I gave this presentation at the Oracle InSync09 Conference in Sydney in May 2009. It's all about Oracle Coherence - Napster for the enterprise - and how you can use it to get the most out of your applications.
Use Coherence like our customers are doing today;
- Sharing web session state across multiple portals
- Caching the results of calls to back end systems
- State management for stateful services, bring the processing to the data
- Process large XML payloads more quickly and efficiently
The document discusses implementing a service-oriented architecture (SOA) for the US government. It notes that a survey found 56% of federal IT professionals believe their agency would benefit from an SOA. It provides tips for making an SOA successful, including understanding business objectives and defining value, focusing on understanding requirements, considering people impacts, and taking a long-term focus.
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAAkamai Technologies
Maintaining the Balance: Getting the Most of Your CDN by Johannes Eckerdal, Product Specialist, IKEA
Join Johannes Eckerdal, CDN Product Specialist of Ikea for an informative supersession where he will discuss how to transform your Content Delivery Network into an Experience Delivery Network and other topics including: Why the Edge matters, Considerations around CDN agnostic versus CDN dependent approaches, How to extract the most of your CDN
Akamai Edge is the premier event for Internet innovators, tech professionals and online business pioneers who together are forging a Faster Forward World. At Edge, the architects, experts and implementers of the most innovative global online businesses gather face-to-face for an invaluable three days of sharing, learning and together pushing the limits of the Faster Forward World. Learn more at: http://www.akamai.com/edge
This document summarizes a guest lecture at UNSW about contemporary software challenges and solutions. It discusses how technology can provide a competitive advantage if developed properly. It presents case studies of legacy systems that were difficult to change and scale, as well as examples of systems that used newer architectures like microservices. The lecture promotes approaches like test-driven development, REST, and self-organizing teams to build independent, scalable services.
Learn about recent advances in MongoDB in the area of In-Memory Computing (Apache Spark Integration, In-memory Storage Engine), and how these advances can enable you to build a new breed of applications, and enhance your Enterprise Data Architecture.
The Why and How of Applications with APIs and microservicesRonald Ashri
This document discusses how to build Drupal applications using microservices and APIs. It begins with background on microservices and the problems they aim to solve like speed, scalability, resilience and testability. It then covers microservice principles like bounded context and independent deployability. The document discusses microservice architecture, integration using message-based approaches and asynchronous messaging. It provides an example of a hotel booking service broken into multiple microservices. It concludes with notes on testing, monitoring, security and API gateways when using a microservices approach.
Christian's part of the AWS re:Invent 2015 talk shared with Sajee Mathew - ARC304 - Designing for SaaS: Next Generation Software Delivery Models on AWS. Full video of the 60 minute presentation: https://www.youtube.com/watch?v=d16aUztH9hk&list=PLhr1KZpdzukdRxs_pGJm-qSy5LayL6W_Y
Serverless Design Patterns for Rethinking Traditional Enterprise Application ...Amazon Web Services
AWS Lambda is a powerful and flexible tool for solving diverse business problems, from traditional grid computing to scheduled batch processing workflows. Cloud native solutions using AWS Lambda enable architectures that depart from traditional enterprise application design. These new design patterns can provide substantially increased performance and reduced costs. In this session, learn how Fannie Mae re-architected one of their mission-critical traditional grid computing applications to a modern serverless solution using AWS Lambda. Learn More: https://aws.amazon.com/government-education/
The document compares two technologies, SAS and SAP, to determine which is better for corporate enterprises. SAS (Statistical Analysis System) is statistical analysis software that originated from North Carolina State University in 1976. It provides data management, analytics, and business intelligence capabilities. SAP (Systems, Applications, and Products in Data Processing) offers enterprise resource planning software that integrates business processes. The document discusses the benefits of each technology, including SAS's high performance, reliability, and scalability, as well as SAP's integration, customization, and functionality. It aims to help readers understand the characteristics of SAS and SAP to choose the right solution for their requirements.
