SlideShare une entreprise Scribd logo
1  sur  273
How Did I Get Here?
Building Confidence in a Distributed Stream Processor
InfoQ.com: News & Community Site
• 750,000 unique visitors/month
• Published in 4 languages (English, Chinese, Japanese and Brazilian
Portuguese)
• Post content from our QCon conferences
• News 15-20 / week
• Articles 3-4 / week
• Presentations (videos) 12-15 / week
• Interviews 2-3 / week
• Books 1 / month
Watch the video with slide
synchronization on InfoQ.com!
https://www.infoq.com/presentations/
trust-distributed-systems
Presented at QCon New York
www.qconnewyork.com
Purpose of QCon
- to empower software development by facilitating the spread of
knowledge and innovation
Strategy
- practitioner-driven conference designed for YOU: influencers of
change and innovation in your teams
- speakers and topics driving the evolution and innovation
- connecting and catalyzing the influencers and innovators
Highlights
- attended by more than 12,000 delegates since 2007
- held in 9 cities worldwide
Sean T. Allen
T
T
Experience Report
Stream Processor
Prototype
Started January 2016
Prototype
Started January 2016
Production
Started April 2016
Production
Started April 2016
America
is all about speed.
Hot, nasty, bad-ass speed.
— Eleanor Roosevelt
High Throughput
Buffy: Goals
Low Latency
Buffy: Goals
Less Hardware
Buffy: Goals
America
is all about data quality.
Quiet, demure data quality.
— Andrew Jackson
High Fidelity
Buffy: Goals
Stream Processing
Message at a time
Never ending
Failure
Machine Failure
Slow Machine
Segfaulting Process
GC Pause
Network Error
Failure Happens
Delivery Guarantees
At-Most-Once
At-Most-Once
Best Effort
At-Least-Once
At-Least-Once
ACK or resend
Exactly-Once
Exactly-Once
At-Least-Once + Idempotence
Exactly-Once
Confidence
Black Box Testing
Black Box Testing
Black Box Testing
Black Box Testing
Black Box Testing
System Under Test
Black Box Testing
Input Source
Black Box Testing
Output Receiver
Black Box Testing
Unit Testing
because
isn't enough
Black Box Testing
Integration Testing
because
isn't enough
Black Box Testing
composed components
because
have interesting new failure modes
Black Box Testing
Test The Entire System
Black Box Testing
Test The Entire System
end to end
Black Box Testing
Test The Entire System
end to end
Black Box Testing
and verify your expectations
Wesley
Expectation verification for Buffy
Wesley
Wesley
Input
Wesley
Output
Wesley
Input Output
Input Source
Wesley
Input Source
Wesley
Output Receiver
Wesley
Input Source
Records sent data
1,2,3,4
Wesley
Input Source
Records sent data Records received data
2,4,6,81,2,3,4
Output Receiver
Wesley
Wesley
Analyze!
Wesley
Wesley
Wesley
Wesley
Wesley
Wesley
Wesley
Wesley
Wesley
It Works!
Spike
Fault injection for Buffy
Fault Injection
Lineage-driven
fault injection
Start from a good result
Spike: LDFI
Input
Spike: LDFI
Output
Spike: LDFI
Figure out what can go
wrong
Spike: LDFI
Nemesis
Spike: LDFI
Each "wrong" is a possible
The Network
Spike: LDFI
Our first nemesis:
Determinism is key
Spike
Repeated runs with different results
==
Mostly Useless
Spike
Spike
Spike
Inject failures as informed by TCP
Spike
TCP Guarantees:
Spike
TCP Guarantees:
Per connection in order delivery
Spike
Per connection in order delivery
Per connection duplicate detection
TCP Guarantees:
Spike
Per connection in order delivery
Per connection duplicate detection
Per connection retransmission of lost data
TCP Guarantees:
TCP in Pony: Event Driven
TCP in Pony: Event Driven
TCP in Pony: Event Driven
TCP in Pony: Event Driven
TCP in Pony: Event Driven
Useless Notifier
Useless Notifier
Useless Notifier
Dropped Connections
Nemesis #1:
Spike: Drop Connection
Spike: Drop Connection
Spike: Drop Connection
Spike: Drop Connection
Spike: Drop Connection
Spike: Drop Connection
• Incoming connection accepted
Spike: Drop Connection
• Incoming connection accepted
