappos and Sa...Docker, Inc.
If you want to compromise millions of machines and users, software distribution and software updates are an excellent attack vector. Using public cryptography to sign your packages is a good starting point, but as we will see, it still leaves you open to a variety of attacks. This is why we designed TUF, a secure software update framework. TUF helps to handle key revocation securely, limits the impact a man-in-the-middle attacker may have, and reduces the impact of repository compromise. We will discuss TUF's protections and integration into Docker's Notary software, and demonstrate new techniques that could be added to verify other parts of the software supply chain, including the development, build, and quality assurance processes.
Situational awareness is vital in any situation. If you are unaware of an issue, then you are in a poor position to fix it. However, there is a natural human response to the publication of metrics, which is to optimise for what is measured. Here are some cautionary tales of how performance metrics inadvertently created incentives for behaviour that was bad for the system.
The Ecclesiastes principle: Learning lessons of the pastDave Neary
We in the technology world often feel that what we're doing is *so* new, we don't have anything to learn from those who went before. And yet, wherever we look, we catch glimpses of wisdom learned in the past which can be applied to open source software development. Dave presents examples from three areas: city planning, architecture and diplomacy, and shows how they apply to the open source world.
Ceph, Open Source, and the Path to Ubiquity in Storage - AACS Meetup 2014Patrick McGarry
Everyone needs storage, but Open Source is changing how we think about storage infrastructure through new features, added durability, and reduced cost. New storage solutions like Ceph are providing distributed, flexible, powerful options that can support a myriad of use cases across object, block, and file system applications. This talk will explore the history and basics of Ceph, the current status of the community, and where the project is headed in the near future.
С переходом на новую версию интернет-протокола (IPv6) изменились и правила игры «Сетевая разведка»: использовать метод перебора адресов, как в случае с IPv4, не представляется возможным, так как на каждую подсеть приходится 264 адреса. На мастер-классе вы узнаете о новейших технологиях в области исследования сетей IPv6, описанных в RFC 7707. Вашему вниманию будет представлен интенсивный мастер-класс, посвященный отработке методов исследования и взлома сетей IPv6.
OpenDaylight: an open source SDN for your OpenStack cloudAnees Shaikh
Presented at the 2013 OpenStack Summit in Hong Kong.
Authors: Stephan Baucke, Kyle Mestery, Anees Shaikh, Chris Wright
OpenDaylight is an exciting new community-led, open source project focused on accelerating adoption of software-defined networking (SDN) by providing a robust SDN platform on which the industry can build and innovate. An OpenDaylight controller provides flexible management of both physical and virtual networks. The open source nature of the project and its flexible network management capabilities make it an ideal SDN platform to integrate with Neutron.
In this session, OpenDaylight community members from Cisco, IBM, RedHat, and Ericsson will describe the OpenDaylight project goals and platform architecture, as well as the roadmap and progress to date. OpenDaylight brings together a number of virtual networking approaches, and we will discuss integration approaches with OpenStack Neutron that provide flexibility for OpenStack administrators and users. Details of our initial Neutron integration will also be demonstrated for attendees.
Attendees will leave this session with a greater understanding of what OpenDaylight is, and how it can integrate with OpenStack Neutron to provide a powerful SDN-based networking solution for OpenStack Clouds.
NetBox as the Source of Truth for Cisco NSO ConfigurationsHank Preston
NetBox “knows” how the network is supposed to be configured, and Cisco NSO can ensure that configuration is actually applied. In this talk we’ll look at an example of how this can be done, and is used in production to manage the DevNet Sandbox Network.
In DevNet Sandbox we are on a journey to adopt NetDevOps design and operational principals throughout our platform. And “journey” is the right word. Like many of you, we have to balance the innovation and modernization of the approach with day to day “keep the lights on” activities and priority projects. But one of the first things we tackled was to adopt NetBox as our Source of Truth. We knew this was critical to being able to move forward in any meaningful way.
As part of making NetBox the Source of Truth, we knew we needed to drive the network configurations pushed out to the network from NetBox directly, having a second “Source of Truth” maintained in our configuration management tool, was counter to the goals of our project. Our network configuration management tool is Cisco NSO, and it has a “Configuration Database” or CDB that could be seen as a “Source of Truth” as well. What we worked on was a way to populate the relevant parts of the CDB from NetBox.
This talk will share how we approached this challenge and how we leverage the magic of Python to bring them together. And the work isn’t done yet or perfect. A few thoughts about areas we need to improve and how we plan to move forward will also be discussed.
