The document discusses cloud orchestration and Wayin's use of AWS CloudFormation templates to automate the deployment and management of their infrastructure. It provides an overview of cloud orchestration and defines it as automating infrastructure to dynamically allocate resources based on demand. It then details Wayin's specific application architecture and how they use CloudFormation templates to automate scaling, deployments, backups and the creation of related AWS resources in a repeatable and predictable manner. It acknowledges that while CloudFormation introduces some vendor lock-in, their application code itself remains decoupled from AWS dependencies.
Confluence Connect has added APIs and enhanced macros – but we didn't stop there. We've also introduced new types of add-ons: theming, workflows, and custom content. Confluence product manager Brian Swift will cover each of these, including the building blocks you'll need and examples of how to use them. He'll also show you how to integrate these types of add-ons with Confluence features to provide a great experience for users. There's never been a better time to create add-ons to satisfy more Confluence use cases!
Ben Mackie, Head of Confluence Engineering, Atlassian
Brian Swift, Principal Product Manager, Atlassian
Preparing for Data Residency and Custom DomainsAtlassian
Atlassian customers have long requested the ability to control where they host their content in Atlassian Cloud. They’ve also long desired the ability to configure their cloud products to be accessible via a custom domain. These features are coming soon to Jira and Confluence Cloud! What will this mean for Marketplace app developers?
Join Nuwan Ginige, Principal Product Manager on the Cloud Platform team, as he walks through how the evolution of Atlassian’s cloud platform has shaped the development of these capabilities. Learn how these changes will impact Marketplace apps, and how you can get involved in app vendor early access progress before general availability.
Learn how we built search for Bitbucket Cloud using a Microservices approach, leveraging the foundation we shipped in Bitbucket Server. Hear about the challenges faced when building search for millions of users, building on top of the Bitbucket Connect platform, the approach the team took, and the lessons we learned.
Stefan Saasen, Bitbucket Architect, Atlassian
Building a Mobile Data Platform with Cassandra - Apigee Under the Hood (Webcast)Apigee | Google Cloud
The document discusses Usergrid, an open source mobile backend platform built on Apache Cassandra. It provides capabilities like API management, analytics, and tools. Usergrid allows building mobile and rich client apps without needing a web stack. It highlights key features like being platform agnostic, flexible data modeling, and multi-tenancy using virtual keyspaces in Cassandra. The document also discusses how Usergrid implements shared schemas and keyspaces in Cassandra to provide isolation and scale for multiple teams and applications.
This document provides an overview of Firebase and how to use it with Android applications. It discusses Firebase features like the realtime database, authentication, and hosting. It then covers how to set up a Firebase project in Android Studio, write and read data from the Firebase database using the SDK, handle different types of read events, query data, and secure data with security rules. Authentication options like custom authentication are also explained. Code samples are provided for common tasks like writing, reading, and querying data.
Integration Testing on Steroids: Run Your Tests on the Real ThingsAtlassian
At AtlasCamp 2018, Jon Mort and Mark Gibson from Adaptavist gave a presentation about how they brought Arquillian into the Atlassian SDK.
In this talk, Jörg Brandstätt from Resolution will help you to put their learnings into practice and take your tests to the next level. He will also share how Resolution is using this approach to test some of the Top 30 Server & Data Center apps.
The session covers how you can run your test code on remote Server and Data Center instances with different databases ad-hoc from within your IDE and during the build process, and provide detailed information about how to set up Maven to execute your tests within your Bitbucket build pipelines.
Bringing Server Add-ons to the Cloud and Back AgainAtlassian
Ever wanted to be a fly on the wall in someone else's retrospective? Now you can! Join Jon Mort and Adam Markham from Adaptavist as they walk us through recent lessons learned from their team. Hear how ScriptRunner, Adaptavist's popular Automation add-on moved into the cloud. Learn about the parts they loved as well as challenges and frustrations they faced. This honest and open talk will be easy for any add-on developer to relate to.
Jon Mort, Head of Engineering Research and Development, Adaptavist
Adam Markham, Software Developer, Adaptavist
Integrating Jira Software Cloud With the AWS Code SuiteAtlassian
This document discusses integrating Jira Software Cloud with the AWS Code Suite. It covers using Atlassian Connect and Spring Boot to build a Jira app, deploying the necessary AWS infrastructure including ECS, CodePipeline, Lambda, and ECR, and using Lambda functions and triggers to integrate development workflows and send build data from AWS to Jira. The presentation provides an overview of the key AWS services and development tools used, sample code and configurations, and best practices for building and hosting containerized Jira apps on AWS.
Parse: A Mobile Backend as a Service (MBaaS)Ville Seppänen
Parse is a mobile backend as a service (MBaaS), a subcategory of PaaS. This is a presentation evaluating the service for a post-graduate seminar course.
This document provides an overview of the Parse platform and its capabilities for building mobile and web applications. It describes Parse Core which allows storing and querying data in the cloud. It also covers user authentication, social integration, push notifications, cloud code, and analytics tracking. The document shows how to perform common tasks like saving and querying objects, user signup/login, and sending push notifications. It emphasizes that Parse provides a full backend as a service to focus on app business logic and UI rather than operations.