• Attempting outgoing connection
Spike: Drop Connection
• Incoming connection accepted
• Attempting outgoing connection
• Connection established
Spike: Drop Connection
• Incoming connection accepted
• Attempting outgoing connection
• Connection established
• Data sent
Spike: Drop Connection
• Incoming connection accepted
• Attempting outgoing connection
• Connection established
• Data sent
• Data received
Integrating Spike
"Double and Halve" app
Integrating Spike
"Double and Halve" app
Integrating Spike
"Double and Halve" app
Integrating Spike
"Double and Halve" app
Integrating Spike
"Double and Halve" app
Integrating Spike
"Double and Halve" app
Integrating Spike
"Double and Halve" app
Integrating Spike
"Double and Halve" app
Integrating Spike
"Double and Halve" app
Integrating Spike
"Double and Halve" app
• Easy to verify
Integrating Spike
"Double and Halve" app
• Easy to verify
• Messages cross process boundary
Integrating Spike
"Double and Halve" app
• Easy to verify
• Messages cross process boundary
• Messages cross network boundary
Integrating Spike
"Double and Halve" app
Integrating Spike
• Double and Halve App
Integrating Spike
• Double and Halve App
• No Spiking
Integrating Spike
• Double and Halve App
• No Spiking
• Test, Test, Test
Integrating Spike
• Double and Halve App
• No Spiking
• Test, Test, Test
• Wesley: It passes! It passes! It passes!
Integrating Spike
• Double and Halve App
Integrating Spike
• Double and Halve App
• Spike with “drop connection”
Integrating Spike
• Double and Halve App
• Spike with “drop connection”
• Test, Test, Test
Integrating Spike
• Double and Halve App
• Spike with “drop connection”
• Test, Test, Test
• Wesley: It fails! It fails! It fails!
Integrating Spike
Integrating Spike
== Session Recovery!
Integrating Spike
• Double and Halve App
Integrating Spike
• Double and Halve App
• Spike with “drop connection”
Integrating Spike
• Double and Halve App
• Spike with “drop connection”
• Test, Test, Test
Integrating Spike
• Double and Halve App
• Spike with “drop connection”
• Test, Test, Test
• Wesley: It passes! It passes! It passes!
Repeated runs with different results
==
Mostly Useless
Spike
Determinism & Spike
It's easy to get wrong
Determinism & Spike
Determinism & Spike
TCP delivery is not deterministic
Determinism & Spike
TCP guarantees:
Per connection in order delivery
Determinism & Spike
Per connection in order delivery
Per connection duplicate detection
TCP guarantees:
Determinism & Spike
Per connection in order delivery
Per connection duplicate detection
Per connection retransmission of lost data
TCP guarantees:
Determinism & Spike
Per connection in order delivery
Per connection duplicate detection
Per connection retransmission of lost data
but it doesn't guarantee determinism
TCP guarantees:
Determinism & Spike
TCP delivery is not deterministic
Determinism & Spike
TCP delivery is not deterministic
Determinism & Spike
TCP delivery is not deterministic
Determinism & Spike
TCP delivery is not deterministicPer method call Spiking won't work
Determinism & Spike
TCP delivery is not deterministicPer method call Spiking won't work
unless we make it work…
Determinism & Spike
TCP message framing
Determinism & Spike
TCP message framing
Determinism & Spike
TCP message framing
Determinism & Spike
TCP message framing
Determinism & Spike
TCP message framing
Determinism & Spike
TCP message framing
Determinism & Spike
TCP message framing
Determinism & Spike
TCP message framing
Determinism & Spike
TCP message framing
Determinism & Spike
Expect in action
Determinism & Spike
Expect in action
Determinism & Spike
Expect in action
Determinism & Spike
Expect in action
Determinism & Spike
Expect in action
Determinism & Spike
Expect in action
Determinism & Spike
Expect in action
Determinism & Spike
Expect in action
Determinism & Spike
Expect in action
Determinism & Spike
Expect in action
