Messaging becomes Data Distributions gets embedded event processing (not complex, made simple) - bending all the rules one benchmark at a time - Push Technology, Waratek and other things
Complex Er[jl]ang Processing with StreamBasedarach
The document is a presentation about complex event processing using StreamBase. It discusses StreamBase's event processing platform and how it provides high performance through its domain specific language and optimizations. It also covers how StreamBase integrates with Erlang through calling Erlang functions and messaging.
Achieving genuine elastic multitenancy with the Waratek Cloud VM for Java : J...JAX London
John Matthew Holt, Waratek CTO, explains how Waratek Cloud VM for Java transforms the JVM with key Cloud characteristics including genuine multitenancy, granular elasticity, instant scalability, realtime metering and prioritization of resources by application, to futureproof your Java investment in the age of Cloud computing.
Communication Patterns Using Data-Centric Publish/SubscribeSumant Tambe
Fundamental to any distributed system are communication patterns: point-to-point, request-reply, transactional queues, and publish-subscribe. Large distributed systems often employ two or more communication patterns. Using a single middleware that supports multiple communication patterns is a very cost-effective way of developing and maintaining large distributed systems. This talk will begin with an introduction of Data Distribution Service (DDS) – an OMG standard – that supports data-centric publish-subscribe communication for real-time distributed systems. DDS separates state management and distribution from application logic and supports discoverable data models. The talk will then describe how RTI Connext Messaging goes beyond vanilla DDS and implements various communication patterns including request-reply, command-response, and guaranteed delivery. You will also learn how these patterns can be combined to create interesting variations when the underlying substrate is as powerful as DDS. We’ll also discuss APIs for creating high-performance applications using the request-reply communication pattern.
The document discusses how to balance velocity and quality in agile development and testing. It promotes HP's Application Lifecycle Management (ALM) solution as helping deliver fast innovation while controlling risk. Key capabilities highlighted include testing mobile applications, enabling agile planning and tracking, virtualizing services for development and testing, and providing integrated quality and lifecycle management. The presentation encourages attendees to try HP's agile manager, learn more about its ALM solutions, and engage by joining an HP community or registering for the HP Discover event.
Cisco is a leading provider of networking technologies founded in 1984. It has a portfolio of products including routers, switches, collaboration tools, and security solutions. A key subsidiary, IronPort, focuses on email and messaging security through technologies like reputation filtering and image spam detection. While Cisco remains the market leader, Juniper has gained some ground through strong growth in routers and the enterprise market.
Cloud computing provides on-demand access to computing resources like servers and applications without long term commitments. It allows users to access services from any device, and pay only for what they use. Moving systems and applications to the cloud can provide benefits like flexibility, scalability, lower costs, increased productivity and mobility.
New applications are increasingly built on distributed service architectures, including mobile and cloud-based services which increase the complexity and interdependency of the systems to be tested.
Teams are forced to do performance test earlier in the application lifecycle, before the application is complete or stable with the increased pressure to operate more efficiently, produce valuable results more quickly, and operate with fewer resources.
Learn how Service Virtualization is a critical enabler to allow testers to get started with performance testing from the first sprint.
We will demonstrate how Service Virtualization is an easy-to-use solution that integrated with multiple performance testing tools, resulting in an almost seamless solution for performance engineering and validation.
This document discusses the rise of cloud computing and the opportunities and challenges it presents for businesses and IT departments. It notes that businesses are increasingly adopting cloud technologies at a faster rate than IT can support due to the speed and agility benefits of the cloud. However, IT concerns around security, compliance, and control are slowing cloud adoption. The document proposes that providing trusted cloud services that address these IT concerns can help enable broader cloud usage and allow businesses to realize the economic and innovation benefits of the cloud while allowing IT to play a more strategic role.
Complex Er[jl]ang Processing with StreamBasedarach
The document is a presentation about complex event processing using StreamBase. It discusses StreamBase's event processing platform and how it provides high performance through its domain specific language and optimizations. It also covers how StreamBase integrates with Erlang through calling Erlang functions and messaging.
Achieving genuine elastic multitenancy with the Waratek Cloud VM for Java : J...JAX London
John Matthew Holt, Waratek CTO, explains how Waratek Cloud VM for Java transforms the JVM with key Cloud characteristics including genuine multitenancy, granular elasticity, instant scalability, realtime metering and prioritization of resources by application, to futureproof your Java investment in the age of Cloud computing.
Communication Patterns Using Data-Centric Publish/SubscribeSumant Tambe
Fundamental to any distributed system are communication patterns: point-to-point, request-reply, transactional queues, and publish-subscribe. Large distributed systems often employ two or more communication patterns. Using a single middleware that supports multiple communication patterns is a very cost-effective way of developing and maintaining large distributed systems. This talk will begin with an introduction of Data Distribution Service (DDS) – an OMG standard – that supports data-centric publish-subscribe communication for real-time distributed systems. DDS separates state management and distribution from application logic and supports discoverable data models. The talk will then describe how RTI Connext Messaging goes beyond vanilla DDS and implements various communication patterns including request-reply, command-response, and guaranteed delivery. You will also learn how these patterns can be combined to create interesting variations when the underlying substrate is as powerful as DDS. We’ll also discuss APIs for creating high-performance applications using the request-reply communication pattern.
The document discusses how to balance velocity and quality in agile development and testing. It promotes HP's Application Lifecycle Management (ALM) solution as helping deliver fast innovation while controlling risk. Key capabilities highlighted include testing mobile applications, enabling agile planning and tracking, virtualizing services for development and testing, and providing integrated quality and lifecycle management. The presentation encourages attendees to try HP's agile manager, learn more about its ALM solutions, and engage by joining an HP community or registering for the HP Discover event.
Cisco is a leading provider of networking technologies founded in 1984. It has a portfolio of products including routers, switches, collaboration tools, and security solutions. A key subsidiary, IronPort, focuses on email and messaging security through technologies like reputation filtering and image spam detection. While Cisco remains the market leader, Juniper has gained some ground through strong growth in routers and the enterprise market.
Cloud computing provides on-demand access to computing resources like servers and applications without long term commitments. It allows users to access services from any device, and pay only for what they use. Moving systems and applications to the cloud can provide benefits like flexibility, scalability, lower costs, increased productivity and mobility.
New applications are increasingly built on distributed service architectures, including mobile and cloud-based services which increase the complexity and interdependency of the systems to be tested.
Teams are forced to do performance test earlier in the application lifecycle, before the application is complete or stable with the increased pressure to operate more efficiently, produce valuable results more quickly, and operate with fewer resources.
Learn how Service Virtualization is a critical enabler to allow testers to get started with performance testing from the first sprint.