How to be a Network Engineer in a Programmable AgeHank Preston
'Software Defined Network', 'Infrastructure as Code', 'Cloud', and 'Programmability' are trends that have already changed the nature of being a Network Engineer. That's yesterday's news... today we have 'NetDevOps', 'Network Reliability Engineering (NRE)', and whatever comes tomorrow. In this session we will explore the evolution of networking, the network engineer, and network operations. We'll look back fondly on the early days of networking, when it was simple. The biggest concerns we had were the number of Spanning-Tree instances to run and which side of the OSPF vs EIGRP debate we were on that day. We'll consider the impact Cloud, Open Source, DevOps, Python, and we can't forget 'SD-Everything' that the Network Renaissance has brought us. We'll dive into the challenges and opportunities that NetDevOps offers as we adopt the culture, technical methods, strategies, and best practices from DevOps.
You'll laugh, you'll groan, you might even get angry, but that's okay. Come join the evolution of the Network Engineer with open eyes and learn how to jumpstart your own transformation - Become the NetDevOps Engineer!
DevOps Live Meetup- NetDevOps session with Jay Shah (IEEE Published Paper)JAY SHAH
NetDevOps: A New Era Towards Networking and DevOps
1) The Presentation Slide-Deck is associated with a recorded video session on NetDevOps which was hosted on DevOps Live Youtube Channel (Youtube Link:-https://youtu.be/46-wTbBh5vE)
2) Refer Knowledge Base on IEEE Explore Digital Library (Website Link:-https://ieeexplore.ieee.org/document/8992969)
Kubernetes and lastminute.com: our course towards better scalability and proc...Michele Orsi
Kubernetes adoption is straight forward when starting from scratch or in public clouds, but what the journey looks like when your starting point is a legacy infrastructure with high-traffic?
In this talk we present our experience that begun almost 1 year ago and challenged everything inside our organisation. Developer teams changed the way they work, product owners benefit from the new speed achieved and the need of new roles emerged in IT department.
We will explain our lessons learnt and the way to get the best out of this solution.
This talk provides a 2017 updated view on SDN and the broader Network Softwarization trend (e.g., + NFV, P4) aiming and trying to provide a clarifying view on the evolving SDN definitions (beyond a purist view) by explaining the main characteristics of SDN embodiments in 2017+
Learn how and why John McDonough contributes to Ansible and how you can too. We’ll arm you with what you need to know, things like Python, Git, and YAML.
Securing the Software Supply Chain with TUF and Docker - Justin Cappos and Sa...Docker, Inc.
If you want to compromise millions of machines and users, software distribution and software updates are an excellent attack vector. Using public cryptography to sign your packages is a good starting point, but as we will see, it still leaves you open to a variety of attacks. This is why we designed TUF, a secure software update framework. TUF helps to handle key revocation securely, limits the impact a man-in-the-middle attacker may have, and reduces the impact of repository compromise. We will discuss TUF's protections and integration into Docker's Notary software, and demonstrate new techniques that could be added to verify other parts of the software supply chain, including the development, build, and quality assurance processes.
Situational awareness is vital in any situation. If you are unaware of an issue, then you are in a poor position to fix it. However, there is a natural human response to the publication of metrics, which is to optimise for what is measured. Here are some cautionary tales of how performance metrics inadvertently created incentives for behaviour that was bad for the system.
The Ecclesiastes principle: Learning lessons of the pastDave Neary
We in the technology world often feel that what we're doing is *so* new, we don't have anything to learn from those who went before. And yet, wherever we look, we catch glimpses of wisdom learned in the past which can be applied to open source software development. Dave presents examples from three areas: city planning, architecture and diplomacy, and shows how they apply to the open source world.
Growing the next generation of Open Source developersDave Neary
We are living in an era when the "digital generation" knows how to use computers, but knows less and less about how to make technology. As the world moves to open source, and people's interaction with computers is dominated by embedded devices, ubiquitous computing, mobile devices and cloud, the typical computer user now has no real ability to change his computing environment in a meaningful way.
As a parent, I want to teach my kids control over their environment, and pass on to them the values of the free software and maker movements: curiosity, a desire to learn how things work and share knowledge, and above all, that we are the masters of our own destiny.
This presentation shares some of the things which we have done in our family to rear our children in the free and open source ethos.
Personas were made famous by Alan Moore in "The Inmates are Running the Asylum", a seminal book on user interface design for computer programmers. They have been used for decades in the marketing industry to help target specific market segments with ads and products. Personas help you frame feature discussions while developing your software, guide your communication and conference strategy, and ultimately help you to have a more popular, better project.
This presentation will cover the basics of:
* What is a persona?
* How do I come up with one (or several) for my project?