The document discusses using MapReduce for a sequential web access-based recommendation system. It explains how web server logs could be mapped to create a pattern tree showing frequent sequences of accessed web pages. When making recommendations for a user, their access pattern would be compared to patterns in the tree to find matching branches to suggest. MapReduce is well-suited for this because it can efficiently process and modify the large, dynamic tree structure across many machines in a fault-tolerant way.
The document discusses the benefits of conventions in Rails and the need for conventions in building APIs and client-side frameworks. It argues that conventions save developers from having to make trivial decisions and push problems into shared solutions. While Rails has benefited from conventions like REST, there is still room to improve APIs and make them as transparent as ActiveRecord. ActiveModel::Serializers is presented as one approach to provide conventions for serialization. The document also discusses how conventions could improve browser frameworks and application structure beyond just code organization.
Managed MPLS vs "wires only" VPLS. As technologies both VPLS and MPLS offer a
number of business benefits. However, there
are key operational differences between the
two, and the old adage stands – ‘do you really
know what you are buying’?
This proposal recommends strategies for a new bank entering the Malaysian market. It suggests a location that is strategic, accessible by various transportation, and near other businesses. It also recommends using EMC storage solutions like SAN and CAS technologies for data backup and management. RAID-6 is proposed for its ability to store large amounts of customer data safely while tolerating two simultaneous drive failures. Finally, suitable hot and cold site options are presented to ensure business continuity in case of a disaster.
At 306 Case Study The Newest Shipping Systems Its All About Rapid Informa...oscarmurray
Oscar Murray presented on a new methodology for shipping systems that integrates web services to leverage the flexibility of home-grown systems and speed of third-party solutions. This allows decreasing deployment time, increasing carrier options and functionality. Murray described how a pharmaceutical company benefited from integrating their SAP system with a third-party shipping suite using web services to eliminate issues and save 4-7% on shipping costs. Murray emphasized the importance of thorough planning, documentation, and addressing all business requirements when developing shipping systems.
- The document discusses maximizing economies of scale through a Virtual Operating System (VOS) Cloud that allows for dynamic allocation of resources and reduces server count by 50%.
- It describes how moving to a model of dynamic resource allocation on demand could significantly reduce operating costs by eliminating thousands of servers, applications, and associated software/hardware but may face resistance from vendors.
- Implementing such a large-scale change would require significant executive support, cooperation across IT teams, and a careful design and implementation approach led by a single person focused on the infrastructure teams.
Message queues at Salesforce allow for asynchronous processing of jobs like dashboards, reports, and bulk API calls. Salesforce sees around 60 million messages per day across instances, with peak instances processing 10 million daily. The queues use a large, shared thread pool for round-robin processing to reduce wait times, allocate resources fairly, and adapt to varying traffic patterns. Elastic thread pools allow the system to grow and shrink processing capacity based on current demand and wait times.
The document discusses how the economics of cloud computing will change how Java applications are developed and deployed. Specifically:
1. In cloud computing, customers pay for computing resources like CPU and RAM on an hourly basis, creating a direct link between cost and resource usage. This will drive Java applications to use fewer resources to reduce costs.
2. Java applications will need to have faster startup times, smaller footprints, and be designed to fail and recover quickly to work well in cloud environments.
3. The growth of APIs and sharing data/services means Java developers will need to focus on building reliable, performant, and well-documented APIs to monetize data and services.
4. Significant changes
Everything you want to know about microservicesYouness Lasmak
Introduction to microservices architecture, each chapter in the presentation target a step in your journey to build distributed system based on micro-services architecture form the design to the delivery
check my the explanation on the YouTube playlist
https://youtube.com/playlist?list=PLl0FlSJn8Rjxyo7Qx0JEOhLap9u6Lc-Bf
and on the CloudReady blog
https://www.cloudready.club
This document discusses best practices and potential pitfalls when moving processes and applications to software as a service (SaaS) models. It notes that SaaS can provide operational efficiencies but also new types of vendor lock-in and loss of control. The document provides many questions to ask SaaS providers regarding data ownership, customization capabilities, service level agreements, privacy and more. It warns that unforeseen consequences may arise from issues like infrastructure transparency, dependency on providers, management of multiple SaaS tools, and security risks if user accounts are compromised.
