Integra(ng an Online Configura(on Checker with Exis(ng Management Systems: Applica(on to CIM/WBEM Environments
|
|
- Coral Daniel
- 5 years ago
- Views:
Transcription
1 Integra(ng an Online Configura(on Checker with Exis(ng Management Systems: Applica(on to CIM/WBEM Environments Ludi Akue, Emmanuel Lavinal, Thierry Desprats, Michelle Sibilla University of Toulouse IRIT Lab. France
2 Outline Configura(on verifica(on requirement in NSM Framework for run(me configura(on verifica(on MeCSV metamodel Configura(on constraints checker Applica(on of the framework in CIM/WBEM environments Experiments on the CIM System Virtualiza(on Profile SVM
3 Configura(on verifica(on requirement Configura(on and reconfigura(on are fundamental ac(vi(es in network and service management (the system s behavior is controlled by its configura(on) Management system Config. Install / deploy Monitor Decide Adjust New Config. New Config. Config. Correctness? Consistency? Adequacy? Managed Elements à Need to verify configurafons before their applicafon to guarantee the system s safe and correct operafon SVM
4 Configura(on verifica(on Currently, most related work address Use- case specific verifica(on [SANchk08] Structural integrity verifica(on [Hinrich04, Warren06, PoDIM07] Structural verificafon deals with type conformance, range of authorized values, syntac(c correctness Examples of structural verifica(on: The host name configura(on parameter must not be empty An IPv4 address must have 4 bytes Structural configura(on verifica(on is independent from a run(me Conf X is structurally valid Conf X is valid RT i SVM
5 Configura(on verifica(on (cont.) In today s dynamic environments, configura(ons are highly dependent on the opera(onal condi(ons We argue that an online configurafon verificafon capability is required to assess the configura(on s compliance regarding the current run(me context Examples of online/opera(onal verifica(on: The server hos(ng the HTTP service must be in a running state When applying the backup configura(on, the current number of clients must be less than 50% of the maximum number of clients Online configura(on verifica(on depends on a run(me Conf X is operationally valid in RT Y Conf X is valid RT i SVM
6 General approach for an online configura(on verifica(on Enhancing exis(ng management systems with a verifica(on func(onality Independent from a specific configura(on language or plahorm Enable an online configura(on verifica(on (coupled with a run(me monitoring) 2 1 Decide Monitor Management system Managed Elements 3 Runtime Conf. Verification Adjust à Approach based on a dedicated high- level language: MeCSV metamodel SVM
7 MeCSV: Metamodel for Configura(on Specifica(on & Valida(on MeCSV metamodel [L. Akue et al., VALID 2012] High- level language dedicated to configura(on verifica(on Simple but sufficient to express offline and online constraints Built around 3 capabili(es : ConfiguraFon descripfon: the ability to define a configura(on model for a given system Constraint expression: the ability to express constraints that configura(ons must respect for both structural and opera(onal validity Monitored data representafon: the ability to represent relevant opera(onal state data that influence the opera(onal validity of a configura(on SVM
8 ConfigurationComposition (from/uml/association) ///active/:/boolean ///level/:/constraintlevel «Stereotype» Constraint «Stereotype» Configuration «Stereotype» ManagedElement «Stereotype» StateParameter «Stereotype» ConfigurationParameter «Stereotype» ConstrainableElement «Stereotype» OfflineConstraint «Stereotype» OnlineConstraint «Stereotype» ConfigurationMetadata «Stereotype» ConstraintLevel «metaclass» Class «metaclass» NamedElement «metaclass» Enumeration «metaclass» Constraint «metaclass» Property ConfigurationReference (from/uml/association) ElementConfiguration (from/uml/association) evaluationcontext/[1] ownedconstraint/[*] settings/[*] metadata/[*] stateparameters/[*] constrainedelement/[*] «metaclass» Property [*] [*] [*] [*] MeCSV UML Profile Monitoring Configuration Constraints SVM
