Coupling Australia’s Researchers to the Global Innovation EconomyLarry Smarr
08.10.02
First Lecture in the
Australian American Leadership Dialogue Scholar Tour
University of Adelaide
Title: Coupling Australia’s Researchers to the Global Innovation Economy
Adelaide, Australia
Coupling Australia’s Researchers to the Global Innovation EconomyLarry Smarr
08.10.14
Seventh Lecture in the
Australian American Leadership Dialogue Scholar Tour
University of New South Wales
Title: Coupling Australia’s Researchers to the Global Innovation Economy
Sydney, Australia
Coupling Australia’s Researchers to the Global Innovation EconomyLarry Smarr
08.10.06
Second Lecture in the
Australian American Leadership Dialogue Scholar Tour
University of Western Australia
Title: Coupling Australia’s Researchers to the Global Innovation Economy
Perth, Australia
Bringing 3D, Ultra-Resolution, and Virtual Reality into the Global LambaGrid ...Larry Smarr
07.11.07
Keynote
ACM Virtual Reality Software and Technology (VRST)
Title: Bringing 3D, Ultra-Resolution, and Virtual Reality into the Global LambaGrid Collaboratory
Newport, CA
A New Global Research Platform – Dedicated 10Gbps LightpathsLarry Smarr
08.11.10
Panel
Symposium on “How Will the U.S. Elections Change US-China Cooperation?”
Tsinghua University
Title: A New Global Research Platform –Dedicated 10Gbps Lightpaths
Beijing, China
Study on the Effect of Network Dynamics on Opportunistic RoutingWaldir Moreira
There has been an efort to employ social similarity inferred from user mobility patterns in opportunistic routing solutions to improve forwarding. However, the dynamics of the networks are still not fully considered when devising solutions based on social similarity metrics. To address this issue, we propose two utility functions which consider the daily life routines of users and the intensity of their social interactions to take forwarding decisions: Time-Evolving Contact Duration (TECD) that weights social interactions among nodes considering the duration of contacts; and TECD Importance (TECDi) which estimates the importance of nodes. We compare our utility functions against contact- and social-based solutions, and we show that the use of daily life routines information (i.e., using TECD and TECDi ) has a positive effect on opportunistic routing.
This presentation was given in the 11th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW 2012), July 9th, 2012 in Belgrade, Serbia.
Coupling Australia’s Researchers to the Global Innovation EconomyLarry Smarr
08.10.02
First Lecture in the
Australian American Leadership Dialogue Scholar Tour
University of Adelaide
Title: Coupling Australia’s Researchers to the Global Innovation Economy
Adelaide, Australia
Coupling Australia’s Researchers to the Global Innovation EconomyLarry Smarr
08.10.14
Seventh Lecture in the
Australian American Leadership Dialogue Scholar Tour
University of New South Wales
Title: Coupling Australia’s Researchers to the Global Innovation Economy
Sydney, Australia
Coupling Australia’s Researchers to the Global Innovation EconomyLarry Smarr
08.10.06
Second Lecture in the
Australian American Leadership Dialogue Scholar Tour
University of Western Australia
Title: Coupling Australia’s Researchers to the Global Innovation Economy
Perth, Australia
Bringing 3D, Ultra-Resolution, and Virtual Reality into the Global LambaGrid ...Larry Smarr
07.11.07
Keynote
ACM Virtual Reality Software and Technology (VRST)
Title: Bringing 3D, Ultra-Resolution, and Virtual Reality into the Global LambaGrid Collaboratory
Newport, CA
A New Global Research Platform – Dedicated 10Gbps LightpathsLarry Smarr
08.11.10
Panel
Symposium on “How Will the U.S. Elections Change US-China Cooperation?”
Tsinghua University
Title: A New Global Research Platform –Dedicated 10Gbps Lightpaths
Beijing, China
Study on the Effect of Network Dynamics on Opportunistic RoutingWaldir Moreira
There has been an efort to employ social similarity inferred from user mobility patterns in opportunistic routing solutions to improve forwarding. However, the dynamics of the networks are still not fully considered when devising solutions based on social similarity metrics. To address this issue, we propose two utility functions which consider the daily life routines of users and the intensity of their social interactions to take forwarding decisions: Time-Evolving Contact Duration (TECD) that weights social interactions among nodes considering the duration of contacts; and TECD Importance (TECDi) which estimates the importance of nodes. We compare our utility functions against contact- and social-based solutions, and we show that the use of daily life routines information (i.e., using TECD and TECDi ) has a positive effect on opportunistic routing.
