Sam has found himself spending much of the past few years dealing with buzzword-heavy areas of technology, trying to come to terms with what it all means. From DevOps, to Microservices, serverless and now Cloud Native. So many of these terms mean different things to different people. In an effort to try and set us up with a common understanding of what Cloud Native is, Sam will be taking us on a whistle-stop tour through the history leading up to Cloud Native, and try and synthesise what it is, and why it’s important.
From the emergence of public cloud to the all consuming hype around Kubernetes, from 12 factors to servlerless, Sam will pull all these strands together to help us understand how everything is related, everything is new, and everything is old all at the same time.
Confusion In The Land Of The Serverless - 90min VersionSam Newman
Note: This is an expanded (roughly 90min) form of my "Confusion in the land of the serverless".
Serverless computing is the hot new thing. Like any hyped technology, it promises a lot. However questions remain around concept and implementation, especially when you start to compare how we’ve built systems in the past, and what serverless offers us now. Is Serverless the future, or just the emperor’s new clothes?
This talk will very brie y introduce serverless computing, but will then dive into some of the questions that aren’t always asked in conjunction with this technology. By the end of the talk you should have a firm grasp of what serverless computing really can offer, cut through some of the hype, and get an understanding about where and how you can use it in your own organisations.
The growth of the public cloud market is obvious to everyone. But what’s less well known is that enterprises are still growing the infrastructure and services they run for themselves. A common reason cited for the continual growth in private cloud rather than adopting public cloud offerings are concerns about being locked in to a specific vendor. This talk analyses the concerns about vendor lock-in with respect to the adoption of public cloud. Sam will share with you not only whether or not the concerns of lock-in have merit in the real world, but will also present some tools you can use to help your own thinking in this regard.
QCon Sao Paulo Keynote - Microservices, an Unexpected JourneySam Newman
Microservices are the hot new thing, but where did they come from, and where are they going?
This keynote will take you through the many origins of microservices. In it I’ll share with you some of the surprising influences and prior art that have shaped what they have become.
By understanding where microservices architectures have their roots, we can learn from the past and avoid making the same mistakes – and we can also start to see where microservices will be going next.
This talk was delivered as the keynote at QCon Sao Paulo in 2015.
Hiding The Lead: Coupling, cohesion and microservicesSam Newman
The terms coupling and cohesion come from the world of structured programming, but they are also thrown about in the context of microservices. In this session, I look at the applicability of these terms to microservice architecture, and also do a deep dive into the different types of coupling to explore how ideas from the 1970s still have a lot of relevance to the types of systems we build today.
Principles of microservices XP Days UkraineSam Newman
There has been lots of buzz around Microservices over the last year, but there has often been a lack of clarity as to what Microservices are, or how to implement them well. I've been working to distill down the principles of Microservices to help ensure that we don't just end up repeating the mistakes we made during the last 20 years of service oriented architecture.
Microservices give us many options. We can pick different technologies, mix synchronous and asynchronous integration techniques or embrace different deployment patterns. But they also give us different options in how we think about securing our systems. Done right, and microservices can increase the security of your vital data and processes. Done wrong, and you can increase the surface area of attack. This talk will discuss the importance of defence in depth, discussing the many different ways in which you can secure your fine-grained, distributed architectures.
There has been lots of buzz around Microservices over the last year, but there has often been a lack of clarity as to what Microservices are, or how to implement them well. I've been working to distill down the principles of Microservices to help ensure that we don't just end up repeating the mistakes we made during the last 20 years of service oriented architecture.
Confusion In The Land Of The Serverless - 90min VersionSam Newman
Note: This is an expanded (roughly 90min) form of my "Confusion in the land of the serverless".
Serverless computing is the hot new thing. Like any hyped technology, it promises a lot. However questions remain around concept and implementation, especially when you start to compare how we’ve built systems in the past, and what serverless offers us now. Is Serverless the future, or just the emperor’s new clothes?
This talk will very brie y introduce serverless computing, but will then dive into some of the questions that aren’t always asked in conjunction with this technology. By the end of the talk you should have a firm grasp of what serverless computing really can offer, cut through some of the hype, and get an understanding about where and how you can use it in your own organisations.