This document discusses various topics related to AWS Identity and Access Management (IAM), including:
1. An overview of IAM roles, policies, and the Security Token Service (STS), as well as a discussion on compliance and security.
2. Details about upcoming meetup topics on Virtual Private Cloud (VPC) networking and AWS Organizations.
3. Examples and explanations of IAM policies, roles, resource-based vs user-based policies, policy variables, Amazon Resource Names (ARNs), and other IAM concepts.
4. A demonstration of custom login URLs and switching roles in the AWS Management Console.
Making connected apps with BaaS (Droidcon Bangalore 2014)Varun Torka
The document discusses backend-as-a-service (BaaS) platforms like Parse.com that allow developers to harness cloud computing power without having to manage complex backend infrastructure. It explains how BaaS handles scalability, maintenance, failures and other issues automatically. The document also provides examples of common tasks that can be done using a BaaS like Parse.com, such as user login/authentication, database operations, file storage and retrieval.
Jason Chan gave a presentation on AWS security at SAINTCON 2014. He began with an overview of typical AWS setups and then focused on three main areas: shared responsibility between AWS and customers, access controls and permissions, and account segregation. For each area, he provided tips on best practices as well as potential security traps to avoid. He also discussed tools for monitoring AWS security configurations and activity, such as CloudTrail, Trusted Advisor, and the Edda service created at Netflix.
Ten Battle-Tested Tips for Atlassian Connect Add-onsAtlassian
The document provides 10 tips for building battle-tested Atlassian Connect add-ons:
1. Automate deployments so they are a single button press.
2. Create rules for deploying to production to make it easy and safe.
3. Understand dependencies and implications of what is built and used.
4. Use other services where it makes sense to avoid reinventing the wheel.
5. Monitor components, servers, applications, users to know where failures happen.
6. Have recovery plans tested regularly to prepare for failures.
7. Handle failures by focusing on fixing issues with notifications and status updates.
8. Plan for traffic patterns to ensure scaling is possible when needed.
Atlassian Connect on Serverless Platforms: Low Cost Add-OnsAtlassian
Join Atlassian developer Patrick Streule to learn about a Java- and JavaScript-based framework that makes it easy for developers to create and deploy serverless add-ons, thanks to platforms like AWS Lambdas and DynamoDB. He'll cover the overall architecture of serverless add-ons, then explain how to manage security, deployments, and integrations with various AWS services and other modern serverless providers.
Patrick Streule, Architect, Atlassian
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Belgium 2019Matt Raible
Spring Boot is an excellent way to build Java applications with the Spring Framework. If you’re developing apps that handle sensitive data, you should make sure they’re secure.
This session will cover HTTPS, dependency checking, CSRF, using a CSP to prevent XSS, OIDC, password hashing, and much more!
You’ll learn how to add these features to a real application, using the Java language you know and love.
* YouTube video: https://www.youtube.com/watch?v=PpqNMhe4Bd0
* Blog post: https://developer.okta.com/blog/2018/07/30/10-ways-to-secure-spring-boot
* Cheat sheet: https://snyk.io/blog/spring-boot-security-best-practices/
by RedLock
In order to confidently scale your AWS deployments, continuous security must be built into your continuous integration and continuous delivery architecture. Participate in a series of interactive capture the flag challenges to get hands on experience with DevSecOps. We’ll teach you how to think like a Security Ninja, highlight common mistakes that can have catastrophic consequences, and provide tips to avoid them.
Parse is a suite of cloud based APIs, services and libraries that focus on letting developers build out rich applications and less time dealing with the overhead of setting up and managing databases, push notifications, social sign on, analytics, and even hosting and servers.
In this series I'll overview the options around developing an application that leverages Parse, including using Cloud Code to deploy your Node.js app to Parse's own hosting service.
10 Excellent Ways to Secure Your Spring Boot Application - The Secure Develop...Matt Raible
Spring Boot is an excellent way to build Java applications with the Spring Framework. If you’re developing apps that handle sensitive data, you should make sure they’re secure. This session will cover HTTPS, dependency checking, CSRF, using a CSP to prevent XSS, OIDC, password hashing, and much more! You’ll learn how to add these features to a real application, using the Java language you know and love.
YouTube: https://www.thesecuredeveloper.com/post/10-excellent-ways-to-secure-your-spring-boot-application
Blog post: https://developer.okta.com/blog/2018/07/30/10-ways-to-secure-spring-boot
Cheat sheet: https://snyk.io/blog/spring-boot-security-best-practices/
Using Java to interact with Firebase in AndroidMagda Miu
Firebase is a platform used to build better apps, improve their quality and also to grow businesses.
This talk will cover examples about how to create a new project in Firebase console, how to integrate Google sign-in in the Java code in Android, how to save and get data from Cloud Firestore and how to use Cloud Messaging. Finally we will review the advantages of using Firebase Crashlytics that help us, the developers, to never miss a critical crash.
