Data Lifecycle and Analytics in the AWS Cloud

Total Page:16

File Type:pdf, Size:1020Kb

Data Lifecycle and Analytics in the AWS Cloud Data Lifecycle and Analytics in the AWS Cloud A Reference Guide for Enabling Data-Driven Decision-Making DATA LIFECYCLE AND ANALYTICS IN THE AWS CLOUD AWS THE IN ANALYTICS AND LIFECYCLE DATA CONTENTS PURPOSE Contents INTRODUCTION Purpose 3 CHALLENGES 1. Introduction 4 2. Common Data Management Challenges 10 3. The Data Lifecycle in Detail 14 LIFECYCLE Stage 1 – Data Ingestion 16 INGESTION Stage 2 – Data Staging 24 Stage 3 – Data Cleansing 31 Stage 4 – Data Analytics and Visualization 34 STAGING Stage 5 – Data Archiving 44 4. Data Security, Privacy, and Compliance 46 CLEANSING 5. Conclusion 49 ANALYTICS 6. Further Reading 51 Appendix 1: AWS GovCloud 53 Appendix 2: A Selection of AWS Data and Analytics Partners 54 Contributors 56 ARCHIVING SECURITY Public Sector Case Studies Financial Industry Regulation Authority (FINRA) 9 CONCLUSION Brain Power 17 READING DigitalGlobe 21 US Department of Veterans Affairs 23 APPENDICES Healthdirect Australia 27 CONTRIBUTORS Ivy Tech Community College 35 UMUC 38 UK Home Office 40 2 © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. DATA LIFECYCLE AND ANALYTICS IN THE AWS CLOUD AWS THE IN ANALYTICS AND LIFECYCLE DATA CONTENTS PURPOSE Purpose of this guide INTRODUCTION Data is an organization’s most valuable asset and the volume and variety of data that organizations amass continues to grow. The demand for simpler data analytics, cheaper data storage, advanced predictive tools CHALLENGES like artificial intelligence (AI), and data visualization is necessary for better data-driven decisions. LIFECYCLE INGESTION The Data Lifecycle and Analytics in the AWS Cloud guide helps organizations of all sizes better understand the data lifecycle so they can optimize or establish an advanced data analytics practice in their STAGING organization. The document guides readers through five stages of the data lifecycle, including data ingestion, data staging, data cleansing, CLEANSING data analysis (including AI/machine learning (ML) inference and deep learning tools) and visualization, data archiving, and overall ANALYTICS data security. This guide is written primarily for IT professionals, as well as for chief ARCHIVING data officers, data scientists, data analysts, and data engineers. Technical professionals of diverse training and experience can learn how to extract more value from their data by taking advantage of the Amazon Web Services (AWS) Cloud to support data-driven decision-making. Business leaders and managers will also benefit from the guide’s overview sections and customer case studies. One could spend countless hours searching online to understand the many services available to turn data into insights. This reference guide aggregates important definitions, workflows, and the relevant AWS services for each stage of the workflow, to simplify the learning process. Here are some data lifecycle and management questions this guide will help you answer: • How do you collect and analyze high-velocity data across a variety of data types – structured, unstructured, and semistructured? • How do you scale up IT resources to run thousands of concurrent queries against your data – and then scale back down automatically to lower costs? • How do you analyze your data across platforms, so users can view, search, and run queries on multiple data repositories? • How do you cost-effectively store petabytes of data and share them on- demand with users around the world? • How do you get your data to answer questions about past scenarios and patterns, while predicting future events? 3 © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. DATA LIFECYCLE AND ANALYTICS IN THE AWS CLOUD AWS THE IN ANALYTICS AND LIFECYCLE DATA INTRODUCTION CONTENTS PURPOSE INTRODUCTION CHALLENGES LIFECYCLE INGESTION STAGING CLEANSING ANALYTICS ARCHIVING SECURITY CONCLUSION READING APPENDICES CONTRIBUTORS Introduction DATA LIFECYCLE AND ANALYTICS IN THE AWS CLOUD AWS THE IN ANALYTICS AND LIFECYCLE DATA INTRODUCTION CONTENTS PURPOSE Data within organizations is measured in petabytes, and it grows exponentially each year. INTRODUCTION IT teams are under pressure to quickly orchestrate data storage, analytics, and visualization projects that get the most from their organizations’ CHALLENGES number one asset: their data. They’re also tasked with ensuring customer privacy and meeting security and compliance mandates. These challenges LIFECYCLE are cost-effectively addressed with cloud-based IT resources, as an INGESTION alternative to fixed, conventional IT infrastructure (e.g. owned data centers and computing hardware managed by internal IT departments). By modernizing their approach to data lifecycle management, and leveraging STAGING the latest cloud-native analytics tools, organizations reduce costs and gain operational efficiencies, while enabling data-driven decision-making. CLEANSING ANALYTICS What is Big Data? A dataset too large or complex for traditional