We will demonstrate how Service Virtualization is an easy-to-use solution that integrated with multiple performance testing tools, resulting in an almost seamless solution for performance engineering and validation.
This document discusses the rise of cloud computing and the opportunities and challenges it presents for businesses and IT departments. It notes that businesses are increasingly adopting cloud technologies at a faster rate than IT can support due to the speed and agility benefits of the cloud. However, IT concerns around security, compliance, and control are slowing cloud adoption. The document proposes that providing trusted cloud services that address these IT concerns can help enable broader cloud usage and allow businesses to realize the economic and innovation benefits of the cloud while allowing IT to play a more strategic role.
Anywhere, anytime, any place - embrace the Martini PrincipleHarold Teunissen
The document discusses how network technologies have converged over time to support access to data and services anytime, anyplace and anywhere. It notes the exponential growth in mobile data usage driven by more capable devices and cloud services. However, this trend risks overloading network capacity as a small portion of users consume most of the available data. The document advocates that national research and education networks embrace innovative approaches, like the "Martini principle", to stay ahead of these changes and continue enabling boundaryless collaboration.
The document discusses 7 ways that Android applications can be vulnerable, including intent hijacking, intent spoofing, sticky broadcast tampering, insecure storage of data, insecure network communication, SQL injection, and allowing applications to have promiscuous privileges. It provides descriptions and examples of each vulnerability and recommends ways to address the security issues, such as using explicit intents that require permissions, securing data storage, and limiting application privileges. The goal is to help developers avoid introducing vulnerabilities that could allow attackers to compromise user data or alter application behavior.
Capture is Powerful - Harvey Spencer presentation to AIIM Ottawa Event Oct 27...Cheryl McKinnon
The document discusses how capture technology is essential for businesses to adapt to a global economy with intense competition. It notes the need for faster, cheaper processes and compliance with increasing regulations. Capture technology uses pattern recognition and rules to understand various media like paper, faxes, emails and transform them into usable business data. The capture software market was estimated to be $2.4 billion in 2011 and expected to grow to $4 billion by 2015. The document emphasizes how capture allows for faster business understanding when processing documents and helps integrate information with business processes.
Presentation of the DDS Interoperability demo performed in Washington DC between RTI, TwinOaks and PrismTech.
This demonstration shows the use of the DDS-RTPS interoperability protocol in 9 different scenarios.
WebSocket is a standardized interface for continuous, bi-directional and low-overhead communication between Web browser clients and back-end servers.
This presentation provides an overview of the WebSocket interface and descriptions of four WebSocket demonstration applications: i) a multi-user Facebook game; ii) a cloud server monitor; iii) a browser-based interface to LabVIEW; and iv) an interface to a MySQL database.
Presented Jan 26, 2011 at the HTML5 & CSS3 LA User Group Meetup, Los Angeles, CA
The document discusses managing content for mobile devices. It notes that content management systems need to support delivering content to various non-PC devices like smartphones and tablets. Key considerations for mobile content include device adaptation by segmenting content granularly and customizing for different device capabilities, as well as allowing content creation and management from mobile devices. Overall, vendors should start with broad targeting across device types and refine over time as mobile usage evolves.
The document discusses HP's StorageWorks solutions for bridging the gap between data explosion and storage infrastructure. Some key points:
1. Data has become critical for businesses and is growing exponentially, posing challenges for storage.
2. HP StorageWorks provides integrated storage solutions including blades, extreme capacity systems, virtualized storage, and data protection/archiving to optimize storage infrastructure.
3. The solutions aim to make infrastructure change-ready, lower costs through features like thin provisioning and data reduction, and provide a trusted partner to businesses.
The document discusses balancing agility and risk in IT. It notes the challenges of constant change, new business models, and increased data and mobility. It advocates extending agile development principles to operations through continuous delivery, automation, and collaboration between development and operations teams. This allows for faster and more reliable application releases across development, test, staging and production environments. Case studies show how HP Software helped customers McKesson, Avis, and the US Army achieve better application performance, insights, and security.
Cloud computing allows users to access technology services without owning the physical infrastructure. It provides on-demand, scalable computing resources and applications delivered over the internet. Key benefits include efficient allocation of resources, flexibility, cost reductions through resource pooling, and empowering businesses to focus on their core operations. Cloud services offer advantages over traditional hosting like faster deployment, scalability, and pay-per-use pricing.
The document discusses the relationship between business intelligence (BI) and enterprise content management (ECM). It notes that while search capabilities have improved, search alone does not constitute BI, which requires measuring and analyzing key performance indicators. The document also provides an overview of the BI and search landscapes, different data types commonly used, and the large volumes of documents stored in email, file shares, and other systems that could provide raw data for analysis.
The document discusses RTMFP, a proprietary transport protocol developed by Adobe. It was designed to securely deliver media flows over the internet in a more efficient manner than existing protocols. RTMFP establishes sessions between endpoints to allow for the transfer of multiple unidirectional flows with low latency. It uses techniques like parallel opens and NAT traversal to establish sessions quickly while being secure and congestion controlled.
The document summarizes common myths told by vendors about enterprise content management (ECM) systems. It discusses nine common myths, such as claims of being a market leader, experiencing high growth rates, having highly flexible systems, quick implementations, and low costs. The document aims to debunk these myths by examining vendors' actual capabilities and total costs of ownership over multiple years. It advises buyers to carefully evaluate vendors' product demonstrations, implementation timelines, development needs, pricing models, and global support coverage.
TAUS Scotland Asia Online Technology Platform V1Kirti Vashee
The document describes Asia Online's translation management technology platform. It provides a comprehensive machine translation platform as a cloud-based service. The platform allows users to clean and prepare data, develop machine translation engines on demand, and enable ongoing post-editing and correction to continuously improve the engines. It aims to revolutionize the enterprise translation process with an adaptive, continuous learning system.
1) Riverbed is a successful company with over $500 million in annual revenue, half a billion in assets, and over 13,000 customers.
2) The document discusses barriers to cloud computing adoption such as latency issues, security concerns, and lack of standards.
3) Riverbed aims to help customers deliver IT performance for applications both in public and private clouds as well as across WANs connecting different locations.
A Foundation for Success in the Information EconomyInside Analysis
The Briefing Room with Dr. Robin Bloor and Hewlett-Packard
Live Webcast on Oct. 30, 2012
Success in today's information economy rises and falls on the efficiency of data management. Companies that treat their information assets as mission-critical components of the business will find ways to better their competitors. The key is to ensure that the foundation of your information architecture can satisfy the wide range of user demands. Moreover, the ability to scale quickly and efficiently has become paramount.