This document summarizes the activities of Al-Huda International's community education and social welfare project in Kachi Basti, Pakistan. It provides education programs for children and women, including weekly classes in the local school and homes. It also organizes community cleaning activities, Eid gift distributions, medical camps, and has started a new community school to provide free, complete education. The school is located near F-11 Markaz in Islamabad.
The document describes the water cycle and cloud formation process according to scientific findings and the teachings of Islam. It explains how winds drive small clouds together to form larger clouds, and how updrafts within cause the clouds to grow vertically in a "stack". When water droplets within become too heavy, they fall as rain. Modern meteorologists have recently understood these details using advanced technology, validating what was described in the Quran centuries ago. The water cycle is powered by solar energy and regulates the planet's temperature, showcasing its perfect design by Allah.
The document summarizes theories about how our solar system formed from a collapsing cloud of gas and dust. It describes how:
1) Our solar system likely began from a giant interstellar cloud that collapsed under gravity and formed a rotating disk, with a dense center that became the Sun and a surrounding disk that formed the planets.
2) The solar nebula disk varied in temperature by distance from the Sun, allowing different elements to condense into planetary cores near and far from the Sun, forming the terrestrial and gas giant planets.
3) Asteroids and comets are remnants from solar system formation and provide clues about its early history through observations and analysis of their composition and orbits.
This document discusses cloud formation and types of clouds. It presents that clouds are formed through convection as warmer air rises and cools, causing water vapor to condense into liquid droplets or ice crystals. Clouds are classified into high, middle, and low-level clouds based on their height and composition. Factors like surface heating, topography, fronts, convergence, and turbulence can influence cloud formation. Clouds impact the environment by regulating temperature through reflection and absorption of heat and enabling precipitation through the water cycle.
This document provides information about the different types of clouds for middle school students. It describes the key characteristics of 12 common clouds: cumulus, cumulonimbus, stratus, stratocumulus, altocumulus, altostratus, nimbostratus, cirrus, cirrocumulus, and cirrostratus. For each cloud type, it discusses their appearance, the atmospheric conditions needed for formation, and some basic facts. The document also includes learning activities like a video, worksheet, and quiz to help students learn to identify and understand the different cloud types.
There are three main types of clouds: cirrus clouds, which are thin and wispy ice crystal clouds found very high in the sky; cumulus clouds, which are puffy cotton-like clouds that can signal either fair weather or rain depending on whether they are white or dark; and stratus clouds, which are the lowest, flat clouds that are often dark and can signal rain or fog if close to the ground.
The document defines and describes the 10 major types of clouds, including cirrus, cirrocumulus, cumulonimbus, altocumulus, altostratus, cumulus, stratus, stratocumulus, cirro, and nimbostratus. Each cloud type is given a brief description of its appearance such as thin and wispy, small and puffy, or tall and fluffy. Latin and Greek roots are also provided to explain the meaning behind parts of cloud names.
Precipitation occurs when moisture in the atmosphere condenses and falls to the surface. The main types of precipitation are rain, snow, hail, fog, dew, mist, glaze, rime, sleet. Precipitation is measured using rain gauges, snow gauges, radars, and satellites. Rain gauges include non-recording and recording types like tipping bucket, weighing, and float gauges. Recording gauges provide rainfall duration and intensity data in addition to total amounts.
There are three main types of clouds - stratus, cirrus, and cumulus - which form in different ways and can be used to predict weather. Stratus clouds form in layers when warm air rises over cooler air, and can produce rain or snow. Cumulus clouds have flat bottoms and puffy tops, and usually indicate fair weather but sometimes rain. Cumulonimbus clouds are large thunderheads that bring thunderstorms and occasionally hail. Cirrus clouds form high in the sky and usually mean good weather is coming, though they may also signal an upcoming change.
AWS re:Invent 2016: Chalk Talk: Succeeding at Infrastructure-as-Code (GPSCT312)Amazon Web Services
- Infrastructure as code is the practice of provisioning and managing infrastructure using code and software development techniques like version control. This allows infrastructure changes to be tested and deployed in a consistent, repeatable way.
- AWS services like CloudFormation, OpsWorks, and CodeDeploy allow defining infrastructure as code templates and automating the deployment of applications and infrastructure changes across environments like development, testing, and production.
- CloudFormation templates define AWS resources and their dependencies and can be used to create matching environments in different stages. OpsWorks and CodeDeploy help manage application deployments and ongoing configuration of running systems.
AWS re:Invent 2016: Deploying and Managing .NET Pipelines and Microsoft Workl...Amazon Web Services
In this session, we’ll look at the AWS services that customers are using to build and deploy Microsoft-based solutions that use technologies like Windows, .NET, SQL Server, and PowerShell. We’ll start by showing you how to build a Windows-based CI/CD pipeline on AWS using AWS CodeDeploy, AWS CodePipeline, AWS CloudFormation, and PowerShell using an AWS Quick Start. We’ll also cover best practices for how you can create templates that let you automatically deploy ready-to-use Windows products by leveraging services and tools like AWS CloudFormation, PowerShell, and Git. Woot, an online retailer for electronics, will share how it moved from using a complex mix of custom PowerShell code for its DevOps processes to using services like Amazon EC2 Simple Systems Manager (SSM), AWS CodeDeploy, and AWS Directory Service. This migration eliminated the need for complex PowerShell scripts and reduced the operational complexity of performing operational tasks like renaming servers, joining domains, and securely handling keys.