9 Framework for online configura(on verifica(on MeCSV Metamodel <<conforms to>> MeCSV inst. edit (at design and run(me) Management System Legacy Legacy mgmt mgmt info info verif. results Adapter Config. instance Current op. state verif. results Reference Model Config structure State Param. <<uses>> Cons- traints RunFme Checker Managed Elements Online configura(on checker SVM
10 Applica(on to CIM/WBEM standards Design Fme: genera(ng part of the MeCSV reference model from CIM schemas 1. Usage of the DMTF s CIM_SettingData configura(on parern 2. Defini(on of transforma(on rules (based on the QVT transforma(on language) between CIM setngs data and the MeCSV metamodel CIM design pauerns (ManagedElement, SettingData) QVT rules MeCSV Metamodel <<conforms to>> <<conforms to>> <<conforms to>> transforma(on Reference Model Config structure State Param. Cons- traints SVM
11 Applica(on to CIM/WBEM standards (cont.) RunFme: building a CIM2MeCSV adapter capable of Mapping at run(me CIM instances to MeCSV instances Gathering from the managed system the state parameters current values (used for online constraints evalua(on) Mgmt System WBEM server 1 Verify {sewng data inst.} 2 Get {state inst.} CIM2MeCSV Adapter (WBEM client) Verify MeCSV {conf + state inst.} 3 Reference Model Config structure State Param. <<uses>> Cons- traints RunFme Checker Managed Elements Online configura(on checker SVM
12 CIM System Virtualiza(on Profile Case Study System virtualiza(on profile (simplified class diagram) HostedDependency ElementSettingData * 1 ComputerSystem SettingsDefineState * VirtualSystemSettingData HostedResourcePool ConcreteComponent * * * ResourcePool ResourceAllocationFromPool ResourceAllocationSettingData 0..1 * ElementSettingData 0..1 SVM
13 CIM System Virtualiza(on Profile Case Study Example Host1:System HostedResourcePool HostedDependency MEM:ResourcePool PoolID = "prim-mem1" Capacity = Primordial = True Reserved = ResourceType = 4 (Memory) AllocationUnits = "byte*2^10" CPU:ResourcePool PoolID = "prim-cpu1" Capacity = 100 Primordial = True Reserved = 50 ResourceType = 3 (Processor) AllocationUnits = "percent" VS1:ComputerSystem Name = "VS1" EnabledState = 2 (Enabled) ResourceAlloc FromPool ResourceAlloc FromPool SettingsDefineState VS1_VSSD:VSSettingData InstanceID = "VS1VSSD" VirtualSystemType = "Default" MRA1:ResourceAllocationSettingData InstanceID = "MRA1RASD" ResourceType = 4 (Memory) AllocationUnits = "byte*2^10" Reservation = PRA1:ResourceAllocationSettingData InstanceID = "PRA1RASD" ResourceType = 3 (Processor) AllocationUnits = "percent" Reservation = 25 ConcreteComponent Element SettingData Element SettingData x:vssettingdata x:vssettingdata x:vssettingdata x:vssettingdata x:vssettingdata x:rasettingdata SVM
14 Experimenta(on: design (me MeCSV reference model genera(on (from CIM VS profile) «ConfigRef» «ManagedElement» ComputerSystem «StateParameter» Name «StateParameter» EnabledState me «ElementConfig» conf «Configuration» VirtualSystemSettingData «ConfigParameter» InstanceId «ConfigParameter» VirtualSystemType «ConfigurationComposition» «ConfigRef» «ManagedElement» ResourcePool «StateParameter» PoolID «StateParameter» ResourceType «StateParameter» AllocationUnits «StateParameter» Capacity «StateParameter» Reserved me «ElementConfig» conf «Configuration» ResourceAllocationSettingData «ConfigParameter» InstanceId «ConfigParameter» ResourceType «ConfigParameter» AllocationUnits «ConfigParameter» Reservation SVM
15 Experimenta(on: design (me Adding constraints to the MeCSV reference model Offline constraints examples Every VirtualSystemSD instance must have a unique id Every VirtualSystemSD instance must include a sub configura(on ResourceAllocationSD of type Processor, Memory and Disk Every ResourceAllocationSD instance must have a Reservation > 0 Online constraints examples The VirtualSystemSD s state configura(on must be associated to a computer system instance in the enabled state The sum of the all the ResourceAllocationSD Reservations must not exceed the Capacity of the corresponding ResourcePool SVM