Determinism & Spike
Expect makes received deterministic
Determinism & Spike
Expect makes received deterministic
Determinism & Spike
Expect makes received deterministic
Determinism & Spike
Expect makes received deterministic
Determinism & Spike
Expect makes received deterministic
Determinism & Spike
Expect makes received deterministic
Determinism & Spike
Expect makes received deterministic
Determinism & Spike
Received gets called with
Determinism & Spike
then…
Determinism & Spike
and then another…
Determinism & Spike
and finally…
Same number of notifier method calls
Determinism & Spike
no matter how the data arrives
Drop Connection & Expect
fast deterministic friends
Determinism & SpikeDeterminism & Spike
Slow Connections
Nemesis #1:
Spike: Delay
Spike: Delay
Spike: Delay
Spike: Delay
Spike: Delay
Delay overrides expect
Spike: Delay
Delay overrides expect
and controls the flow of bytes
Spike: Delay
Delay overrides expect
and controls the flow of bytes
to maintain determinism
Spike: Delay
Spike: Delay
Spike: Delay
Spike: Delay
Spike: Delay
r TCP
Spike
Spike: Delay
r TCP
Spike
Spike: Delay
r TCP
Spike
Spike: Delay
TCP
Spike: Delay
TCP
TCP
Spike
Spike: Delay
TCP
TCP
TCP
Spike
Spike
Early Results
Early Results
• Bugs in Session Recovery
Found…
Early Results
• Bugs in Session Recovery
• Bug in Pony standard library
Found…
Early Results
• Bugs in Session Recovery
• Bug in Pony standard library
• Bugs in Spike
Found…
Early Results
• Bugs in Session Recovery
• Bug in Pony standard library
• Bugs in Spike
• And more bugs…
Found…
Determinism is key
Early Results
Found…
Determinism is key
Early Results
but hard to achieve
Found…
Data Lineage
WARNING!!!
Vaporware ahead
Output
Data Lineage
How did I get here?
Output
Data Lineage
Data Lineage
Input: 1,2,3
Data Lineage
Input: 1,2,3
Expect: 2,4,6
Data Lineage
Input: 1,2,3
Expect: 2,4,6
Get: 4,6
Data Lineage
Input: 1,2,3
Expect: 2,4,6
Get: 4,6
How did we get here?
these are not our beautiful results
Data Lineage
Input: 1,2,3
Data Lineage
Input: 1,2,3
Expect: 2,4,6
Data Lineage
Input: 1,2,3
Expect: 2,4,6
Get: 2,6,12
Data Lineage
Input: 1,2,3
Expect: 2,4,6
Get: 2,6,12
¯_( )_/¯
Data Lineage to the Rescue!
Data Lineage
Externally verify determinism
Data Lineage
Externally verify determinism
is it REALLY deterministic?
Data Lineage
Find incorrect executions
Data Lineage
Find incorrect executions
bugs in Buffy
Data Lineage
Input: 1
Expected: 2
Got: 4
¯_( )_/¯
Data Lineage
Execution path was…
when it should have been
Data Lineage
when it should have been
Execution path was…
Data Lineage
Useful outside of
development
Data Lineage
Production Debugging
Data Lineage
Production Debugging
how did I get here?
Data Lineage
Audit Log
Data Lineage
Audit Log
why did you do that?
Data Lineage
Hindsight Machine
Building Confidence
is difficult
and frustrating
Don't be this dog
Be this dog
Peter Alvaro
http://www.cs.berkeley.edu/~palvaro/molly.pdf
@palvaro
https://www.youtube.com/watch?v=ggCffvKEJmQ
Lineage-driven Fault Injection:
Outwards from the Middle of the Maze:
Kyle Kingsbury
https://aphyr.com/tags/Jepsen
@aphyr
Jepsen:
Will Wilson
https://www.youtube.com/watch?v=4fFDFbi3toc
Testing Distributed Systems w/ Deterministic Simulation:
Catie McCaffrey
http://queue.acm.org/detail.cfm?ref=rss&id=2889274
@caitie
The Verification of a Distributed System
The Verification of a Distributed System:
A practitioner's guide to increasing confidence in system correctness
2:55 PM Tomorrow in Salon E
Inés Sombra
https://www.youtube.com/watch?v=KSdNYi55kjg
Testing in a Distributed World:
@randommood
http://principlesofchaos.org
Principles of Chaos Engineering:
Chaos Engineering
Thanks
Peter Alvaro
Sylvan Clebsch
Zeeshan Lakhani
John Mumm
Rob Roland
Andrew Turley
@SeanTAllen
Note:
The 'T' is very important
Watch the video with slide synchronization on
InfoQ.com!
https://www.infoq.com/presentations/trust-
distributed-systems