AWS reinvent 2019 recap - Riyadh - Containers and Serverless - Paul MaddoxAWS Riyadh User Group
This document provides an overview and agenda for an AWS storage, compute, containers, serverless, and management tools presentation. It includes summaries of several upcoming AWS services and features related to EBS, S3, EC2, EKS, Fargate, Lambda, and AWS Cost Optimizer. The speaker is introduced as Paul Maddox, Principal Architect at AWS, with a background in development, SRE, and systems architecture.
The document discusses architectural patterns and best practices for building scalable and resilient applications on Amazon Web Services (AWS). It provides examples of how to design for failure, implement loose coupling between components, and build elasticity into applications using AWS services like Auto Scaling, Elastic Load Balancing, and Amazon EC2. The document also outlines three approaches for creating standardized technology stacks and managed development environments on AWS.
AWS Architecting Cloud Apps - Best Practices and Design Patterns By Jinesh VariaAmazon Web Services
Jinesh Varia, Technology Evangelist, Discusses AWS architecture best practices and design patterns at the AWS Enterprise Tour - SF - 2010
http://jineshvaria.s3.amazonaws.com/public/cloudbestpractices-jvaria.pdf
Scaling drupal horizontally and in cloudVladimir Ilic
Vancouver Drupal group presentation for April 25, 2013.
How to deploy Drupal on
- multiple web servers,
- multiple web and database servers, and
- how to join all that together and make site deployed on Amazon Cloud (Virtual Private Cloud) inside
- one availability zone
- multiple availability zones deployment.
Session cover details about what you need in order to get Drupal deployed on separate servers, what are issues/concerns, and how to solve them.
AWS re:Invent 2016: How to Launch a 100K-User Corporate Back Office with Micr...Amazon Web Services
Learn how to build a scalable, compliance-ready, and automated deployment of the Microsoft “backoffice” servers for 100K users running on AWS. In this session, we show a reference architecture deployment of Exchange, SharePoint, Skype for Business, SQL Server and Active Directory in a single VPC. We discuss the following: (1) how the solution is automated for 100K users, (2) how the solution is enabled for compliance (e.g., FedRAMP, HIPAA, PCI), and (3) how the solution is built from modular 10K user blocks. Attendees should have knowledge of AWS CloudFormation, PowerShell, instance bootstrapping, VPCs, and Amazon Route 53, as well as the relevant Microsoft technologies.
The document discusses how AWS services can help organizations increase speed and agility. It provides an overview of AWS services for compute, storage, databases, analytics and more. It also discusses how AWS enables continuous delivery and automation through services like CodeDeploy, CodePipeline, CloudFormation and Elastic Beanstalk. The document argues that AWS allows organizations to provision resources on demand, pay as they go, and build infrastructure as code.
Infrastructure Continuous Delivery Using AWS CloudFormationAmazon Web Services
This document discusses using AWS CloudFormation and AWS CodePipeline to implement infrastructure continuous delivery. It begins by explaining the need for infrastructure as code and continuous delivery workflows for infrastructure changes. AWS CloudFormation allows treating infrastructure as code by authoring templates and provisioning AWS resources from them. AWS CodePipeline can then be used to automate building, testing and deploying infrastructure changes as code is updated. The document demonstrates decomposing a sample application into CloudFormation templates and setting up a CodePipeline to continuously deliver changes. It provides examples of how to model pipelines for network resources and application components separately with dependencies.
Infrastructure Continuous Delivery Using AWS CloudFormationAmazon Web Services
This document discusses using AWS CloudFormation and AWS CodePipeline for infrastructure continuous delivery. It describes treating infrastructure as code, using templates to model resources, and continuous delivery workflows to reliably deploy changes. The presentation demonstrates decomposing a sample application into CloudFormation templates and setting up a pipeline to continuously deliver infrastructure changes.
Weaveworks at AWS re:Invent 2016: Operations Management with Amazon ECSWeaveworks
Alfonso described how Weave open source projects (Weave Net and Weave Scope) can help with networking, visualization, and control for ECS. Specifically, Weave acts as a key communicator for networking containers with its multi-host overlay and additional features (including automatic DNS service discovery and multicast).
