COSC349—Cloud Computing Architecture David Eyers Learning Objectives
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
An Opinionated Guide to Technology Frontiers
TECHNOLOGY RADARVOL. 21 An opinionated guide to technology frontiers thoughtworks.com/radar #TWTechRadar Rebecca Martin Fowler Bharani Erik Evan Parsons (CTO) (Chief Scientist) Subramaniam Dörnenburg Bottcher Fausto Hao Ian James Jonny CONTRIBUTORS de la Torre Xu Cartwright Lewis LeRoy The Technology Radar is prepared by the ThoughtWorks Technology Advisory Board — This edition of the ThoughtWorks Technology Radar is based on a meeting of the Technology Advisory Board in San Francisco in October 2019 Ketan Lakshminarasimhan Marco Mike Neal Padegaonkar Sudarshan Valtas Mason Ford Ni Rachel Scott Shangqi Zhamak Wang Laycock Shaw Liu Dehghani TECHNOLOGY RADAR | 2 © ThoughtWorks, Inc. All Rights Reserved. ABOUT RADAR AT THE RADAR A GLANCE ThoughtWorkers are passionate about ADOPT technology. We build it, research it, test it, 1 open source it, write about it, and constantly We feel strongly that the aim to improve it — for everyone. Our industry should be adopting mission is to champion software excellence these items. We use them and revolutionize IT. We create and share when appropriate on our the ThoughtWorks Technology Radar in projects. HOLD ASSESS support of that mission. The ThoughtWorks TRIAL Technology Advisory Board, a group of senior technology leaders at ThoughtWorks, 2 TRIAL ADOPT creates the Radar. They meet regularly to ADOPT Worth pursuing. It’s 108 discuss the global technology strategy for important to understand how 96 ThoughtWorks and the technology trends TRIAL to build up this capability. ASSESS 1 that significantly impact our industry. Enterprises can try this HOLD 2 technology on a project that The Radar captures the output of the 3 can handle the risk. -
Table of Contents
Table of Contents Introduction and Motivation Theoretical Foundations Distributed Programming Languages Distributed Operating Systems Distributed Communication Distributed Data Management Reliability Applications Conclusions Appendix Distributed Operating Systems Key issues Communication primitives Naming and protection Resource management Fault tolerance Services: file service, print service, process service, terminal service, file service, mail service, boot service, gateway service Distributed operating systems vs. network operating systems Commercial and research prototypes Wiselow, Galaxy, Amoeba, Clouds, and Mach Distributed File Systems A file system is a subsystem of an operating system whose purpose is to provide long-term storage. Main issues: Merge of file systems Protection Naming and name service Caching Writing policy Research prototypes: UNIX United, Coda, Andrew (AFS), Frangipani, Sprite, Plan 9, DCE/DFS, and XFS Commercial: Amazon S3, Google Cloud Storage, Microsoft Azure, SWIFT (OpenStack) Distributed Shared Memory A distributed shared memory is a shared memory abstraction what is implemented on a loosely coupled system. Distributed shared memory. Focus 24: Stumm and Zhou's Classification Central-server algorithm (nonmigrating and nonreplicated): central server (Client) Sends a data request to the central server. (Central server) Receives the request, performs data access and sends a response. (Client) Receives the response. Focus 24 (Cont’d) Migration algorithm (migrating and non- replicated): single-read/single-write (Client) If the needed data object is not local, determines the location and then sends a request. (Remote host) Receives the request and then sends the object. (Client) Receives the response and then accesses the data object (read and /or write). Focus 24 (Cont’d) Read-replication algorithm (migrating and replicated): multiple-read/single-write (Client) If the needed data object is not local, determines the location and sends a request. -
Learning Key-Value Store Design
Learning Key-Value Store Design Stratos Idreos, Niv Dayan, Wilson Qin, Mali Akmanalp, Sophie Hilgard, Andrew Ross, James Lennon, Varun Jain, Harshita Gupta, David Li, Zichen Zhu Harvard University ABSTRACT We introduce the concept of design continuums for the data Key-Value Stores layout of key-value stores. A design continuum unifies major Machine Databases K V K V … K V distinct data structure designs under the same model. The Table critical insight and potential long-term impact is that such unifying models 1) render what we consider up to now as Learning Data Structures fundamentally different data structures to be seen as \views" B-Tree Table of the very same overall design space, and 2) allow \seeing" Graph LSM new data structure designs with performance properties that Store Hash are not feasible by existing designs. The core intuition be- hind the construction of design continuums is that all data Performance structures arise from the very same set of fundamental de- Update sign principles, i.e., a small set of data layout design con- Data Trade-offs cepts out of which we can synthesize any design that exists Access Patterns in the literature as well as new ones. We show how to con- Hardware struct, evaluate, and expand, design continuums and we also Cloud costs present the first continuum that unifies major data structure Read Memory designs, i.e., B+tree, Btree, LSM-tree, and LSH-table. Figure 1: From performance trade-offs to data structures, The practical benefit of a design continuum is that it cre- key-value stores and rich applications. -