16 Experimenta(on: run(me Goals 1. Test the CIM2MeCSV adapter and measure its overhead (transforma(on and integra(on (me) 2. Test the online configura(on checker and measure the verifica(on (me (2) Verify {sewng data inst.} (1) Reference Model Mgmt System WBEM server Get {state inst.} CIM2MeCSV Adapter (WBEM client) Verify MeCSV {conf + state inst.} Conf. State Const. <<uses>> Managed Elements RunFme Checker Online configurafon checker Evalua(on according to different configura(on sizes and number of constraints SVM
17 Experimenta(on: run(me evalua(on setup CIM instances provided by OpenPegasus WBEM server (default repository provider) 3 scenarios Case 1: 1 host, 1 VM, ~ 180 config param. & 140 state param. Case 2: 1 host, 2 VM, ~ 360 config param. & 140 state param. Case 3: 1 host, 3 VM, ~ 800 config param. & 140 state param. 3 sets of OCL constraints 10 constraints (~ 70% offline & 30% online) 50 constraints (~ 70% offline & 30% online) 100 constraints (~ 70% offline & 30% online) SVM
18 Experimenta(on: run(me evalua(on results Verify {sewng data inst.} Reference Model Mgmt System WBEM server Get {state inst.} CIM2MeCSV Adapter (WBEM client) Verify MeCSV {conf + state inst.} <<uses>> Managed Elements RunFme Checker Online configurafon checker CIM2MeCSV%adapter's%overhead% Online%configura3on%checking%3me% Time%(in%ms)% 1800" 1600" 1400" 1200" 1000" 800" 600" 400" Total"1me" Instance" transfo." Time%(in%ms)% 1800" 1600" 1400" 1200" 1000" 800" 600" 400" 10"constraints" 50"constraints" 100"constraints" 200" 200" 0" Case"1" Case"2" Case"3" 0" Case"1" Case"2" Case"3" Case 1: 1 host, 1 VM, ~ 180 config param. & 140 state param. Case 2: 1 host, 2 VM, ~ 360 config param. & 140 state param. Case 3: 1 host, 3 VM, ~ 800 config param. & 140 state param. SVM
19 Conclusion and future work Framework for online configura(on verifica(on based on a dedicated (minimal) metamodel named MeCSV Provide online constraints verifica(on for configura(on applicability Enrich exis(ng mgmt systems with a configura(on verifica(on capability Applica(on to CIM/WBEM environments Mapping rules from CIM modeling parerns to MeCSV constructs Run(me adapter to retrieve state parameters from a WBEM server Future work Improve the mapping between standard management informa(on models and MeCSV constructs (in par(cular for the verifica(on results) Ease the specifica(on of constraints (deriva(on from requirements?) SVM
20 Thank you! SVM
This is an author-deposited version published in : Eprints ID : 13241
Open Archive TOULOUSE Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. This is an author-deposited
More informationMemory Resource Virtualization Profile
1 2 3 4 Document Number: DSP1045 Date: 2009-07-14 Version: 1.0.0 5 6 7 8 Document Type: Specification Document Status: DMTF Standard Document Language: E 9 DSP1045 10 11 12 13 14 15 16 17 18 19 20 21 22
More informationStorage Resource Virtualization Profile
1 2 3 4 5 Document Number: DSP1047 Date: 2010-04-22 Version: 1.0.0 6 7 8 9 Document Type: Specification Document Status: DMTF Standard Document Language: E DSP1047 10 11 12 13 14 15 16 17 18 19 20 21 22
More informationCISC327 - So*ware Quality Assurance
CISC327 - So*ware Quality Assurance Lecture 8 Introduc
More informationEthernet Port Resource Virtualization Profile
1 2 3 4 5 6 Document Number: DSP1050 Date: 2010-02-04 Profile Version: 1.0.0b Document version: 0.7.3 7 8 9 10 11 12 13 14 Information for work in progress version: This document is subject to change at
More informationCommon Information Modeling for Advanced Virtual Ethernet Switches
Common Information Modeling for Advanced Virtual Switches John Parchem - Partner Architect, Microsoft Corporation Vice-Chair, SVPC Virtual Networking, DMTF Hemal V. Shah - Associate Technical Director,
More informationSystem Virtualization Profile
1 2 3 4 Document Number: Date: 2010-04-22 Version: 1.0.0 5 6 7 8 Document Type: Specification Document Status: DMTF Standard Document Language: E 9 10 Copyright Notice Copyright 2007, 2010 Distributed
More informationCLOUD SERVICES. Cloud Value Assessment.
