Cloud native applications can create enormous business growth and value in a very short amount of time. Take Instagram as one example company. It took only two years to get a net asset value of 1 billion USD. However, cloud-native applications are often characterized by a highly implicit technological dependency on hosting cloud infrastructures. What happens if you are forced to leave your cloud service provider? What happens if your cloud is burning? The project Cloud TRANSIT investigates how to design cloud-native applications and services to reduce technological dependencies on underlying cloud infrastructures.
Presentation at the International Industry-Academia Workshop on Cloud Reliability and Resilience. 7-8 November 2016, Berlin, Germany.
Organized by EIT Digital and Huawei GRC, Germany.
Twitter: @CloudRR2016
Gartner analyzed data centers for a period of 10 years and found that 47% of all problems were caused by cloud services outages. The duration of outages ranged between 40 minutes and five days. Ponemon Institute studied the financial impact and found that on average outages cost US$ 690.204, with an average downtime cost of US$ 6.828 per minute. These results are important due to the economic impact of unplanned outages on cloud operations which calls for higher platform reliability.
The first part of this talk will present the mechanisms that pioneers, such as Amazon, Google, and Netflix, have already developed to increase the reliability of their cloud platforms. The second part of the talk will describe how Huawei Research is exploring the use of fault-injection mechanisms to effectively increase the reliability of the Open Telekom Cloud platform from Deutsche Telekom.
Presentation at the International Industry-Academia Workshop on Cloud Reliability and Resilience. 7-8 November 2016, Berlin, Germany.
Organized by EIT Digital and Huawei GRC, Germany.
Twitter: @CloudRR2016
Gartner analyzed data centers for a period of 10 years and found that 47% of all problems were caused by cloud services outages. The duration of outages ranged between 40 minutes and five days. Ponemon Institute studied the financial impact and found that on average outages cost US$ 690.204, with an average downtime cost of US$ 6.828 per minute. These results are important due to the economic impact of unplanned outages on cloud operations which calls for higher platform reliability.
The first part of this talk will present the mechanisms that pioneers, such as Amazon, Google, and Netflix, have already developed to increase the reliability of their cloud platforms. The second part of the talk will describe how Huawei Research is exploring the use of fault-injection mechanisms to effectively increase the reliability of the Open Telekom Cloud platform from Deutsche Telekom.
Securely move, manage and use data across, on-premise and cloud Anil Titus, Manager, Systems Engineering, South Gulf- Commvault
Alaa Samarji, Sr. Solution Architect, Fujitsu Middle East
OpenStack & the Evolving Cloud EcosystemMark Voelker
OpenStack has come a long way since 2010. What started as a collaboration on compute and storage between NASA and Rackspace has changed dramatically and grown into a large, successful open source project that meets the needs of thousands of organizations. But OpenStack hasn’t evolved in a vacuum over the past seven years: the technology landscape around it has been changing as well. Join VMware’s chief OpenStack architect and longtime community member Mark Voelker for a look at the new technology landscape around OpenStack, how we got here, and where we might go next. We’ll discuss how what started as an IaaS platform ending up being a winning platform for Network Functions Virtualization and telco applications, how OpenStack came to be selected as a common underpinning for container orchestration systems like Kubernetes, how OpenStack governance influenced other open source communities, and how OpenStack changed the way companies looked at Open Source. We’ll consider the role IaaS might play in a future that includes options like functions-as-a-service, containers, and the internet of things. We’ll consider OpenStack as a common foundation for a variety of new technologies, and discuss OpenStack’s lasting impact in the cloud ecosystem. We’ll also discuss how OpenStack is changing and adapting to shifts in the technology landscape, both as an open source community and in terms of product offerings. Learn about new interoperability programs targeted at use cases that didn’t exist seven years ago, and new initiatives from the OpenStack technical community and Foundation.
Interoperable Clouds and How to Build (or Buy) ThemMark Voelker
What's up with interop in OpenStack, Kubernetes, and more!
In this talk we'll discuss interoperability of modern open source cloud platforms and describe how the OpenStack, Kubernetes, and OPNFV communities are working toward interoperability standards for their respective platforms. We'll discuss the need for interoperability standards, the types of problems one may encounter, and why interoperability programs are increasingly a trend in open source infrastructure projects. We'll particularly hone in on the OpenStack Powered program and the work of the OpenStack Interop Working Group. Presented at All Things Open 2017.
A popular pattern today is the injection of declarative (or functional) mini-languages into general purpose host languages. Years ago, this is what LINQ for C# was all about. Now there are many more examples such as the Spark or Beam APIs for Java and Scala. The opposite embedding is also possible: start with a declarative (or functional) language as the outer host and then embed a general purpose language. This is the path we took for Scope years ago (Scope is a Microsoft-internal big data analytics language) and have recently shipped as U-SQL. In this case, the host language is close to T-SQL (Transact SQL is Microsoft’s SQL language for SQL Server and Azure SQL DB) and the embedded language is C#. By embedding the general purpose language in a declarative language, we enable all-of-program (not just all-of stage) optimization, parallelization, and scheduling. The resulting jobs can flexibly scale to leverage thousands of machines.
For the full video of this presentation, please visit:
https://www.embedded-vision.com/platinum-members/embedded-vision-alliance/embedded-vision-training/videos/pages/may-2017-embedded-vision-summit-warden
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Pete Warden, Research Engineer at Google, presents the "Implementing the TensorFlow Deep Learning Framework on Qualcomm’s Low-power DSP" tutorial at the May 2017 Embedded Vision Summit.
TensorFlow is Google’s second-generation deep learning software framework. TensorFlow was designed from the ground up to enable efficient implementation of deep learning algorithms at different scales, from high-performance data centers to low-power embedded and mobile devices. In this talk, Warden presents the technical details of how the TensorFlow and Qualcomm teams collaborated to target TensorFlow to Qualcomm’s low-power Hexagon DSP using Hexagon Vector Extensions, which enables deep learning models to run fast and efficiently.