CARL ASHLEY Mac Admin, Occasional Photographer
CARL ASHLEY mac admin, occasional photographer Posts from carlashley.com. Printed on June 14, 2020 using Print My Blog STARTING THE SWITCH TO PYTHON 3 28 JUNE 2019 CATEGORIES: MAC OS TAGS: PYTHON With Python (and other scripting languages) being dropped from deprecated in macOS Catalina*, and Python 2.7 maintenance ending in 2020, it’s time to start updating any Python 2 scripts so they are compatible with Python 3. This might seem like a big task, and it could very well be for your code-base, however there are a few things you can do to start the process. If you don’t already have Python 3 installed on your Mac, you’ll need to get it installed. You can install it using homebrew , or you can install it from the Python Releases for Mac OS X page. It’s also provided by Apple, but currently you need an Apple Developer account to access those command line tool betas. There’s a great guide on what to do and what not to do when installing Python 3 on macOS here. No matter which way you get it installed, your Python 3 interpreter will be in a new location, and you’ll de˚nitely want to update pip3 for package management. You can also expect a lot, if not all of the “standard” packages that Apple included with their Python 2.7 framework to not be installed, so you’ll need to make sure you’ve installed those as well. This is a great opportunity to start using virtual environments. -
Apple in Education Data and Privacy Overview for Schools
Apple in Education Data and Privacy Overview for Schools Education has always been part of Apple’s DNA. We believe technology has the power to transform every classroom and engage every student. Our products are designed to expand how teachers teach and students learn with access to powerful apps and engaging content on the devices they love to use. We also know how important security and privacy is to protect the data students create, store, and access throughout the learning experience. Security and privacy are fundamental to the design of all Apple hardware, software, and services. We take an integrated approach to ensure that every aspect of the experience has security and privacy built in. This approach considers the privacy and security of all users including those within an education setting such as teachers, faculty, staff and students. We have also created features and services that are designed specifically for education, including Apple School Manager, Managed Apple IDs, and Shared iPad. These capabilities are built with the same integrated approach and with additional consideration for the specific security and privacy needs of students and institutions. This overview covers how Managed Apple IDs and our related education features and services handle student data and privacy. You can use this overview to communicate to parents about how their students’ data is secured by Apple. Apple’s Commitment to Student Privacy Apple will never track, share, or sell student information for advertising or marketing purposes. We don’t build profiles of students based on their email content or web browsing habits. We also don’t collect, use, or disclose personal student information other than to provide educational services. -
Mergers in the Digital Economy
2020/01 DP Axel Gautier and Joe Lamesch Mergers in the digital economy CORE Voie du Roman Pays 34, L1.03.01 B-1348 Louvain-la-Neuve Tel (32 10) 47 43 04 Email: [email protected] https://uclouvain.be/en/research-institutes/ lidam/core/discussion-papers.html Mergers in the Digital Economy∗ Axel Gautier y& Joe Lamesch z January 13, 2020 Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five's strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company's most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves. For these tech giants, therefore, acquisition appears to be a substitute for in-house R&D. Finally, from our check for possible "killer acquisitions", it appears that just a single one in our sample could potentially be qualified as such. Keywords: Mergers, GAFAM, platform, digital markets, competition policy, killer acquisition JEL Codes: D43, K21, L40, L86, G34 ∗The authors would like to thank M. -
CURRICULUM FRAMEWORK and SYLLABUS for FIVE YEAR INTEGRATED M.Sc (DATA SCIENCE) DEGREE PROGRAMME in CHOICE BASED CREDIT SYSTEM
