The document describes Coldstore, a storage solution from Veracity that addresses challenges with traditional hard disk drives (HDDs) in surveillance systems. It presents SFS (Sequential Filing System) and LAID (Linear Array of Idle Disks) which utilize HDDs more efficiently for surveillance needs by writing data sequentially and only powering one disk at a time. This reduces wear, heat, vibration and failure rates compared to RAID solutions. When an HDD fails in LAID, the system skips it and continues functioning normally without data loss or rebuild times.
Cassandra Summit 2014: Lesser Known Features of Cassandra 2.1DataStax Academy
Presenter: Aaron Morton, Apache Cassandra Committer & Co-Founder of The Last Pickle
Apache Cassandra 2.0 and 2.1 include a wealth of new and updated features. Some are well known, others are known to only a few. But any of them could help you reduce latency, improve throughput, or make operations easier. This talk will take a deep dive into features that improve: Compaction, Write Performance, Memory Management, CQL 3, TTL and Tombstones, & Repair. Existing and new users will benefit from this wide ranging view of the features Apache Cassandra offers.
Cassandra Troubleshooting (for 2.0 and earlier)J.B. Langston
I’ll give a general lay of the land for troubleshooting Cassandra. Then I’ll take you on a deep dive through nodetool and system.log and give you a guided tour of the useful information they provide for troubleshooting. I’ll devote special attention to monitoring the various processes that Cassandra uses to do its work and how to effectively search for information about specific error messages online.
This is the old version of this presentation for Cassandra 2.0 and earlier. Check out the updated slide deck for Cassandra 2.1.
From http://wiki.directi.com/x/hQAa - This is a fairly detailed presentation I made at BarCamp Mumbai on building large storage networks and different SAN topologies. It covers fundamentals of selecting harddrives, RAID levels and performance of various storage architectures. This is Part I of a 3-part series.
Presentation from 2016 Austin OpenStack Summit.
The Ceph upstream community is declaring CephFS stable for the first time in the recent Jewel release, but that declaration comes with caveats: while we have filesystem repair tools and a horizontally scalable POSIX filesystem, we have default-disabled exciting features like horizontally-scalable metadata servers and snapshots. This talk will present exactly what features you can expect to see, what's blocking the inclusion of other features, and what you as a user can expect and can contribute by deploying or testing CephFS.
Cassandra Summit 2014: Lesser Known Features of Cassandra 2.1DataStax Academy
Presenter: Aaron Morton, Apache Cassandra Committer & Co-Founder of The Last Pickle
Apache Cassandra 2.0 and 2.1 include a wealth of new and updated features. Some are well known, others are known to only a few. But any of them could help you reduce latency, improve throughput, or make operations easier. This talk will take a deep dive into features that improve: Compaction, Write Performance, Memory Management, CQL 3, TTL and Tombstones, & Repair. Existing and new users will benefit from this wide ranging view of the features Apache Cassandra offers.
Cassandra Troubleshooting (for 2.0 and earlier)J.B. Langston
I’ll give a general lay of the land for troubleshooting Cassandra. Then I’ll take you on a deep dive through nodetool and system.log and give you a guided tour of the useful information they provide for troubleshooting. I’ll devote special attention to monitoring the various processes that Cassandra uses to do its work and how to effectively search for information about specific error messages online.
This is the old version of this presentation for Cassandra 2.0 and earlier. Check out the updated slide deck for Cassandra 2.1.
From http://wiki.directi.com/x/hQAa - This is a fairly detailed presentation I made at BarCamp Mumbai on building large storage networks and different SAN topologies. It covers fundamentals of selecting harddrives, RAID levels and performance of various storage architectures. This is Part I of a 3-part series.
Presentation from 2016 Austin OpenStack Summit.
The Ceph upstream community is declaring CephFS stable for the first time in the recent Jewel release, but that declaration comes with caveats: while we have filesystem repair tools and a horizontally scalable POSIX filesystem, we have default-disabled exciting features like horizontally-scalable metadata servers and snapshots. This talk will present exactly what features you can expect to see, what's blocking the inclusion of other features, and what you as a user can expect and can contribute by deploying or testing CephFS.