Check out this episode of The Briefing Room to hear veteran Analyst Robin Bloor who will explain the benefits of embracing a modern Information Oriented Architecture (IOA). He'll also tout the purpose of using a flexible SQL engine in this era of NoSQL technologies. He will be briefed by Ajaya Gummadi of Hewlett-Packard, who will show how her company’s NonStop SQL has evolved to become a valuable solution for mission-critical data, mixed workloads and high volume databases. She will also explain how their integrated hardware and software stack can help reduce the cost of operations and management in a large-scale database environment.
This document discusses the need for and drivers towards IPv6 adoption. It notes that new mobile applications and services require more bandwidth than IPv4 allows. IPv6 provides a much larger address space and allows for always-on services without network address translation. The document outlines a phased approach to introducing IPv6 in mobile networks beginning with IPv6 in the user layer and terminal, followed by internal network upgrades. Initial IPv6 deployment is expected in 2003-2007 with a transition period before IPv6 is used mainly from 2014 onwards.
The document discusses extending data centers with AWS Cloud. It provides context on AWS's global business and experience building web-scale systems. It describes how AWS infrastructure allows elasticity compared to traditional data centers. The agenda covers AWS services, examples, and how to get started.
Tom Krcha from Adobe presented on peer-to-peer (P2P) capabilities in Flash Player. P2P allows for decentralized networks without a central server. It is useful for applications like multiplayer games, video chat and live streaming. Flash Player 10.1 introduced new features like groups, multicast and security improvements to enhance P2P. Examples of P2P apps built with Flash include games, video calling and using P2P networks through services like Adobe Stratus on Facebook. Future developments may include more advanced multicast, security and integration with Flash Media Server.
The document discusses the Internet of Things (IoT). It defines IoT as connecting physical objects to the internet and allowing them to transfer data without human interaction. It describes the different layers of an IoT architecture including sensors, gateways, management services, and applications. It also discusses some major challenges of IoT like big data, security, and power efficiency. Finally, it provides examples of IoT applications in various sectors like transportation, healthcare, agriculture, and retail.
Anywhere, anytime, any place - embrace the Martini PrincipleHarold Teunissen
The document discusses how network technologies have converged over time to support access to data and services anytime, anyplace and anywhere. It notes the exponential growth in mobile data usage driven by more capable devices and cloud services. However, this trend risks overloading network capacity as a small portion of users consume most of the available data. The document advocates that national research and education networks embrace innovative approaches, like the "Martini principle", to stay ahead of these changes and continue enabling boundaryless collaboration.
The document discusses 7 ways that Android applications can be vulnerable, including intent hijacking, intent spoofing, sticky broadcast tampering, insecure storage of data, insecure network communication, SQL injection, and allowing applications to have promiscuous privileges. It provides descriptions and examples of each vulnerability and recommends ways to address the security issues, such as using explicit intents that require permissions, securing data storage, and limiting application privileges. The goal is to help developers avoid introducing vulnerabilities that could allow attackers to compromise user data or alter application behavior.
Capture is Powerful - Harvey Spencer presentation to AIIM Ottawa Event Oct 27...Cheryl McKinnon
The document discusses how capture technology is essential for businesses to adapt to a global economy with intense competition. It notes the need for faster, cheaper processes and compliance with increasing regulations. Capture technology uses pattern recognition and rules to understand various media like paper, faxes, emails and transform them into usable business data. The capture software market was estimated to be $2.4 billion in 2011 and expected to grow to $4 billion by 2015. The document emphasizes how capture allows for faster business understanding when processing documents and helps integrate information with business processes.
Presentation of the DDS Interoperability demo performed in Washington DC between RTI, TwinOaks and PrismTech.
This demonstration shows the use of the DDS-RTPS interoperability protocol in 9 different scenarios.
WebSocket is a standardized interface for continuous, bi-directional and low-overhead communication between Web browser clients and back-end servers.
This presentation provides an overview of the WebSocket interface and descriptions of four WebSocket demonstration applications: i) a multi-user Facebook game; ii) a cloud server monitor; iii) a browser-based interface to LabVIEW; and iv) an interface to a MySQL database.
Presented Jan 26, 2011 at the HTML5 & CSS3 LA User Group Meetup, Los Angeles, CA
The document discusses managing content for mobile devices. It notes that content management systems need to support delivering content to various non-PC devices like smartphones and tablets. Key considerations for mobile content include device adaptation by segmenting content granularly and customizing for different device capabilities, as well as allowing content creation and management from mobile devices. Overall, vendors should start with broad targeting across device types and refine over time as mobile usage evolves.
The document discusses HP's StorageWorks solutions for bridging the gap between data explosion and storage infrastructure. Some key points:
1. Data has become critical for businesses and is growing exponentially, posing challenges for storage.
2. HP StorageWorks provides integrated storage solutions including blades, extreme capacity systems, virtualized storage, and data protection/archiving to optimize storage infrastructure.
3. The solutions aim to make infrastructure change-ready, lower costs through features like thin provisioning and data reduction, and provide a trusted partner to businesses.
The document discusses balancing agility and risk in IT. It notes the challenges of constant change, new business models, and increased data and mobility. It advocates extending agile development principles to operations through continuous delivery, automation, and collaboration between development and operations teams. This allows for faster and more reliable application releases across development, test, staging and production environments. Case studies show how HP Software helped customers McKesson, Avis, and the US Army achieve better application performance, insights, and security.
Cloud computing allows users to access technology services without owning the physical infrastructure. It provides on-demand, scalable computing resources and applications delivered over the internet. Key benefits include efficient allocation of resources, flexibility, cost reductions through resource pooling, and empowering businesses to focus on their core operations. Cloud services offer advantages over traditional hosting like faster deployment, scalability, and pay-per-use pricing.
The document discusses the relationship between business intelligence (BI) and enterprise content management (ECM). It notes that while search capabilities have improved, search alone does not constitute BI, which requires measuring and analyzing key performance indicators. The document also provides an overview of the BI and search landscapes, different data types commonly used, and the large volumes of documents stored in email, file shares, and other systems that could provide raw data for analysis.
The document discusses RTMFP, a proprietary transport protocol developed by Adobe. It was designed to securely deliver media flows over the internet in a more efficient manner than existing protocols. RTMFP establishes sessions between endpoints to allow for the transfer of multiple unidirectional flows with low latency. It uses techniques like parallel opens and NAT traversal to establish sessions quickly while being secure and congestion controlled.
The document summarizes common myths told by vendors about enterprise content management (ECM) systems. It discusses nine common myths, such as claims of being a market leader, experiencing high growth rates, having highly flexible systems, quick implementations, and low costs. The document aims to debunk these myths by examining vendors' actual capabilities and total costs of ownership over multiple years. It advises buyers to carefully evaluate vendors' product demonstrations, implementation timelines, development needs, pricing models, and global support coverage.