2019 StartIT - Boosting your performance with BlackfireMarko Mitranić
A workshop held in StartIT as part of Catena Media learning sessions.
We aim to dispel the notion that large PHP applications tend to be sluggish, resource-intensive and slow compared to what the likes of Python, Erlang or even Node can do. The issue is not with optimising PHP internals - it's the lack of proper introspection tools and getting them into our every day workflow that counts! In this workshop we will talk about our struggles with whipping PHP Applications into shape, as well as work together on some of the more interesting examples of CPU or IO drain.
This slide contains a brief presentation of how Organizations can leverage Cloud to virtualize functional/performance testing and cost benefit from investing in hardware.
Oracle Apps Day Fusion Middleware KeynoteSean Boiling
Standardisation. Simplification. Rationalisation
November 2009. A keynote presentation aimed at an audience of Oracle Applications users - Siebel, PeopleSoft, Oracle E-business Suite etc... on how they could think about using for Oracle Fusion Middleware in their organisations.
Australian Oracle Users Group - Middleware for InnovationSean Boiling
The document discusses common myths around middleware projects and how Oracle Fusion Middleware addresses them. It provides examples of customers who implemented Oracle Fusion Middleware solutions to streamline processes like order-to-cash automation, onboarding/offboarding, and self-service enablement. Project timelines ranged from 2-6 months and provided measurable benefits like cost reduction, time savings, and improved efficiencies.
Tomorrow, and tomorrow, and tomorrow,
Creeps in this petty pace from day to day,
To the last syllable of recorded time;
And all our yesterdays have lighted fools
The way to dusty death. Out, out, brief candle!
Life's but a walking shadow, a poor player,
That struts and frets his hour upon the stage,
And then is heard no more. It is a tale
Told by an idiot, full of sound and fury,
Signifying nothing.
Middleware and virtualization. Now with added Shakespeare! Read on...
Next Generation Grid Enabled SOA - July2008Sean Boiling
I gave this presentation at the Gartner Application Integration, Development and Web Services (ADIWS) conference in Sydney, Australia on July 1st 2008.
Thanks to my colleague David Chappell for coming up with the hard content, and thanks to flickr.com for the images.
-sean
How Netflix Builds High Performance Applications at Global ScaleScyllaDB
We all want to build applications that are blazingly fast. We also want to scale them to users all over the world. Can the two happen together? Can users in the slowest of environments also get a fast experience? Learn how we do this at Netflix: how we understand every user's needs and preferences and build high performance applications that work for every user, every time.
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Chris Swan
Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge.
You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter.
The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.
AC Atlassian Coimbatore Session Slides( 22/06/2024)apoorva2579
This is the combined Sessions of ACE Atlassian Coimbatore event happened on 22nd June 2024
The session order is as follows:
1.AI and future of help desk by Rajesh Shanmugam
2. Harnessing the power of GenAI for your business by Siddharth
3. Fallacies of GenAI by Raju Kandaswamy
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
Hire a private investigator to get cell phone recordsHackersList
Learn what private investigators can legally do to obtain cell phone records and track phones, plus ethical considerations and alternatives for addressing privacy concerns.
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecJames Anderson
The lecture titled "Automating AppSec" delves into the critical challenges associated with manual application security (AppSec) processes and outlines strategic approaches for incorporating automation to enhance efficiency, accuracy, and scalability. The lecture is structured to highlight the inherent difficulties in traditional AppSec practices, emphasizing the labor-intensive triage of issues, the complexity of identifying responsible owners for security flaws, and the challenges of implementing security checks within CI/CD pipelines. Furthermore, it provides actionable insights on automating these processes to not only mitigate these pains but also to enable a more proactive and scalable security posture within development cycles.
The Pains of Manual AppSec:
This section will explore the time-consuming and error-prone nature of manually triaging security issues, including the difficulty of prioritizing vulnerabilities based on their actual risk to the organization. It will also discuss the challenges in determining ownership for remediation tasks, a process often complicated by cross-functional teams and microservices architectures. Additionally, the inefficiencies of manual checks within CI/CD gates will be examined, highlighting how they can delay deployments and introduce security risks.
