Cloud Computing Karlsruhe Institute of Technology (KIT), Germany Institute for Applied Informatics (AIFB) Prof

Total Page:16

File Type:pdf, Size:1020Kb

Cloud Computing Karlsruhe Institute of Technology (KIT), Germany Institute for Applied Informatics (AIFB) Prof About the Speaker: Stefan Tai Professor, Cloud Computing Karlsruhe Institute of Technology (KIT), Germany Institute for Applied Informatics (AIFB) Prof. Dr. Stefan Tai Karlsruhe Service Research Institute (KSRI) [email protected] Director, FZI Research Center for Information Technology in Karlsruhe, Germany From 1999-2007: Research Staff Member, IBM T.J. Watson Research Center, New York, USA Prior to 1999: Eurocontrol Experimental Center, Paris, France Fraunhofer ISST, Berlin, Germany TU Berlin, Germany 2 25 Sept 2009 S. Tai KIT – The cooperation of Forschungszentrum Karlsruhe GmbH and Universität Karlsruhe (TH) Karlsruhe, Germany www.eOrganiz ation. de 3 25 Sept 2009 S. Tai 4 25 Sept 2009 S. Tai Gartner‘s Hype Cycle of Emerging Technologies, What is Cloud Computing? July 2009 5 25 Sept 2009 S. Tai 6 25 Sept 2009 S. Tai Cloud Computing: Infrastructure, Platforms, First of all: What are Services? and Software as Services Figure Credit: Rackspace 7 25 Sept 2009 S. Tai 8 25 Sept 2009 S. Tai …set in multiple contexts Cloud Computing is about: Understanding business opportunities • Faster time-to-market, and cost-effective innovation processes • Di(tDynamic (trans-)forma tion o f open serv ice an d bus iness ne twor ks Enterprise Computing • Leveraging the participation Web and mass programming Web Computing Internet-scale service computing • Provide and consume sophisticated infrastructure, platforms and business applications as modular (Web) services • Disrupt traditional industries and offer rich, highly dynamic Cloud Economics experiences Enterprise-grade systems management • Under-utilized server resources waste computing power and energy • Over-utilized servers cause interruption or degradation of service levels 9 25 Sept 2009 S. Tai 10 25 Sept 2009 S. Tai Cloud Computing is about: Cloud Computing is about: Understanding business opportunities Understanding business opportunities • Faster time-to-market, and cost-effective innovation processes • Faster time-to-market, and cost-effective innovation processes • Di(tDynamic (trans-)forma tion o f open serv ice an d bus iness ne twor ks • Di(tDynamic (trans-)forma tion o f open serv ice an d bus iness ne twor ks • Leveraging the participation Web and mass programming • Leveraging the participation Web and mass programming Internet-scale service computing Internet-scale service computing • Provide and consume sophisticated infrastructure, platforms and • Provide and consume sophisticated infrastructure, platforms and business applications as modular (Web) services business applications as modular (Web) services • Disrupt traditional industries and offer rich, highly dynamic • Disrupt traditional industries and offer rich, highly dynamic experiences experiences Enterprise-grade systems management Enterprise-grade systems management • Under-utilized server resources waste computing power • Under-utilized server resources waste computing power and energy and energy • Over-utilized servers cause interruption or degradation of service • Over-utilized servers cause interruption or degradation of service levels levels 11 25 Sept 2009 S. Tai 12 25 Sept 2009 S. Tai Our Definition To keep in mind: Three Dimensions “Building on compute and storage virtualization , Cloud Service cloud computing provides scalable, network-centric, Engineering abstracted IT infrastructure, platforms, and applications as on-deman d serv ices t hat are bille d by consumpt ion. " Business opportunities “Cloud service engggineering leverages cloud Internet-scale service computing computing in the context of the Internet in its combined role as a platform for