* What can I do with them?
Passing on the core values of the free software and maker culture is important to me - sharing is good, you have control over your physical and computing environment, and you can do great things with whatever tools and materials you have on hand.
Through hackable living space, creative toys, teaching my kids how to use tools and get comfortable with electronics, I hope I'm passing on those values.
Sometimes good intentions can lead to unintentional results. This was a presentation to the OPNFV Community on identifying and mitigating some community anti-patterns.
OpenShift is a Platform as a Service. It's straightforward to deploy it on top of the Infrastructure as a Service platform OpenStack using Heat templates, in a way which allows it to grow as more resources are required.
This presentation gives an overview of what OpenShift gives to developers, and how to deploy it on top of OpenStack.
A complete Open Source cloud: Storage, Virt, IaaS, PaaSDave Neary
You can do everything in your datacenter with open source these days. With GlusterFS, oVirt, OpenStack, OpenShift, all running on CentOS or Fedora and orchestrated with the Foreman, you can run a complete open source cloud where all the pieces talk to each other and leverage integration points for no money.
What is NFV? How does it relate to SDN, what does it mean for the telecommunications industry, and why should anyone outside of that industry care?
Presentation delivered at CloudOpen Europe, Düsseldorf, October 2014
OpenStack personas - an early draft proposal for personas to target (or not) & refine for the OpenStack project. Personas document: http://bit.ly/OpenStackPersonas
Legal policies can have unintended collateral effects on the growth and adoption of community open source projects. This was presented to the Legal DevRoom during FOSDEM 2016
oVirt and OpenStack look kind of similar from a distance. But they cater to different use-cases. That said, they do have some common needs. How can they work together? And when is it better to use one over the other?
Une présentation rapide des principes de base de Git - l'idée n'était pas de montrer le syntax des commandes, mais plutôt d'éclaircir les grandes lignes de Git, pour perrmettre à des gens de le prendre en charge dans le cadre d'un travail collaboratif.
How docker change organization of development and ops teams
What is the point for developers when it comes to interactions with underlying system and application dependencies
Lessons learnt by @EnaleanTeam on mytuleap.com experience
DevOps represents cultural change. Whether it’s the change of resistant engineers that don’t want to be on-call or the change of Operations teams to have more empathy towards their counterparts writing code, to the willingness of executives to embrace a culture of automation, measurement and sharing. Organizations must overcome the culture war to be able to approach the agility and productivity that organizations following a DevOps model gain. The faster they can get there, the faster these organizations can take the competitive edge away from traditional enterprises.
The is the keynote presentation at the DevOps/vDay conference in Budapest on November 27, 2014. There was a nice crowd (300-400) and the presentation was well received with lots of good questions at the end.
DSC UTeM DevOps Session#1: Intro to DevOps Presentation SlidesDSC UTeM
DevOps has been such a buzzword in the IT field nowadays. If you look into job postings, you might be surprised to find terms like "work with DevOps team", "work in an agile team" etc.
What is DevOps? What is agile? And why all these? 樂
Join us on 24 May 2021, where we have a short session to explore on the events that led to the trend nowadays
We will be exploring on the current trends, tech stacks and the existence of DevOps itself! 朗
Mark this date on your calendar and we'll see you there!
* Note: This is an introductory "brief overview" session that gives you context on our upcoming events.
Slides by KwongTN.
For the full video of this presentation, please visit:
https://www.edge-ai-vision.com/2020/03/opencv-past-present-and-future-a-presentation-from-opencv-org/
For more information about edge AI and vision, please visit:
http://www.edge-ai-vision.com
Gary Bradski, the President and CEO of OpenCV.org, delivers the presentation “OpenCV: Past, Present and Future” at the Edge AI and Vision Alliance’s March 2020 Vision Industry and Technology Forum. Bradski shares the latest developments in the OpenCV open source library for computer vision and deep learning applications, as well as where OpenCV is heading.
The slides from the December 2012 Cloud Camp Chicago. The slides include slides from our speakers: Dave Falck, Model Metrics: node.js on AWS; Paul Mantz, CohesiveFT: Working with APIs; Bob Chojnacki, Jellyvision Labs: Hadoop on AWS; Karl Zimmerman, Steadfast: Keep control with the Private Cloud
Theme: "Do you speak cloud? How old roles fit in with the new cloud."
CloudCamp is an unconference where early adopters of Cloud Computing technologies exchange ideas. Come share your cloud experiences, challenges and solutions. At CloudCamp, attendees are encouraged to share thoughts in open discussions and short talks. End users, IT professionals and vendors are all encouraged to come!