Automating CI/CD Gates:
Here, the focus shifts to the automation of security within the CI/CD pipelines. The lecture will cover methods to seamlessly integrate security tools that automatically scan for vulnerabilities as part of the build process, thereby ensuring that security is a core component of the development lifecycle. Strategies for configuring automated gates that can block or flag builds based on the severity of detected issues will be discussed, ensuring that only secure code progresses through the pipeline.
Triaging Issues with Automation:
This segment addresses how automation can be leveraged to intelligently triage and prioritize security issues. It will cover technologies and methodologies for automatically assessing the context and potential impact of vulnerabilities, facilitating quicker and more accurate decision-making. The use of automated alerting and reporting mechanisms to ensure the right stakeholders are informed in a timely manner will also be discussed.
Identifying Ownership Automatically:
Automating the process of identifying who owns the responsibility for fixing specific security issues is critical for efficient remediation. This part of the lecture will explore tools and practices for mapping vulnerabilities to code owners, leveraging version control and project management tools.
Three Tips to Scale the Shift Left Program:
Finally, the lecture will offer three practical tips for organizations looking to scale their Shift Left security programs. These will include recommendations on fostering a security culture within development teams, employing DevSecOps principles to integrate security throughout the development
What Not to Document and Why_ (North Bay Python 2024)Margaret Fero
We’re hopefully all on board with writing documentation for our projects. However, especially with the rise of supply-chain attacks, there are some aspects of our projects that we really shouldn’t document, and should instead remediate as vulnerabilities. If we do document these aspects of a project, it may help someone compromise the project itself or our users. In this talk, you will learn why some aspects of documentation may help attackers more than users, how to recognize those aspects in your own projects, and what to do when you encounter such an issue.
These are slides as presented at North Bay Python 2024, with one minor modification to add the URL of a tweet screenshotted in the presentation.
The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Invited Remote Lecture to SC21
The International Conference for High Performance Computing, Networking, Storage, and Analysis
St. Louis, Missouri
November 18, 2021
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/07/intels-approach-to-operationalizing-ai-in-the-manufacturing-sector-a-presentation-from-intel/
Tara Thimmanaik, AI Systems and Solutions Architect at Intel, presents the “Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” tutorial at the May 2024 Embedded Vision Summit.
AI at the edge is powering a revolution in industrial IoT, from real-time processing and analytics that drive greater efficiency and learning to predictive maintenance. Intel is focused on developing tools and assets to help domain experts operationalize AI-based solutions in their fields of expertise.
In this talk, Thimmanaik explains how Intel’s software platforms simplify labor-intensive data upload, labeling, training, model optimization and retraining tasks. She shows how domain experts can quickly build vision models for a wide range of processes—detecting defective parts on a production line, reducing downtime on the factory floor, automating inventory management and other digitization and automation projects. And she introduces Intel-provided edge computing assets that empower faster localized insights and decisions, improving labor productivity through easy-to-use AI tools that democratize AI.
Implementations of Fused Deposition Modeling in real worldEmerging Tech
The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries:
1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes.
2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions.
3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines.
4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors.
5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering.
6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands.
7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems.
8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering.
9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively.
Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threatsanupriti
In the rapidly evolving landscape of blockchain technology, the advent of quantum computing poses unprecedented challenges to traditional cryptographic methods. As quantum computing capabilities advance, the vulnerabilities of current cryptographic standards become increasingly apparent.
This presentation, "Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats," explores the intersection of blockchain technology and quantum computing. It delves into the urgent need for resilient cryptographic solutions that can withstand the computational power of quantum adversaries.
Key topics covered include:
An overview of quantum computing and its implications for blockchain security.
Current cryptographic standards and their vulnerabilities in the face of quantum threats.
Emerging post-quantum cryptographic algorithms and their applicability to blockchain systems.
Case studies and real-world implications of quantum-resistant blockchain implementations.
Strategies for integrating post-quantum cryptography into existing blockchain frameworks.