technical, economic, Enterprise-grade organizational and social networks.” systems management 13 25 Sept 2009 S. Tai 14 25 Sept 2009 S. Tai Clouds vs. Grids Cloud Architecture and Ecosystem Cloud Computing Grid Computing Objective Provide desired computing platform Resource sharing via network enabled services Job execution Infrastructure One or few data centers, Geographically distributed, heterogeneous/homogeneous heterogeneous resource, no central resource under central control, control, VO Industry and Business Research and academic organization nctional uu Middleware Proprietary, several reference Well developed, maintained and F implementations exist (e.g. Amazon) documented Application Suited for generic applications Special application domains like High Energy Physics User interface Easy to u se/deploy, no complex u ser Difficu lt u se and deploy ment interface required Need new user interface, e.g., commands, APIs, SDKs, services … Business Model Commercial: Pay-as-you-go Publicly funded: Use for free IT] ional tt Operational Model Industrialization of IT Mostly Manufacture KK Fully automated Services Handcrafted Services QoS Possible Little support on-Func ks to M. Kunze, NN On-demand provisioning Yes No [Than 15 25 Sept 2009 S. Tai 16 25 Sept 2009 S. Tai Organizational Cloud Architecture: Technical Cloud Architecture: Public-/Hybrid-/Private-Cloud Cloud Computing Stack Generic Approach Layered architecture Everything as a Service concept Standard layers IfttInfrastructure as a S Siervice Platform as a Service Software as a Service Extra Layers Human as a Service Administration/Business Support 17 25 Sept 2009 S. Tai 18 25 Sept 2009 S. Tai Infrastructure as a Service Platform as a Service Infrastructure Services Progggramming Storage Environment Computational Programming Language, Network Libraries Database e.g. Django, Java e.g. Google Bigtable, GlFSGoogleFS, HdHadoop Execution Environment MapReduce, HadoopFS Runtime Environment RStResource Set e. g. Google App Engine, Java Virtual Machine Machine Images e.ggyp. EC2, Eucalyptus 19 25 Sept 2009 S. Tai 20 25 Sept 2009 S. Tai Software as a Service Human as a Service Applications User Interface CdCrowdsourc ing Frontend Application Enabling Collective e.g. Google Docs, Intelligence Yahoo Email e.g. Mechanical Turk Application Services Information Markets Webservices Interface Prediction of events Basic or Composite e.g. Iowa Electronic ege.g. Opensocial, Markets Google Maps 21 25 Sept 2009 S. Tai 22 25 Sept 2009 S. Tai Administration/Business Support Cloud Architecture Æ Cloud Players Available on all layers Administration High-value SPs Deppyloyment Configuration Intermediaries Monitoring Life cycle management Business support Metering Basic SPs Billing Authentication User management Infrastructure SPs 23 25 Sept 2009 S. Tai 25 Sept 2009 S. Tai Players Players: Providers Cloud infrastructure service providers – raw cloud Programmatic access via Web Services and/or Web APIs resources “Pure” virtualized resources IaaS (infrastructure-as-a-service) CPU, memory, storage, and bandwidth Cloud platform providers – resources + frameworks; PaaS Data store (platform-as-a-service) Cloud intermediaries – help broker some aspect of raw Versus resources and frameworks, e.g., server managers, application assemblers, application hosting Vir tuali ze d resources p lus app lica tion framewor k Cloud application providers (SaaS) (e.g., RoR, Python, .NET) Clou d consumers – users ofthf the a bove Imposes an application and data architecture Constrains how application is built [Thanks to M. Maximilien, IBM] [Thanks to M. Maximilien, IBM] 25 25 Sept 2009 S. Tai 26 25 Sept 2009 S. Tai Players: Cloud Intermediaries Players: Application Providers Resells (aspects of) raw cloud resources, with added value Software as a Service (SaaS): propositions Applications provided and consumed over the Web Packaging