Pilot Hadoop Towards 2500 Nodes and Cluster RedundancyStuart Pook
Hadoop has become a critical part of Criteo's operations. What started out as a proof of concept has turned into two in-house bare-metal clusters of over 2200 nodes. Hadoop contains the data required for billing and, perhaps even more importantly, the data used to create the machine learning models, computed every 6 hours by Hadoop, that participate in real time bidding for online advertising.
Two clusters do not necessarily mean a redundant system, so Criteo must plan for any of the disasters that can destroy a cluster.
This talk describes how Criteo built its second cluster in a new datacenter and how to do it better next time. How a small team is able to run and expand these clusters is explained. More importantly the talk describes how a redundant data and compute solution at this scale must function, what Criteo has already done to create this solution and what remains undone.
Slides from my talk at Cassandra Summit 2016 on troubleshooting Cassandra. This is a reprise of my popular talk from last summit, reorganized, expanded, and updated for Cassandra 3.0. In it I share the secrets I've learned in four years of supporting hundreds of customers using Apache Cassandra and DataStax Enterprise. Be sure to check out presenter notes for additional tips and links to further resources.
We provide relevant, and compelling security solutions provided exclusively by LMKT.
To know more about our endeavors in the field of security, call us or write to us at information@lmkt.com
(Part 2 of a series on IP Cameras.)
With security and surveillance moving into the digital world (through IP), the need for networking expertise is more crucial than ever before. Whether you need to upgrade an old analog system to digital, create a complete end-to-end solution, or simply add new surveillance components, D-Link has the knowledge and experience to help you succeed.
This multi-post series is intended to provide some basic IP Surveillance knowledge and tips on conducting a site assessment, selecting cameras and creating end-to-end IP Surveillance solution.
Closed Circuit Television (CCTV) system allows you to monitor your office, factory or quarters etc. in order to safe gaurd your necessary assets without physically creature gift at each location. A single visual unit can display videos from mulitple surveillance cameras installed across various locations of single premises. CCTV solutions in India, specially Ahmedabad, Gujarat are getting sticking together of importance due to the ongoing efforts of organizations to efficiently monitor visitors, employees and sections of a premise that are not easily accessible. Corporate Services provides CCTV security surveillance solutions for businesses to cater to their monitoring requirements. Solutions are tailor-made based coarsely individual requirements depending vis--vis factors specific to the client’s needs and necessities.
With security and surveillance moving into the digital world (through IP), the need for networking expertise is more crucial than ever before. Whether you need to upgrade an old analog system to digital, create a complete end-to-end solution, or simply add new surveillance components, D-Link has the knowledge and experience to help you succeed.
This is the first of a multi-post series to guide your journey. It’s intended to provide some basic IP Surveillance knowledge and tips on conducting a site assessment, selecting cameras and creating end-to-end IP Surveillance solution.
High Resolution Energy Modeling that Scales with Apache Spark 2.0 Spark Summi...Spark Summit
As advanced sensor technologies are becoming widely deployed in the energy industry, the availability of higher-frequency data results in both analytical benefits and computational costs. To an energy forecaster or data scientist, some of these benefits might include enhanced predictive performance from forecasting models as well as improved pattern recognition in energy consumption across building types, economic sectors, and geographies. To a utility or electricity service provider, these benefits might include significantly deeper insights into their diverse customer base. However, these advantages can come with a high computational price tag. With Spark 2.0, User-Defined Functions can be applied across grouped SparkDataFrames in the SparkR API to solve the multivariate optimization and model selection problems typically required for fitting site-level models. This recently added feature of Spark 2.0 on Databricks has allowed DNV GL to efficiently fit predictive models that relate weather, electricity, water, and gas consumption across virtually any number of buildings.