The growth of the public cloud market is obvious to everyone. But what’s less well known is that enterprises are still growing the infrastructure and services they run for themselves. A common reason cited for the continual growth in private cloud rather than adopting public cloud offerings are concerns about being locked in to a specific vendor. This talk analyses the concerns about vendor lock-in with respect to the adoption of public cloud. Sam will share with you not only whether or not the concerns of lock-in have merit in the real world, but will also present some tools you can use to help your own thinking in this regard.
QCon Sao Paulo Keynote - Microservices, an Unexpected JourneySam Newman
Microservices are the hot new thing, but where did they come from, and where are they going?
This keynote will take you through the many origins of microservices. In it I’ll share with you some of the surprising influences and prior art that have shaped what they have become.
By understanding where microservices architectures have their roots, we can learn from the past and avoid making the same mistakes – and we can also start to see where microservices will be going next.
This talk was delivered as the keynote at QCon Sao Paulo in 2015.
Hiding The Lead: Coupling, cohesion and microservicesSam Newman
The terms coupling and cohesion come from the world of structured programming, but they are also thrown about in the context of microservices. In this session, I look at the applicability of these terms to microservice architecture, and also do a deep dive into the different types of coupling to explore how ideas from the 1970s still have a lot of relevance to the types of systems we build today.
Principles of microservices XP Days UkraineSam Newman
There has been lots of buzz around Microservices over the last year, but there has often been a lack of clarity as to what Microservices are, or how to implement them well. I've been working to distill down the principles of Microservices to help ensure that we don't just end up repeating the mistakes we made during the last 20 years of service oriented architecture.
Microservices give us many options. We can pick different technologies, mix synchronous and asynchronous integration techniques or embrace different deployment patterns. But they also give us different options in how we think about securing our systems. Done right, and microservices can increase the security of your vital data and processes. Done wrong, and you can increase the surface area of attack. This talk will discuss the importance of defence in depth, discussing the many different ways in which you can secure your fine-grained, distributed architectures.
There has been lots of buzz around Microservices over the last year, but there has often been a lack of clarity as to what Microservices are, or how to implement them well. I've been working to distill down the principles of Microservices to help ensure that we don't just end up repeating the mistakes we made during the last 20 years of service oriented architecture.
Serverless computing is the hot new thing. Like any hyped technology, it promises a lot. However questions remain around concept and implementation, especially when you start to compare how we've built systems in the past, and what serverless offers us now. Is Serverless the future, or just the emperor's new clothes?
This talk will very briefly introduce serverless computing, but will then dive into some of the questions that aren't always asked in conjunction with this technology. Topics will include:
How does your attitude to security change?
Is it easier, or harder, to create reliable, resilient systems?
Do patterns like Circuit breakers and connection pools make sense any more?
Is vendor lock-in a problem?
Is serverless computing only for microservice architectures?
Which problems fit serverless computing?
By the end of the talk you should have a firm grasp of what serverless computing really can offer, cut through some of the hype, and get an understanding about where and how you can use it in your own organisations.
Presented at NDC London, December 2014
Microservice architectures can lead to easier to change, more maintainable systems which can be more secure, performant and stable than previous designs. But what are the practical concerns associated with running more fine-grained systems, and what are the new things you’ll need to know if you want to embrace the power of smaller services without the new sources of complexity making your life a nightmare? This talk will delve deeper into the characteristics of well-behaved services, and will define some clear principles your services should follow. It will also discuss in more depth some of the challenges associated with managing and monitoring more complex distributed systems. We’ll discuss how you can design services to be more fault-tolerant, what technologies may exist in your own platform to get you started. We’ll end by giving some pointers as to when you should consider microservice architectures, and how you should go about introducing them in your own organisation.
This is the longer, 90 min version of my Microservices talk, as presented at Velocity 2016 in Santa Clara.
Security is everyone’s job, even if you’re not a specialist. Microservices offer many options for securing your systems. Done right, microservices can increase the security of your vital data and processes. Done wrong, and they can increase the surface area of attack. Sam Newman explores the importance of defense in depth, discussing the many different ways in which you can secure your fine-grained, distributed architectures and outlining a model to show how developers can think about application security and how they can play their part. From there, Sam dives into the specific challenges in microservice architectures and explains how application security principles can be applied to these often much more complex application architectures. You’ll leave with a high-level framework for thinking about application security and tools that help with prevention, detection, response, and recovery, as well as the knowledge of what not to do when breaches happen.
These are the slides I gave from my recent talk at Javazone. It's an update of my 'Practical Considerations For Microservices' talk. You can see the accompanying video here: http://vimeo.com/105751281
The deck for Practical Microservices as presented at YOW 2013 in Brisbane. Minor changes from the Melbourne event.