CLOUD SERVICES Cloud Value Assessment www.cloudcomrade.com Comrade a companion who shares one's ac8vi8es or is a fellow member of an organiza8on 2 Today s Agenda! Why Companies Should Consider Moving Business
More informationPreliminary ACTL-SLOW Design in the ACS and OPC-UA context. G. Tos? (19/04/2016)
Preliminary ACTL-SLOW Design in the ACS and OPC-UA context G. Tos? (19/04/2016) Summary General Introduc?on to ACS Preliminary ACTL-SLOW proposed design Hardware device integra?on in ACS and ACTL- SLOW
More informationOracle VM Workshop Applica>on Driven Virtualiza>on
Oracle VM Workshop Applica>on Driven Virtualiza>on Simon COTER Principal Product Manager Oracle VM & VirtualBox simon.coter@oracle.com hnps://blogs.oracle.com/scoter November 25th, 2015 Copyright 2014
More informationModel Transforma.on. Krzysztof Czarnecki Genera.ve So:ware Development Lab University of Waterloo, Canada gsd.uwaterloo.ca
Model Transforma.on Krzysztof Czarnecki Genera.ve So:ware Development Lab University of Waterloo, Canada gsd.uwaterloo.ca Modeling Wizards Summer School, Oct. 1, 2010, Oslo, Norway What is model transforma.on?
More informationVirtual Networking Management White Paper
Version 1.0.0a Status: Informational Publication Date: February 18, 2011 DSP2025 wgv 0.8.3 Information for work in progress version: IMPORTANT: This specification is not a standard. It does not necessarily
More informationSystem Modeling Environment
System Modeling Environment Requirements, Architecture and Implementa
More informationPhD in Computer And Control Engineering XXVII cycle. Torino February 27th, 2015.
PhD in Computer And Control Engineering XXVII cycle Torino February 27th, 2015. Parallel and reconfigurable systems are more and more used in a wide number of applica7ons and environments, ranging from
More informationRAD, Rules, and Compatibility: What's Coming in Kuali Rice 2.0
software development simplified RAD, Rules, and Compatibility: What's Coming in Kuali Rice 2.0 Eric Westfall - Indiana University JASIG 2011 For those who don t know Kuali Rice consists of mul8ple sub-
More informationVirtualization. Introduction. Why we interested? 11/28/15. Virtualiza5on provide an abstract environment to run applica5ons.
Virtualization Yifu Rong Introduction Virtualiza5on provide an abstract environment to run applica5ons. Virtualiza5on technologies have a long trail in the history of computer science. Why we interested?