TAUS Scotland Asia Online Technology Platform V1Kirti Vashee
The document describes Asia Online's translation management technology platform. It provides a comprehensive machine translation platform as a cloud-based service. The platform allows users to clean and prepare data, develop machine translation engines on demand, and enable ongoing post-editing and correction to continuously improve the engines. It aims to revolutionize the enterprise translation process with an adaptive, continuous learning system.
1) Riverbed is a successful company with over $500 million in annual revenue, half a billion in assets, and over 13,000 customers.
2) The document discusses barriers to cloud computing adoption such as latency issues, security concerns, and lack of standards.
3) Riverbed aims to help customers deliver IT performance for applications both in public and private clouds as well as across WANs connecting different locations.
A Foundation for Success in the Information EconomyInside Analysis
The Briefing Room with Dr. Robin Bloor and Hewlett-Packard
Live Webcast on Oct. 30, 2012
Success in today's information economy rises and falls on the efficiency of data management. Companies that treat their information assets as mission-critical components of the business will find ways to better their competitors. The key is to ensure that the foundation of your information architecture can satisfy the wide range of user demands. Moreover, the ability to scale quickly and efficiently has become paramount.
Check out this episode of The Briefing Room to hear veteran Analyst Robin Bloor who will explain the benefits of embracing a modern Information Oriented Architecture (IOA). He'll also tout the purpose of using a flexible SQL engine in this era of NoSQL technologies. He will be briefed by Ajaya Gummadi of Hewlett-Packard, who will show how her company’s NonStop SQL has evolved to become a valuable solution for mission-critical data, mixed workloads and high volume databases. She will also explain how their integrated hardware and software stack can help reduce the cost of operations and management in a large-scale database environment.
This document discusses the need for and drivers towards IPv6 adoption. It notes that new mobile applications and services require more bandwidth than IPv4 allows. IPv6 provides a much larger address space and allows for always-on services without network address translation. The document outlines a phased approach to introducing IPv6 in mobile networks beginning with IPv6 in the user layer and terminal, followed by internal network upgrades. Initial IPv6 deployment is expected in 2003-2007 with a transition period before IPv6 is used mainly from 2014 onwards.
The document discusses extending data centers with AWS Cloud. It provides context on AWS's global business and experience building web-scale systems. It describes how AWS infrastructure allows elasticity compared to traditional data centers. The agenda covers AWS services, examples, and how to get started.
Tom Krcha from Adobe presented on peer-to-peer (P2P) capabilities in Flash Player. P2P allows for decentralized networks without a central server. It is useful for applications like multiplayer games, video chat and live streaming. Flash Player 10.1 introduced new features like groups, multicast and security improvements to enhance P2P. Examples of P2P apps built with Flash include games, video calling and using P2P networks through services like Adobe Stratus on Facebook. Future developments may include more advanced multicast, security and integration with Flash Media Server.
The document discusses the Internet of Things (IoT). It defines IoT as connecting physical objects to the internet and allowing them to transfer data without human interaction. It describes the different layers of an IoT architecture including sensors, gateways, management services, and applications. It also discusses some major challenges of IoT like big data, security, and power efficiency. Finally, it provides examples of IoT applications in various sectors like transportation, healthcare, agriculture, and retail.
The document summarizes the results of benchmark testing of the Alfresco content management system on a Unisys ES7000/one Enterprise Server. The goals of loading at least 100 million documents into a single repository and achieving a load rate of at least 100 documents per second were met. A total of 107 million documents were loaded at a rate of 140 documents per second. Document retrieval operations took less than one second, demonstrating acceptable response times with the large repository. The ES7000 server had low processor utilization of around 20%, indicating its capabilities were not fully utilized.
This document provides a summary of key aspects for building internet-scale applications based on a talk given by Gaveen Prabhasara. It discusses the importance of culture, acquiring domain knowledge, building the right team with the proper skills, designing solid architecture and avoiding over-engineering. It also emphasizes using the best tools, implementing best practices like automation and continuous integration, addressing security from the start, and planning for scaling from the beginning. Monitoring and metrics are also highlighted as important for measuring and improving performance over time.
Content Strategy: The Keys Unlocking Scalable Marketing ContentBuddy Scalera
CONTENT STRATEGY: Unlock Scalable Content to Ensure a Resonate Online Consumer Message - Presented by Buddy Scalera at Content Marketing World | Health Summit 2012. Explore the user journey and how content messaging can be provided at every step of the consumer continuum. Includes a case study with everybody's favorite comic book cave man Grok.
This is part of our presentation for the paper 'Understanding Consumers in India' taken at Amity Business School, Noida. Our Presentation was based on the study done by Deloitte India for the same.
The DMI Project Logical Data Model describes the sought after DMI Asset Metadata Structure represented
using UML Class Modelling diagrams. The model is describing the structure on a class level, but where
possible examples have been added to explain how the structure works.
The current version has not been fully populated with attributes but the required data structures should be in
place.
The model covers all types of media assets, not just linear television programmes. The structure of the
model is supporting Linear Television Programmes, Radio Programmes, Interactive Services, Promotions,
Web Pages, Interstitials and Scripts etc. Several areas will require further analysis; this will be highlighted in
the detail of the document. It is expected that this will be looked at in the detailed design phase.
One of the main focuses of the model is that the asset information should be held separately from
information about the usage of that asset; this will simplify the reuse of the assets, from an information point
of view. The concepts Publishable Asset and Media Asset have been introduced to the model to support this
separation of the data.
Databases create a real challenge for automation and dealing with database deployments is a complex process. Databases contain our most valuable information, business data, which must be preserved and protected at all costs and yet the automation processes for database deployment are not widely adopted.
Low Power Wireless Technologies and Standards for the Internet of ThingsDuncan Purves
Presentation on low power wireless technologies and standards for the Internet of Things (iOT), given at the BCS Communications Management Association AGM on 5th April 2016
This document provides an overview of organic electronic materials, including their properties, applications, and key developments. It discusses how charge transfer complexes and conductive polymers can have conducting, semiconducting, and light emitting properties. Important applications mentioned include organic field effect transistors, RFID tags, and OLED displays. The development of conductive polymers like polyacetylene in the 1970s led to the discovery of organic superconductors and earned several scientists the 2000 Nobel Prize in Chemistry. Flexible OLEDs and organic thin film transistors now allow for printed electronic technologies.