Bonus point if you can spot the typo!
Microservices give us many options. We can pick different technologies, mix synchronous and asynchronous integration techniques or embrace different deployment patterns. But they also give us different options for how we think about securing our systems.
Done right, and microservices can increase the security of your vital data and processes.
Done wrong, and you can increase the surface area of attack. This talk will discuss the importance of defence in depth, discussing the many different ways in which you can secure your fine-grained, distributed architectures.
The audience should come away with a working framework for thinking about application security, and also understand how microservices can help (or hinder) building a secure system.
This talk is distillation of what makes microservices different from normal services. While this talk can serve as an introduction to microservices the real goal is to help tease out the key areas of what is a very broard topic.
There has been lots of buzz around Microservices over the last year, but there has often been a lack of clarity as to what Microservices are, or how to implement them well. I've been working to distill down the principles of Microservices to help ensure that we don't just end up repeating the mistakes we made during the last 20 years of service oriented architecture. I'll talk about the history of where Microservices came from, what they are, the benefits and downsides, and the core principles to stick to do to them well.
This is a shorter 60min version of the presentation
Rip It Up - The Microservice OrganisationSam Newman
Much of the attention for microservice architectures tends to focus on the technical aspects. But when you look into the details of organisations that have benefited from this approach you realise that there is more to getting the most out of microservices than lots of shinny new technology.
In this talk, I show how organisational structures and team responsibilities may need to change if you want to get the most out of adopting a microservice architecture. Looking at traditional IT structures and comparing them with the modern autonomous delivery teams, he’ll explore how to get the organisation and architecture working well together. From Conway's law, to Dunbar's number and two pizza teams, you'll see how you can start to apply these ideas inside your own company.
Feature Branches And Toggles In A Post-GitHub WorldSam Newman
During the evolution of the ideas behind Continuous Delivery, many of us came to the conclusion that having branches for features was not a good idea, and resulted in some fairly problematic issues. This was contentious at the time, with lots of discussion around whether or not feature toggles or feature branching was the right way forward.
Roll on several years, and through Git and GitHub, branches are everywhere. Is this a problem?
This talk re-examines the role of feature branches and feature toggles, and looks at them in the context of new research and technology to try and distill down some sensible lessons in a post-GitHub, but hopefully not post-factual, world.
How Modern Software Architecture Benefits from Patterns Found in Natural Comp...Jeremiah Jones
CICD, Microservices, Containers, and Automation are buzzwords spreading throughout software and app development spaces; but where do these architectures make sense to apply and what are the real benefits? In this presentation, Jeremiah explores key differences between complicated vs complex systems and how this applies to modern software development. Learn how modern, massively-scaled software companies are using processes that mimic natural systems to grow, evolve, and adapt to changing demands. We hope you will come away with a new perspective of your own technology systems and take home a few tools to better design those systems to scale and adapt.
This presentation is NOT intenteded to be a stand-alone slide deck. Please feel free to reach out to me to learn more about this presentation or to schedule a live presentation for your organization.
With the wide adoption of micro-services and large-scale distributed systems, architectures have grown increasingly complex and hard to understand. Worse, the software systems running them have become extremely difficult to debug and test, increasing the risk of outages. With these new challenges, new tools are required and since failures have become more and more chaotic in nature, we must turn to chaos engineering in order to reveal failures before they become outages. In this talk, we will make an introduction to chaos engineering, a discipline that promotes breaking things on purpose in order to learn how to build more robust systems and we will deep dive into designing large-scale resilient architectures.
Create Modern Serverless Web Applications in Minutes Using the AWS Amplify Fr...Amazon Web Services
AWS Amplify makes it easy for you to create, configure, and implement scalable mobile and web apps powered by AWS. In this session we will explore how you can create, manage, and operate a full-stack, serverless single-page application with AWS Amplify. We will show you how you can rapidly build application backends and APIs using the Amplify toolchain and how the AWS Amplify Console provides a continuous deployment and hosting service for mobile and web applications. We will finish the session with a live coding demonstration creating a serverless web application using these tools.