resources as bundles Infrastructure usage (mostly) hidden Facilitating cloud resource management, e.g., setup, up dates, backup, load balancing, etc. Providing tools and dashboards Enabler of the cloud ecosystem [Thanks to M. Maximilien, IBM] [Thanks to M. Maximilien, IBM] 27 25 Sept 2009 S. Tai 28 25 Sept 2009 S. Tai 28 Cloud Computing by example: AWS The Cloud Ecosystem 29 25 Sept 2009 S. Tai 30 25 Sept 2009 S. Tai Cloud computing by example: AWS Amazon Simple Queue Service (SQS) Amazon Web Services (AWS) Cloud Offerings: Amazon Elastic Compute Cloud (()Amazon EC2) Amazon Simple Storage Service (Amazon S3 Amazon Simple Queuing Service (Amazon SQS) Amazon SimpleDB Amazon Elas tic MMRdapReduce Amazon CloudFront Amazon DevPay AWS Import/Export 31 25 Sept 2009 S. Tai 32 25 Sept 2009 S. Tai Amazon Simple Queue Service (SQS) SQS Functionality “Message queuing in the Cloud” Developers can create an unlimited number of Amazon SQS queues, each of which can send and receive an unlimited Basic message queuing model, except: queues are hosted by number of messages . Amazon, and queues are accessed using Web service protocols New messages can be added to a queue at any time. The Simple API message body can contain up to 8 KB of text in any format. Platform agnostic A computer can check a queue at any time for messages waiting Basic support for access control and message locking to be read. A message is “locked” while a computer is processing it, keeping other computers from trying to process it simultaneously . If Reliability processing fails, the lock will expire and the message will again Runs within Amazon's high-availability data centers be available. Messages stored redundantly across multiple servers and locations Messages can be retained in queues for up to 4 days. Scalable to millions of messages a day Developers can access Amazon SQS through standards-based SOAP and Query interfaces designed to work with any Internet- development toolkit . Source: aws.amazon.com 33 25 Sept 2009 S. Tai 34 25 Sept 2009 S. Tai SQS API Sample
Recommended publications
  • Security in Cloud Computing a Security Assessment of Cloud Computing Providers for an Online Receipt Storage
    Security in Cloud Computing A Security Assessment of Cloud Computing Providers for an Online Receipt Storage Mats Andreassen Kåre Marius Blakstad Master of Science in Computer Science Submission date: June 2010 Supervisor: Lillian Røstad, IDI Norwegian University of Science and Technology Department of Computer and Information Science Problem Description We will survey some current cloud computing vendors and compare them to find patterns in how their feature sets are evolving. The start-up firm dSafe intends to exploit the promises of cloud computing in order to launch their business idea with only marginal hardware and licensing costs. We must define the criteria for how dSafe's application can be sufficiently secure in the cloud as well as how dSafe can get there. Assignment given: 14. January 2010 Supervisor: Lillian Røstad, IDI Abstract Considerations with regards to security issues and demands must be addressed before migrating an application into a cloud computing environment. Different vendors, Microsoft Azure, Amazon Web Services and Google AppEngine, provide different capabilities and solutions to the individual areas of concern presented by each application. Through a case study of an online receipt storage application from the company dSafe, a basis is formed for the evaluation. The three cloud computing vendors are assessed with regards to a security assessment framework provided by the Cloud Security Alliance and the application of this on the case study. Finally, the study is concluded with a set of general recommendations and the recommendation of a cloud vendor. This is based on a number of security as- pects related to the case study’s existence in the cloud.