This presentation was given in the 11th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW 2012), July 9th, 2012 in Belgrade, Serbia.
First and second order semi-Markov chains for wind speed modelingNozir Shokirov
An overview of Guglelmo D'Amic et al. paper titled as "First and second order semi-Markov chains for wind speed modeling" from the journal of Physica A 2012.
Introduction to java beans, java beans, Core java, j2se, getting started with java beans programming, java to standard edition, beans in java, beans programming in java
Explains the causes of the Ariane 5 launcher failure in 1996. Due to a failure in the software controlling the inertial navigation system
Video: http://www.youtube.com/watch?v=W3YJeoYgozw
First and second order semi-Markov chains for wind speed modelingNozir Shokirov
An overview of Guglelmo D'Amic et al. paper titled as "First and second order semi-Markov chains for wind speed modeling" from the journal of Physica A 2012.
Introduction to java beans, java beans, Core java, j2se, getting started with java beans programming, java to standard edition, beans in java, beans programming in java
Explains the causes of the Ariane 5 launcher failure in 1996. Due to a failure in the software controlling the inertial navigation system
Video: http://www.youtube.com/watch?v=W3YJeoYgozw
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...ijafrc
Cloud computing is powering the overall business and organizational growth by providing the three basic services like Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). As the worldwide cloud users demand multiple services from cloud at a time, so it is the most important concern for cloud service providers to concentrate on the reliability of the system. The reliability of any system can be determined by the number of failures occurred in the cloud computing environment vs. the total number of tasks done by the cloud. The reliability of a system depends on the reliability of each and every component of the system with which the system is composed of. In this paper, an attempt has been made to analyze different cloud reliability techniques, different components for reliability measurement and the methodology for measuring reliability. Further, based on these parameters we have prepared a comparison table to compare these techniques.
Cloud Economics in Training and SimulationNane Kratzke
This slide presents a use case how to adopt IaaS cloud computing in higher education. It is shown that virtual labs can provide a more than 25 times cost advantage compared to classical dedicated on-premise in-house labs.
A popular pattern today is the injection of declarative (or functional) mini-languages into general purpose host languages. Years ago, this is what LINQ for C# was all about. Now there are many more examples such as the Spark or Beam APIs for Java and Scala. The opposite embedding is also possible: start with a declarative (or functional) language as the outer host and then embed a general purpose language. This is the path we took for Scope years ago (Scope is a Microsoft-internal big data analytics language) and have recently shipped as U-SQL. In this case, the host language is close to T-SQL (Transact SQL is Microsoft’s SQL language for SQL Server and Azure SQL DB) and the embedded language is C#. By embedding the general purpose language in a declarative language, we enable all-of-program (not just all-of stage) optimization, parallelization, and scheduling. The resulting jobs can flexibly scale to leverage thousands of machines.
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSIJCNCJournal
The pivotal role of data security in mobile edge-computing environments forms the foundation for the
proposed work. Anomalies and outliers in the sensory data due to network attacks will be a prominent
concern in real time. Sensor samples will be considered from a set of sensors at a particular time instant as
far as the confidence level on the decision remains on par with the desired value. A “true” on the
hypothesis test eventually means that the sensor has shown signs of anomaly or abnormality and samples
have to be immediately ceased from being retrieved from the sensor. A deep learning Actor-Criticbased
Reinforcement algorithm proposed will be able to detect anomalies in the form of binary indicators and
hence decide when to withdraw from receiving further samples from specific sensors. The posterior trust
value influences the value of the confidence interval and hence the probability of anomaly detection. The
paper exercises a single-tailed normal function to determine the range of the posterior trust metric. The
decision taken by the prediction model will be able to detect anomalies with a good percentage of anomaly
detection accuracy.