Realtime Analytical Query Processing and Predictive Model Building on High Di...Spark Summit
Spark SQL and Mllib are optimized for running feature extraction and machine learning algorithms on row based columnar datasets through full scan but does not provide constructs for column indexing and time series analysis. For dealing with document datasets with timestamps where the features are represented as variable number of columns in each document and use-cases demand searching over columns and time to retrieve documents to generate learning models in realtime, a close integration within Spark and Lucene was needed. We introduced LuceneDAO in Spark Summit Europe 2016 to build distributed lucene shards from data frame but the time series attributes were not part of the data model. In this talk we present our extension to LuceneDAO to maintain time stamps with document-term view for search and allow time filters. Lucene shards maintain the time aware document-term view for search and vector space representation for machine learning pipelines. We used Spark as our distributed query processing engine where each query is represented as boolean combination over terms with filters on time. LuceneDAO is used to load the shards to Spark executors and power sub-second distributed document retrieval for the queries.
Our synchronous API uses Spark-as-a-Service to power analytical queries while our asynchronous API uses kafka, spark streaming and HBase to power time series prediction algorithms. In this talk we will demonstrate LuceneDAO write and read performance on millions of documents with 1M+ terms and configurable time stamp aggregate columns. We will demonstrate the latency of APIs on a suite
of queries generated from terms. Key takeaways from the talk will be a thorough understanding of how to make Lucene powered time aware search a first class citizen in Spark to build interactive analytical query processing and time series prediction algorithms.
Pilot Hadoop Towards 2500 Nodes and Cluster RedundancyStuart Pook
Hadoop has become a critical part of Criteo's operations. What started out as a proof of concept has turned into two in-house bare-metal clusters of over 2200 nodes. Hadoop contains the data required for billing and, perhaps even more importantly, the data used to create the machine learning models, computed every 6 hours by Hadoop, that participate in real time bidding for online advertising.
Two clusters do not necessarily mean a redundant system, so Criteo must plan for any of the disasters that can destroy a cluster.
This talk describes how Criteo built its second cluster in a new datacenter and how to do it better next time. How a small team is able to run and expand these clusters is explained. More importantly the talk describes how a redundant data and compute solution at this scale must function, what Criteo has already done to create this solution and what remains undone.
Slides from my talk at Cassandra Summit 2016 on troubleshooting Cassandra. This is a reprise of my popular talk from last summit, reorganized, expanded, and updated for Cassandra 3.0. In it I share the secrets I've learned in four years of supporting hundreds of customers using Apache Cassandra and DataStax Enterprise. Be sure to check out presenter notes for additional tips and links to further resources.
We provide relevant, and compelling security solutions provided exclusively by LMKT.
To know more about our endeavors in the field of security, call us or write to us at information@lmkt.com
(Part 2 of a series on IP Cameras.)
With security and surveillance moving into the digital world (through IP), the need for networking expertise is more crucial than ever before. Whether you need to upgrade an old analog system to digital, create a complete end-to-end solution, or simply add new surveillance components, D-Link has the knowledge and experience to help you succeed.
This multi-post series is intended to provide some basic IP Surveillance knowledge and tips on conducting a site assessment, selecting cameras and creating end-to-end IP Surveillance solution.
Closed Circuit Television (CCTV) system allows you to monitor your office, factory or quarters etc. in order to safe gaurd your necessary assets without physically creature gift at each location. A single visual unit can display videos from mulitple surveillance cameras installed across various locations of single premises. CCTV solutions in India, specially Ahmedabad, Gujarat are getting sticking together of importance due to the ongoing efforts of organizations to efficiently monitor visitors, employees and sections of a premise that are not easily accessible. Corporate Services provides CCTV security surveillance solutions for businesses to cater to their monitoring requirements. Solutions are tailor-made based coarsely individual requirements depending vis--vis factors specific to the client’s needs and necessities.
With security and surveillance moving into the digital world (through IP), the need for networking expertise is more crucial than ever before. Whether you need to upgrade an old analog system to digital, create a complete end-to-end solution, or simply add new surveillance components, D-Link has the knowledge and experience to help you succeed.
This is the first of a multi-post series to guide your journey. It’s intended to provide some basic IP Surveillance knowledge and tips on conducting a site assessment, selecting cameras and creating end-to-end IP Surveillance solution.