data processing mechanisms is called “big data”. Big data also encompasses a set of data management ARCHIVING challenges resulting from an increase in volume, velocity, and variety of data. These challenges cannot be solved with conventional data storage, SECURITY database, networking, compute, or analytics solutions. Big data includes CONCLUSION structured, semi-structured, and unstructured data. “Small data,” on the other hand, refers to structured data that is manageable within existing READING databases. Whether your data is big or small, the lifecycle stages are APPENDICES universal. It’s the data management and IT tools that will differ in terms of scale and costs. CONTRIBUTORS To support advanced analytics for big and small data projects, cloud services support a variety of use cases: descriptive analytics that address what happened and why (e.g. traditional queries, scorecards, and dashboards); predictive analytics that measure the probability of a given event in the future (e.g. early alert systems, fraud detection, preventive maintenance applications, and forecasting); and prescriptive analytics that answer, “What should I do if ‘x’ happens?” (e.g. recommendation engines). With AWS, it’s also technically and economically feasible to collect, store, and share larger datasets and analyze them to reveal actionable insights. 5 © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. DATA LIFECYCLE AND ANALYTICS IN THE AWS CLOUD AWS THE IN ANALYTICS AND LIFECYCLE DATA INTRODUCTION CONTENTS AWS offers a complete cloud platform designed for big data across data PURPOSE lakes or big data stores, data warehousing, distributed analytics, real-time INTRODUCTION streaming, machine learning, and business intelligence services. These cloud-based IT infrastructure building blocks – along with AWS Cloud capabilities that meet the strictest security requirements – can help address CHALLENGES a wide range of analytics challenges. LIFECYCLE What is the Data Lifecycle? INGESTION As data is generated, it moves from its raw form to a processed version, to outputs that end users need to make better decisions. All data goes STAGING through this data lifecycle. Organizations can use AWS Cloud services in each stage of the data lifecycle to quickly and cost-effectively prepare, process, and present data to derive more value from it. The five data CLEANSING lifecycle stages include: data ingestion, data staging, data cleansing, ANALYTICS data analytics and visualization, and data archiving. ARCHIVING SECURITY CONCLUSION Data Sources Data Ingestion READING APPENDICES CONTRIBUTORS Data Staging Data Cleansing Data Analytics & Data Archiving Visualization 6 © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. DATA LIFECYCLE AND ANALYTICS IN THE AWS CLOUD AWS THE IN ANALYTICS AND LIFECYCLE DATA INTRODUCTION CONTENTS 1. The first stage is data ingestion. Data ingestion is the movement of PURPOSE data from an external source to another location for analysis. Data can INTRODUCTION move from local or physical disks where value is locked (e.g. in an IT data center), to the cloud’s virtual disks. There, it can be closer to end users and where machine learning and analytics tools can be applied. During data CHALLENGES ingestion, high value data sources are identified, validated, and imported while data files are stored and backed up in the AWS Cloud. Data in LIFECYCLE the cloud is durable, resilient, secure, cost-effectively stored, and most INGESTION importantly, accessible to a broad set of users. Common data sources include transaction files, large systems (e.g. CRM, ERP), user-generated data (e.g. clickstream data, log files), sensor data (e.g. from Internet-of- STAGING Things or mobile devices), and databases. AWS services available in this stage include Amazon Kinesis, AWS Direct Connect, AWS Snowball/ CLEANSING Snowball Edge/Snowmobile, AWS DataSync, AWS Database Migration Service, and AWS Storage Gateway. ANALYTICS 2. The second stage is data staging. Data staging involves performing housekeeping tasks prior to making data available to users. Organizations ARCHIVING house data in multiple systems or locations, including data warehouses, SECURITY spreadsheets, databases, and text files. Cloud-based tools make it easy to stage data or create a data lake in one location (e.g. Amazon S3), CONCLUSION while avoiding disparate storage mechanisms. AWS services available Amazon S3, Amazon Aurora, Amazon RDS, READING in this stage include Amazon DynamoDB. APPENDICES CONTRIBUTORS 3. The third stage is data cleansing. Before data is
Recommended publications
  • Reliability and Security of Large Scale Data Storage in Cloud Computing C.W