Warden explains how the two companies split up the work between them and how they measured progress with specific benchmarks, and he looks at some of the code optimizations they implemented. Since the majority of the resulting code has been open-sourced, he's able to dive deeply into the specifics of the implementation decisions they made.
In this deck from the Swiss HPC Conference, Robert Triendly from DDN presents: Long Live Posix - HPC Storage and the HPC Datacenter.
"The Portable Operating System Interface (POSIX) is a family of standards specified by the IEEE Computer Society for maintaining compatibility between operating systems. Since it was developed over 30 years ago, storage has changed dramatically. To improve the IO performance of applications, many users have called for the relaxation in POSIX IO that could lead to the development of new storage mechanisms to improve not only application performance but management, reliability, portability, and scalability."
Watch the video: https://wp.me/p3RLHQ-kaR
Learn more: http://ddn.com
and
http://hpcadvisorycouncil.com/events/2019/swiss-workshop/agenda.php
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Study on Secure Cryptographic Techniques in Cloudijtsrd
Cloud Computing is turning into an increasing number of popular day by day. If the safety parameters are taken care properly many organizations and authorities corporations will flow into cloud technology.one usage of cloud computing is statistics storage. Cloud affords considerable capability of garage for cloud users. It is more reliable and flexible to users to shop and retrieve their facts at whenever and everywhere. It is an increasingly more growing technology. Mariam Fatima | M Ganeshan | Saif Ulla Shariff "Study on Secure Cryptographic Techniques in Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42363.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-network/42363/study-on-secure-cryptographic-techniques-in-cloud/mariam-fatima
Bringing Private Cloud Computing to HPC and Science - Berkeley Lab - July 2014 OpenNebula Project
Berkeley Lab – Computing Sciences Seminar
HPC-optimized clouds provide access to flexible and elastic scientific and technical computing to solve complex problems and drive innovation. The talk will describe the most demanded features for building HPC and science clouds, and will illustrate using real-life case studies from leading research and industry organizations how OpenNebula effectively addresses these challenges of cloud usage, scheduling, security, networking and storage. The keynote will end with a view of private cloud's future in HPC and science, and grid as the foundation of cloud federation.
Securely move, manage and use data across, on-premise and cloud Anil Titus, Manager, Systems Engineering, South Gulf- Commvault
Alaa Samarji, Sr. Solution Architect, Fujitsu Middle East
OpenStack & the Evolving Cloud EcosystemMark Voelker
OpenStack has come a long way since 2010. What started as a collaboration on compute and storage between NASA and Rackspace has changed dramatically and grown into a large, successful open source project that meets the needs of thousands of organizations. But OpenStack hasn’t evolved in a vacuum over the past seven years: the technology landscape around it has been changing as well. Join VMware’s chief OpenStack architect and longtime community member Mark Voelker for a look at the new technology landscape around OpenStack, how we got here, and where we might go next. We’ll discuss how what started as an IaaS platform ending up being a winning platform for Network Functions Virtualization and telco applications, how OpenStack came to be selected as a common underpinning for container orchestration systems like Kubernetes, how OpenStack governance influenced other open source communities, and how OpenStack changed the way companies looked at Open Source. We’ll consider the role IaaS might play in a future that includes options like functions-as-a-service, containers, and the internet of things. We’ll consider OpenStack as a common foundation for a variety of new technologies, and discuss OpenStack’s lasting impact in the cloud ecosystem. We’ll also discuss how OpenStack is changing and adapting to shifts in the technology landscape, both as an open source community and in terms of product offerings. Learn about new interoperability programs targeted at use cases that didn’t exist seven years ago, and new initiatives from the OpenStack technical community and Foundation.
Interoperable Clouds and How to Build (or Buy) ThemMark Voelker
What's up with interop in OpenStack, Kubernetes, and more!
In this talk we'll discuss interoperability of modern open source cloud platforms and describe how the OpenStack, Kubernetes, and OPNFV communities are working toward interoperability standards for their respective platforms. We'll discuss the need for interoperability standards, the types of problems one may encounter, and why interoperability programs are increasingly a trend in open source infrastructure projects. We'll particularly hone in on the OpenStack Powered program and the work of the OpenStack Interop Working Group. Presented at All Things Open 2017.
A popular pattern today is the injection of declarative (or functional) mini-languages into general purpose host languages. Years ago, this is what LINQ for C# was all about. Now there are many more examples such as the Spark or Beam APIs for Java and Scala. The opposite embedding is also possible: start with a declarative (or functional) language as the outer host and then embed a general purpose language. This is the path we took for Scope years ago (Scope is a Microsoft-internal big data analytics language) and have recently shipped as U-SQL. In this case, the host language is close to T-SQL (Transact SQL is Microsoft’s SQL language for SQL Server and Azure SQL DB) and the embedded language is C#. By embedding the general purpose language in a declarative language, we enable all-of-program (not just all-of stage) optimization, parallelization, and scheduling. The resulting jobs can flexibly scale to leverage thousands of machines.
For the full video of this presentation, please visit:
https://www.embedded-vision.com/platinum-members/embedded-vision-alliance/embedded-vision-training/videos/pages/may-2017-embedded-vision-summit-warden
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Pete Warden, Research Engineer at Google, presents the "Implementing the TensorFlow Deep Learning Framework on Qualcomm’s Low-power DSP" tutorial at the May 2017 Embedded Vision Summit.
TensorFlow is Google’s second-generation deep learning software framework. TensorFlow was designed from the ground up to enable efficient implementation of deep learning algorithms at different scales, from high-performance data centers to low-power embedded and mobile devices. In this talk, Warden presents the technical details of how the TensorFlow and Qualcomm teams collaborated to target TensorFlow to Qualcomm’s low-power Hexagon DSP using Hexagon Vector Extensions, which enables deep learning models to run fast and efficiently.