High Resolution Energy Modeling that Scales with Apache Spark 2.0 Spark Summi...Spark Summit
As advanced sensor technologies are becoming widely deployed in the energy industry, the availability of higher-frequency data results in both analytical benefits and computational costs. To an energy forecaster or data scientist, some of these benefits might include enhanced predictive performance from forecasting models as well as improved pattern recognition in energy consumption across building types, economic sectors, and geographies. To a utility or electricity service provider, these benefits might include significantly deeper insights into their diverse customer base. However, these advantages can come with a high computational price tag. With Spark 2.0, User-Defined Functions can be applied across grouped SparkDataFrames in the SparkR API to solve the multivariate optimization and model selection problems typically required for fitting site-level models. This recently added feature of Spark 2.0 on Databricks has allowed DNV GL to efficiently fit predictive models that relate weather, electricity, water, and gas consumption across virtually any number of buildings.
Realtime Analytical Query Processing and Predictive Model Building on High Di...Spark Summit
Spark SQL and Mllib are optimized for running feature extraction and machine learning algorithms on row based columnar datasets through full scan but does not provide constructs for column indexing and time series analysis. For dealing with document datasets with timestamps where the features are represented as variable number of columns in each document and use-cases demand searching over columns and time to retrieve documents to generate learning models in realtime, a close integration within Spark and Lucene was needed. We introduced LuceneDAO in Spark Summit Europe 2016 to build distributed lucene shards from data frame but the time series attributes were not part of the data model. In this talk we present our extension to LuceneDAO to maintain time stamps with document-term view for search and allow time filters. Lucene shards maintain the time aware document-term view for search and vector space representation for machine learning pipelines. We used Spark as our distributed query processing engine where each query is represented as boolean combination over terms with filters on time. LuceneDAO is used to load the shards to Spark executors and power sub-second distributed document retrieval for the queries.
Our synchronous API uses Spark-as-a-Service to power analytical queries while our asynchronous API uses kafka, spark streaming and HBase to power time series prediction algorithms. In this talk we will demonstrate LuceneDAO write and read performance on millions of documents with 1M+ terms and configurable time stamp aggregate columns. We will demonstrate the latency of APIs on a suite
of queries generated from terms. Key takeaways from the talk will be a thorough understanding of how to make Lucene powered time aware search a first class citizen in Spark to build interactive analytical query processing and time series prediction algorithms.
Scylla Summit 2017: Intel Optane SSDs as the New Accelerator in Your Data CenterScyllaDB
Frank will share the motivation behind the 3D XPoint memory, the current shipping Optane SSD product and key values of why it is better than NAND-based SSDs, and a few use cases that exist in the Open Source space for Database usages of Optane SSDs.
This webinar will address major bottlenecks in your Oracle database that can be solved by simply improving storage performance. The Pros and Cons of several different storage approaches will be addressed including caching, adding additional hard disk drives, and implementing solid state disk.
Solid State Drives - Seminar for Computer Engineering Semester 6 - VIT,Univer...ravipbhat
Solid state is term that refers to electronic circuitry that is built entirely out of semiconductors.
A Solid-State Drive (SSD) is a data storage device that uses solid state memory to store persistent data and SSDs use same I/O interfaces developed for hard disk drives.
Demystifying Storage - Building large SANsDirecti Group
From http://wiki.directi.com/x/hQAa - This is a fairly detailed presentation I made at BarCamp Mumbai on building large storage networks and different SAN topologies. It covers fundamentals of selecting harddrives, RAID levels and performance of various storage architectures. This is Part I of a 3-part series
Get Your GeekOn With Ron - Session Two: Local Storage vs Centralized Storage ...Unidesk Corporation
Join virtualization expert and industry veteran Ron Oglesby as he discusses local storage vs centralized storage models for VDI, including the arguments for and against local storage in VDI environments, a review of converged platform models (ie Nutanix) for VDI, and SSD tips and tricks
From Raghu Ramakrishnan's presentation "Key Challenges in Cloud Computing and How Yahoo! is Approaching Them" at the 2009 Cloud Computing Expo in Santa Clara, CA, USA. Here's the talk description on the Expo's site: http://cloudcomputingexpo.com/event/session/510
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
Veracity's Coldstore Arcus - Storage as the foundation of your surveillance system.