Five year Integrated M.Sc (Data Science) Degree Programme 2019-2020 CURRICULUM FRAMEWORK AND SYLLABUS FOR FIVE YEAR INTEGRATED M.Sc (DATA SCIENCE) DEGREE PROGRAMME IN CHOICE BASED CREDIT SYSTEM FOR THE STUDENTS ADMITTED FROM THE ACADEMIC YEAR 2019-2020 ONWARDS THIAGARAJAR COLLEGE OF ENGINEERING (A Government Aided Autonomous Institution affiliated to Anna University) MADURAI – 625 015, TAMILNADU Phone: 0452 – 2482240, 41 Fax: 0452 2483427 Web: www.tce.edu BOS Meeting Approved: 21-12-2018 Approved in 57th Academic Council meeting on 05-01-2019 Five year Integrated M.Sc (Data Science) Degree Programme 2019-2020 THIAGARAJAR COLLEGE OF ENGINEERING, MADURAI 625 015 DEPARTMENT OF APPLIED MATHEMATICS AND COMPUTATIONAL SCIENCE VISION “Academic and research excellence in Computational Science” MISSION As a Department, We are committed to Achieve academic excellence in Computational Science through innovative teaching and learning processes. Enable the students to be technically competent to solve the problems faced by the industry. Create a platform for pursuing inter-disciplinary research among the faculty and the students to create state of art research facilities. Promote quality and professional ethics among the students. Help the students to learn entrepreneurial skills. BOS Meeting Approved: 21-12-2018 Approved in 57th Academic Council meeting on 05-01-2019 Five year Integrated M.Sc (Data Science) Degree Programme 2019-2020 Programme Educational Objectives (PEO) Post graduates of M.Sc.(Data Science) program will be PEO1: Utilizing strong quantitative aptitude and domain knowledge to apply quantitative modeling and data analysis techniques to provide solutions to the real world business problems. PEO2: Applying research and entrepreneurial skills augmented with a rich set of communication, teamwork and leadership skills to excel in their profession. -
Mac Os X Database Application
Mac Os X Database Application Splashy Moses always degum his Politburo if Barr is unprovident or unswathing but. Corny Ashton enervating hinderingly or evite ergo when Weylin is faceless. Butcherly Maurits sometimes cognizes his alodiums hard and rebelled so submissively! New platform for the next section names of your data source you to It tedious really disappointing the heir that amount has been zero progress with this issue, could this time. Also many question are using databases on their Macs such as. Expert users may configure the ODBC. This application that you. Check the app from zero progress with a tabbed format of applications that this, transforming raw data! DBeaver Community Free Universal Database Tool. Provide the administrator username and password. You exhibit even export your bay as an html-table and print labels. Understanding at precious glance. Best Database Management Software for Mac 2021 Reviews. What does Texas gain for not selling electricity across state lines and therefore avoiding Federal Power and oversight? Take this open snaptube will get into chartable form at first mac os x application functioning of your experience with live without using app. Transform all kinds of files into optimized for various displays PDFs with water motion. However, four of the defining features of this crime is it it comes with native TLS encryption to ensure that important business success never gets into these wrong hands. Get stomp to legal one million creative assets on Envato Elements. Fuzzee allows to mac os application has been easier for free file to the appropriate odbc data synchronization tool. -
Best Practices for Building Apps Used in Business and Education 0.9
Distribution #WWDC16 Best Practices for Building Apps Used in Business and Education Session 304 David M. O’Rourke iOS Managed Configuration Team © 2016 Apple Inc. All rights reserved. Redistribution or public display not permitted without written permission from Apple. Agenda Agenda Modern App Design Practices Agenda Modern App Design Practices Architecture Overview of Shared iPad Agenda Modern App Design Practices Architecture Overview of Shared iPad Cover What iOS Technologies to Adopt for Shared iPad Agenda Modern App Design Practices Architecture Overview of Shared iPad Cover What iOS Technologies to Adopt for Shared iPad New Opportunities to Enhance Your App Modernize Your Application Modernize Your Application Customers expect a fully modern and up to date iOS experience • Stay current, adopt iOS features… Modernize Your Application Customers expect a fully modern and up to date iOS experience • Stay current, adopt iOS features… Some example technologies: Modernize Your Application Customers expect a fully modern and up to date iOS experience • Stay current, adopt iOS features… Some example technologies: Modernize Your Application Customers expect a fully modern and up to date iOS experience • Stay current, adopt iOS features… Some example technologies: Modernize Your Application Customers expect a fully modern and up to date iOS experience • Stay current, adopt iOS features… Some example technologies: Modernize Your Application Customers expect a fully modern and up to date iOS experience • Stay current, adopt iOS features… Some -