Dave Falck, Model Metrics: node.js on AWS
Paul Mantz, CohesiveFT: Working with APIs
Bob Chojnacki, Jellyvision Labs: Hadoop on AWS
Karl Zimmerman, Steadfast: Keep control with the Private Cloud
By,
Krishna Kumar
This very brief talk gives you an overview of how you can contribute to CNCF (Cloud Native Computing Foundation) not just through the code.
How to contribute to cloud native computing foundation (CNCF)Krishna-Kumar
Contribute to cloud native computing foundation - various ways. This is an introductory presentation given in Container conference in Bangalore April 2017 and may help new comers to get in to the CNCF eco system faster.
ABSTRACT: The ongoing big data revolution has revolutionized the way in which technology is used to empower new business segments like social networking and transform old business segments like traditional retail. However, the DNA that is used to build data processing platform is evolving quite rapidly. There is a plethora of competing tools, technologies, and “religion” for how to build state-of-the-art data analysis frameworks. In this talk, I will go over five ways to build scalable high-performance long-lasting data analysis frameworks in the wrong way. Surprisingly, the industry is full of examples of organization building frameworks in this “wrong” way. Since the “right” way to build a technology framework is dependent on the key business drivers, it is my hope that this talk will spur a discussion on what is the “right” way for Pinterest. The talk will focus on technologies including “data plumbing” (e.g. tools in the Hadoop ecosystem), and statistical modeling methods (e.g. R and Python). In this talk, I’ll try to connect to platform builders, data scientists, and business decision makers.
BIO: Jignesh Patel is a Professor in Computer Sciences at the University of Wisconsin-Madison, where he also earned his Ph.D. He has worked in the area of databases (now fashionably called “big data”) for over two decades. He has won several best paper awards, and industry research awards. He is the recipient of the Wisconsin COW teaching award, and the U. Michigan College of Engineering Education Excellence Award. He has a strong interest in seeing research ideas transition to actual products. His Ph.D. thesis work was acquired by NCR/Teradata in 1997, and he also co-founded Locomatix -- a startup that built a platform to power real-time data-driven mobile services. Locomatix became part of Twitter in 2013. He is an ACM Distinguished Scientist and an IEEE Senior Member. He also serves on the board of Lands’ End, and advises a number of startups.
How we built an open video conferencing service to help people stay connected during corona
You can watch the Youtube Recording here (german):
https://t.co/cg7bGKDOjB?amp=1
Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/20SN0dP.
Tammer Saleh talks about the mistakes people make when building a microservices architecture. He also talks about: when microservices are appropriate, and where to draw the lines between services, dealing with performance issues, testing and debugging techniques, managing a polyglot landscape and the explosion of platforms, managing failure and graceful degradation. Filmed at qconlondon.com.
Tammer Saleh is a long time developer, leader, and author of the acclaimed book *Rails AntiPatterns*. Saleh is currently building the Cloud Foundry platform at Pivotal.
An old presentation on community engagement practices, and communication in open source projects. Some of the references are a little outdated with current trends in open source (eg. github).
Community catalysts value of open sourceDave Neary
What is the value of using an open source product? If you're buying a product from a vendor, does it matter that the underlying software is open source? This presentation describes some of the benefits that only come from an open source product.
Crafting an open source product strategyDave Neary
Should I open source this project? If so, how do I do it successfully? A presentation explaining fundamental principles behind open source business models. For a prose accompaniment, see https://community.redhat.com/blog/2018/04/crafting-an-open-source-product-strategy/
There is no open source business model - only people selling complementary goods, and using an open source project as a development and distribution model.
A presentation on the Maemo Community Council, going through the problems which gave arise to it, the origins and various governance and process decisions which needed to be made, and the successes which the council has had since its inception. The presentation will eventually be accompanied by speaker notes which I need to copy from a notepad to the computer.
Un atelier de formation donné à l'ALDIL lors du Jeudi du Libre de janvier 2010, par Dave Neary, sur la base de la formation qui a donné Lionel Tricot à l'APRIL à Paris.
A lightning talk I gave on giving great presentations at the Maemo Summit 2009 in Amsterdam, in reaction to seeing so many poor technical presentations at conferences I attend. I hope people find it both entertaining and useful.
With thanks to Seth Godin, Garr Reynolds, Nancy Duarte and Guy Kawasaki for inspiration and material.