1. C O L D S T O R E A R C U S
COLDSTORE
with Milestone Arcus
Q3 2013
By SQX
2. C O L D S T O R E A R C U S
Agenda
Present Challenges in Storage
• Hard Disk
• FAT32, NTFS etc..
• R.A.I.D. (Redundant Array of Independent
Disks)
Veracity’s Answer to Storage
• SFS (Sequential Filing System)
• L.A.I.D. (Linear Array of Idle Disks)
Application of Coldstore
• Network Attached Storage
• Embedded Network Video Recorder
3. C O L D S T O R E A R C U S
Present Challenges
IT and Surveillance industry alike
4. C O L D S T O R E A R C U S
Challenges
Longer retention time
Higher resolution & frame rate
Storage!!! 100TB – 10PB is common!!!
Typical Surveillance System
Storage
Cameras
Server & Network
Misc.
5. C O L D S T O R E A R C U S
Challenges – Hard Disk 101
Actuator
Read/Write Arm
Read/Write Head
Spindle
Disk Platters
Hard drives are the most important and most sensitive part of the system!!!
7,200 to 15,000 rpm
Gap is 3 nanometer
Imagine a fighter jet at Mach 8, flying 1 mm above ground!!!
6. C O L D S T O R E A R C U S
Challenges – Hard Disk 101
Actuator
Read/Write
Arm
Read/Write
Head
Disk Platter
Spindle
Cylinder
Sector
7. C O L D S T O R E A R C U S
Challenges – Hard Disk 101
Heat, Vibration & Wear will kill it!!!
UBE (Unrecoverable Bit Error) is inevitable
• Enterprise SATA capacity increased by a factor
of 375 over the past 15 years
• Error rate improved only 10x in the same time
• Actually, it is closer then ever!!!
Device Hard Error Rate in Bits PB equivalent
Consumer SATA 10E14 .89
Enterprise SATA 10E15 8.88
Enterprise SAS/FC 10E16 88.82
8. C O L D S T O R E A R C U S
Challenges – Hard Disk Fails
Hard Disk Fails more frequently due to:
• Temperature
• Vibration
• Wear
Heat
Dust
Forced Ventilation
Vibration
Full Power
Power Spikes
9. C O L D S T O R E A R C U S
Challenges – File System 101
WD Raptor X HD 10,000 rpm
Max Data Rate 84MB/s
1 GB File in 46 Secs (21.7MB/s)
http://vimeo.com/sqx/veracitydfs
10. C O L D S T O R E A R C U S
Challenges – File System 101
Examples
• FAT, FAT32, XFS, HFS, NTFS etc..
Directory
• a complex map of all files and file segments
Ideal for random and rapid access to any
file
Challenges :
• Directory area uses 5% of disk space
• Disk can become severely fragmented over
time
• Directory is most written-to area of disk
11. C O L D S T O R E A R C U S
Challenges – RAID 101
Commonly adopted RAID level:
• RAID 5 & 6 – Archive Database (Milestone XProtect)
• RAID 10 – Live Database (Milestone XProtect)
Mirror & Stripe across HDDs
Rebuild base on parity bit on failure
12. C O L D S T O R E A R C U S
Challenges – RAID 101
Serious Write Penalty
Long rebuild time, especially when writing is ongoing!!!
Full speed & full power on all hard disk, high duty cycle!!!
Disk failures are highly co-related.
RAID rebuild at 10% of full disk rate
RAID has been
evolving over the past
quarter century!!!
13. C O L D S T O R E A R C U S
Challenges – RAID Fails
We can roughly classify hard disks into two classes :
• Enterprise Storage (ES) and Personal Storage (PS)
ES disks are designed for high duty cycles, PS disks for low duty cycles
BUT : nearly all DVR / NVR systems and external storage systems used for
DVR / NVR systems use PS disks on grounds of cost
Thus PS disks are used in ES mode
Also : failure rate increases exponentially with temperature & vibration!!!