    This article is part of the Reliability Society 2010 Annual Technical Report Reliability and Security of Large Scale Data Storage in Cloud Computing C.W. Hsu ¹¹¹ C.W. Wang ²²² Shiuhpyng Shieh ³³³ Department of Computer Science Taiwan Information Security Center at National Chiao Tung University NCTU (TWISC@NCTU) Email: ¹[email protected] ³[email protected] ²[email protected] Abstract In this article, we will present new challenges to the large scale cloud computing, namely reliability and security. Recent progress in the research area will be briefly reviewed. It has been proved that it is impossible to satisfy consistency, availability, and partitioned-tolerance simultaneously. Tradeoff becomes crucial among these factors to choose a suitable data access model for a distributed storage system. In this article, new security issues will be addressed and potential solutions will be discussed. Introduction “Cloud Computing ”, a novel computing model for large-scale application, has attracted much attention from both academic and industry. Since 2006, Google Inc. Chief Executive Eric Schmidt introduced the term into industry, and related research had been carried out in recent years. Cloud computing provides scalable deployment and fine-grained management of services through efficient resource sharing mechanism (most of them are for hardware resources, such as VM). Convinced by the manner called “ pay-as-you-go ” [1][2], companies can lower the cost of equipment management including machine purchasing, human maintenance, data backup, etc. Many cloud services rapidly appear on the Internet, such as Amazon’s EC2, Microsoft’s Azure, Google’s Gmail, Facebook, and so on. However, the well-known definition of the term “Cloud Computing ” was first given by Prof.
    [Show full text]
  • AWS Risk and Compliance Whitepaper for Additional Details - Policy Available At
    Amazon Web Services: Risk and Compliance January 2017 (Consult http://aws.amazon.com/compliance/resources for the latest version of this paper) Amazon Web Services Risk and Compliance January 2017 This document is intended to provide information to assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. This document includes a basic approach to evaluating AWS controls and provides information to assist customers with integrating control environments. This document also addresses AWS-specific information around general cloud computing compliance questions. Table of Contents Risk and Compliance Overview .......................................................................................................................3 Shared Responsibility Environment ............................................................................................................................................... 3 Strong Compliance Governance ...................................................................................................................................................... 4 Evaluating and Integrating AWS Controls ...................................................................................................4 AWS IT Control Information ........................................................................................................................................................... 5 AWS Global Regions .........................................................................................................................................................................
    [Show full text]
  • Amazon Dynamodb
    Dynamo Amazon DynamoDB Nicolas Travers Inspiré de Advait Deo Vertigo N. Travers ESILV : Dynamo Amazon DynamoDB – What is it ? • Fully managed nosql database service on AWS • Data model in the form of tables • Data stored in the form of items (name – value attributes) • Automatic scaling ▫ Provisioned throughput ▫ Storage scaling ▫ Distributed architecture • Easy Administration • Monitoring of tables using CloudWatch • Integration with EMR (Elastic MapReduce) ▫ Analyze data and store in S3 Vertigo N. Travers ESILV : Dynamo Amazon DynamoDB – What is it ? key=value key=value key=value key=value Table Item (64KB max) Attributes • Primary key (mandatory for every table) ▫ Hash or Hash + Range • Data model in the form of tables • Data stored in the form of items (name – value attributes) • Secondary Indexes for improved performance ▫ Local secondary index ▫ Global secondary index • Scalar data type (number, string etc) or multi-valued data type (sets) Vertigo N. Travers ESILV : Dynamo DynamoDB Architecture • True distributed architecture • Data is spread across hundreds of servers called storage nodes • Hundreds of servers form a cluster in the form of a “ring” • Client application can connect using one of the two approaches ▫ Routing using a load balancer ▫ Client-library that reflects Dynamo’s partitioning scheme and can determine the storage host to connect • Advantage of load balancer – no need for dynamo specific code in client application • Advantage of client-library – saves 1 network hop to load balancer • Synchronous replication is not achievable for high availability and scalability requirement at amazon • DynamoDB is designed to be “always writable” storage solution • Allows multiple versions of data on multiple storage nodes • Conflict resolution happens while reads and NOT during writes ▫ Syntactic conflict resolution ▫ Symantec conflict resolution Vertigo N.