The document summarizes a science project about building an air-powered car. The car would use compressed air stored in a 16-liter tank to power gears connected to the tires and drive the car, providing eco-friendly transportation. It describes the basic engine design involving an air tank and release valve to power gears connected to the axle. It also mentions the car would need a strong but light frame and tubeless tires for grip and low weight. The summary concludes by noting the document was written by two 11th grade students for their science project.
Continuous Deployment Practices, with Production, Test and Development Enviro...Amazon Web Services
With AWS companies now have the ability to develop and run their applications with speed and flexibility like never before. Working with an infrastructure that can be 100% API driven enables businesses to use lean methodologies and realize these benefits. This in turn leads to greater success for those who make use of these practices. In this session we'll talk about some key concepts and design patterns for Continuous Deployment and Continuous Integration, two elements of lean development of applications and infrastructures.
UI for Big Data Visualization | Jonathan Stray | UX Week 2012Adaptive Path
Visualization is great way to understand data, but it breaks down when the data gets big. Simply plotting everything to the screen won’t work, because there isn’t enough screen real estate, interactions slow to a crawl, and human working memory isn’t up to the task anyway. Big data requires specific interaction techniques for visual exploration, such as filtering, summarization, and context. We’ll go over some basic principles, and I’ll show examples of recent systems, including our work on the Overview Project, a system for visual exploration of huge unstructured document sets.
Compressed air has potential as an alternative fuel source for vehicles. Storing energy in compressed air is done by squeezing air into a tank using an air compressor. When the compressed air is released through an engine, it expands and the energy is used to power the vehicle. Proposed air cars would use compressed air engine technology to run on stored compressed air with zero emissions. While air cars could have advantages like limited parts and high efficiency, disadvantages include a need to refuel via electricity-powered air compressors and potentially shorter driving ranges than gasoline-powered vehicles. The first air cars may be produced in the next few years by companies like Tata Motors and K'Air Energy.
This document discusses compressed air engines as an alternative to gasoline engines. It provides details on the history and components of compressed air engines, how they work, and their advantages and limitations. Compressed air engines store compressed air in tanks and use the expansion of the compressed air to power the engine, similar to how steam engines use steam. While compressed air engines reduce pollution, they currently have less power and require more time to refuel than gasoline engines. The document also mentions some companies working to develop compressed air vehicles.
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Duncan Purves
Presentation on Low Power Wireless Sensor Network Technologies and Standards for the Internet of Things given at Institute of Physics, Sensors & their Applications XVIII Conference, 12 September 2016
This document discusses vehicle-to-grid (V2G) technology which allows electric vehicles to provide power to the electric grid during periods when they are parked and connected to the grid. V2G technology integrates electric vehicles into the smart grid and allows them to provide services like frequency regulation. It describes how V2G works by establishing communication between vehicles and charging stations that can then form a "virtual storage network" to provide balancing services to the electric grid. V2G provides benefits like improving power quality and reducing electric bills but requires standards and legislation to fully integrate electric vehicles into grid operations.
Nokia Morph is a concept developed by Nokia and the University of Cambridge to demonstrate how future mobile devices could be stretchable and flexible using nanotechnology. It describes how nanomaterials like nano-flowers that naturally repel water and fingerprints could allow devices to change shape to be worn as a wristwatch or used as an expandable keyboard. The concept suggests that advances in nanoscale electronics, transparent surfaces, flexible batteries and self-cleaning coatings could enable mobile devices to seamlessly adapt to a user's needs.
This talk will provide an in-depth treatment of satellite telephony networks from a security perspective. The overall system seems secure, but in reality, it cannot be expected to be fully reliable.
We will briefly cover the satellite mobile system architecture, then discuss GMR (GEO-Mobile Radio) system elements, e.g. GSS (Gateway Station Subsystem), MES (Mobile Earth Station), AOC (Advanced Operation Center), and TCS (Traffic Control Subsystem) for GMR-1 systems and NCC (Network Control Center), GW (Gateway), SCF (Satellite Control Facility) and CMIS (Customer Management Information System) for GMR-2 systems.
From there, we will discuss the security issues of GMR system as it shares similar vulnerabilities with GSM–GMR is derived from the terrestrial digital cellular standard GSM and support access to GSM core networks, along with some interesting demos.
Time permitting, a question and answer session at the end of the presentation will allow participants to cover any additional issues in satellite telephony system they’d like to discuss.
Combination of biology and electronics has led to many new inventions .these are useful to combat delay diseases .One such invention microelectronic pill. This phenomenon is used to detect diseases and abnormalities in the body. This is an indigestible pill and comprised of sensor. These sensor measures various body parameters like pH of stomach acid and intestinal .these measure temperature and dissolved oxygen. These sensors are mounted in the silicon chips. The microelectronics pill is completely harm-free to body.
Cloud Security - Cloud Arena - Tim WilloughbyTim Willoughby
Tim explains technology to various groups in an understandable way. He lives in Naas, Ireland and works as a translator between technical and business teams, using web services and cloud computing. Security, standardization, and control are ongoing challenges for moving organizations to the cloud.
Mobile networking is growing rapidly driven by increases in smartphone and tablet adoption. Video now accounts for over 1/3 of consumer internet traffic. Looking ahead, Huawei sees phones becoming the universal device, driven by improved screens, faster networks, and powerful chipsets. This will enable seamless sharing of content between intelligent devices and real-time HD interactions, including cloud-based multiplayer gaming. Mobile operators can capture this growth through differentiated services focused on social networking, communications, and digital media across multiple screens.
Is your business NBN ready? – Developing a Digital Business Strategy: VELG Na...Vanguard Visions
The Australian Government is investing $43 billion over 8 years in fibre, wireless and satellite broadband infrastructure as part of the National Broadband Network (NBN). There is strong evidence that the NBN will be a key enabler of many economic, social, technological and environmental developments (Bowles, 2011). This new digital economy will have an impact on all Australian industries and will require every Australian to improve their information and communication technology (ICT) skills. Participants will take away tools and processes to develop a digital business strategy which will enable them to capitalise on the training and business opportunities being made possible through the roll out of the NBN.
Getting your business ready for the NBN - Salisbury/Modbury Digital EnterpriseVanguard Visions
The document discusses how businesses can prepare for the National Broadband Network (NBN) in Australia. The NBN will provide faster internet speeds from 100 megabits per second up to 1 gigabit per second. This high-speed internet will change the digital landscape and require businesses to be "NBN-ready." The document outlines steps businesses can take to design their digital future, including developing their digital presence on platforms like social media, building their digital infrastructure, and establishing an online marketplace. It also discusses important considerations for implementing and evaluating digital strategies, such as digital policies, financial sustainability, and benchmarking progress.
The National Broadband Network (NBN) will contribute to Australia being among the world’s leading digital economies through improved productivity gains, global competitiveness and social well-being (National Digital Economy Strategy, 2011).