Seagate quotes Annualised Failure Rates (AFR) for both types of disks used
in both modes (under ideal conditions)
• PS disks used in PS mode : AFR = 0.34%
• PS disks used in ES mode : AFR = 1.25%
RAID 1, RAID 5, RAID 6 systems (in %) Year 1 Year 2 Year 3 Year 4 Year 5
Probability of individual disk failure per year 1.25% 2.50% 3.75% 5.00% 6.25%
Cumulative probability of individual disk surviving 98.75% 96.28% 92.67% 88.04% 82.53%
Cumulative probability of individual disk failing 1.25% 3.72% 7.33% 11.96% 17.47%
Cumulative probability of 16-disk array surviving 81.77% 54.53% 29.59% 13.02% 4.64%
Cumulative probability of 16-disk array failing 18.23% 45.47% 70.41% 86.98% 95.36%
14. C O L D S T O R E A R C U S
Challenges – Power Consumption
According to Western Digital (http://www.wdc.com/en/products/greenpower/)
• One 10W PS drive running at 8760 hours/year with a 65% efficient power
supply at $0.12 per kilowatt hour =
• Cost of ownership of $10.51/year
• 60.5 Kg of CO2 generated (the same as 14 days of driving!) per year
• 15 of the same drives?
• 150 watts
• 131,400 total hours per year of use
• Cost of ownership $157.68/year
• 907.5 Kg of CO2 which is the same as 210 days of driving per year
But WAIT!
• 15 drives in a RAID 5 array- assume 30TB total- need:
• 200 watts for the drives
• 200+ watts for the motherboard, fans, cooling, etc. (125% more)
• Assume a 500 watt power supply…
• $525.60 per year TCO ($1.44 per DAY)
• 2,520 Kg of CO2 generated
15. C O L D S T O R E A R C U S
Challenges
Heat
Vibration
Fragmentation
Operating & Cooling Power
Write Penalty
Unrecoverable Bit Error
Long Rebuild Time
Enterprise Grade Hard Disk
16. C O L D S T O R E A R C U S
Other peoples’ answers!!!
Solid State Drive (SSD)
N+4 redundancy in disk array
Smart failure of HDD (eliminate rebuild time)
Tons of CPU for rebuild
Liquid cool system (vs. Air Cold)
Scale Out NAS
Full replication of data
Online defragmentation
Snapshot backup & incremental backup
Are they all relevant to Surveillance Industry?!
17. C O L D S T O R E A R C U S
Veracity’s answer
For the Surveillance industry
Storage as the foundation of your surveillance system
18. C O L D S T O R E A R C U S
Surveillance Industry’s need
97% of disk operation in Surveillance are write
operations!!!!
• Other IT application is quite the opposite.
Surveillance data is BIG but sequential!!!!
• Others is not as BIG and randomized.
Speed requirement is high, but, not that high.
• Present HDD technology can handle.
Directory requirement is low.
• Channel and time header is simple.
Yesterday’s data Today’s data
nowTime
19. C O L D S T O R E A R C U S
Veracity’s answer
Coldstore, cures the HDD’s high failure
rate!!!
• SFS™ – Sequential Filing System
• LAID™ – Linear Array of Idle Disks
US/Worldwide Patent Applications filed in 2006
Product was released in 2009
20. C O L D S T O R E A R C U S
Coldstore – SFS
WD Raptor X HD 10,000 rpm
Max Data Rate 84MB/s
2 GB File in 30 Secs (66.7MB/s)
Three times faster!!!!
http://vimeo.com/sqx/veracitysfs
21. C O L D S T O R E A R C U S
Coldstore– SFS
No directory & large clusters
Allocation blocks
• 1 header sector + 128 data sectors
• fast playback of sequential files & even fast reverse
playback !
Single-sector header area uses 0.78% of disk
space
• Vs. 5% of disk space used for directory in NTFS or FAT
As fast as the theoretical speed limit!!!
Negligible read/write arm movement, less
vibration
• Low wear, low errors, lower temperature
• Dramatically increased MTBF (i.e. reduced AFR)
22. C O L D S T O R E A R C U S
Coldstore– SFS
Hint index
• uses less than 0.0001% of disk space
• NOT ESSENTIAL and is easily reconstructed
Highly robust data structure
• even severely damaged disk can be read
Light encryption available
23. C O L D S T O R E A R C U S
Coldstore – LAID
L.A.I.D.