Warden explains how the two companies split up the work between them and how they measured progress with specific benchmarks, and he looks at some of the code optimizations they implemented. Since the majority of the resulting code has been open-sourced, he's able to dive deeply into the specifics of the implementation decisions they made.
In this deck from the Swiss HPC Conference, Robert Triendly from DDN presents: Long Live Posix - HPC Storage and the HPC Datacenter.
"The Portable Operating System Interface (POSIX) is a family of standards specified by the IEEE Computer Society for maintaining compatibility between operating systems. Since it was developed over 30 years ago, storage has changed dramatically. To improve the IO performance of applications, many users have called for the relaxation in POSIX IO that could lead to the development of new storage mechanisms to improve not only application performance but management, reliability, portability, and scalability."
Watch the video: https://wp.me/p3RLHQ-kaR
Learn more: http://ddn.com
and
http://hpcadvisorycouncil.com/events/2019/swiss-workshop/agenda.php
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Study on Secure Cryptographic Techniques in Cloudijtsrd
Cloud Computing is turning into an increasing number of popular day by day. If the safety parameters are taken care properly many organizations and authorities corporations will flow into cloud technology.one usage of cloud computing is statistics storage. Cloud affords considerable capability of garage for cloud users. It is more reliable and flexible to users to shop and retrieve their facts at whenever and everywhere. It is an increasingly more growing technology. Mariam Fatima | M Ganeshan | Saif Ulla Shariff "Study on Secure Cryptographic Techniques in Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42363.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-network/42363/study-on-secure-cryptographic-techniques-in-cloud/mariam-fatima
Bringing Private Cloud Computing to HPC and Science - Berkeley Lab - July 2014 OpenNebula Project
Berkeley Lab – Computing Sciences Seminar
HPC-optimized clouds provide access to flexible and elastic scientific and technical computing to solve complex problems and drive innovation. The talk will describe the most demanded features for building HPC and science clouds, and will illustrate using real-life case studies from leading research and industry organizations how OpenNebula effectively addresses these challenges of cloud usage, scheduling, security, networking and storage. The keynote will end with a view of private cloud's future in HPC and science, and grid as the foundation of cloud federation.
Overcoming Cost Intransparency of Cloud ComputingNane Kratzke
Presentation hold during Cloud Computing Conference 2011 in Noordwijkerhout, Netherlands 2011. This is presentation is about missing cost estimation models in cloud computing and presents firsts considerations how to overcome this.
Sintesis del programa dictado en la materia impacto ambiental en suelos. identificación de problemas y propuesta de soluciones y como utilizar los estudios del suelo en temas de impacto ambiental
Bouwstenen voor succesvol veranderen - TOPdesk Symposium 2012Jordi Recasens
Alle verandering is moeilijk. Waar moet u beginnen? Hoe verlaagt u weerstand? Deze workshop geeft u handvatten om uw processen te verbeteren. Door zelf aan de slag te gaan met LEGO ervaart u welke bouwstenen u nodig heeft om succesvol te veranderen. (workshop door Jordi Recasens en Erikjan Capelleveen op TOPdesk Symposium 2012)
A Case Study of Fairwinds Credit Union’s Groundbreaking Online Insurance Agen...NAFCU Services Corporation
Fairwinds Credit Union launched a successful insurance agency, having over 5,000 members visit and shop for insurance online in just 30 days in this recorded webinar with Insuritas and Fairwinds Credit Union. Download the presentation slides at http://www.nafcu.org/insuritas
Was die Cloud mit einem brennenden Haus zu tun hatNane Kratzke
Ein Motivationsvortrag für hybride Cloud Szenarien im Rahmen einer Veranstaltung des Computermuseums der FH Kiel und der fat it solution GmbH.
Der Vortrag beschäftigt sich mit häufig genannten Bedenken warum Cloud-basierte Geschäftsmodelle vermieden werden: Verfügbarkeit, Sicherheit, Vendor Lock-In (Fokus dieses Vortrags), Kosten.
Und was man dagegen machen kann.
Insights on How to Run a Credit Union: Blending new technologies with traditi...NAFCU Services Corporation
Hear from five thought leaders as they discuss the opportunities and obstacles facing the financial services industry today as it moves firmly into the digital age.Chris Swecker of Swecker Enterprises covers the current state of fraud in banking and explains how data can be used to mitigate it; Jim Goodnight, SAS CEO, explains how a high-performance banking technology framework can provide the next answer to key business questions; Jim Davis, Senior Vice President and Chief Marketing Officer of SAS, shares his insights on why understanding customers' needs will be critical to thriving in the current economic climate; Nobel Laureate Myron Scholes and Alastair Sim, Senior Director of Global Marketing at SAS, address past risk management techniques and how they should evolve. Learn more at http://www.nafcu.org/sas
ClouNS - A Cloud-native Application Reference Model for Enterprise ArchitectsNane Kratzke
The capability to operate cloud-native applications can create enormous business growth and value. But enterprise architects should be aware that cloud-native applications are vulnerable to vendor lock-in. We investigated cloud-native application design principles, public cloud service providers, and industrial cloud standards. All results indicate that most cloud service categories seem to foster vendor lock-in situations which might be especially problematic for enterprise architectures. This might sound disillusioning at first. However, we present a reference model for cloud-native applications that relies only on a small subset of well standardized IaaS services. The reference model can be used for codifying cloud technologies. It can guide technology identification, classification, adoption, research and development processes for cloud-native application and for vendor lock-in aware enterprise architecture engineering methodologies.