[REPEAT 1] Create and Publish AR, VR, and 3D Applications Using Amazon Sumeri...Amazon Web Services
In this session, learn how Amazon Sumerian can help you create and run virtual reality (VR), augmented reality (AR), and 3D applications quickly and easily without requiring any specialized programming or 3D graphics expertise. Learn how you can use Sumerian to build highly immersive and interactive scenes that run on popular hardware, such as Oculus Go, Oculus Rift, Google Daydream, and HTC Vive as well as on Android and iOS mobile devices.
by Ben Moore, Sr. Product Manager, AWS
Now it is your turn, take the information you’ve learned over the day and create your own AR/VR scene. Amazon Sumerian team members will be available to answer your questions as you build your own scenes.
Serverless computing is the hot new thing. Like any hyped technology, it promises a lot. However questions remain around concept and implementation, especially when you start to compare how we've built systems in the past, and what serverless offers us now. Is Serverless the future, or just the emperor's new clothes?
This talk will very briefly introduce serverless computing, but will then dive into some of the questions that aren't always asked in conjunction with this technology. Topics will include:
How does your attitude to security change?
Is it easier, or harder, to create reliable, resilient systems?
Do patterns like Circuit breakers and connection pools make sense any more?
Is vendor lock-in a problem?
Is serverless computing only for microservice architectures?
Which problems fit serverless computing?
By the end of the talk you should have a firm grasp of what serverless computing really can offer, cut through some of the hype, and get an understanding about where and how you can use it in your own organisations.
Presented at NDC London, December 2014
Microservice architectures can lead to easier to change, more maintainable systems which can be more secure, performant and stable than previous designs. But what are the practical concerns associated with running more fine-grained systems, and what are the new things you’ll need to know if you want to embrace the power of smaller services without the new sources of complexity making your life a nightmare? This talk will delve deeper into the characteristics of well-behaved services, and will define some clear principles your services should follow. It will also discuss in more depth some of the challenges associated with managing and monitoring more complex distributed systems. We’ll discuss how you can design services to be more fault-tolerant, what technologies may exist in your own platform to get you started. We’ll end by giving some pointers as to when you should consider microservice architectures, and how you should go about introducing them in your own organisation.
This is the longer, 90 min version of my Microservices talk, as presented at Velocity 2016 in Santa Clara.
Security is everyone’s job, even if you’re not a specialist. Microservices offer many options for securing your systems. Done right, microservices can increase the security of your vital data and processes. Done wrong, and they can increase the surface area of attack. Sam Newman explores the importance of defense in depth, discussing the many different ways in which you can secure your fine-grained, distributed architectures and outlining a model to show how developers can think about application security and how they can play their part. From there, Sam dives into the specific challenges in microservice architectures and explains how application security principles can be applied to these often much more complex application architectures. You’ll leave with a high-level framework for thinking about application security and tools that help with prevention, detection, response, and recovery, as well as the knowledge of what not to do when breaches happen.
These are the slides I gave from my recent talk at Javazone. It's an update of my 'Practical Considerations For Microservices' talk. You can see the accompanying video here: http://vimeo.com/105751281
The deck for Practical Microservices as presented at YOW 2013 in Brisbane. Minor changes from the Melbourne event.
Bonus point if you can spot the typo!
Microservices give us many options. We can pick different technologies, mix synchronous and asynchronous integration techniques or embrace different deployment patterns. But they also give us different options for how we think about securing our systems.
Done right, and microservices can increase the security of your vital data and processes.
Done wrong, and you can increase the surface area of attack. This talk will discuss the importance of defence in depth, discussing the many different ways in which you can secure your fine-grained, distributed architectures.
The audience should come away with a working framework for thinking about application security, and also understand how microservices can help (or hinder) building a secure system.
This talk is distillation of what makes microservices different from normal services. While this talk can serve as an introduction to microservices the real goal is to help tease out the key areas of what is a very broard topic.
There has been lots of buzz around Microservices over the last year, but there has often been a lack of clarity as to what Microservices are, or how to implement them well. I've been working to distill down the principles of Microservices to help ensure that we don't just end up repeating the mistakes we made during the last 20 years of service oriented architecture. I'll talk about the history of where Microservices came from, what they are, the benefits and downsides, and the core principles to stick to do to them well.
This is a shorter 60min version of the presentation
Rip It Up - The Microservice OrganisationSam Newman
Much of the attention for microservice architectures tends to focus on the technical aspects. But when you look into the details of organisations that have benefited from this approach you realise that there is more to getting the most out of microservices than lots of shinny new technology.