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsIJCNCJournal
The pivotal role of data security in mobile edge-computing environments forms the foundation for the
proposed work. Anomalies and outliers in the sensory data due to network attacks will be a prominent
concern in real time. Sensor samples will be considered from a set of sensors at a particular time instant as
far as the confidence level on the decision remains on par with the desired value. A “true” on the
hypothesis test eventually means that the sensor has shown signs of anomaly or abnormality and samples
have to be immediately ceased from being retrieved from the sensor. A deep learning Actor-Criticbased
Reinforcement algorithm proposed will be able to detect anomalies in the form of binary indicators and
hence decide when to withdraw from receiving further samples from specific sensors. The posterior trust
value influences the value of the confidence interval and hence the probability of anomaly detection. The
paper exercises a single-tailed normal function to determine the range of the posterior trust metric. The
decision taken by the prediction model will be able to detect anomalies with a good percentage of anomaly
detection accuracy
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...Stenio Fernandes
This talk will discuss what is dependability, how it has effects upon network design and management in SDN scenarios, why it is important to measure and assess its attributes (e.g., availability, reliability), and what are the tools and techniques for scalable performance evaluation. In addition, challenges for introducing dependability assessment in SDN HW/SW components will be discussed. We will also give some directions on possible solutions, including plans for some I-Ds.
Some topics of the presentation are:
- How to assess risks associated to SDN deployment?
- How to measure and improve dependability attributes in SDN
- Dependability in virtualized environments: A glimpse on research papers
- I-D proposals related to dependability for SDN
Tom Soderstrom, Chief Technology and Innovation Officer at NASA’s Jet Propulsion Laboratory, has demonstrated how internet-of-things (IoT) technology and cloud computing can form the backbone for monumental innovation. This combination has enabled private and public space exploration enterprises to dare greatly and, together, discover more of the solar system than ever before. Cloud computing, with its unlimited storage and compute resources, blends IoT, machine learning, intelligent assistance, and new interfaces with computers. It has the potential to allow humans to explore and colonize other areas of the solar system by enabling collaboration across millions of miles, and social networking on a planetary scale.
Artificial intelligence in IoT-to-core network operations and managementADVA
Danish Rafique’s OFC 2019 presentation explores the AI application space and its architectural integration into today’s end-to-end network management stack.
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
IaaS Cloud Benchmarking: Approaches, Challenges, and ExperienceAlexandru Iosup
IaaS Cloud Benchmarking: Approaches, Challenges, and Experience
Impact Award lecture at MTAGS/ACM SC'12. URL: http://datasys.cs.iit.edu/events/MTAGS12/biggest-impact-award.html
Similar to Software Faults, Failures and Their Mitigations | Turing100@Persistent (20)
Skilling for SMAC by Anand Deshpande, Founder, Chairman and Managing Director...Persistent Systems Ltd.
Social-Mobile-Analytics-Cloud (SMAC) technologies will play a significant role in the building of next generation software products and solutions. Building solutions on this SMAC-stack requires a unique set of technical skills, different from the traditional software programming. This presentation focuses on some of the upcoming SMAC trends and the skills needed to stay relevant as these trends unfold.
Dr. Anand Deshpande, Chairman, Managing Director & CEO, Persistent systems Ltd talks about Life and Work of Jim Gray ( 1998 Turing Award Recipient) during 6th Turing Session
During 4th Tech Talk session of Turing100@Persistent, Dr. Navin Kabra, Co-Founder and CTO, ReliScore.com talks about 1991 ACM Turing Award Recipient,Dr. Robin Milner
3rd Session of Turing100@Persistent Systems, Dr Sridhar Varadarajan, Sasken Communication Technologies Ltd presents on Net Neutrality: The supply-demand perspective
Mathai Joseph, Advisor, Tata Consultancy Service discusses about Alan Turing at the Grand Launch of Alan Turing Centenary Celebrations at Persistent Systems
Prof. Sham Navathe, Georgia Tech University talks about the father of Relational Databases, E. F. Codd and discusses about his fundamental and continuing contributions to the theory and practice of database management systems
Dr. Anand Deshpande, CEO, Persistent Systems kick starts the Alan Turing Centenary Celebrations at Persistent and talks about various events planned to honor Alan Turing
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.