About Microservices, Containers and their Underestimated Impact on Network Pe...Nane Kratzke
Microservices are used to build complex applications composed of small, independent and highly decoupled processes. Recently, microservices are often mentioned in one breath with container technologies like Docker. That is why operating system virtualization experiences a renaissance in cloud computing. These approaches shall provide horizontally scalable, easily deployable systems and a high-performance alternative to hypervisors. Nevertheless, performance impacts of containers on top of hypervisors are hardly investigated. Furthermore, microservice frameworks often come along with software defined networks. This contribution presents benchmark results to quantify the impacts of container, software defined networking and encryption on network performance. Even containers, although postulated to be lightweight, show a noteworthy impact to network performance. These impacts can be minimized on several system layers. Some design recommendations for cloud deployed systems following the microservice architecture pattern are derived.
About an Immune System Understanding for Cloud-native Applications - Biology ...Nane Kratzke
Presentation for 9th International Conference on Cloud Computing, GRIDS, and Virtualization (CLOUD COMPUTING 2018) in Barcelona, Spain, 2018.
There is no such thing as an impenetrable system, although the penetration of systems does get harder from year to year. The median days that intruders remained undetected on victim systems dropped from 416 days in 2010 down to 99 in 2016. Perhaps because of that, a new trend in security breaches is to compromise the forensic trail to allow the intruder to remain undetected for longer in victim systems and to retain valuable footholds for as long as possible. This paper proposes an immune system inspired solution which uses a more frequent regeneration of cloud application nodes to ensure that undetected compromised nodes can be purged. This makes it much harder for intruders to maintain a presence on victim systems. Basically the biological concept of cell-regeneration is combined with the information systems concept of append-only logs. Evaluation experiments performed on popular cloud service infrastructures (Amazon Web Services, Google Compute Engine, Azure and OpenStack) have shown that between 6 and 40 nodes of elastic container platforms can be regenerated per hour. Even a large cluster of 400 nodes could be regenerated in somewhere between 9 and 66 hours. So, regeneration shows the potential to reduce the foothold of undetected intruders from months to just hours.
What's next? Emerging trends in cloud computingMartin Hamilton
My talk for the LATi ExpertExchange workshop on the future of cloud computing, covering topics including Docker and OpenStack, and the emergence of high performance public cloud infrastructures such as Azure RDMA.
We have the Bricks to Build Cloud-native Cathedrals - But do we have the mortar?Nane Kratzke
This is some input for a panel discussion about "Challenges of Cloud Computing-based Systems" I attend at the 9th International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2018) in Barcelona, Spain in February 2018.
Cloud-native applications (CNA) are build more and more often according to microservice and independent system architecture (ISA) approaches. ISA involves two architecture layers: the macro and the micro architecture layer. Software engineering outcomes on the micro layer are often distributed in a standardized form as self-contained deployment units (so called container images). There exist plenty of programming languages to implement these units: JAVA, C, C++, JavaScript, Python, R, PHP, Ruby, ... (this list is almost endless) But on the macro layer, one might mention TOSCA and little more. TOSCA is an OASIS deployment and orchestration standard language to describe a topology of cloud based web services, their components, relationships, and the processes that manage them. This works for static deployments. However, CNA are elastic, self-adaptive - almost the exact opposite of what can be defined efficiently using TOSCA. For these kind of scenarios one might mention Kubernetes or Docker Swarm as container orchestrators which are intentionally build to operate elastic services formed of containers. But these operating platforms do not provide expressive and pragmatic programming languages covering the macro layer of cloud-native applications.
So it seems there is a gap and the question arises, whether we need further (and what kind of) macro layer languages for CNA?
Towards a Lightweight Multi-Cloud DSL for Elastic and Transferable Cloud-nati...Nane Kratzke
Cloud-native applications are intentionally designed for the cloud in order to leverage cloud platform features like horizontal scaling and elasticity – benefits coming along with cloud platforms. In addition to classical (and very often static) multi-tier deployment scenarios, cloud-native applications are typically operated on much more complex but elastic infrastructures. Furthermore, there is a trend to use elastic container platforms like Kubernetes, Docker Swarm or Apache Mesos. However, especially multi-cloud use cases are astonishingly complex to handle. In consequence, cloud-native applications are prone to vendor lock-in. Very often TOSCA-based approaches are used to tackle this aspect. But, these application topology defining approaches are limited in supporting multi-cloud adaption of a cloud-native application at runtime. In this paper, we analyzed several approaches to define cloud-native applications being multi-cloud transferable at runtime. We have not found an approach that fully satisfies all of our requirements. Therefore we introduce a solution proposal that separates elastic platform definition from cloud application definition. We present first considerations for a domain specific language for application definition and demonstrate evaluation results on the platform level showing that a cloud-native application can be transfered between different cloud service providers like Azure and Google within minutes and without downtime. The evaluation covers public and private cloud service infrastructures provided by Amazon Web Services, Microsoft Azure, Google Compute Engine and OpenStack.
OpenStack is the prevailing open source cloud software. It includes numerous API services for programmatic management of all sorts of IaaS and SaaS services. VMs, Containers, Bare Metal, Multi-tenancy. Use this platform to strike the right balance between developer self-service to your infrastructure and a well defined platform for next generation containerized microservice applications that your IT department feels happy to support and your CFO would be happy to pay for.
Pat Helland's "book review" of the Above the Clouds: a Berkeley View of Cloud Computing paper.
As Pat says "If you are interested in cloud computing, you want to understand these ideas"
Cloud Busting: Understanding Cloud-based Digital ForensicsKerry Hazelton
Slide deck from the cloud forensics class taught by Tigran Terpandjian and me at BSides Charm 2018. To all who attended - thank you. To those who hung in there until the bitter end during the Cloud Forensic Challenge for those two RasPi 3B+ kits - you guys and gals really impressed us with your forensics skills! We hope to see all of you at the next event!