In this talk, I show how organisational structures and team responsibilities may need to change if you want to get the most out of adopting a microservice architecture. Looking at traditional IT structures and comparing them with the modern autonomous delivery teams, he’ll explore how to get the organisation and architecture working well together. From Conway's law, to Dunbar's number and two pizza teams, you'll see how you can start to apply these ideas inside your own company.
Feature Branches And Toggles In A Post-GitHub WorldSam Newman
During the evolution of the ideas behind Continuous Delivery, many of us came to the conclusion that having branches for features was not a good idea, and resulted in some fairly problematic issues. This was contentious at the time, with lots of discussion around whether or not feature toggles or feature branching was the right way forward.
Roll on several years, and through Git and GitHub, branches are everywhere. Is this a problem?
This talk re-examines the role of feature branches and feature toggles, and looks at them in the context of new research and technology to try and distill down some sensible lessons in a post-GitHub, but hopefully not post-factual, world.
How Modern Software Architecture Benefits from Patterns Found in Natural Comp...Jeremiah Jones
CICD, Microservices, Containers, and Automation are buzzwords spreading throughout software and app development spaces; but where do these architectures make sense to apply and what are the real benefits? In this presentation, Jeremiah explores key differences between complicated vs complex systems and how this applies to modern software development. Learn how modern, massively-scaled software companies are using processes that mimic natural systems to grow, evolve, and adapt to changing demands. We hope you will come away with a new perspective of your own technology systems and take home a few tools to better design those systems to scale and adapt.
This presentation is NOT intenteded to be a stand-alone slide deck. Please feel free to reach out to me to learn more about this presentation or to schedule a live presentation for your organization.
With the wide adoption of micro-services and large-scale distributed systems, architectures have grown increasingly complex and hard to understand. Worse, the software systems running them have become extremely difficult to debug and test, increasing the risk of outages. With these new challenges, new tools are required and since failures have become more and more chaotic in nature, we must turn to chaos engineering in order to reveal failures before they become outages. In this talk, we will make an introduction to chaos engineering, a discipline that promotes breaking things on purpose in order to learn how to build more robust systems and we will deep dive into designing large-scale resilient architectures.
Create Modern Serverless Web Applications in Minutes Using the AWS Amplify Fr...Amazon Web Services
AWS Amplify makes it easy for you to create, configure, and implement scalable mobile and web apps powered by AWS. In this session we will explore how you can create, manage, and operate a full-stack, serverless single-page application with AWS Amplify. We will show you how you can rapidly build application backends and APIs using the Amplify toolchain and how the AWS Amplify Console provides a continuous deployment and hosting service for mobile and web applications. We will finish the session with a live coding demonstration creating a serverless web application using these tools.
[REPEAT 1] Create and Publish AR, VR, and 3D Applications Using Amazon Sumeri...Amazon Web Services
In this session, learn how Amazon Sumerian can help you create and run virtual reality (VR), augmented reality (AR), and 3D applications quickly and easily without requiring any specialized programming or 3D graphics expertise. Learn how you can use Sumerian to build highly immersive and interactive scenes that run on popular hardware, such as Oculus Go, Oculus Rift, Google Daydream, and HTC Vive as well as on Android and iOS mobile devices.
by Ben Moore, Sr. Product Manager, AWS
Now it is your turn, take the information you’ve learned over the day and create your own AR/VR scene. Amazon Sumerian team members will be available to answer your questions as you build your own scenes.
Digital transformation for local news - SVC220 - New York AWS SummitAmazon Web Services
Discover how Graham media is bringing agility and digital transformation to traditional broadcasting. Gain insights from the company’s journey, and learn how it is partnering with companies like Arc Publishing and Grabyo and using AWS Media Services to power the modern 24/7 news cycle.
Cloud Computing in an Edgy World (IOT221-S) - AWS re:Invent 2018Amazon Web Services
Edge computing is defined by taking the specific timing-sensitive parts of your application and moving them closer to where they are needed—whether that need is a user or a source of interesting data. In this session, learn how to take advantage of cloud computing at the edge with New Relic. This session is brought to you by AWS partner, New Relic.
Temperature probes monitoring crops? Micro drones monitoring wind speed in the atmosphere? You don’t have to turn to these novel uses to see edge computing in action, look no further than the Point of Sale device at your local grocery store or the app on your mobile phone that is letting you order a cup of coffee.
Edge computing is all about taking the specific timing-sensitive parts of your application and moving them closer to where they are needed…whether that need is an end user or a source of interesting data, it’s all the same thing.