[AWS Dev Day] 앱 현대화 | DevOps 개발자가 되기 위한 쿠버네티스 핵심 활용 예제 알아보기 - 정영준 AWS 솔루션즈 아키...Amazon Web Services Korea
쿠버네티스에 어플리케이션을 손쉽게 배포하는 방법은 무엇일까요? 복잡하게 배포된 어플리케이션의 파드들은 어떻게 디버깅하고 로깅해야 할까요? 또한 요즘 자주 이야기 되는 클라우드 네이티브 아키텍처로 설계된 어플리케이션은 어떻게 만들고 배포해야하는 걸까요?삼성전자 무선사업부에서 삼성헬스를 EKS 에 배포한 사례를 살펴보며, 이러한 문제를 어떻게 해결했는지 알아봅니다. 또한 복잡하게만 느껴졌던 쿠버네티스의 어플리케이션 배포와 클라우드 네이티브 아키텍처의 베스트 프렉티스를 EKS 에 어플리케이션을 배포하고, 관리하는 예제를 통하여 간편하게 이해할 수 있게 도와드립니다.
Max Körbächer - AWS EKS and beyond – master your Kubernetes deployment on AWS...Codemotion
Kubernetes (K8s) is on everyone’s lips, but it is easy to experience pitfalls during the development of a K8s cluster. In this talk we will give you an introduction of AWS EKS (Elastic Container Service for Kubernetes), the managed service for deploying and operate Kubernetes on AWS resources, and how you can reach a production readiness. This seamless integration of K8s into the AWS environment allows you a rapid application development assuming architectural concepts of microservice and serverless architecture.
Max Körbächer - AWS EKS and beyond master your Kubernetes deployment on AWS -...Codemotion
Kubernetes (K8s) is on everyone’s lips, but it is easy to experience pitfalls during the development of a K8s cluster. In this talk we will give you an introduction of AWS EKS (Elastic Container Service for Kubernetes), the managed service for deploying and operate Kubernetes on AWS resources, and how you can reach a production readiness. This seamless integration of K8s into the AWS environment allows you a rapid application development assuming architectural concepts of microservice and serverless architecture.
Monitoring Containers at Scale - September Webinar SeriesAmazon Web Services
Containers come and go rapidly, which is great for scalable or fast-evolving infrastructure. However, the short life of containers make it more challenging to monitor, leaving many with questions such as: How many containers can you run on a given Amazon EC2 instance type? Which metric should you look at to measure contention? How do you manage fleets of containers at scale? In this session, we'll present the challenges and benefits of running containers at scale, how to use quantitative performance patterns to monitor your infrastructure at this magnitude and complexity, and we'll discuss proven strategies for monitoring your containerized infrastructure on AWS and ECS.
Learning Objectives:
- Set up the infrastructure to monitor your containers running on AWS
- Understand the metrics available and what they mean
- Define a strategy to monitor your containers
Mastering GitOps 2022, April, Mario-Leander Reimer (@LeanderReimer, Principal Software Architect bei QAware).
== Dokument bitte herunterladen, falls unscharf! Please download slides if blurred! ==
Crossplane or: kubectl apply -f cloud-Infrastructure-as-code.yaml
Developing cloud-native applications easily and efficiently presents significant challenges for many teams. This is because, in addition to implementing domain-specific features and microservices, developers are now often jointly responsible for building the required cloud services with Infrastructure as Code à la Terraform. Unfortunately, the associated high cognitive load quickly leads to overload and suboptimal solutions.
Crossplane is an open source add-on for Kubernetes that addresses this problem. Using Crossplane, one can declaratively build cloud infrastructure for all popular cloud providers without writing a line of code. In addition, there is the ability to create highly specific self-service APIs and abstractions that can then be applied very easily by feature teams.
This talk will demonstrate the practical use of Crossplane with its features in AWS and GCP, as well as the seamless integration with a GitOps approach.
Nathan Burrell from Atlassian discusses how Connect, AWS, and Docker can be used together with Bitbucket Pipelines. Connect provides an integration point for third party services with Atlassian products. AWS is used to host and run microservices. Docker is utilized for containerization of services both locally during development and in production on AWS. The talk covers Connect descriptors, permissions, iFrames, and webhooks for integrating with Atlassian products, as well as how microservices are structured and interact with each other when run on AWS using services like DynamoDB, ECS, and SQS. Kubernetes is also mentioned for container management at scale. Security best practices when using Docker and Kubernetes in production are briefly discussed
The document discusses Open Services for Lifecycle Collaboration (OSLC), an initiative aimed at simplifying tool integration across the product delivery lifecycle. It provides an overview of OSLC's community-driven approach, current status and successes, technical approach based on REST and linked data principles, and how IBM's Jazz platform integrates with OSLC. The core specification establishes consistent guidelines for defining resources, HTTP operations, and representation formats to promote interoperability across tools.
The document discusses Linked Data and the Resource Description Framework (RDF). It explains the motivations for Linked Data as a data model for the machine-readable web and REST-based web services. The key points are that RDF provides a simple data model using URIs, properties, and property values (triples) to represent resources on the web in a way that is understandable by software. Common vocabularies and ontologies further define properties and resource classes to facilitate integration and interoperability. Examples are given of using RDF in different formats such as XML, JSON, Turtle, and RDFa embedded in HTML.