Join us as we navigate the complexities of securing blockchain networks in a quantum-enabled future. Gain insights into the latest advancements and best practices for safeguarding data integrity and privacy in the era of quantum threats.
AI_dev Europe 2024 - From OpenAI to Opensource AIRaphaël Semeteys
Navigating Between Commercial Ownership and Collaborative Openness
This presentation explores the evolution of generative AI, highlighting the trajectories of various models such as GPT-4, and examining the dynamics between commercial interests and the ethics of open collaboration. We offer an in-depth analysis of the levels of openness of different language models, assessing various components and aspects, and exploring how the (de)centralization of computing power and technology could shape the future of AI research and development. Additionally, we explore concrete examples like LLaMA and its descendants, as well as other open and collaborative projects, which illustrate the diversity and creativity in the field, while navigating the complex waters of intellectual property and licensing.
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Supercharge Your Applications
1. Pop quiz… who’s this? Ian Fleming – creator of James Bond Second question what was James Bonds first car?
2. It was this (not the Aston Martin DB5 from the 1964 movie ‘Goldfinger’) in the first Bond novel, 'Casino Royale' published in 1953 Fleming put our James in one of these. This is a 4.5 litre supercharged Bentley from the 1920’s. W.O. Bentley famously said when talking about engine performance - "there's no replacement for displacement". One of his engineers said ah ha, I'll show you, and bolted a supercharger on to the engine of the regular 4.5 litre Bentley - the supercharger is the big silver box on the front of this car - forcing more oxygen into the engine allowing more fuel to be burnt and increasing performance. Now that's exactly what I'm going to outline for you in this presentation, how you can bolt on some currently available technology to increase the performance of your applications.
3. co·her·ence I'm going to start with an overview of the supercharger - Oracle Coherence - what it is and how it works. And then show how it can be used and is being used by our customers to increase performance, reduce costs and improve user experience. What does coherence mean? Well, it’s defined as the state of cohering or sticking together, or the logical and orderly and consistent relation of parts. I like that, logic, order, consistency.
4. “ If you want a 3 second response time. You’ve got 3 seconds. 1 in the presentation layer, 1 in the mid-tier and 1 in the back end” This quote from the CIO of one of our customers really sums up the problem space that we’re in here. If you want a ‘n’ second response time then you only have ‘n’ seconds to deliver that. There are no silver medals for second place in the response time Olympics.
12. Avoid driving increased traffic to back end systems I like this one a lot... and it's a classic SOA example, and if it's a mainframe there's a monetary cost in terms of haw many MIPS you need to pay for, using the technologies described here you can actually reduce the traffic to the back ends, reduce the MIPS that you're paying for.
13. Value simplicity. Maximize the amount of work not done Thanks to the Agile Alliance for this one – more details here http://agilemanifesto.org/principles.html
19. We're trying to achieve business agility, business alignment, so that when a line of business comes to IT and says government legislation on superannuation just changed, make our systems change to reflect it. IT can say sure thing rather than suck it's teeth and say, "it's gonna cost ya" like some dodgy plumber.
26. And then there's this organisational tension that developing between the SOA architects who come up with these pristine blueprints for how the IT world should look within their organisation and then they hand that off…
27. … to IT operations and say make that run, make it highly available, make it high performance, ensure that it will scale. And today there is too tight a coupling between those two sets of folks - between the people that design the architecture and the people that have to operate it. For example, what does it mean to scale up the order to cash process? That process might consist of 42 different services across 8 machines. How do IT ops go about bringing some scale to that process at the same as managing the end of month financial close and keeping the lights on and fixing the printer on level 6 while resetting my password?
33. So thinking about state and state management we have this continuum that runs from completely stateless to fully stateful. and there are a few things that can affect or influence this - one is complexity - the more complex a service the more likely it is that it will need to manage state across multiple requests coming in and out of the service, and the longevity of the service - how long the service needs to run to satisfy a particular business transaction. Service Sophistication, Longevity Complex Stateless Cookies + Servlet Session State passing via XML Payloads Loose Coupling, Tight Coupling Service Complexity Stateful Service State Repository Simple
34. state aware So that's where we are... where should we be?