What really is the edge and how do we deal with it? How do we decide what computing should occur at the edge and what computing should occur in the cloud? How do you verify that your application is doing what it is expected to do? How do you know if you are meeting your performance expectations in the edge? How do you keep visibility in your entire application, whether it’s in the cloud or at the edge?
Building AR/VR Apps with AWS - SVC201 - Anaheim AWS SummitAmazon Web Services
Amazon Sumerian provides a web-based authoring tool, templates, hosts, asset libraries, and API operations to reduce the complexities involved in creating immersive applications and experiences. With AWS and Sumerian, you can develop and publish augmented reality, virtual reality, and 3D applications without needing specialized programming or 3D graphics expertise. Come see what customers have created, and learn how to get started.
Are you a developer, operator, or business stakeholder who is banging your head against the wall because you cannot seem to deliver apps that make everyone happy? Have you thrown more tools, containers, or agile methods at this challenge than you can count? Have you tried adopting this thing called "DevOps" for your app delivery problems but still cannot fix your IT mayhem? Then this session is for you. Learn how putting people and process first can pave the way to use the cloud for modern application delivery. With AWS and Red Hat, developers and IT operations have a optimal platform and cloud environment for developing, deploying, and managing traditional and cloud-native applications with a streamlined DevOps process to end the headbanging.
Go Fast and Remain Secure: How Millennium Enables Developers and Upholds Secu...Amazon Web Services
How do you empower your developers to manage their own AWS infrastructure and give them the flexibility that AWS provides without compromising security? Millennium Management, a global investment management firm, did not want to limit its developers, but the company needed to ensure that they followed security best practices. In this chalk talk, AWS and Millennium professionals share, discuss, and answer your questions on how Millennium achieved this balance through the combined use of CI/CD patterns, a number of AWS services, and a component-based Python framework. Together, we review architecture, automation, security, and a number of use cases to help you achieve these same no-compromise-needed results in your organization.
Automatic Labelling and Model Tuning with Amazon SageMaker - AWS Summit SydneyAmazon Web Services
Developing machine learning models requires a lot of effort which often needs to be repeated over time as data distributions change. In this session you will learn about some of the latest concepts in Automatic Machine Learning including how to apply them to speed up development and achieve robust models over time. You will learn how to run a custom labelling job using Amazon SageMaker Ground Truth to build a larger data set to fine-tune your model. You will also learn how to tune your model’s hyperparameters using Amazon SageMaker’s Automatic Model Tuning capabilities and understand the theory of how bayesian optimisation is automatically applied for more accurate results and faster tuning.
This workshop requires a laptop and administrative access to your own AWS account.
Zendesk: Building a World-Class Cloud Center of Excellence (ENT309-S) - AWS r...Amazon Web Services
When it comes to doing the cloud right, no one size fits all. Yet sometimes organizations become distracted by the day-to-day management of cost, security, and overall operations. They can lose sight of the reasons they chose to embrace the cloud in the first place. How can you possibly manage it all and stay focused on the business outcomes that are most important? In this session, learn how forming a Cloud Center of Excellence (CCoE) has become an increasingly common way to address many of these challenges. When implemented well, the CCoE acts as a bridge, connecting all departments that use, measure, or fund your cloud operation. This session is brought to you by AWS partner, CloudHealth Technologies.
Using use cases from Geoscience and AWS Earth, Herman will share pratical insights into breaking down silos within the research community.
Presenter: Herman Coomans, Senior Solutions Architect, AWS
Create Immersive Experiences Using Amazon Sumerian (ARV204-R1) - AWS re:Inven...Amazon Web Services
Anyone can create and publish augmented reality (AR), virtual reality (VR), and 3D applications quickly and easily with Amazon Sumerian. In this session, learn how to use Sumerian to build a scene that can be published and viewed on laptops, mobile phones, VR headsets, and digital signage. Take a tour of the Sumerian interface, and learn how to build a scene, add assets and hosts, and add behaviors to create dynamically animated objects and characters in an AR/VR experience. Also see how Sumerian integrates into AWS services such as Amazon Polly, Amazon Lex, AWS Lambda, Amazon S3, and Amazon DynamoDB.
Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...Amazon Web Services
You may have heard of the buzzwords “chaos engineering” and “containers.” But what do they have to do with each other? In this session, we introduce chaos engineering and share a live demo of how to practice chaos engineering principles on AWS. We walk through chaos engineering practices, tools, and success metrics you can use to inject failures in order to make your systems more reliable.