In this talk, we'll cover the features of Apache Roller 5.0, and how it compares to other blog server options. We'll also look at typical deployment architectures, and examples of Roller sites in production today. The talk will discuss in detail some of the ongoing, student-driven work on OpenID and on better Media Blogging support.
http://www.us.apachecon.com/c/acus2009/sessions/280
Dave Johnson gave a presentation on social software at work. He discussed how blogs, wikis, and social networking have risen on the web. He outlined various uses of blogs, wikis, and social networking within companies, including using them for status reports, project documentation, and enhancing corporate directories. Johnson also described his own use of social media tools like Twitter and blogs for work. He concluded by noting that social software is widely used today but still changing rapidly.
This is my JavaOne 2007 session. It's based in part on the Beyond Blogging presentation that I presented to a tiny audience at the local Tri-XML in 2006. Tim Bray didn't attend my talk, but he read the slides and called them "the single best introduction and overview I’ve ever seen about feeds and syndication and RSS and Atom and all that stuff."
MYIR Product Brochure - A Global Provider of Embedded SOMs & SolutionsLinda Zhang
This brochure gives introduction of MYIR Electronics company and MYIR's products and services.
MYIR Electronics Limited (MYIR for short), established in 2011, is a global provider of embedded System-On-Modules (SOMs) and
comprehensive solutions based on various architectures such as ARM, FPGA, RISC-V, and AI. We cater to customers' needs for large-scale production, offering customized design, industry-specific application solutions, and one-stop OEM services.
MYIR, recognized as a national high-tech enterprise, is also listed among the "Specialized
and Special new" Enterprises in Shenzhen, China. Our core belief is that "Our success stems from our customers' success" and embraces the philosophy
of "Make Your Idea Real, then My Idea Realizing!"
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
AI_dev Europe 2024 - From OpenAI to Opensource AIRaphaël Semeteys
Navigating Between Commercial Ownership and Collaborative Openness
This presentation explores the evolution of generative AI, highlighting the trajectories of various models such as GPT-4, and examining the dynamics between commercial interests and the ethics of open collaboration. We offer an in-depth analysis of the levels of openness of different language models, assessing various components and aspects, and exploring how the (de)centralization of computing power and technology could shape the future of AI research and development. Additionally, we explore concrete examples like LLaMA and its descendants, as well as other open and collaborative projects, which illustrate the diversity and creativity in the field, while navigating the complex waters of intellectual property and licensing.
What's Next Web Development Trends to Watch.pdfSeasiaInfotech2
Explore the latest advancements and upcoming innovations in web development with our guide to the trends shaping the future of digital experiences. Read our article today for more information.
What Not to Document and Why_ (North Bay Python 2024)Margaret Fero
We’re hopefully all on board with writing documentation for our projects. However, especially with the rise of supply-chain attacks, there are some aspects of our projects that we really shouldn’t document, and should instead remediate as vulnerabilities. If we do document these aspects of a project, it may help someone compromise the project itself or our users. In this talk, you will learn why some aspects of documentation may help attackers more than users, how to recognize those aspects in your own projects, and what to do when you encounter such an issue.
These are slides as presented at North Bay Python 2024, with one minor modification to add the URL of a tweet screenshotted in the presentation.
Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment.
How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.
Details of description part II: Describing images in practice - Tech Forum 2024BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and transcript: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecJames Anderson
The lecture titled "Automating AppSec" delves into the critical challenges associated with manual application security (AppSec) processes and outlines strategic approaches for incorporating automation to enhance efficiency, accuracy, and scalability. The lecture is structured to highlight the inherent difficulties in traditional AppSec practices, emphasizing the labor-intensive triage of issues, the complexity of identifying responsible owners for security flaws, and the challenges of implementing security checks within CI/CD pipelines. Furthermore, it provides actionable insights on automating these processes to not only mitigate these pains but also to enable a more proactive and scalable security posture within development cycles.
The Pains of Manual AppSec:
This section will explore the time-consuming and error-prone nature of manually triaging security issues, including the difficulty of prioritizing vulnerabilities based on their actual risk to the organization. It will also discuss the challenges in determining ownership for remediation tasks, a process often complicated by cross-functional teams and microservices architectures. Additionally, the inefficiencies of manual checks within CI/CD gates will be examined, highlighting how they can delay deployments and introduce security risks.
Automating CI/CD Gates:
Here, the focus shifts to the automation of security within the CI/CD pipelines. The lecture will cover methods to seamlessly integrate security tools that automatically scan for vulnerabilities as part of the build process, thereby ensuring that security is a core component of the development lifecycle. Strategies for configuring automated gates that can block or flag builds based on the severity of detected issues will be discussed, ensuring that only secure code progresses through the pipeline.
Triaging Issues with Automation:
This segment addresses how automation can be leveraged to intelligently triage and prioritize security issues. It will cover technologies and methodologies for automatically assessing the context and potential impact of vulnerabilities, facilitating quicker and more accurate decision-making. The use of automated alerting and reporting mechanisms to ensure the right stakeholders are informed in a timely manner will also be discussed.
Identifying Ownership Automatically:
Automating the process of identifying who owns the responsibility for fixing specific security issues is critical for efficient remediation. This part of the lecture will explore tools and practices for mapping vulnerabilities to code owners, leveraging version control and project management tools.