• Linear Array of Idle Disks
Only required HDD is turned ON
Use SFS as file system
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
24. C O L D S T O R E A R C U S
Coldstore – LAID with protection
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
Current disks
(Powered On)
Idle disks
(Powered Off)
25. C O L D S T O R E A R C U S
Coldstore – LAID with protection
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
Current disks
(Powered On)
Idle disk
(Shut Off)
26. C O L D S T O R E A R C U S
Coldstore – LAID with protection
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
27. C O L D S T O R E A R C U S
Coldstore – LAID with protection
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
28. C O L D S T O R E A R C U S
Coldstore – LAID with protection
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
29. C O L D S T O R E A R C U S
Coldstore – LAID with protection
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
30. C O L D S T O R E A R C U S
Coldstore – LAID with protection
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
31. C O L D S T O R E A R C U S
Coldstore – LAID with protection
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
32. C O L D S T O R E A R C U S
Coldstore – LAID with protection
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
33. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
34. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
35. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
36. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
37. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
38. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
39. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A better solution : Mirrored Writing with Overlapping Pairs
40. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
So what happens now when a disk fails ?
41. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
So what happens now when a disk fails ?
42. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
So what happens now when a disk fails ?
43. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
So what happens now when a disk fails ?
Data is preserved Writing skips over to new pair…
…and carries on normally
44. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
And how does the disk failure affect the system ?
The failed disk is skipped and the old
data on the next disk overwritten
…and writing carries on normally
45. C O L D S T O R E A R C U S
Sequential Storage - LAID
1 2 3 4 5 6 7 8 9 10 11 12131415
What is the overall effect of a failed disk ?
• No effect - the disk array continues to operate normally
• No data are lost
• Nothing needs to be rebuilt
What happens when the failed disk is replaced ?
• It is automatically checked for capacity, then shut down
• Then it is written to during the next storage loop cycle
How soon must the failed disk be replaced ?
• Anytime before the faulty disk would normally be overwritten – e.g. if the storage
loop was 30 days with 15 disks (i.e. 2 days per disk), then within 28 days.
What happens if the disk not replaced ?
• The storage period shortens by one disk, e.g. in the above example the storage
period would drop from 30 days to 28 days, but the most recent 28 days would
still be preserved
46. C O L D S T O R E A R C U S
Physical Location Of Evidence
Evidential advantages
• The original recording of vital evidence can be easily located
• The evidence can be removed and preserved
• One, several or ALL disks can be removed if required
• Very large data volumes may be transported
• Disks may be copied off line
• A disk may be played back through a USB cradle on a PC
The sequential nature of
recording means that the
physical location of any
particular date and time
span is now very easy :
Simply select any disk
(highlighted by yellow LED)
and the time span will be
displayed.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Sunday, 7th January 2007 – 13:42:21
to
Tuesday 9th January 2007 – 15:38:10
Tuesday 9th January 2007 – 15:38:10
To
Thursday 11th January 2007 – 17:34:09
Thursday 11th January 2007 – 17:34:09
To
Saturday 13th January 2007 – 19:30:17
Saturday 13th January 2007 – 19:30:17
To
Monday 15th January 2007 – 21:26:22
Monday 15th January 2007 – 21:26:22
To
Wednesday 17th January 2007 – 23:22:01
47. C O L D S T O R E A R C U S
COLDSTORE System Power Consumption
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Motherboard consumes only 15 to 20W
Total Power Consumption of Array
• Around 70W with 2 disks operating
• Includes PSU inefficiencies
• Assumes dual hot-swappable PSU
RAID-5 Equivalent need 200 Watt
Don’t forget the exact 125% for cooling
48. C O L D S T O R E A R C U S
Expansion – Master & Slave
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
MASTER
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30SLAVE 1
31 32 33 34 35 36 37 38 39 40 41 42 43 44 45
SLAVE 2
Extended Sequential Recording : Disks 1 to 45
Master-Slave system with :
1 Master
2 Slaves
45 Disks
90 TeraByte Capacity
Massive storage periods
Reliability x 20 (estimate)
Power consumption ~ 150W
average
Any storage period identified
instantly
Any faulty disks replaced at leisure
Simplified evidential transport
49. C O L D S T O R E A R C U S
Application– NAS or NVR
Network Attached Storage
• Use Coldstore’s SDK
• Perfect for any sequential data
• Event log
• Audio
• Media industry
• Surveillance
Embedded Network Video Recorder
• Coldstore Arcus!!!!