More informationWestern Michigan University
CS-6030 Cloud compu;ng Google App engine Sepideh Mohammadi Summer II 2017 Western Michigan University content Categories of cloud compu;ng Google cloud plaborm Google App Engine Storage technologies Datastore
More informationDesign Principles & Prac4ces
Design Principles & Prac4ces Robert France Robert B. France 1 Understanding complexity Accidental versus Essen4al complexity Essen%al complexity: Complexity that is inherent in the problem or the solu4on
More informationCS251 Programming Languages Spring 2016, Lyn Turbak Department of Computer Science Wellesley College
Functions in Racket CS251 Programming Languages Spring 2016, Lyn Turbak Department of Computer Science Wellesley College Racket Func+ons Functions: most important building block in Racket (and 251) Functions/procedures/methods/subroutines
More informationObject Oriented Design (OOD): The Concept
Object Oriented Design (OOD): The Concept Objec,ves To explain how a so8ware design may be represented as a set of interac;ng objects that manage their own state and opera;ons 1 Topics covered Object Oriented
More informationA Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection
A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection Patrícia Dockhorn Costa Izon Thomas Mielke Isaac Pereira João Paulo A. Almeida jpalmeida@ieee.org http://nemo.inf.ufes.br
More informationModel- Based Security Tes3ng with Test Pa9erns
Model- Based Security Tes3ng with Test Pa9erns Julien BOTELLA (Smartes5ng) Jürgen GROSSMANN (FOKUS) Bruno LEGEARD (Smartes3ng) Fabien PEUREUX (Smartes5ng) Mar5n SCHNEIDER (FOKUS) Fredrik SEEHUSEN (SINTEF)
More informationSecure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek
Secure Server Project Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek 1 Outline I. Mo9va9on, Objec9ves II. Threat Landscape III. Design IV. Status V. Roadmap 2 Mo9va9on In a nutshell: Secure
More informationConfigura)on Management Founda)ons. Leonardo Gresta Paulino Murta
Configura)on Management Founda)ons Leonardo Gresta Paulino Murta leomurta@ic.uff.br Configura)on Item Hardware or so@ware aggrega)on subject to configura)on management Examples: CM plan Requirement Engineering
More informationBackground. IBM sold expensive mainframes to large organiza<ons. Monitor sits between one or more OSes and HW
Virtual Machines Background IBM sold expensive mainframes to large organiza
More informationCrea?ng Cloud Apps with Oracle Applica?on Builder Cloud Service
Crea?ng Cloud Apps with Oracle Applica?on Builder Cloud Service Shay Shmeltzer Director of Product Management Oracle Development Tools and Frameworks @JDevShay hpp://blogs.oracle.com/shay This App you
More informationCOSC 310: So*ware Engineering. Dr. Bowen Hui University of Bri>sh Columbia Okanagan
COSC 310: So*ware Engineering Dr. Bowen Hui University of Bri>sh Columbia Okanagan 1 Admin A2 is up Don t forget to keep doing peer evalua>ons Deadline can be extended but shortens A3 >meframe Labs This
More informationAutomated System Analysis using Executable SysML Modeling Pa8erns
Automated System Analysis using Executable SysML Modeling Pa8erns Maged Elaasar* Modelware Solu
More informationON THE REUSE OF RTL ASSERTIONS IN SYSTEMC TLM VERIFICATION
ON THE REUSE OF RTL ASSERTIONS IN SYSTEMC TLM VERIFICATION Nicola Bombieri 1,2 Franco Fummi 1,2, Graziano Pravadelli 1,2, Valerio Garnieri 1, Francesco Stefanni 1, Tara Ghasempouri 2, Michele Lora 2, Giovanni
More informationScalability in a Real-Time Decision Platform
Scalability in a Real-Time Decision Platform Kenny Shi Manager Software Development ebay Inc. A Typical Fraudulent Lis3ng fraud detec3on architecture sync vs. async applica3on publish messaging bus request
More informationFunc+on applica+ons (calls, invoca+ons)
Func%ons in Racket Racket Functions: most important building block in Racket (and 25) Functions/procedures/methods/subroutines abstract over computations Like Java methods, Python functions have arguments
More informationAutomated Generation of Adaptive Test Plans for Self- Adaptive Systems. Erik Fredericks and Be'y H. C. Cheng May 19 th, 2015
Automated Generation of Adaptive Test Plans for Self- Adaptive Systems Erik Fredericks and Be'y H. C. Cheng May 19 th, 2015 Motivation Run- 9me tes9ng provides assurance for self- adap9ve systems (SAS)