Three Tips to Scale the Shift Left Program:
Finally, the lecture will offer three practical tips for organizations looking to scale their Shift Left security programs. These will include recommendations on fostering a security culture within development teams, employing DevSecOps principles to integrate security throughout the development
The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Invited Remote Lecture to SC21
The International Conference for High Performance Computing, Networking, Storage, and Analysis
St. Louis, Missouri
November 18, 2021
How Netflix Builds High Performance Applications at Global ScaleScyllaDB
We all want to build applications that are blazingly fast. We also want to scale them to users all over the world. Can the two happen together? Can users in the slowest of environments also get a fast experience? Learn how we do this at Netflix: how we understand every user's needs and preferences and build high performance applications that work for every user, every time.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/07/intels-approach-to-operationalizing-ai-in-the-manufacturing-sector-a-presentation-from-intel/
Tara Thimmanaik, AI Systems and Solutions Architect at Intel, presents the “Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” tutorial at the May 2024 Embedded Vision Summit.
AI at the edge is powering a revolution in industrial IoT, from real-time processing and analytics that drive greater efficiency and learning to predictive maintenance. Intel is focused on developing tools and assets to help domain experts operationalize AI-based solutions in their fields of expertise.
In this talk, Thimmanaik explains how Intel’s software platforms simplify labor-intensive data upload, labeling, training, model optimization and retraining tasks. She shows how domain experts can quickly build vision models for a wide range of processes—detecting defective parts on a production line, reducing downtime on the factory floor, automating inventory management and other digitization and automation projects. And she introduces Intel-provided edge computing assets that empower faster localized insights and decisions, improving labor productivity through easy-to-use AI tools that democratize AI.
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
this resume for sadika shaikh bca studentSadikaShaikh7
I am a dedicated BCA student with a strong foundation in web technologies, including PHP and MySQL. I have hands-on experience in Java and Python, and a solid understanding of data structures. My technical skills are complemented by my ability to learn quickly and adapt to new challenges in the ever-evolving field of computer science.
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threatsanupriti
In the rapidly evolving landscape of blockchain technology, the advent of quantum computing poses unprecedented challenges to traditional cryptographic methods. As quantum computing capabilities advance, the vulnerabilities of current cryptographic standards become increasingly apparent.
This presentation, "Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats," explores the intersection of blockchain technology and quantum computing. It delves into the urgent need for resilient cryptographic solutions that can withstand the computational power of quantum adversaries.
Key topics covered include:
An overview of quantum computing and its implications for blockchain security.
Current cryptographic standards and their vulnerabilities in the face of quantum threats.
Emerging post-quantum cryptographic algorithms and their applicability to blockchain systems.
Case studies and real-world implications of quantum-resistant blockchain implementations.
Strategies for integrating post-quantum cryptography into existing blockchain frameworks.
Join us as we navigate the complexities of securing blockchain networks in a quantum-enabled future. Gain insights into the latest advancements and best practices for safeguarding data integrity and privacy in the era of quantum threats.
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Wayin devops-2013
1. DevOps at Wayin
Orchestration with AWS Cloud Formation
David M. Johnson
Software Developer - Wayin, Inc.
Friday, June 21, 13
2. Agenda
•What is Cloud Orchestration
• Quick intro to Wayin Hub
• Wayin Hub deployment & application architecture
• How we scale, deploy and do backups
• About Cloud Formation Templates
• About vendor lock-in
• Designing for orchestration
Friday, June 21, 13
3. “Orchestration describes the
automated arrangement,
coordination, and management
of complex computer systems,
middleware, and services.
It is often discussed as having
an inherent intelligence or even
implicitly autonomic control, but
those are largely aspirations or
analogies rather than technical
descriptions.”
http://en.wikipedia.org/wiki/Orchestration_(computing)
Friday, June 21, 13
4. “cloud orchestration =
automation
+ integration
+ best practices”
https://www.ibm.com/developerworks/mydeveloperworks/blogs/9e696bfa-94af-4f5a-ab50-
c955cca76fd0/entry/orchestrating_the_cloud_to_simplify_and_accelerate_service_delivery1
Friday, June 21, 13
5. Cloud Orchestration is...
Automating the infrastructure
needed to provide a computing
service so that resources are
automatically allocated and de-
allocated to meet changing demand
Friday, June 21, 13
8. Agenda
• What is Cloud Orchestration
•Quick intro to Wayin Hub
• Wayin Hub deployment & application architecture
• How we scale, deploy and do backups
• About Cloud Formation Templates
• About vendor lock-in
• Designing for orchestration
Friday, June 21, 13
16. Agenda
• What is Cloud Orchestration
• Quick intro to Wayin Hub
•Wayin Hub deployment & app architecture
• How we scale, deploy and do backups
• About Cloud Formation Templates
• About vendor lock-in
• Designing for orchestration
Friday, June 21, 13
17. Glossary
• EC2 - server virtualization
• EBS - mountable block storage
• ELB - load balancer
• R53 - domain name services (DNS)
• S3 - file / bucket storage service
• CloudFront - content distribution network (CDN)
• Autoscale - automatically stop & start servers
• CloudWatch / Cloud Alarms - monitoring & triggering
• Security Group - restrict port access on group of instances
• SQS - Simple Queuing Service
Friday, June 21, 13
20. Cloud Formation
“An easy way to create and manage a collection of related
AWS resources, provisioning and updating them in an orderly
and predictable fashion.