    [Show full text]
  • AWS Certified Developer – Associate (DVA-C01) Sample Exam Questions
    AWS Certified Developer – Associate (DVA-C01) Sample Exam Questions 1) A company is migrating a legacy application to Amazon EC2. The application uses a user name and password stored in the source code to connect to a MySQL database. The database will be migrated to an Amazon RDS for MySQL DB instance. As part of the migration, the company wants to implement a secure way to store and automatically rotate the database credentials. Which approach meets these requirements? A) Store the database credentials in environment variables in an Amazon Machine Image (AMI). Rotate the credentials by replacing the AMI. B) Store the database credentials in AWS Systems Manager Parameter Store. Configure Parameter Store to automatically rotate the credentials. C) Store the database credentials in environment variables on the EC2 instances. Rotate the credentials by relaunching the EC2 instances. D) Store the database credentials in AWS Secrets Manager. Configure Secrets Manager to automatically rotate the credentials. 2) A Developer is designing a web application that allows the users to post comments and receive near- real-time feedback. Which architectures meet these requirements? (Select TWO.) A) Create an AWS AppSync schema and corresponding APIs. Use an Amazon DynamoDB table as the data store. B) Create a WebSocket API in Amazon API Gateway. Use an AWS Lambda function as the backend and an Amazon DynamoDB table as the data store. C) Create an AWS Elastic Beanstalk application backed by an Amazon RDS database. Configure the application to allow long-lived TCP/IP sockets. D) Create a GraphQL endpoint in Amazon API Gateway. Use an Amazon DynamoDB table as the data store.
    [Show full text]
  • Introduction to Amazon Web Services
    Introduction to Amazon Web Services Jeff Barr Senior AWS Evangelist @jeffbarr / [email protected] What Does It Take to be a Global Online Retailer? The Obvious Part… And the Not-So Obvious Part How Did Amazon Get in to Cloud Computing? • We’d been working on it for over a decade • Development of a platform to enable sellers on the Amazon global infrastructure • Internal need for centralized, scalable deployment environment for applications • Early forays into web services proved developers were hungry for more This Led to a Broader Mission • Enable businesses and developers to use web services (what people now call “the cloud”) to build scalable, sophisticated applications. “It's not the customers' job to invent for themselves. It's your job to invent on their behalf. You need to listen to customers. You need to invent on their behalf. Kindle, EC2 would not have been developed if we did not have an inventive culture.” - Jeff Bezos, Founder & CEO, Amazon.com Attributes of Cloud Computing No Up-Front Capital Low Cost Pay Only for What Expense You Use Self-Service Easily Scale Up and Improve Agility & Time- Infrastructure Down to-Market Deploy Last-Generation IT Services Cloud-Generation IT Services Cloud-Generation IT Services What’s the Difference? Last-Generation Cloud-Generation • IT department • Empowered users • Manual Setup • Automated Setup • Hours/Days/Weeks • Seconds/Minutes • Error-prone • Scripted & repeatable • Small scale • Any scale AWS PLATFORM Cloud-Powered Applications Management & Administration Administration Identity &
    [Show full text]
  • Implementación De Los Algoritmos De Factorización 201
    Universidad Complutense de Madrid Facultad de Informática Sistemas Informáticos 2010/2011 RSA@Cloud Criptoanálisis eficiente en la Nube Autores: Directores de proyecto: Alberto Megía Negrillo José Luis Vázquez-Poletti Antonio Molinera Lamas Ignacio Martin Llorente José Antonio Rueda Sánchez Dpto. Arquitectura de Computadores Página 0 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Se autoriza a la Universidad Complutense a difundir y utilizar con fines académicos, no comerciales y mencionando expresamente a sus autores, tanto la propia memoria, como el código, la documentación y/o el prototipo desarrollado. Alberto Megía Negrillo Antonio Molinera Lamas José Antonio Rueda Sánchez Página 1 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Página 2 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Agradecimientos Un trabajo como este no habría sido posible sin la cooperación de mucha gente. En primer lugar queremos agradecérselo a nuestras familias que tanto han confiado y nos han dado. A nuestros directores José Luis Vázquez-Poletti e Ignacio Martín Llorente, por conseguir llevar adelante este proyecto. Por último, a todas y cada una de las personas que forman parte de la Facultad de Informática de la Universidad Complutense de Madrid, nuestro hogar durante estos años. Página 3 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Página 4 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Resumen En el presente documento se describe un sistema que aprovecha las virtudes de la computación Cloud y el paralelismo para la factorización de números grandes, base de la seguridad del criptosistema RSA, mediante el empleo de diferentes algoritmos matemáticos como la división por tentativa y criba cuadrática.