Contenu connexe

En vedette (6)

Evaluacion de la gobernabilidad fund covelo 9mayo2012
Evaluacion de la gobernabilidad fund covelo 9mayo2012Evaluacion de la gobernabilidad fund covelo 9mayo2012
Evaluacion de la gobernabilidad fund covelo 9mayo2012
 
P cmv-01
P cmv-01P cmv-01
P cmv-01
 
Tabla análisis imagen 1
Tabla análisis imagen 1Tabla análisis imagen 1
Tabla análisis imagen 1
 
Reformas manual de indicadores financieros opdf
Reformas manual de indicadores financieros opdfReformas manual de indicadores financieros opdf
Reformas manual de indicadores financieros opdf
 
Résultats paraphes CFS-EM 2015
Résultats paraphes CFS-EM 2015Résultats paraphes CFS-EM 2015
Résultats paraphes CFS-EM 2015
 
Mgc idh
Mgc idhMgc idh
Mgc idh
 

Similaire à Building Confidence in a Distributed System

The business case for contributing code
The business case for contributing codeThe business case for contributing code
The business case for contributing code
Zivtech, LLC
 
Hacking News
Hacking NewsHacking News
Hacking News
amclean
 

Similaire à Building Confidence in a Distributed System (20)

How did I get here? Building confidence in a distributed stream processor
How did I get here? Building confidence in a distributed stream processorHow did I get here? Building confidence in a distributed stream processor
How did I get here? Building confidence in a distributed stream processor
 
Canary Analyze All the Things
Canary Analyze All the ThingsCanary Analyze All the Things
Canary Analyze All the Things
 
How Shutl Delivers Even Faster Using Neo4J
How Shutl Delivers Even Faster Using Neo4JHow Shutl Delivers Even Faster Using Neo4J
How Shutl Delivers Even Faster Using Neo4J
 
We broke up with the monolith, and started dating #eventSourcing - #symfonyCat
We broke up with the monolith, and started dating #eventSourcing - #symfonyCatWe broke up with the monolith, and started dating #eventSourcing - #symfonyCat
We broke up with the monolith, and started dating #eventSourcing - #symfonyCat
 
Goto Berlin - Migrating to Microservices (Fast Delivery)
Goto Berlin - Migrating to Microservices (Fast Delivery)Goto Berlin - Migrating to Microservices (Fast Delivery)
Goto Berlin - Migrating to Microservices (Fast Delivery)
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
 
Webinar #5: Mobile indsigter og trends ft. Google
Webinar #5: Mobile indsigter og trends ft. Google Webinar #5: Mobile indsigter og trends ft. Google
Webinar #5: Mobile indsigter og trends ft. Google
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Building High Fidelity Data Streams (QCon London 2023)
Building High Fidelity Data Streams (QCon London 2023)Building High Fidelity Data Streams (QCon London 2023)
Building High Fidelity Data Streams (QCon London 2023)
 
Testing Adhearsion Applications
Testing Adhearsion ApplicationsTesting Adhearsion Applications
Testing Adhearsion Applications
 