Smart like a Fox: How clever students trick dumb programming assignment asses...Nane Kratzke
This case study reports on two first-semester programming courses with more than 190 students. Both courses made use of automated assessments. We observed how students trick these systems by analysing the version history of suspect submissions. By analysing more than 3300 submissions, we revealed four astonishingly simple tricks (overfitting, evasion) and cheat-patterns (redirection, and injection) that students used to trick automated programming assignment assessment systems (APAAS). Although not the main focus of this study, it discusses and proposes corresponding counter-measures where appropriate.
Nevertheless, the primary intent of this paper is to raise problem awareness and to identify and systematise observable problem patterns in a more formal approach. The identified immaturity of existing APAAS solutions might have implications for courses that rely deeply on automation like MOOCs. Therefore, we conclude to look at APAAS solutions much more from a security point of view (code injection). Moreover, we identify the need to evolve existing unit testing frameworks into more evaluation-oriented teaching solutions that provide better trick and cheat detection capabilities and differentiated grading support.
#BTW17 on Twitter (Die Bundestagswahl 2017 auf Twitter - war der Ausgang abzu...Nane Kratzke
Es gibt erstaunlich wenig Open Access Twitter-Datensätze . Daher wurden von Juni bis September 2017 Twitter-Interaktionen mit 364 deutschen Politikern des deutschen Bundestags "mitgeschnitten" und als Open Data Datensatz für weitere Analysen aufbereitet. Im Rahmen dessen wurden etwa 120.000 Twitter User erfasst, die gemeinsam über 1.2 Mio. Twitterinteraktionen erzeugt haben. Der Vortrag stellt den Datensatz und seine Erhebungsmethode vor und geht einigen Fragen nach: Z.B. ob es "laute" und "leise" Parteien auf Twitter gibt? Ob und wie sich die politische Nähe von Twitter Nutzern zu Parteien ableiten lässt? Ob sich Twitter als Instrument für die Meinungsforschung eignet und was zu berücksichtigen ist? Und vor allem: War das Wahlergebnis bereits im Vorfeld absehbar?
About being the Tortoise or the Hare? Making Cloud Applications too Fast and ...Nane Kratzke
Cloud applications expose - beside service endpoints - also potential or actual vulnerabilities. And attackers have several advantages on their side. They can select the weapons, the point of time and the point of attack.
Very often cloud application security engineering efforts focus to harden the fortress walls but seldom assume that attacks may be successful. So, cloud applications rely on their defensive walls but seldom attack intruders actively. Biological systems are different. They accept that defensive "walls" can be breached at several layers and therefore make use of an active and adaptive defense system to attack potential intruders - an immune system. This position paper proposes such an immune system inspired approach to ensure that even undetected intruders can be purged out of cloud applications. This makes it much harder for intruders to maintain a presence on victim systems. Evaluation experiments with popular cloud service infrastructures (Amazon Web Services, Google Compute Engine, Azure and OpenStack) showed that this could minimize the undetected acting period of intruders down to minutes.
Serverless Architectures - Where have all the servers gone?Nane Kratzke
Serverless architectures refer to cloud applications that depend substantially on 3rd party services (Backend as a Service, BaaS)
or on custom code that is run in ephemeral deployment units (Function as a Service, FaaS). By moving much behavior to the front end, such architectures reduce the need for ‚always on‘ servers. Therefore, such systems can reduce operational cost and shift operational complexity to BaaS service providers at cost of vendor dependencies and (still) immaturity of supporting services and tools.
This presentation explains the term "Serverless" and how it is changing cloud application architectures. It identifies open issues, benefits and drawbacks, as well as (in-)appropriate use cases for Serverless. It closes with a curated list of Serverless services, standalone platforms and frameworks and provides a list for further reading.
There is no impenetrable system - So, why we are still waiting to get breached?Nane Kratzke
This is some input for a panel discussion about "Security and Safety in Cloud-based Systems and Services" (9th International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2018) in Barcelona, Spain in February 2018).
Although it might be hard to accept. By principle, attackers can establish footholds in our systems whenever they want (zero-day exploits). Cloud application security engineering efforts focus to harden the "fortress walls". Therefore, cloud applications rely on these defensive walls but seldom attack intruders actively. There is the somehow the need for a more reactive component. A component that could be inspired by biological systems. Biological systems consider by design that defensive "walls" can be breached at several layers. So, biological systems provide an additional active defense system to attack potential successful intruders - an immune system. Although several experts find this approach "intriguing", there are follow-up questions arising. What is about exploits that adapt to bio-inspired systems? How to protect the immune system against direct attacks? Are cloud immune systems prone to phenomenons like fever (running hot) or auto-immune diseases (self-attacking)?
Der Bundestagswahlkampf 2017 auf Twitter - War der Ausgang abzusehen?Nane Kratzke
Von Juni bis September wurden Twitter-Interaktionen mit deutschen Politikern des 18. deutschen Bundestags und bundespolitisch relevanten Politikern der FDP und AfD "mitgeschnitten" und als Open Data Datensatz für weitere Analysen aufbereitet. Insgesamt wurden die Accounts von 364 Politikern verfolgt. Im Rahmen dessen wurden etwa 120.000 Twitter User erfasst, die gemeinsam über 1.2 Mio. Tweets erzeugt haben. Dies entspricht einer Stichprobe von etwa 5% des tatsächlichen Traffics auf Twitter. Die Gesamtmenge der erfassten Daten beträgt ca. 10 GB. Der Vortrag stellt erste Erkenntnisse vor, die in diesem Datensatz zu finden sind. Dabei wird einigen Fragen nachgegangen, z.B. ob es "laute" und "leise" Parteien auf Twitter gibt? Lässt sich die politische Nähe von Twitter Nutzern zu Parteien ableiten? Eignet sich Twitter als Instrument für die Meinungsforschung? Und vor allem: War das Wahlergebnis bereits im Vorfeld absehbar?