Similar to What Is This Cloud Native Thing Anyway? (20)
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfJay Das
With the advent of artificial intelligence or AI tools, project management processes are undergoing a transformative shift. By using tools like ChatGPT, and Bard organizations can empower their leaders and managers to plan, execute, and monitor projects more effectively.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
May Marketo Masterclass, London MUG May 22 2024.pdfAdele Miller
Can't make Adobe Summit in Vegas? No sweat because the EMEA Marketo Engage Champions are coming to London to share their Summit sessions, insights and more!
This is a MUG with a twist you don't want to miss.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
21. @samnewman
“Application can dynamically migrate across infrastructure
providers without interruption of service”
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
46. @samnewman
Right tool, right job
Independent Scaling
“MICRO-SERVICE ORIENTED?”
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
47. @samnewman
Right tool, right job
Independently Deployable
Independent Scaling
“MICRO-SERVICE ORIENTED?”
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
51. @samnewman
Lift & Shift
On the cloud, but fighting it
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
52. @samnewman
Lift & Shift
On the cloud, but fighting it
Cloud Ready
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
53. @samnewman
Lift & Shift
On the cloud, but fighting it
Cloud Ready
Working with, not against
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
54. @samnewman
Lift & Shift
Cloud Native
On the cloud, but fighting it
Cloud Ready
Working with, not against
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
55. @samnewman
Lift & Shift
Cloud Native
On the cloud, but fighting it
Embracing the cloud, and only the cloud
Cloud Ready
Working with, not against
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
56. @samnewman
Lift & Shift
Cloud Native
On the cloud, but fighting it
Embracing the cloud, and only the cloud
Cloud Ready
Working with, not against
12 factor apps
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
57. @samnewman
Lift & Shift
Cloud Native
On the cloud, but fighting it
Embracing the cloud, and only the cloud
Cloud Ready
Working with, not against
12 factor apps
Serverless
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
58. @samnewman
An application that is built to take
full advantage of an underlying
cloud platform
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
59. @samnewman
An application that is built to take
full advantage of an underlying
cloud platform
Probably: designed with a specific
platform in mind
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
60. @samnewman
An application that is built to take
full advantage of an underlying
cloud platform
Probably: designed with a specific
platform in mind
Highly-likely: not going to work without
a cloud platform
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
61. @samnewman
CLOUD NATIVE APP CHARACTERISTICS
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
62. @samnewman
Build to scale
CLOUD NATIVE APP CHARACTERISTICS
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
65. @samnewman
Build to scale
Fault-tolerant
Maybe: decomposed into services
Pushes as much work to the platform as possible
CLOUD NATIVE APP CHARACTERISTICS
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
66. @samnewman
Build to scale
Fault-tolerant
Maybe: decomposed into services
Pushes as much work to the platform as possible
Automatable
CLOUD NATIVE APP CHARACTERISTICS
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
74. @samnewman
“Developers turn caffeine into abstractions”
- Brian Marick, possibly
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
87. @samnewman
CNCF PROJECTS -> CLOUD NATIVE PRIMITIVES
https://www.cncf.io/projects/
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
88. @samnewman
“(g) Platform agnostic. The specifications developed will
not be platform specific such that they can be
implemented on a variety of architectures and operating
systems.”
https://www.cncf.io/about/charter/
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
95. @samnewman
https://www.cncf.io/about/charter/
CNCF CHARTER
“The Foundation’s mission is to create and drive the
adoption of a new computing paradigm that is
optimized for modern distributed systems environments
capable of scaling to tens of thousands of self healing
multi-tenant nodes.”
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
109. @samnewman
is it for me?
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
110. @samnewman
You need to be able to buy into a platform
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
111. @samnewman
You need to be able to buy into a platform
You need a continual appetite to assess and
adopt new technology
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
112. @samnewman
You need to be able to buy into a platform
You need a continual appetite to assess and
adopt new technology
You’ll need to learn new skills, and perhaps hire
new types of people
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/
113. @samnewman
You need to be able to buy into a platform
You need a continual appetite to assess and
adopt new technology
You’ll need to learn new skills, and perhaps hire
new types of people
Accept the constraints of the platform(s) you
adopt
Copyright 2018 Sam Newman and Associates Ltd. https://samnewman.io/