In order to ensure your business takes advantage of this improved connectivity it will need to make sure that is ‘NBN ready’.
This interactive session presented by Allison Miller of Vanguard Visions Consulting will provide an overview of:
What the NBN is and why it is important to your business
How your businesses can prepare itself to make the most of the NBN
This document discusses trends in technology and their impact on organizations. It covers the evolution of networks, content, and personal technologies. Networks have evolved from one-way communication to being more networked and social. Content has shifted from being authoritative and top-down to being more user-generated and dynamic. Personal technologies have also evolved rapidly from desktop computers to mobile devices. The document discusses implications for organizations, including considering a mobile mindset, apps versus mobile websites, responsive design, and mobile contexts like location, motion, and device capabilities. It also briefly introduces cloud computing models.
Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway ...Continuous Computing
Presentation delivered at Broadband Traffic Management Congress on November 2010 entitled, "Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway and Esuring Scalability"
This document summarizes Daniel Odio's presentation on capitalizing on mobile trends for success. The presentation covers the current state of mobile with smartphones surpassing PCs, opportunities for mobile entrepreneurs in apps and social features, and big trends like the rise of APIs and gamification. It provides tips for mobile developers such as using agile development practices and cloud services to improve efficiency.
P2P - Real Time Communications in the EnterpriseMead Eblan
"Mainstreaming Peer-to-Peer Connectivity:
Real-Time Communications in the Enterprise"
- Presented at Digital Government Institute Conference on IPv6
- September 2007
Smarter Test Automation for Web & Mobile AppsKeao Caindec
On any given day SOASTA may be looking for thousands of cloud servers to simulate millions of virtual mobile and web site visitors. As a result, they’ve done more cloud testing across more cloud providers than anyone else. SOASTA’s CloudTest platform depends on the swift provisioning and releasing of servers, while ensuring that each server plays its role in a distributed, multi-vendor architecture. Dimension Data is a key provider in SOASTA’s Global Test Cloud, giving our clients scalable access to cost effective servers from around the world.
ODCA Forecast 2012 Keynote: Curt Aubley, President, Open Data Center Alliance; VP/CTO NexGen Cyber Innovation & Technology; Lockheed Martin Information Systems & Global Services
This document discusses how telecommunications companies can survive and prosper in the 21st century. It notes that technology, competition, and customer demands are changing rapidly. Companies that hold onto the past will die. The document recommends that telecom companies recognize changes that have already happened and are still to come, look for big opportunities, and change their business models. It suggests stopping dumb questions and assumptions about things like bandwidth needs, network control, and customer behavior. The document predicts major changes like voice services being killed by VOIP, networks bypassed by wireless, and anyone providing network services. It recommends moving to all-IP networks and fiber deployment to drastically reduce costs. The biggest predictions are positioning systems surpassing communications, sensor networks becoming all
The Anue 5200 Net Tool Optimizer from Ixia provides:
1) Increased network visibility for security and monitoring tools by addressing lack of SPAN ports and network segments.
2) Reduced tool costs by allowing expensive tools to monitor high speed networks and eliminating duplicate tools.
3) Increased staff productivity by simplifying monitoring setup and reducing troubleshooting time.
The Anue 5200 Net Tool Optimizer from Ixia helps maximize ROI from existing network monitoring tools by improving network visibility, optimizing tool utilization, and boosting staff productivity. It extends network monitoring coverage and scales to high-density and 40G networks while allowing expensive tools to monitor faster links. This reduces tool costs and overhead while simplifying monitoring. It also adds security by controlling access between core devices and tools.
The Essentials of Mobile App Performance Testing and MonitoringCorrelsense
Complexity across mobile carriers, locations and operating systems has made building mobile apps and monitoring their end user performance time consuming and expensive. The importance of testing mobile apps on iOS, Android and Windows Phone is increasing as more users embrace these devices. Join Correlsense and uTest for an online seminar which will teach you the steps to successful mobile application testing and performance management. We will discuss:
- The proliferation of mobile devices and the technical challenges they bring to end user experience monitoring
- Ways to prepare mobile applications for peak usage periods with the right load and performance testing techniques
- Tips and techniques for gaining visibility into the performance of mobile applications with the right monitoring tools
We will conclude with a discussion of the Correlsense and uTest solutions.
Lessons from Mozilla provides 7 insights and 2 problems Mozilla learned from its experience as an open source project and maker of Firefox. The insights include the importance of superior products, distributed decision-making, effective communication, making contributions easy, managing expectations of surprise, treating community members as citizens rather than consumers, and experimenting to apply insights. The problems are that engaged citizens can be noisy and contradictory, and there are no maps at large scale.
The document discusses various methods for making physical objects and products interactive through mobile technologies. It describes identification methods like barcodes, RFID, and augmented reality that can be used to connect objects to digital information accessed through mobile devices. The document argues that the mobile handset is central to enabling real-time interactions between physical objects and users due to the pervasiveness of mobile phones and their ability to access information. It analyzes the costs and technical requirements of different interaction methods and emphasizes the importance of user permission and privacy in implementing these technologies.
Similaire à Data distribution in the cloud with Node.js (20)
The document discusses streams and functional programming in JavaScript. It provides three examples of using streams:
1. Playing MP3 files by piping a read stream through a decoder and speaker.
2. Creating a "sound soup" that randomly plays MP3 files from a directory every half second by piping read streams through a decoder and speaker.
3. A brief history of streams in Node.js, from the original Util.pump method to the current Streams API in versions 1-3, highlighting improvements in error handling and backpressure support.
Slides from my talk at Philly ETE looking at the Lambda Architecture (originating at twitter) critically from the perspective of someone viewing it from the financial (faster, higher volume, spikier data) domain
This document discusses the Internet of Things and embedded event processing. It defines the Internet of Things as everyday objects having network connectivity to send and receive data. It also discusses streams of events for receiving, processing, and generating data flows in near real-time. Additionally, it presents embedded event processing as a simple way to aggregate and analyze streaming data using functional reactive programming patterns like those in Node.js streams. The document concludes by discussing the potential to empower ordinary people to program and connect their smart devices in new ways.
This document discusses big data and data-intensive science. It introduces the Lambda architecture, which processes streaming data in both batch and speed layers to generate real-time and batch views. The batch layer precomputes queries from all available data. The serving layer indexes batch views. The speed layer uses incremental algorithms to generate real-time views from new data. Queries are resolved by merging results from the batch and real-time views. Recommendations are made to leverage complex event processing and stream processing techniques to more efficiently construct views and handle merging and querying across layers.