50. C O L D S T O R E A R C U S
Do we answer to the challenges?
Heat
Vibration
Fragmentation
Operating & Cooling Power
Write Penalty
Unrecoverable Bit Error
Long Rebuild Time
Enterprise Grade Hard Disk
51. C O L D S T O R E A R C U S
COLDSTORE Benefits
Field proven since 2006, in Europe and USA market.
Total system >20 times higher reliability
>10 times lower power use, >15 times lower running costs
25% lower cost (no Windows, no system disk, no RAID controllers, own hardware, largest disks, no cooling)
Specifically designed for Surveillance applications
• Linear recording – exact location of dates & times
• Faulty disk replacement - no rebuild required (simply copy)
• Hot swap of all drives (actually cold-swap) at any time and are USEFUL
• Hot expansion of storage capacity
• Infinite storage capacity by use of new drives (all-SATA system)
• Each drive : self-contained continuous recording period
• Low level automatic encryption
System design will cope with
• Multiple channel data generation
• Start/Stop data generation
• Varying data rate per channel
• Some idiot pulling the disk being written to
• Total power loss, with very fast reboot time
52. C O L D S T O R E A R C U S
Milestone Arcus on Coldstore
World number one VMS
On
The best surveillance storage
53. C O L D S T O R E A R C U S
EMBEDDED VIDEO SURVEILLANCE PLATFORM
54. C O L D S T O R E A R C U S
What is Milestone Arcus?
Milestone Arcus is the video surveillance
platform designed for embedding into
hardware technology to produce an
efficient, intuitive and ready-to-use video
surveillance solution
55. C O L D S T O R E A R C U S
Who is Milestone Arcus for?
Hardware technology vendors
Linux, Mac® OS X, or Microsoft
Windows® operating systems running on
Intel or Arm based processors
These devices are suitable for Milestone
Arcus edge video surveillance solution:
• Network storage
• IP Cameras
• Switches
• Consumer electronic devices
• Other embedded surveillance device on the
edge
56. C O L D S T O R E A R C U S
System Complexity
Complex
Simple
Small Medium Large
Airport
Security
Education
City
Surveillance
Ports
Industry
Hotel
Gaming &
Casinos
Retail
Finance Government
Transport
Residential
Commercial
Complex
Residential Complexity depends
on
applications, NOT
only on number of
channels!!!
57. C O L D S T O R E A R C U S
Typical VMS of today
58. C O L D S T O R E A R C U S
Playback Stream
Simplicity – Coldstore Arcus
62. C O L D S T O R E A R C U S
Arcus – Milestone Mobile
Available on Android & iOS
Viewing, playback, multiple servers
access…..
63. C O L D S T O R E A R C U S
Milestone Interconnect
Central surveillance site
XProtect® Corporate
Any size
Any number
Remote management Remote surveillance
XProtect® Essential
XProtect® Express
XProtect® Professional
XProtect® Enterprise
Please refer to Milestone’s website for the latest list of products compatible with
Milestone Interconnect: www.milestonesys.com/milestoneinterconnect_compatibility
Remote backupRemote backup
64. C O L D S T O R E A R C U S
Why Coldstore Arcus?
Why you want a storage supplier to develop and
support a VMS?
Why you want a VMS vendor to source and
support the storage for you?
Coldstore Arcus provides:
• 5 Years software upgrade plan on Milestone Arcus
• Upgrade path to Milestone Interconnect on pre-channel
basis.
65. C O L D S T O R E A R C U S
Thanks!!!
Please contact SQX for further details.
sales@securex.hk
+852 31043323