    [Show full text]
  • Cisco Workload Automation Amazon EC2 Adapter Guide
    Cisco Workload Automation Amazon EC2 Adapter Guide Version 6.3 First Published: August, 2015 Last Updated: September 6, 2016 Cisco Systems, Inc. www.cisco.com THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • OPINION Sysadmin NETWORKING Security Columns
    October 2010 VOLUME 35 NUMBER 5 OPINION Musings 2 RikR FaR ow SYSADMin Teaching System Administration in the Cloud 6 Jan Schaumann THE USENIX MAGAZINE A System Administration Parable: The Waitress and the Water Glass 12 ThomaS a. LimonceLLi Migrating from Hosted Exchange ­Service to In-House Exchange Solution 18 T Roy mckee NETWORKING IPv6 Transit: What You Need to Know 23 mT aT Ryanczak SU EC RITY Secure Email for Mobile Devices 29 B Rian kiRouac Co LUMNS Practical Perl Tools: Perhaps Size Really Does Matter 36 Davi D n. BLank-eDeLman Pete’s All Things Sun: The “Problem” with NAS 42 Pe TeR BaeR GaLvin iVoyeur: Pockets-o-Packets, Part 3 48 Dave JoSePhSen /dev/random: Airport Security and Other Myths 53 RoT BeR G. FeRReLL B OOK reVIEWS Book Reviews 56 El izaBeTh zwicky, wiTh BRanDon chinG anD Sam SToveR US eniX NOTES USA Wins World High School Programming Championships—Snaps Extended China Winning Streak 60 RoB koLSTaD Con FERENCES 2010 USENIX Federated Conferences Week: 2010 USENIX Annual Technical Conference Reports 62 USENIX Conference on Web Application Development (WebApps ’10) Reports 77 3rd Workshop on Online Social Networks (WOSN 2010) Reports 84 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud ’10) Reports 91 2nd Workshop on Hot Topics in Storage and File Systems (HotStorage ’10) Reports 100 Configuration Management Summit Reports 104 2nd USENIX Workshop on Hot Topics in Parallelism (HotPar ’10) Reports 106 The Advanced Computing Systems Association oct10covers.indd 1 9.7.10 1:54 PM Upcoming Events 24th Large InstallatIon system admInIstratIon ConferenCe (LISA ’10) Sponsored by USENIX in cooperation with LOPSA and SNIA november 7–12, 2010, San joSe, Ca, USa http://www.usenix.org/lisa10 aCm/IfIP/USENIX 11th InternatIonaL mIddLeware ConferenCe (mIddLeware 2010) nov.
    [Show full text]
  • Using Arcgis for Server in the Amazon Cloud Bonnie Stayer, Esri Amy Ramsdell, Blue Raster Session Outline
    Federal GIS Conference February 9–10, 2015 | Washington, DC Using ArcGIS for Server in the Amazon Cloud Bonnie Stayer, Esri Amy Ramsdell, Blue Raster Session Outline • AWS Overview • ArcGIS in AWS • Cloud Builder • Benefits • Security • Case Study from Blue Raster AWS Overview Utility Computing ON DEMAND UNIFORM PAY AS YOU GO AVAILABLE} Utility Computing | AWS Overview Compute Scaling Security ON DEMAND CDN Backup UNIFORM DNS Database Storage Load Balancing PAY AS YOU GO Workflow Monitoring AVAILABLE Networking } Messaging Utility Computing | AWS Overview Amazon Web Services (AWS) | AWS Overview 10 AWS Regions 30+ AWS Edge Locations AWS Global Infrastructure | AWS Overview US Regions Global Regions US East (VA) US West (CA) Asia Pacific (Tokyo) Asia Pacific (Singapore) EU (Frankfurt) Availability Availability Availability Availability Zone A Zone B Zone A Zone B Availability Availability Availability Availability Availability Availability Zone A Zone B Zone A Zone B Zone A Zone B Availability Availability Zone C Zone D Availability Zone C US West (OR) GovCloud (OR) EU (Ireland) South America (Sao Asia Pacific (Sydney) Paulo) Availability Availability Availability Availability Zone A Zone B Zone A Zone B Availability Availability Availability Availability Availability Availability Zone A Zone B Zone A Zone B Zone A Zone B Availability Availability Zone C Zone C Note: Conceptual drawing only. The number of Availability Zones may vary. AWS Regions & Availability Zones | AWS Overview Virtual machines (instance types) optimized for: • General purpose • Compute • GPU • Memory • Storage Amazon EC2 Instances | AWS Overview Elastic Block Storage (EBS) • Storage volumes can be attached to EC2 instances • Can be detached and preserved separately Elastic Block Storage | AWS Overview Preconfigured with: • Operating system • Architecture (32-bit or 64-bit) • Storage • Applications (i.e.