Your Goat Antifragiled My Snowflake!: Demystifying DevOps Jargon - ChefConf 2015
Your Goat Antifragiled My Snowflake!: Demystifying DevOps Jargon - ChefConf 2015Your Goat Antifragiled My Snowflake!: Demystifying DevOps Jargon - ChefConf 2015
Your Goat Antifragiled My Snowflake!: Demystifying DevOps Jargon - ChefConf 2015
 
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
 
My Little Webap - DevOpsSec is Magic
My Little Webap - DevOpsSec is MagicMy Little Webap - DevOpsSec is Magic
My Little Webap - DevOpsSec is Magic
 
Cheapass.in — presented at JSFoo 2016
Cheapass.in — presented at JSFoo 2016Cheapass.in — presented at JSFoo 2016
Cheapass.in — presented at JSFoo 2016
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
Educ6751(2)
Educ6751(2)Educ6751(2)
Educ6751(2)
 
The business case for contributing code
The business case for contributing codeThe business case for contributing code
The business case for contributing code
 
AdhearsionConf 2013 Keynote
AdhearsionConf 2013 KeynoteAdhearsionConf 2013 Keynote
AdhearsionConf 2013 Keynote
 
Subverting the monolith!
Subverting the monolith!Subverting the monolith!
Subverting the monolith!
 
Hacking News
Hacking NewsHacking News
Hacking News
 

Plus de C4Media

Plus de C4Media (20)

Streaming a Million Likes/Second: Real-Time Interactions on Live Video
Streaming a Million Likes/Second: Real-Time Interactions on Live VideoStreaming a Million Likes/Second: Real-Time Interactions on Live Video
Streaming a Million Likes/Second: Real-Time Interactions on Live Video
 
Next Generation Client APIs in Envoy Mobile
Next Generation Client APIs in Envoy MobileNext Generation Client APIs in Envoy Mobile
Next Generation Client APIs in Envoy Mobile
 
Software Teams and Teamwork Trends Report Q1 2020
Software Teams and Teamwork Trends Report Q1 2020Software Teams and Teamwork Trends Report Q1 2020
Software Teams and Teamwork Trends Report Q1 2020
 
Understand the Trade-offs Using Compilers for Java Applications
Understand the Trade-offs Using Compilers for Java ApplicationsUnderstand the Trade-offs Using Compilers for Java Applications
Understand the Trade-offs Using Compilers for Java Applications
 
Kafka Needs No Keeper
Kafka Needs No KeeperKafka Needs No Keeper
Kafka Needs No Keeper
 
High Performing Teams Act Like Owners
High Performing Teams Act Like OwnersHigh Performing Teams Act Like Owners
High Performing Teams Act Like Owners
 
Does Java Need Inline Types? What Project Valhalla Can Bring to Java
Does Java Need Inline Types? What Project Valhalla Can Bring to JavaDoes Java Need Inline Types? What Project Valhalla Can Bring to Java
Does Java Need Inline Types? What Project Valhalla Can Bring to Java
 
Service Meshes- The Ultimate Guide
Service Meshes- The Ultimate GuideService Meshes- The Ultimate Guide
Service Meshes- The Ultimate Guide
 
Shifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CDShifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CD
 
CI/CD for Machine Learning
CI/CD for Machine LearningCI/CD for Machine Learning
CI/CD for Machine Learning
 
Fault Tolerance at Speed
Fault Tolerance at SpeedFault Tolerance at Speed
Fault Tolerance at Speed
 
Architectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep SystemsArchitectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep Systems
 
ML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.jsML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.js
 
Build Your Own WebAssembly Compiler
Build Your Own WebAssembly CompilerBuild Your Own WebAssembly Compiler
Build Your Own WebAssembly Compiler
 
User & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix ScaleUser & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix Scale
 
Scaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's EdgeScaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's Edge
 
Make Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home EverywhereMake Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home Everywhere
 
The Talk You've Been Await-ing For
The Talk You've Been Await-ing ForThe Talk You've Been Await-ing For
The Talk You've Been Await-ing For
 
Future of Data Engineering
Future of Data EngineeringFuture of Data Engineering
Future of Data Engineering
 
Automated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and MoreAutomated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and More
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Building Confidence in a Distributed System