You can use AWS CloudFormation’s sample templates or create
your own. Once deployed, you can modify and update the AWS
resources in a controlled and predictable way allowing you to
version control your AWS infrastructure in the same way as
you version control your software.
You can deploy and update a template and its associated collection
of resources (called a stack) via the AWS Management Console,
CloudFormation command line tools or APIs. CloudFormation is
available at no additional charge, and you pay only for the
AWS resources needed to run your applications.”
Friday, June 21, 13
21. Agenda
• What is Cloud Orchestration
• Quick intro to Wayin Hub
• Wayin Hub deployment & application architecture
•How we scale, deploy and do backups
• About Cloud Formation Templates
• About vendor lock-in
• Designing for orchestration
Friday, June 21, 13
22. Separate auto-scale groups
Ubuntu
API server
WAR
Jetty
Ubuntu
API server
WAR
Jetty
Ubuntu
API server
WAR
Jetty
Min: 3
Max: 9
Scale up (quickly):
CPU > X% forY minutes
Scale down (slowly):
CPU < A% for B minutes
Ubuntu
Cassandra
Redis
Memcache
DB serverUbuntu
Cassandra
Redis
Memcache
DB server
Min: 2
Max: 2
We decide when to scale
up and scale down our
DB server instances
Ubuntu
Tracker
WAR
Jetty
Ubuntu
Tracker
WAR
Jetty
Ubuntu
Tracker
WAR
Jetty
Min: 2
Max: 20
Scale up (quickly):
Queue has > X
messages forY minutes
Scale down (slowly):
Queue has < X message
forY minutes
Friday, June 21, 13
23. CFN Launches
new API server
instances
1
Self-configuring API servers
DB Security Group
S3 ELB
CloudInit script
downloads the
deployment bundle
2
CloudInit scripts
find DB servers by
Security Group,
starts Jetty
3
CloudInit
scripts put
server into
ELB rotation
4
API Security Group
CFN
Cloud
Watch
Friday, June 21, 13
24. Self-configuring DB servers
DB Security Group
S3
CloudInit scripts finds other
DB servers by Server Group
3
CloudInit scripts
download latest
deployment bundle
2Human runs the
command to increase
DB servers by one
1
Ubuntu
New DB server
New Cassandra node joins
cluster when ready
7
CFN
CloudInit scripts write
Memcache config, start it
4
MemcacheCloudInit scripts write Redis config,
assume first server is master, start it
5
Redis
CloudInit scripts write
Cassandra config, start it
6
Cassandra
Friday, June 21, 13
25. Automated deployment
API Security Group
GitDeveloper merges code
into deployment branch
1
Developer kicks off
Jenkins build
2
S3
Jenkins copies
bundle to S3 bucket
3
Developer kicks off
deployment build
4
Jenkins runs
deploy command
via SSH
5
On each server the script
runs locally, downloads
and installs the bundle
6
Ubuntu
Jenkins
Tracker Security Group
Friday, June 21, 13
26. Incremental backups
copied to S3 bucket
5
Automated Backups
S3
Jenkins runs
daily backup job
1
Backup script
creates EBS snapshot 3
DB Security Group
Cronjob kicks off
incremental backups
4
Cassandra snapshot
backups happen
simultaneously
2
Ubuntu
Jenkins
EBS
Friday, June 21, 13
27. Agenda
• What is Cloud Orchestration
• Quick intro to Wayin Hub
• Wayin Hub deployment & application architecture
• How we scale, deploy and do backups
•About Cloud Formation Templates
• About vendor lock-in
• Designing for orchestration
Friday, June 21, 13
35. Agenda
• What is Cloud Orchestration
• Quick intro to Wayin Hub
• Wayin Hub deployment & application architecture
• How we scale, deploy and do backups
• About Cloud Formation Templates
•About vendor lock-in
• Designing for orchestration
Friday, June 21, 13
36. Lock-in in automation
• Cloud Formation itself is lock-in
• Plenty of AWS dependencies in our:
• Instance init scripts
• Deployment scripts
• Backup scripts
Friday, June 21, 13
37. No lock-in in app code
• Bulk of our code is in our application
• AWS dependencies are pluggable
Friday, June 21, 13
38. Agenda
• What is Cloud Orchestration
• Quick intro to Wayin Hub
• Wayin Hub deployment & application architecture
• How we scale, deploy and do backups
• About Cloud Formation Templates
• About vendor lock-in
•Designing for orchestration
Friday, June 21, 13
39. Choose right components
• Good
• Peer-to-peer
• Linear scalability
• Bad
• Master-slave
• “Special” servers
• Single point-of-failure
Friday, June 21, 13