Cloudkit Tips and Tricks Session 715
System Frameworks #WWDC15 CloudKit Tips And Tricks Session 715 Nihar Sharma CloudKit Engineer © 2015 Apple Inc. All rights reserved. Redistribution or public display not permitted without written permission from Apple. CloudKit What is it? CloudKit What is it? iCloud database CloudKit What is it? iCloud database Large file storage CloudKit What is it? iCloud database Large file storage Privacy obsessed CloudKit What is it? iCloud database Large file storage Privacy obsessed Developer API CloudKit What is it? iCloud database Large file storage Privacy obsessed Developer API Apple applications built on it CloudKit One year later CloudKit No really, what is it? Introduction to CloudKit WWDC14 Advanced CloudKit WWDC14 100% Awesome with Swift 2! record.setObject(5, forKey: "numberOfClowns") if let partyDate = record.objectForKey("date") as? NSDate {…} record["numberOfClowns"] = 5 if let partyDate = record["date"] as? NSDate {…} record["numberOfClowns"] = 5 if let partyDate = record["date"] as? NSDate {…} modifyRecordsOperation.recordsToSave = ["I’m not a CKRecord!"] record["numberOfClowns"] = 5 if let partyDate = record["date"] as? NSDate {…} modifyRecordsOperation.recordsToSave = ["I’m not a CKRecord!"] error: cannot assign a value of type '[String]' to a value of type '[CKRecord]?' CloudKit Storage architecture CloudKit Storage architecture CloudKit Container CloudKit Storage architecture CloudKit Container Public Database CloudKit Storage architecture CloudKit Container Public Database Private Database CloudKit Storage architecture CloudKit -
Core Data Cloudkit Xcoders Talk
Integrating Core Data and CloudKit Jared Sorge Scorebook Remember Your Games Core Data Paul Goracke – “Core Data Potpurri”, February 2014 http://bit.ly/1A5fWGr Marcus Zarra – “My Core Data Stack”, March 2015 http://bit.ly/1KQaibt TaphouseKit – GitHub Project http://bit.ly/1e4AEwo CloudKit OS X Yosemite & iOS 8 Transport layer No black magic CloudKit Used by Apple iCloud Drive & iCloud Photo Library Used by third parties 1Password CloudKit Stack CKContainer CloudKit Stack Public CKDatabase Private CKDatabase CKContainer CloudKit Stack CKRecordZone Default Zone Custom Public CKDatabase Private CKDatabase CKContainer CloudKit Stack CKRecord CKRecordZone Default Zone Custom Public CKDatabase Private CKDatabase CKContainer CloudKit Stack CKSubscription (optional) CKRecord CKRecordZone Default Zone Custom Public CKDatabase Private CKDatabase CKContainer CloudKit Stack CKSubscription (optional) CKRecord CKRecordZone Default Zone Custom Public CKDatabase Private CKDatabase CKContainer CKRecord Store data using key/value pairs NSString, NSNumber, NSData, NSDate, NSArray, CLLocation, CKAsset, CKReference Use constant strings for keys recordType property is like a database table name CKRecord Initializers initWithRecordType: initWithRecordType:zoneID: initWithRecordType:recordID: CKRecordID 2 properties recordName, zoneID Initializers initWithRecordName: initWithRecordName:zoneID: CKRecordZoneID initWithZoneName:ownerName: Use CKOwnerDefaultName for ownerName Zone name is a string Use CKRecordZoneDefaultName for the default zone CKRecordZoneID CKContainer -
Ios-Security-Guide.Pdf
iOS Security iOS 9.3 or later May 2016 Contents Page 4 Introduction Page 5 System Security Secure boot chain S y s t e m S o f t w a r e A uthorization S e c u r e E n c l a v e T o u c h I D Page 10 Encryption and Data Protection Hardware security features File Data Protection Passcodes Data Protection classes Keychain Data Protection Access to Safari saved passwords Keybags Security Certifications and programs Page 18 App Security App code signing Runtime process security Extensions App Groups Data Protection in apps Accessories HomeKit HealthKit Secure Notes Apple Watch Page 28 Network Security TLS VPN Wi-Fi Bluetooth Single Sign-on AirDrop security Page 32 Apple Pay Apple Pay components How Apple Pay uses the Secure Element How Apple Pay uses the NFC controller Credit and debit card provisioning Payment authorization Transaction-specific dynamic security code Contactless payments with Apple Pay Paying with Apple Pay within apps Rewards cards Suspending, removing, and erasing cards iOS Security—White Paper | May 2016 2 Page 39 Internet Services A p p l e I D i M e s s a g e F a c e T i m e i C l o u d i C l o u d K e y c h a i n S i r i C o n t i n u i t y Spotlight Suggestions Page 52 Device Controls Passcode protection i O S p a i r i n g m o d e l Configuration enforcement Mobile device management (MDM) Shared iPad Apple School Manager D e v i c e E n r o l l m e n t Apple Configurator 2 Supervision Restrictions R e m o t e W ipe Lost Mode Activation Lock Page 59 Privacy Controls Location Services Access to personal data P r i v a c y p o l i c y Page 60 Conclusion A commitment to security Page 61 Glossary Page 63 Document Revision History iOS Security—White Paper | May 2016 3 Introduction Apple designed the iOS platform with security at its core.