    [Show full text]
  • Amazon Elastic Compute Cloud User Guide for Linux API Version 2014-10-01 Amazon Elastic Compute Cloud User Guide for Linux
    Amazon Elastic Compute Cloud User Guide for Linux API Version 2014-10-01 Amazon Elastic Compute Cloud User Guide for Linux Amazon Elastic Compute Cloud: User Guide for Linux Copyright © 2014 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks of Amazon Web Services, Inc.: Amazon, Amazon Web Services Design, AWS, Amazon CloudFront, Cloudfront, CloudTrail, Amazon DevPay, DynamoDB, ElastiCache, Amazon EC2, Amazon Elastic Compute Cloud, Amazon Glacier, Kinesis, Kindle, Kindle Fire, AWS Marketplace Design, Mechanical Turk, Amazon Redshift, Amazon Route 53, Amazon S3, Amazon VPC. In addition, Amazon.com graphics, logos, page headers, button icons, scripts, and service names are trademarks, or trade dress of Amazon in the U.S. and/or other countries. Amazon©s trademarks and trade dress may not be used in connection with any product or service that is not Amazon©s, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. Amazon Elastic Compute Cloud User Guide for Linux Table of Contents What Is Amazon EC2? ................................................................................................................... 1 Features of Amazon EC2 ........................................................................................................ 1 How to Get Started with Amazon
    [Show full text]
  • Frankfurt 2015 Rights Guide
    Frankfurt 2015 Rights Guide www.apub.com For Global Rights inquiries, please contact: Jennifer Bassuk—Director, Global Rights Jodi Marchowsky—Manager, Global Rights Alexandra Levenberg—Manager, Global Rights Amazon Publishing 1350 Avenue of the Americas, 17th Floor New York, New York 10019 [email protected] Rights Guide Table of Contents 47North . 3 Amazon Publishing . 22 French and German Titles — Amazon Publishing . 29 Grand Harbor Press . 41 Jet City Comics . 45 Lake Union Publishing . 51 Little A . .82 Montlake Romance . 92 StoryFront . 123 Thomas & Mercer . 129 Waterfall . 165 For information about our backlist titles, please refer to our backlist rights guide, which is available on our website at www.apub.com. For Media Inquiries, please contact: [email protected] 2 This Way to the New Unknown 47North, whose name is based on the latitude coordinates for Seattle, offers a wide array of new novels and cult favorites for avid readers of science fiction, fantasy, and horror. 3 Seed Ania Ahlborn Horror Publication Date: 7/17/2012 Page Count: 246 Rights Available: All Languages Rights Sold: German Seed plants its page-turning terror deep in your soul, and lets it grow wild. With nothing but the clothes on his back—and something horrific snapping at his heels—Jack Winter fled his rural Georgia home when he was still just a boy. Watching the world he knew vanish in a trucker’s rearview mirror, he thought he was leaving an unspeakable nightmare behind forever. But years later, the bright new future he’s built suddenly turns pitch black, as something fiendishly familiar looms dead ahead.