This document discusses streaming concepts and different types of streams. It outlines readable and writable streams that are oriented toward input/output and are asynchronous and lazy. Sources produce data, sinks consume results, and operators like filters, transforms, and branches manipulate data. The document also discusses compute-oriented streams that are synchronous, eager, and better suited for in-memory operations than input/output. It provides instructions for installing related NPM packages for streaming, including beam for compute streams, eep for windows, and nodesapiens for robotics.
The document discusses using Erlang to control robot hardware. It mentions using embedded Erlang on a Raspberry Pi to control a Robosapiens robot. The author is a chief scientist at Push Technology who has worked at various companies involving distributed systems. He proposes building a robot swarm controlled by Erlang code.
The document discusses a presentation given by Darach Ennis, Chief Scientist at Push Technology, at QCON London 2013. The presentation covers topics such as distributed systems, high availability, challenges at the network edge like bandwidth limitations and latency, and examples of single points of failure. It also includes humor and references to challenges faced by technology companies.
EFL Munich - February 2013 - "Conversational Big Data with Erlang"darach
This document provides biographical information about Darach Eaves, including that he is currently the Chief Scientist at Push Technology and has previous experience at companies like Motorola, IONA, and JPMC. It notes that he has a BA and MSc in computer science from Trinity College Dublin.
This document provides an overview of streaming data and event processing concepts. It discusses different types of windows (tumbling, sliding, periodic, monotonic) that can be used to analyze data over time. It also introduces the concepts of streams and pipes for composing processing logic from simple reusable parts, and discusses how this relates to approaches used in Node.js and other systems. The document is presented at a technical event to explain these streaming data concepts.
This document provides an overview of Darach Eaves, including that he is a chief scientist at Push Technology, has experience at several technology companies, and has degrees from Trinity College Dublin. It also briefly discusses his interests in distributed systems, big data, and real-time data distribution technologies.
StreamBase - Embedded Erjang - Erlang User Group London - 20th April 2011darach
This document summarizes a presentation given by Darach Ennis of StreamBase Systems on complex event processing using Erlang. The presentation discusses using a domain specific language for high frequency trading, challenges in complex event processing like low latency and large data volumes, and how StreamBase's event processing platform addresses these challenges through techniques like compilation, modular abstraction, and clustering. It also demonstrates how to embed Erlang code and behaviors in StreamBase to extend its functionality.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Choosing The Best AWS Service For Your Website + API.pptx
Data distribution in the cloud with Node.js
1. Data Distribution
in the cloud with
Node.js
Copyright Push Technology 2012
2. • British startup. Founded in 2006.
• ‘Last mile’ data distribution specialist.
• Data-centric approach to
messaging/caching.
• Preferred by 6 of the top 10 online
eGaming exchanges.
• Growing fast. 400% year on year.
• Focus: Better bang for your bytes!
Introducing Push Technology
Copyright Push Technology 2012
Twitter: @push_technology
3. • Distributed Systems / HPC guy.
• Chief Scientist :- at Push Technology
• Alumnus of :-
Motorola, IONA, Betfair, JPMC, StreamBase.
• School: Trinity College Dublin.
- BA (Mod). Comp. Sci.+
- M.Sc. Networks & Distributed Systems
• Responds to: Guinness, Whisky
About me?
Copyright Push Technology 2012
Darach@PushTechnology.com
4. • Favorite language: Erlang
• Favorite bits?
• OTP – Behaviors
• Bit Syntax
• Least favorite language: Java
• Paid to write this stuff
• Love the JVM
• Liking Node a lot.
• Small fast data guy. I work in microseconds,
measure in nanoseconds. On my critical path
micro-benchmarking is a way of life.
About me?
Copyright Push Technology 2012
Darach@PushTechnology.com
5. 1st clean room certified JVM in 10
years. Built in Dublin! It rocks.
Tenant #1 Tenant #2 Tenant #N
(Diffusion) (Diffusion) (Diffusion)
Push Technology Diffusion
Waratek Cloud VM for Java
Benefits
• High density deployments
• Elastic. Scalable on demand
• Meterability: Bandwidth and compute utilization
• Multi-tenant. Each tenant fully isolated
Copyright Push Technology 2012
6. A US Cap Market second?
• 174 microseconds round trip
time rules out High
Frequency Trading
applications.
Not on the critical path!
Source: Me, former life
@StreamBase
• http://slidesha.re/guZOVe
8. Traditional Messaging
A
B
ba
bb
Producers ? Consumers
Pros Cons
• Loosely coupled. • No data model. Slinging blobs
• All you can eat messaging patterns • Fast producer, slow consumer? Ouch.
• Familiar • No data ‘smarts’. A blob is a blob.
Copyright Push Technology 2012
9. Invented yonks ago…
Before the InterWebs
For ‘reliable’ networks
For machine to machine
Remember DEC Message Queues?
- That basically. Vomit!
Copyright Push Technology 2012
10. When fallacies were simple
-The network is reliable
-Latency is zero
-Bandwidth is infinite
-There is one administrator
-The network is secure
-Transport cost is zero
-The network is homogeneous
Copyright Push Technology 2012
11. Then in 1992, this happened:
The phrase ‘surfing the internet’ was coined by Jean Poly.
First base.
Copyright Push Technology 2012
12. It grew, and it grew
Copyright Push Technology 2012
13. Then in 2007, this happened:
The god phone:
Surfing died. Touching happened.
Second base unlocked.
Copyright Push Technology 2012
14. Then in 2007, this happened:
So we took all the things and put them in the internet:
Cloud happened.
So we could touch all the things.
Messaging
Apps
Hardware
Virtualize all the things
Services
Skills,
Specialties
Copyright Push Technology 2012
15. Then in 2009, this happened:
Ryan Dahl, basically.
Tyrannically asynchronous.
Devilishly event oriented.
Amazoidingly non-blocking.
Copyright Push Technology 2012
16. It grew, and it grew
Like all the good things do.
Copyright Push Technology 2012
17. Stop. Fallacies? Reality:
-The network is not reliable
nor is it cost free.
-Latency is not zero
nor is it a democracy.
-Bandwidth is not infinite
nor predictable especially the last mile!
-There is not only one administrator
trust, relationships are key
-The network is not secure
nor is the data that flows through it
-Transport cost is not zero
but what you don’t do is free
-The network is not homogeneous
nor is it smart
Copyright Push Technology 2012
18. Look. What, How & Why?
-What and How are what geeks do.
-Why gets you paid
-Business Value and Trust dictate What and How
- Policies, Events and Content implements Business Value
-Science basically. But think like a carpenter:
-Measure twice. Cut once.
Copyright Push Technology 2012
19. The Problem: The bird, basically.
Immediately Inconsistent.
But, Eventually Consistent
… Maybe.