37. Next pop quiz question, who knows what this is? That’s right, Napster. Remember Napster? Well think of Coherence like Napster for your business data - highly available, highly distributed peer to peer clustering protocol.
38. P B Backup Node Primary Node Put() HashKey/CacheKey Hashmap iFace Here's a picture of how it works. At the core are a set of connected network nodes - software processes, which cooperate together across a network, with the sole purpose of storing and maintaining instance data for individual application objects. An application does a ‘put’, that operation is delegated to the grid and the grid automatically elects a primary storage node and a backup storage node on another machine and it does that in a highly available way. So each of these nodes is on a different physical server, and each knows about each other, they are aware of each other existence, health, availability etc... If the primary owner goes down the grid detects that and selects a new primary and backup pair. And this switching this failover can happen in flight without affecting a transaction because of the self-healing nature of the grid. Application Object Application Object Application Object
39. Put() HashKey/CacheKey Hashmap iFace P B Backup Node Primary Node X Application Object Application Object Application Object
40. Put() HashKey/CacheKey Hashmap iFace P B Backup Node Primary Node X Application Object Application Object Application Object
41. Backup Node Primary Node Write Behind Queue DB Grid Put() HashKey/CacheKey ESB Mediation P B Service Service Service
48. Solution Coherence solution provides caching for the data and no loss of connections to the back-end systems Customers can shop between different brands - Gap, Banana Republic, Old Navy and Piperlime without having to check out between sites Problem On-line store shopping cart would lose connections to back-end servers, causing users to re-select the items and add to shopping cart, causing loss of sales and low customer satisfaction Slow on-line store performance Scenario Online retail store High availability of the web site, shopping cart, over 4 distinct brands
51. Solution Coherence solution provides caching – side-cache - for the multi page sales histories One call to the back end and then 9 calls to the cache to get 10 pages of data. Problem Costly to continue to hit the back end for every ‘next’ page of data Slow on-line performance in the field Un-necessary interaction Scenario Sales application Large volumes of sales data retrieved – multi page histories
54. Solution Moving event processing into application tier increased capacity to handle peak loads Enabled application developers to modify logic without impacting the database; operational cost savings & increased flexibility Problem Matching engine supporting several thousand matches per second, with intense “hot spots” on specific instruments Revenue tied directly to customer activity. Need for high-throughput, low-latency solution for financial transactions Scenario Expanding their infrastructure to handle increased traffic Looking for an event-driven architecture, treating bids as incoming events, modifying the state of bidding markets, and dispatching matched bids
56. So this picture is fairly typical - every vendor of a Service Bus could draw out this picture - they all use some sort of Message Oriented Middleware (MOM) to achieve high reliability and quality of service - and I'm using MOM here to cover anything that's JMS based or MQ based or Rendezvous based or implements WS-RM - all those similar techniques of message retries and store and forward to reliably send data from one place to the next... And then it dawned on us, why do I have to send something, when it really doesn't have to go anywhere? Everything is already in the grid. All interested parties can act on it. Why do I have to put it in a big JMS message or a big SOAP message and put it into the bus and send it across the wire just so someone can take it out again - if all you really want to do is share that information reliably? So this is what the new bus looks like. Same as the old but without some MOM implementation at the core. There's just no need when the data is in the grid and everyone can access it. Web Service Consumer WS-A ddr <ReplyTo> Callback Portal BPEL CRM ERP CEP Rules BAM JMS / MOM / WS-RM Core Web Service Provider
57. Web Service Consumer WS-A ddr <ReplyTo> Callback Portal BPEL CRM ERP CEP Rules BAM Web Service Provider
58.
59. The XTPP — a new generation of platform middleware meant to enable low-cost, commodity hardware-based XTP — is emerging from the convergence of current enterprise application servers, enterprise service buses, flow management technology and innovative XTP point technologies. Massimo Pezzini, Gartner
64. “ Major, often unexpected, changes will directly affect IT organizations in 2009. The successful CIOs will be those who execute well, expand their influence within the enterprise, and, perhaps, are a little bit lucky.” Stefan Spang, McKinsey