Smuggling Multi-Cloud Support into Cloud-native Applications using Elastic Co...Nane Kratzke
Elastic container platforms (like Kubernetes, Docker Swarm, Apache Mesos) fit very well with existing cloud-native application architecture approaches. So it is more than astonishing, that these already existing and open source available elastic platforms are not considered more consequently for multi-cloud approaches. Elastic container platforms provide inherent multi-cloud support that can be easily accessed. We present a solution proposal of a control process which is able to scale (and migrate as a side effect) elastic container platforms across different public and private cloud-service providers. This control loop can be used in an execution phase of self-adaptive auto-scaling MAPE loops (monitoring, analysis, planning, execution). Additionally, we present several lessons learned from our prototype implementation which might be of general interest for researchers and practitioners. For instance, to describe only the intended state of an elastic platform and let a single control process take care to reach this intended state is far less complex than to define plenty of specific and necessary multi-cloud aware workflows to deploy, migrate, terminate, scale up and scale down elastic platforms or applications.
Kleine Einführung in die Entwicklung von RESTful APIs mit Dart. Auskopplung eines Foliensatzes aus der Lehrveranstaltung Webtechnologien des Studiengangs Informatik/Softwaretechnik der Fachhochschule Lübeck.
ppbench - A Visualizing Network Benchmark for MicroservicesNane Kratzke
Companies like Netflix, Google, Amazon, Twitter successfully exemplified elastic and scalable microservice architectures for very large systems. Microservice architectures are often realized in a way to deploy services as containers on container clusters. Containerized microservices often use lightweight and REST-based mechanisms. However, this lightweight communication is often routed by container clusters through heavyweight software defined networks (SDN). Services are often implemented in different programming languages adding additional complexity to a system, which might end in decreased performance. Astonishingly it is quite complex to figure out these impacts in the upfront of a microservice design process due to missing and specialized benchmarks. This contribution proposes a benchmark intentionally designed for this microservice setting. We advocate that it is more useful to reflect fundamental design decisions and their performance impacts in the upfront of a microservice architecture development and not in the aftermath. We present some findings regarding performance impacts of some TIOBE TOP 50 programming languages (Go, Java, Ruby, Dart), containers (Docker as type representative) and SDN solutions (Weave as type representative).
Mit Java 8 haben endlich Lambdas in den Sprachumfang von Java Einzug gehalten. Mittels Lambdas lassen sich viele Probleme kurz und prägnant ausdrücken. Vorliegende Auskopplung aus Handouts zur Vorlesung Programmieren I führt Lambdas und Streams ein und erläutert den Einsatz an vielen kleineren Beispielen.
Dies ist der zweite Teil der Tour de Dart. Der erste Teil hat die Sprache Dart an sich betrachtet. Dieser zweite Teil betrachtet erweiterte Aspekte wie:
Das Library System von Dart und den zugehörigen Paketmanager pub. Die asynchrone Programmierung mittels Streams, Futures und Isolates. File I/O mit Dart. Zugriff auf den DOM-Tree mittels Selektoren sowie Event Handling (Client side). Server und Client side Programmierung unter Nutzung von HttpServer, dem Dart webframework Start und Websockets. Datenkonvertierungen (HTML escaping, XSS prevention, decoding and encoding of JSON, base64 encoding and decoding, hashfunction (CryptoUtils)).
Diese Präsentation gibt einen umfassenden Überblick über die Programmiersprache Dart und ihre Konzepte. Um diesen Überblick schnell erfassen zu können, ist es hilfreich eine Programmiersprache wie bspw. Java zu beherrschen sowie die Konzepte der Objektorientierung zu kennen.
Im Teil I wird die Sprache Dart an sich dargestellt. Es wird ein Überblick über die optionale Typisierung, Datentypen, Funktionen, Operatoren, OO-Möglichkeiten sowie Generics in Dart gegeben.
Teil II wird sich dem Library System von Dart sowie der asynchronen Programmierung, der IO Programmierung, der DOM-Tree Programmierung, server- und clientseitiger Programmierung sowie der Konvertierung von Datenformaten widmen.
Cloud Economics in Training and SimulationNane Kratzke
This slide presents a use case how to adopt IaaS cloud computing in higher education. It is shown that virtual labs can provide a more than 25 times cost advantage compared to classical dedicated on-premise in-house labs.
Are cloud based virtual labs cost effective? (CSEDU 2012)Nane Kratzke
Cost efficiency is an often mentioned strength of cloud computing. In times of decreasing educational budgets virtual labs provided by cloud computing might be an interesting alternative for higher education organizations or IT training facilities. This contribution analyzes the cost advantage of virtual educational labs provided via cloud computing means and compare these costs to costs of classical ed- ucational labs provided in a dedicated manner. This contribution develops a four step decision making model which might be interesting for colleges, universities or other IT training facilities planning to implement cloud based training facilities. Furthermore this contribution provides interesting findings when cloud computing has economical advantages in education and when not. The developed four step decision making model of general IaaS applicability can be used to find out whether an IaaS cloud based virtual IT lab approach is more cost efficient than a dedicated approach.
A Case Study About Cloud Based Virtual Labs
Poster presentation on 2nd International Conference on Cloud Computing and Service Sciences (CLOSER 2012).
Case study about cloud based virtual labs and corresponding cost advantage in higher education.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
1. Prof. Dr. Nane Kratzke
What to do if your cloud is burning?
Well, be prepared ...
2. ESCAPE ROUTE (aka Agenda)
2
Burning cloud? What does that mean?
How long is your escape route in cloud computing?
Who takes care for escape routes in cloud computing?
How can escape routes look like in cloud computing?
Why to take the risk?
7. It is simple. They got a promise:
„If something happens, we will get you
out, what ever it takes!“
8. Cloud TRANSIT (a research project to get you out of a cloud)
8
• There are a lot of
approaches to get into
a cloud.
• But almost no
(pragmatic)
approaches exist to
leave a cloud or move
between clouds.