Copyright Push Technology 2012
20. Listen.
- Every nuance comes with a set of tradeoffs.
- Choosing the right ones can be hard, but it pays off.
- Context, Environment are critical
- Break all the rules, one benchmark at a time.
- Benchmark Driven Development FTW
Copyright Push Technology 2012
21. Act.
- You measured twice, right?
- So get cutting!
- Simples
Copyright Push Technology 2012
22. Act. Telepathy? Telemetry!
A
B
ba
bb
Buffer
Producers Bloat
Consumers
Virtualize client queues? Nuance: ‘See’ backlog, client affinity. Tradeoff GD harder :/
Copyright Push Technology 2012
23. Act. Stateless or Stateful Topics
A
B
ba x
bb x
Producers
Is it a Consumers
cache?
Data one hop closer to consumers. Good state? Touch it! Exploit it! Use it!
Copyright Push Technology 2012
24. Act. Finagle the data
A
B Snapshot Delta
ba x
bb x
Producers State! Consumers
Last value cached. Tradeoff? Memory. Snapshot on subscribe. Deltas thereafter
Copyright Push Technology 2012
25. Act. ‘Smart data’
A B C A C D
t0 t1
Don’t repeat yourself. Send the changes, not the whole list after initial ‘snapshot’.
Copyright Push Technology 2012
26. Act. Behaviors
A
B
ba x
bb x
X The
Producers
topic is Consumers
the
cloud!
Extensible. Nuance? Roll your own protocols. Tradeoff? 3rd party code in the engine :/
Copyright Push Technology 2012
27. Data Distribution
Messaging remixed around:
Relevance - Queue depth for conflatable data should be 0 or 1. No more
Responsiveness - Use HTTP/REST for things. Stream the little things
Timeliness - It’s relative. M2M != M2H.
Context - Packed binary, deltas mostly, snapshot on subscribe.
Environment- Don’t send 1M 1K events to a mobile phone with 0.5mbps.
Copyright Push Technology 2012
28. An Example
Operations:>
Tenants :>
Gaming Live Internet Apps Finance QA + Dev + UAT
Copyright Push Technology 2012
29. Either way?
It’s about the data.
Period.
The rest (analysis, storage, transformation) is sugar.
Copyright Push Technology 2012
30. Sugar? Streams
w w S
C Q
w w
Stream Operations
• Mapping. Change/enrich the data structurally.
• Aggregation. A ‘window of’ data. Eg. A seconds worth.
• Splitting & Filtering
• Combining multiple streams. Eg. Temporal pattern matching
• Access/Store. Eg: CRUD, variable, file, …
Copyright Push Technology 2012
31. Sugar? Streams
w w S
C Q
w w
Stream Operations
• Mapping. Just a function call in Node.js
• Aggregation. A ‘window of’ data. Eg. A seconds worth.
• Splitting & Filtering. An expression or a set thereof.
• Combining multiple streams. It depends. Can be ‘complex’
• Access/Store. Trivial.
Copyright Push Technology 2012
33. Introducing eep.js
w w S
C Q
w w
What is eep.js?
• Add aggregate functions and window operations to Node.js
• 4 window types: tumbling, sliding, periodic, monotonic
• Node makes evented IO easy. So just add windows.
• Fast. 8-40 million events per second (upper bound).
Copyright Push Technology 2012
34. eep.js: Tumbling Windows
x() x() x() x()
emit()
x() x() x() x() emit()
1 2 3 4
x() x() x() x()
emit()
2 3 4 5
init()
2 3 4 5
init()
init()
t0 t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 ...
What is a tumbling window?
• Every N events, give me an average of the last N events
• Does not overlap windows
• ‘Closing’ a window, ‘Emits’ a result (the average)
• Closing a window, Opens a new window
Copyright Push Technology 2012
35. eep.js: Aggregate Functions
What is an aggregate function?
• A function that computes values over events.
• The cost of calculations are ammortized per event
• Just follow the above recipe
• Example: Aggregate 2M events (equity prices), send to GPU
on emit, receive 2M options put/call prices as a result.
Copyright Push Technology 2012
39. eep.js: Sliding Windows
init()
1 2 3 4 5 .. .. .. ..
x() 1 2 3 4 .. .. .. ..
x() 1 2 3 .. .. .. ..
x() 1 2 .. .. .. ..
t0 t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 ...
What is a sliding window?
• Like tumbling, except can overlap. But O(N2), Keep N small.
• Every event opens a new window.
• After N events, every subsequent event emits a result.
• Like all windows, cost of calculation ammortized over events
Copyright Push Technology 2012
43. eep.js: Monotonic Windows
my my my
x() x() x() x()
emit()
x() x() x() x() emit()
1 2 3 4
x() x() x() x()
emit()
2 3 4 5
init()
2 3 4 5
init()
init()
t0 t1 t2 t3 ...
What is a monotonic window?
• Driven mad by ‘wall clock time’? Need a logical clock?
• No worries. Provide your own clock! Eg. Vector clock
Copyright Push Technology 2012
47. eep.js
Embedded Event Processing:
• Simple to use. Aggregates Functions and Windowed event processing.
• Get it from GitHub/npm soon. Use it. Fork it.
• Fast. CEP engines typically handle ~250K/sec.
• For small N (most common) is 34x - 200x faster than commercial CEP engines.
• But, at a small price. Simple. No multi-dimensional, infinite or predicate windows
• Reduces a flood of events into a few in near real time
• Can handle 8-40 million events per second (max, on my laptop). YMMV.
• Combinators may be added. [Ugh, if I need combinators]
Copyright Push Technology 2012
49. Performance? In perspective
• A 1 producer, 1 consumer lock-free wait-free full duplex queue implementation on
a 2.3GHz intel Sandybridge can:
• Distribute ~300M events between hyperthreads per second
• Distribute ~50M events between two hardware threads on two cores on the same physical die
• Distributed ~30M events between two hardware threads on two cores on separate physical dies
• You can, with a fully lock-free wait-free system (and you bypass the operating system
kernel), maybe, ~1M 1K events/second
• There’s no point being capable of > 30M events/second on a thread if you’re going over a wire.
• So, 8-40 million events/second in node is a pleasant sufficiency
• It’s not the algorithm. It’s the mechanical sympathy, stoopid!
• Lock free wait-free concurrency is easier than lock based concurrency. Try it.
Copyright Push Technology 2012
50. • Thank you for listening
• Thank you for having me
• Thank you Push for the beer budget
• Le twitter: @darachennis
• Expect eep.js in GitHub soon
• I’ll hashtag it #nodedublin
• Thank you @Waratek geeks.
About me?
Copyright Push Technology 2012
Darach@PushTechnology.com