    [Show full text]
  • Semantics Developer's Guide
    MarkLogic Server Semantic Graph Developer’s Guide 2 MarkLogic 10 May, 2019 Last Revised: 10.0-8, October, 2021 Copyright © 2021 MarkLogic Corporation. All rights reserved. MarkLogic Server MarkLogic 10—May, 2019 Semantic Graph Developer’s Guide—Page 2 MarkLogic Server Table of Contents Table of Contents Semantic Graph Developer’s Guide 1.0 Introduction to Semantic Graphs in MarkLogic ..........................................11 1.1 Terminology ..........................................................................................................12 1.2 Linked Open Data .................................................................................................13 1.3 RDF Implementation in MarkLogic .....................................................................14 1.3.1 Using RDF in MarkLogic .........................................................................15 1.3.1.1 Storing RDF Triples in MarkLogic ...........................................17 1.3.1.2 Querying Triples .......................................................................18 1.3.2 RDF Data Model .......................................................................................20 1.3.3 Blank Node Identifiers ..............................................................................21 1.3.4 RDF Datatypes ..........................................................................................21 1.3.5 IRIs and Prefixes .......................................................................................22 1.3.5.1 IRIs ............................................................................................22
    [Show full text]
  • Security of Cloud Computing in the Iot Era
    future internet Article Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era Michele De Donno 1 , Alberto Giaretta 2, Nicola Dragoni 1,2 and Antonio Bucchiarone 3,∗ and Manuel Mazzara 4,∗ 1 DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark; [email protected] (M.D.D.); [email protected] (N.D.) 2 Centre for Applied Autonomous Sensor Systems Orebro University, 701 82 Orebro, Sweden; [email protected] 3 Fondazione Bruno Kessler, Via Sommarive 18, 38123 Trento, Italy 4 Institute of Software Development and Engineering, Innopolis University, Universitetskaya St, 1, 420500 Innopolis, Russian Federation * Correspondence: [email protected] (A.B.); [email protected] (M.M.) Received: 28 January 2019; Accepted: 30 May 2019; Published: 4 June 2019 Abstract: The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors.
    [Show full text]
  • Implementation of a Mini-Cloud E-Learning Supplementary Tool by Using Free Tier AWS
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/333670196 Implementation of a Mini-cloud E-learning Supplementary Tool by Using free Tier AWS Conference Paper · June 2019 DOI: 10.15359/cicen.1.79 CITATIONS READS 0 148 2 authors: Manuel Espinoza Majid Bayani National University of Costa Rica National University of Costa Rica 1 PUBLICATION 0 CITATIONS 21 PUBLICATIONS 88 CITATIONS SEE PROFILE SEE PROFILE Some of the authors of this publication are also working on these related projects: IoT-Based Library Automation & monitoring System View project All content following this page was uploaded by Majid Bayani on 09 June 2019. The user has requested enhancement of the downloaded file. Implementation of a Mini-cloud E-learning Supplementary Tool by Using free Tier AWS Manuel Espinoza-Guerrero [email protected] Universidad Nacional Costa Rica Majid Bayani-Abbasy [email protected] Universidad Nacional Costa Rica Resumen Las técnicas de e-learning han mejorado el rendimiento en el sistema educativo moderno. Falta un sistema de gestión de e-learning efectivo y de bajo costo, y las herramientas podría tener un impacto negativo en el rendimiento educativo. La incorporación de tecnologías en línea en el proceso de aprendizaje puede cubrir esta desventaja. El sistema de nube de Amazon Web Service es una de las últimas tecnologías que ofrecen grandes volúmenes de servicios en las plataformas de aprendizaje electrónico. Accesando la capa gratuita de AWS, el sistema de gestión de aprendizaje (un Moodle con MYSQL), el alojamiento de archivos y los servicios de gestión de contenido se consideran herramientas complementarias que son viables mediante el uso de la plataforma AWS.