• But: If you know how
to get out, you are
more willing to take the
risk to go in.
9. What does it mean? My cloud is burning ...
Prof. Dr. rer. nat. Nane Kratzke
Praktische Informatik und betriebliche Informationssysteme
9
• Provider is insolvent ...
• Provider rises prices ...
• Provider reduces resource limits ...
• Provider terminates your contract ...
• Provider has availability problems ...
• Changing laws (data protection) ...
• Other governance/compliance reasons (data hosted on US
territory, NSA?)
There are a lot of (hardly predictable) reasons to
leave a cloud service provider.
10. ESCAPE ROUTE (Agenda)
10
Burning cloud? What does that mean?
How long is your escape route in cloud computing?
Who takes care for escape routes in cloud computing?
How can escape routes look like in cloud computing?
Why to take the risk?
11. Example: Instagram
Prof. Dr. rer. nat. Nane Kratzke
Praktische Informatik und betriebliche Informationssysteme
11
• Worldwide social network for image sharing
• 20 employees
• Hosted by Amazon Web Services
• Net asset value of 1 Bill. USD (that paid Facebook)
• No noteworthy IT assets or datacenters (just 20 laptops)
Years
It took only
12. Example: Instagram
Prof. Dr. rer. nat. Nane Kratzke
Praktische Informatik und betriebliche Informationssysteme
12
• Approximately 1 year for analysis and
• development of toolings (especially IP Collision Handling)
• About 4 to 8 weeks for all migration steps (inlcuding severe outages)
Question: How long does it take to transfer all Instagram services and
data into Facebook datacenters?
???
This was no ad-hoc transfer! This was a major project.
13. So, your escape route can be long, ...
... lonely,
cumbersome
and far away from any data highway.
14. ESCAPE ROUTE (Agenda)
14
Burning cloud? What does that mean?
How long is your escape route in cloud computing?
Who takes care for escape routes in cloud computing?
How can escape routes look like in cloud computing?
Why to take the risk?
15. Did you know ...
More than 95% of all enterprises are small enterprises?
Prof. Dr. rer. nat. Nane Kratzke
Praktische Informatik und betriebliche Informationssysteme
15
micro enterprises
small enterprises
medium enterprises
large enterprises
Category Employees Turnover
Micro enterprises < 10 < 2 Mio. €
Small enterprises < 50 < 10 Mio. €
Medium enterprises < 250 < 50 Mio. €
Large enterprises >= 250 >= 50 Mio. €
Distribution of ICT enterprises in the European Union (2014), EUSTAT
16. Current Cloud Computing Research ...
Prof. Dr. rer. nat. Nane Kratzke
Computer Science and Business Information Systems
16
• Has often implicit assumptions:
• Arbitrary companies with
• large IT-staffs providing the capability to handle
• arbitrary complexity of tools and methods.
• These “Super Tankers“ do not have to be afraid
of inconviences like vendor lock-in. They are big
enough to solve the problem ...
17. Our target group is different ...
Prof. Dr. rer. nat. Nane Kratzke
Computer Science and Business Information Systems
17
• Small sailing boat vs. Supertanker (weather)
• Small and medium sized enterprises (SME)
• 1 person IT-staffs
• Public and private cloud computing
• We analyze
• Container technologies (like Docker)
• Container cluster (like Kubernetes, Swarm,
Mesos)
18. According to that ....
Cloud fire protection for
(not just) small
enterprises (that means
95% of all enterprises)
looks like that ...
Prof. Dr. rer. nat. Nane Kratzke
Computer Science and Business Information Systems
18
19. ESCAPE ROUTE (Agenda)
19
Burning cloud? What does that mean?
How long is your escape route in cloud computing?
Who takes care for escape routes in cloud computing?
How can escape routes look like in cloud computing?
Why to take the risk?
20. Good News ...
Prof. Dr. rer. nat. Nane Kratzke
Praktische Informatik und betriebliche Informationssysteme
20
2006
2 cloud services
reflected by cloud
standards
2016
11 cloud services
reflected by cloud
standards
5 times more standardization than 10 years before !!!
Example:
21. But ...
Prof. Dr. rer. nat. Nane Kratzke
Praktische Informatik und betriebliche Informationssysteme
21
2 2
2 4 6
7
7
7 7 11 11
1 1
2 4 7
10
14
21 26 42 44
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
Relation of considered services
considered by CIMI, OCCI, CDMI, OVF, OCI, TOSCA not considered
The relation of services reflected by cloud
standards to cloud services not reflected by
cloud standards decreased over the last 10
years!
Analyzed using over 2300 offical release notes of Amazon Web
Services (AWS). Data for other providers like Google, Azure,
Rackspace, etc. not presented. Basic conclusions for these
providers are the same.
Cloud-native applications
are vulnerable for vendor
lock-in. That is especially
true for SMEs.
22. Cloud-native Applications
Cloud native applications are often characterized by
a highly implicit technological dependency on
hosting cloud infrastructures. The project Cloud
TRANSIT investigates how to design cloud-native
applications and services to reduce technological
dependencies on underlying cloud infrastructures.
DEFINITION: A cloud-native application is a
(micro)service-based, elastic and horizontal
scalable application where each self-contained
deployment unit of that application is designed
according to cloud-focused software design patterns
and operated on a self-service agile elastic platform.
23. The Cloud-Native Reference Model
(ClouNS)
Prof. Dr. rer. nat. Nane Kratzke
Computer Science and Business Information Systems
23
24. Popular Container-based Cluster Platforms ...
Prof. Dr. rer. nat. Nane Kratzke
Computer Science and Business Information Systems
24
Docker Swarm
Swarm Mode (since
Docker 1.12) Clones
Kubernetes-like control
processes but integrates
them in just one
component. Secure by
default (control and data
plane). Hides operation
complexity.