    [Show full text]
  • Scalable Training of Deep Learning Models on Cloud Infrastructures
    Scalable Training of Deep Learning Models on Cloud Infrastructures Author: Javier Jorge Cano Advisors: Dr. J. Damián Segrelles Dr. Germán Moltó Departamento de Sistemas Informáticos y Computación Universitat Politècnica de València Máster Universitario en Computación Paralela y Distribuida Master’s Thesis September 2018 “A distributed system is one in which the failure of a computer you didn’t even know existed can render your own computer unusable.” — Leslie Lamport Abstract In this Master’s thesis we focus on deploying and provisioning in an unattended and distributed way a set of nodes that conduct the training of a deep learning model. To this end, the deep learning framework TensorFlow will be used, as well as the Infrastructure Manager that allows us to deploy complex infrastructures programmatically. The final infrastructure should consider: data handling, model training using this data, and the persistence of the trained model. For this purpose, it will be used public Cloud platforms such as Amazon Web Services (AWS) and General-Purpose Computing on Graphics Processing Units (GPGPU). Contents List of Figures IX List of Tables XI 1. Introduction1 1.1. Motivation . .1 1.2. Objectives . .2 1.3. State-of-the-art . .3 1.3.1. Machine Learning . .4 1.3.2. Deep Learning Frameworks . .9 1.3.3. Cloud providers . 12 1.3.4. Infrastructure as code . 13 2. Proposal 17 2.1. System’s Architecture . 17 2.2. Deploying with Infrastructure Manager . 20 2.2.1. Software provisioning and configuring with Ansible . 23 2.3. Recipe’s definition . 25 2.3.1. Resources’ definition . 25 2.3.2.
    [Show full text]
  • VM Import/Export User Guide VM Import/Export User Guide
    VM Import/Export User Guide VM Import/Export User Guide VM Import/Export: User Guide Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. VM Import/Export User Guide Table of Contents What is VM Import/Export? ................................................................................................................. 1 Features of VM Import/Export ..................................................................................................... 1 How to get started with VM Import/Export ................................................................................... 1 Accessing VM Import/Export ....................................................................................................... 1 Pricing ...................................................................................................................................... 2 Related services ......................................................................................................................... 2 How it works ............................................................................................................................
    [Show full text]
  • Introduction to Cloud Computing and AWS
    Introduction to Cloud Computing and AWS • Provides on-demand delivery of compute power, database storage, applications, and other IT resources via the Internet. • Access as many resources as you need - almost instantly. • Only pay for what you use: pay-as-you-go pricing. • Simple way to access servers, storage, databases and a broad set of application services over the Internet. • Amazon Web Services (AWS) is a cloud services platform that owns and maintains the network-connected hardware, while you provision and use what you need via a web application. Source: Adapted from AWS AWS Services & Terms EC2: Amazon Elastic Compute Cloud (EC2) provides resizable compute capacity in the cloud, includes server configuration and hosting. Service to provide a virtual machine Instance: Virtual computing environments on EC2. a.k.a. virtual machine EBS: Elastic Block Storage is block storage service that is used with EC2 instances. S3: Amazon Simple Storage Service (S3) can be used to store and retrieve any amount of data. AMI: Amazon Machine Image is a special feature that is used to create a virtual machine within the Amazon Elastic Compute Cloud ("EC2") used to deploy applications. a.k.a. pre-built virtual environment Many, many more services and terms: https://docs.aws.amazon.com/index.html Source: Adapted from AWS Using AWS EC2 1) Launch Instance • Via AWS Console (web interface) • Via AWS Command Line Interface 2) Manage Instance (AWS CLI) 3) Access Instance 4) Do Science! Using AWS EC2 1) Launch Instance • Already done for this tutorial. • But, will give brief overview using 2) Manage Instance the AWS console (web interface).
    [Show full text]