    [Show full text]
  • There Are No Limits to Learning! Academic and High School
    Brick and Click Libraries An Academic Library Symposium Northwest Missouri State University Friday, November 5, 2010 Managing Editors: Frank Baudino Connie Jo Ury Sarah G. Park Co-Editor: Carolyn Johnson Vicki Wainscott Pat Wyatt Technical Editor: Kathy Ferguson Cover Design: Sean Callahan Northwest Missouri State University Maryville, Missouri Brick & Click Libraries Team Director of Libraries: Leslie Galbreath Co-Coordinators: Carolyn Johnson and Kathy Ferguson Executive Secretary & Check-in Assistant: Beverly Ruckman Proposal Reviewers: Frank Baudino, Sara Duff, Kathy Ferguson, Hong Gyu Han, Lisa Jennings, Carolyn Johnson, Sarah G. Park, Connie Jo Ury, Vicki Wainscott and Pat Wyatt Technology Coordinators: Sarah G. Park and Hong Gyu Han Union & Food Coordinator: Pat Wyatt Web Page Editors: Lori Mardis, Sarah G. Park and Vicki Wainscott Graphic Designer: Sean Callahan Table of Contents Quick & Dirty Library Promotions That Really Work! 1 Eric Jennings, Reference & Instruction Librarian Kathryn Tvaruzka, Education Reference Librarian University of Wisconsin Leveraging Technology, Improving Service: Streamlining Student Billing Procedures 2 Colleen S. Harris, Head of Access Services University of Tennessee – Chattanooga Powerful Partnerships & Great Opportunities: Promoting Archival Resources and Optimizing Outreach to Public and K12 Community 8 Lea Worcester, Public Services Librarian Evelyn Barker, Instruction & Information Literacy Librarian University of Texas at Arlington Mobile Patrons: Better Services on the Go 12 Vincci Kwong,
    [Show full text]
  • Content Processing Framework Guide (PDF)
    MarkLogic Server Content Processing Framework Guide 2 MarkLogic 9 May, 2017 Last Revised: 9.0-7, September 2018 Copyright © 2019 MarkLogic Corporation. All rights reserved. MarkLogic Server Version MarkLogic 9—May, 2017 Page 2—Content Processing Framework Guide MarkLogic Server Table of Contents Table of Contents Content Processing Framework Guide 1.0 Overview of the Content Processing Framework ..........................................7 1.1 Making Content More Useful .................................................................................7 1.1.1 Getting Your Content Into XML Format ....................................................7 1.1.2 Striving For Clean, Well-Structured XML .................................................8 1.1.3 Enriching Content With Semantic Tagging, Metadata, etc. .......................8 1.2 Access Internal and External Web Services ...........................................................8 1.3 Components of the Content Processing Framework ...............................................9 1.3.1 Domains ......................................................................................................9 1.3.2 Pipelines ......................................................................................................9 1.3.3 XQuery Functions and Modules .................................................................9 1.3.4 Pre-Commit and Post-Commit Triggers ...................................................10 1.3.5 Creating Custom Applications With the Content Processing Framework 11 1.4
    [Show full text]
  • Cloud Security and Privacy: an Enterprise Perspective on Risks and Compliance Pdf, Epub, Ebook
    CLOUD SECURITY AND PRIVACY: AN ENTERPRISE PERSPECTIVE ON RISKS AND COMPLIANCE PDF, EPUB, EBOOK Tim Mather, Subra Kumaraswamy, Shahed Laitf | 338 pages | 20 Oct 2009 | O'Reilly Media, Inc, USA | 9780596802769 | English | Sebastopol, United States Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance PDF Book Data ownership. Cloud Compliance Summary An integrated compliance view gives the overall health score, the total number of checks against compliance, the number of passes, and classified failures based on severity levels. Follow Us. Language: English. Cloud computing is a multi million dollar business. Francisco Eduardo Alves rated it it was amazing Jun 29, Book is in NEW condition. View 3 excerpts, references background. Get A Copy. Skip to search form Skip to main content You are currently offline. Content protection. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. Error rating book. General privacy challenges of cloud computing One of these challenges in cloud computing is connected to the sensitivity of the entrusted information. With Cloud Security and Privacy you will: Review the current state of data security and storage in the cloud Learn about identity and access management IAM practices for cloud services Discover which security management frameworks and standards are relevant Understand how privacy in the cloud compares with traditional computing models Learn about standards and frameworks for audit and compliance within the cloud Examine security delivered as a service--a different facet of cloud security Advance Praise " Cloud Security and Privacy is the seminal tome to guide information technology professionals in their pursuit of trust in 'on-demand computing.