Google
Control processes that
continuously drive current state
of container based applications
towards a defined desired state.
Makes Google‘s experience of
running large scale production
workloads available as open
source.
Mesosphere
Apache Mesos based
datacenter operating system
for fine grained resource
allocation. Frameworks to
operate containers and data
services. Datacenter focused.
Mesos operates successfully
large scale datacenters since
years (Twitter, Netflix, ...)
Practitioners ask for simple solutions (elastic platforms) ...
25. Avoid Vendor Lock-In using already
existing Container-Technologies
Prof. Dr. rer. nat. Nane Kratzke
Praktische Informatik und betriebliche Informationssysteme
25
Operate application on current provider.
Scale cluster into prospective provider.
Shutdown nodes on current provider.
Cluster reschedules lost container.
Migration finished.
Pets
Cattle
It is all about pets vs. cattle!
http://www.theregister.co.uk/2013/03/18/servers_pets_or_cattle_cern/
26. ESCAPE ROUTE (Agenda)
26
Burning cloud? What does that mean?
How long is your escape route in cloud computing?
Who takes care for escape routes in cloud computing?
How can escape routes look like in cloud computing?
Why to take the risk?
27. Prof. Dr. rer. nat. Nane Kratzke
Praktische Informatik und betriebliche Informationssysteme
27
Kostenassoziativät
New Business Models
e.g. cost associativity
e.g. unpredictable workloads
28. Berkley View of Cloud Computing, 2009:
Cost associativity in Cloud Computing
28
It cost the same to operate ...
... 720 machines
for one hour
or one machine for
720 hours.
29. We are afraid of peak loads, but why?
29
„In other words, even if cloud services cost, say,
twice as much, a pure cloud solution makes sense for
those demand curves where the peak-to-average ratio
is two-to-one or higher.“
Weinman, Mathematical Proof of the Inevitability of Cloud
Computing, 2011
http://www.joeweinman.com/Resources/Joe_Weinman_Inevitability_Of_Cloud.pdf
30. Analyzed use case
• Web technology lecture/practical course for
computer science students (bachelor) in summer
2011 and summer/winter 2012.
• Projects: Development of web information
systems (Drupal based)
• All groups were assigned cloud service accounts
provided by Amazon Web Services (AWS).
• Analysis of billing as well as usage data provided
by AWS.
Prof. Dr. rer. nat. Nane Kratzke
Computer Science and Business Information Systems
30
31. Usage Analysis
31
Prof. Dr. rer. nat. Nane Kratzke
Computer Science and Business Information Systems
13 14 15 16 17 18 19 20 21 22 23 24 25
Average Box Usage
Maximum Box Usage in an hour
(A)
Maximum and Average Box Usage
Calendar Week
UsedServerBoxes
01020304050
Training
Project 24x7 Migration
32. Average to Peak Ratio per week
32
Prof. Dr. rer. nat. Nane Kratzke
Computer Science and Business Information Systems
13 14 15 16 17 18 19 20 21 22 23 24 25
Calendar Week
0
14 16 18 20 22 24
0.00.20.40.60.81.0
(C)
Average Box to Maximum Box Ratio
according to Weinman
Calendar Week
AvgtoMaxBoxUsageRatio
Cloud computing is
economical reasonable
Cloud computing
might be reasonable
Cloud computing is
economical not reasonable
33. Economical Decision Analysis
A four step process to decide for or against cloud based virtual labs
Prof. Dr. rer. nat. Nane Kratzke
Computer Science and Business Information Systems
33
A cloud based solution provides a more
than 25 times cost advantage.
The measured ATP ratio of 0.035 means in fact a 1/0.035 ==
28.57 times cost advantage.
This means for the presented use case:
Compared to necessary investment efforts for a classical
dedicated system implementation.
34. Why this big cost advantage?
Prof. Dr. rer. nat. Nane Kratzke
Computer Science and Business Information Systems
34
13 14 15 16 17 18 19 20 21 22 23 24 25
Average Box Usage
Maximum Box Usage in an hour
(A)
Maximum and Average Box Usage
Calendar Week
UsedServerBoxes
01020304050
How to dimensionize the data center? Hmm, peak load ...
peak load
average
load
And the delta?
Measures the overdimension of a data center
35. ESCAPE ROUTE (Agenda)
35
Burning cloud? What does that mean?
How long is your escape route in cloud computing?
Who takes care for escape routes in cloud computing?
How can escape routes look like in cloud computing?
Why to take the risk?
36. Summary
• You want to adopt cloud computing?
• Think about your escape strategy FIRST!
• Support research focussing small and
medium sized enterprises (it does not cost
sooo much)
• That supports 95% of all enterprises
• (and not only 5% supertankers)
• New (maybe disruptive?) business models ...
• Cost associativity
• Cost advantages for non-static of
unpredictable workloads
37. Acknowledgement
• All Pictures taken from Pixabay.com (CC0 Licence)
Prof. Dr. rer. nat. Nane Kratzke
Computer Science and Business Information Systems
37
Our research is funded by German Federal Ministry of Education and Research
(Project Cloud TRANSIT, 03FH021PX4). We thank fat IT solution GmbH (Kiel)
for their support of Cloud TRANSIT.
Picture Reference
Presentation URL
38. About
Prof. Dr. rer. nat. Nane Kratzke
Computer Science and Business Information Systems
38
CoSA: https://cosa.fh-luebeck.de/en/contact/people/n-kratzke
Blog: http://www.nkode.io
Twitter: @NaneKratzke
GooglePlus: +NaneKratzke
LinkedIn: https://de.linkedin.com/in/nanekratzke
GitHub: https://github.com/nkratzke
ResearchGate: https://www.researchgate.net/profile/Nane_Kratzke
SlideShare: http://de.slideshare.net/i21aneka
Prof. Dr. rer. nat.
Nane Kratzke