Nokia and the Maemo community has come a long way towards the goal of co-producing documentation for the Maemo project - this presentation presents some of the achievements so far and puts forward the next steps.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
6. Swimming upstream – Dave Neary6
Branching strategy
1. I branch, and do what I want
Community development
(mainline)
Branch
point Vendor branch
"Unleveraged potential"
7. Swimming upstream – Dave Neary7
Branching strategy
Cost: Work on vendor branch
Opportunity cost of upstream work
Community development
(mainline)
Branch
point Vendor branch
"Unleveraged potential"
8. Swimming upstream – Dave Neary8
Branching strategy
2. Branch and rebase
Community development
(mainline)
Branch
point Vendor branch
Merge
point
Cost
of
merge
9. Swimming upstream – Dave Neary9
Branching strategy
...and rebase and rebase and...
Community development
(mainline)
Vendor branch
Merge points
10. Swimming upstream – Dave Neary10
Branching strategy
Cost: Vendor work + cost of
repeated merging (maintenance)
Community development
(mainline)
Vendor branch
Merge points
11. Swimming upstream – Dave Neary11
Branching strategy
3. Branch, rebase, and upstream
Community development
(mainline)
Branch
point Vendor branch
Merge
point
Cost
of
merge
Propose
patches
upstream
12. Swimming upstream – Dave Neary12
Branching strategy
Cost: Vendor work + cost of
merge + “community overhead”
Community development
(mainline)
Branch
point Vendor branch
Merge
point
Cost
of
merge
Propose
patches
upstream
13. Swimming upstream – Dave Neary13
“Community overhead”?
Our communities expect lots of
things which companies would
not otherwise do
23. Android team members have spent literally hundreds of
man hours (my mail folder on the suspend blocker thread
has over 1500 mail messages, and is nearly 10MB), and
have tried rewriting the patches several times, in an
attempt to make them be main-line acceptable.
Aug 2010, Theodore T'so
DiBona said there were some developers at Google
working on it who “feel burned” by the decision but he
acknowledged that the “staffing, attitute and culture” at
Google isn’t sufficient to support the kernel crew.
Apr 2010, Paula Rooney, ZDNet
24. “Getting code into the kernel is always
easier if you have a recognised name
associated with it”
Matthew Garrett, LinuxCon 2010
25. Swimming upstream – Dave Neary25
“Do NOT fall into the trap of adding
more and more stuff to an out-of-
tree project. It just makes it harder
and harder to get it merged. There
are many examples of this.”
Andrew Morton
31. Swimming upstream – Dave Neary31
Example: SR-IOV support
● Performance: VMs to be allocated an SR-IOV Virtual
Function on capable hosts
● Requires NUMA awareness in Nova, libvirt, QEMU to
ensure VM is on the same NUMA segment as the VF
● Improved SR-IOV support in libvirt (VM placed in same
NUMA node as VF)
● PCI pass-through support for Nova
● User interface and policy enforcement
32. Virtualized Mobile Base Station
- Multiple RAN technologies from
multiple vendors to be consolidated
on a single BS to improve utilization
- BS virtualization can share resources
among multiple logical RAN nodes
from different systems.
- C-RAN for efficient resource
utilization among different physical
BSs.
- Baseband Unit (BBU) pool with high
performance servers and real-time
processing for signaling capacity
(ETSI #4)
33. Swimming upstream – Dave Neary33
Example: C-RAN/vRAN
● Determinism
● Real-time patches to KVM
● Performance
● DPDK accelerated Open vSwitch
● Reliability at scale
● HA instances in OpenStack Nova
● HA OpenStack
● Fault management and reporting
● IPv6 support – kernel through Nova, Neutron
35. Swimming upstream – Dave Neary35
Upstream first
● Maintaining significant out-of-tree patches across
multiple projects is unsustainable
● Features should be designed, written and proposed
with upstream developers
● Cascading changes across multiple projects require
explanation and advocacy
36. Swimming upstream – Dave Neary36
Upstream First
● Requires discipline (small changes, discussed first)
● Relationships (your priority might not be their priority)
● Many communities – not just OpenStack!
41. https://gcc.gnu.org/bugzilla/show_bug.cgi?id=30475
Bug: assert(int+100 > int) optimized away
c2: “signed type overflow is undefined by the C standard”
c4: “You have GOT to be kidding? [...] You are missing the
point here. [...] PLEASE REVERT THIS CHANGE. [...] THIS IS
NOT A JOKE. FIX THIS! NOW!”
c5: “I am not joking, the C standard explictly says signed
integer overflow is undefined behavior.”
c9: “Hey Andrew, do you really think this issue goes away if you
keep closing the bugs fast enough?”
...
c48: “Oh wow, another wise cracking newbie who comments
without actually understanding the issue. I AM NOT RELYING
ON UNDEFINED BEHAVIOR.”
...