    [Show full text]
  • The Complete Guide to Social Media from the Social Media Guys
    The Complete Guide to Social Media From The Social Media Guys PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Mon, 08 Nov 2010 19:01:07 UTC Contents Articles Social media 1 Social web 6 Social media measurement 8 Social media marketing 9 Social media optimization 11 Social network service 12 Digg 24 Facebook 33 LinkedIn 48 MySpace 52 Newsvine 70 Reddit 74 StumbleUpon 80 Twitter 84 YouTube 98 XING 112 References Article Sources and Contributors 115 Image Sources, Licenses and Contributors 123 Article Licenses License 125 Social media 1 Social media Social media are media for social interaction, using highly accessible and scalable publishing techniques. Social media uses web-based technologies to turn communication into interactive dialogues. Andreas Kaplan and Michael Haenlein define social media as "a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, which allows the creation and exchange of user-generated content."[1] Businesses also refer to social media as consumer-generated media (CGM). Social media utilization is believed to be a driving force in defining the current time period as the Attention Age. A common thread running through all definitions of social media is a blending of technology and social interaction for the co-creation of value. Distinction from industrial media People gain information, education, news, etc., by electronic media and print media. Social media are distinct from industrial or traditional media, such as newspapers, television, and film. They are relatively inexpensive and accessible to enable anyone (even private individuals) to publish or access information, compared to industrial media, which generally require significant resources to publish information.
    [Show full text]
  • Access Control Models for XML
    Access Control Models for XML Abdessamad Imine Lorraine University & INRIA-LORIA Grand-Est Nancy, France [email protected] Outline • Overview on XML • Why XML Security? • Querying Views-based XML Data • Updating Views-based XML Data 2 Outline • Overview on XML • Why XML Security? • Querying Views-based XML Data • Updating Views-based XML Data 3 What is XML? • eXtensible Markup Language [W3C 1998] <files> "<record>! ""<name>Robert</name>! ""<diagnosis>Pneumonia</diagnosis>! "</record>! "<record>! ""<name>Franck</name>! ""<diagnosis>Ulcer</diagnosis>! "</record>! </files>" 4 What is XML? • eXtensible Markup Language [W3C 1998] <files>! <record>! /files" <name>Robert</name>! <diagnosis>! /record" /record" Pneumonia! </diagnosis> ! </record>! /name" /diagnosis" <record …>! …! </record>! Robert" Pneumonia" </files>! 5 XML for Documents • SGML • HTML - hypertext markup language • TEI - Text markup, language technology • DocBook - documents -> html, pdf, ... • SMIL - Multimedia • SVG - Vector graphics • MathML - Mathematical formulas 6 XML for Semi-Structered Data • MusicXML • NewsML • iTunes • DBLP http://dblp.uni-trier.de • CIA World Factbook • IMDB http://www.imdb.com/ • XBEL - bookmark files (in your browser) • KML - geographical annotation (Google Maps) • XACML - XML Access Control Markup Language 7 XML as Description Language • Java servlet config (web.xml) • Apache Tomcat, Google App Engine, ... • Web Services - WSDL, SOAP, XML-RPC • XUL - XML User Interface Language (Mozilla/Firefox) • BPEL - Business process execution language
    [Show full text]
  • NIST Cloud Computing Standards Roadmap
    Special Publication 500-291, Version 2 NIST Cloud Computing Standards Roadmap NIST Cloud Computing Standards Roadmap Working Group NIST Cloud Computing Program Information Technology Laboratory NIST CLOUD COMPUTING STANDARDS ROADMAP This page left intentionally blank ii NIST Special Publication 500-291, Version 2 (Supersedes Version 1.0, July 2011) NIST Cloud Computing Standards Roadmap NIST Cloud Computing Standards Roadmap Working Group July 2013 U. S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director NIST CLOUD COMPUTING STANDARDS ROADMAP This page left intentionally blank iv NIST CLOUD COMPUTING STANDARDS ROADMAP Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in federal computer systems. This document reports on ITL’s research, guidance, and outreach efforts in Information Technology and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 500-291 V2 Natl. Inst. Stand. Technol. Spec. Publ. 500-291, 108 pages (May 24, 2013) DISCLAIMER This document has been prepared by the National Institute of Standards and Technology (NIST) and describes standards research in support of the NIST Cloud Computing Program.
    [Show full text]