More informationIMS Standards in Ac:on
IMS Standards in Ac:on Colin Smythe (IMS Chief Architect) csmythe@imsglobal.org 1 From the Specifica:on to Adop:on The aim is improve learning Crea:ng an interoperability specifica:on is only part of the
More informationThis is an author-deposited version published in : Eprints ID : 15085
Open Archive TOULOUSE Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. This is an author-deposited
More informationCon$nuous Audi$ng and Risk Management in Cloud Compu$ng
Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Marcus Spies Chair of Knowledge Management LMU University of Munich Scien$fic / Technical Director of EU Integrated Research Project MUSING Cloud
More informationKVM Forum 2007 Tucson, Arizona
Standard-based Systems Management Solution for KVM KVM Forum 2007 Tucson, Arizona Heidi Eckhart heidieck@linux.vnet.ibm.com Open Hypervisor Team IBM Linux Technology Center August 30 th 2007 Linux is a
More informationObjec0ves. Gain understanding of what IDA Pro is and what it can do. Expose students to the tool GUI
Intro to IDA Pro 31/15 Objec0ves Gain understanding of what IDA Pro is and what it can do Expose students to the tool GUI Discuss some of the important func
More informationBudapes( Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék. Code Genera*on
Budapes( Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék Code Genera*on Designing modeling languages Metamodel: a model of models o Abstract syntax o Concrete syntax
More informationREsources linkage for E-scIence - RENKEI -
REsources linkage for E-scIence - - hlp://www.e- sciren.org/ REsources linkage for E- science () is a research and development project for new middleware technologies to enable e- science communi?es. ""
More informationThe Open Group. DMTF Global Management Conference June 18, Allen Brown President & CEO
The Open Group DMTF Global Management Conference June 18, 2003 Allen Brown President & CEO a.brown@opengroup.org 44 Montgomery Street Suite 960 San Francisco, CA 94104 USA Tel +1 415 374 8280 ext. 235
More informationSMI-S Manage all the things!!! Chris Lionetti NetApp
SMI-S Manage all the things!!! Chris Lionetti NetApp Abstract SMI-S; Manage all the things!!! A chronicle of the development and evolution of the SMI-S protocol that manages multi-vendor environments.
More informationCS 465 Final Review. Fall 2017 Prof. Daniel Menasce
CS 465 Final Review Fall 2017 Prof. Daniel Menasce Ques@ons What are the types of hazards in a datapath and how each of them can be mi@gated? State and explain some of the methods used to deal with branch
More informationBoot Control Profile. Document Number: DSP1012. Date: Version: Document Type: Specification. Document Status: Final Standard
1 2 3 4 5 Document Number: DSP1012 Date: 2008-11-03 Version: 1.0.0 6 Boot Control Profile 7 8 9 Document Type: Specification Document Status: Final Standard Document Language: E 1 2 3 4 5 6 7 8 9 10 11
More informationDiscovery in the WBEM Architecture (Infrastructure Discovery)
Discovery in the WBEM Architecture (Infrastructure Discovery) 3:15 pm- 4:05 pm Thursday Winston Bumpus, Novell, Inc. Director of Standards, Karl Schopmeyer, Open Group / Application WG Chair The Problem
More informationGraphical Editors 2. GMF. Budapes( Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék
Graphical Editors 2. GMF Budapes( Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék GMF Graphical Modeling Framework Goal o Graphical edi:ng of DSLs o Model- based, with
More informationOverview. About the Common Information Model. Send documentation comments to CHAPTER
CHAPTER 1 The Cisco MDS 9000 Family of multilayer directors and fabric switches provide an industry standard application programming interface (API) using the Storage Management Initiative Specification
More informationCommon Criteria Crypto Working Group. Interna'onal Cryptographic Module Conference 2017 Fritz Bollmann (BSI) Mary Baish (NIAP)
Common Criteria Crypto Working Group Interna'onal Cryptographic Module Conference 2017 Fritz Bollmann (BSI) Mary Baish (NIAP) Crypto in Common Criteria Cryptography is ubiquitous in Common Criteria Protec'on
More informationDeveloping an IDE4L Grid
Developing an IDE4L Grid Presenter: Antonino Riccobono, Ph.D. RWTH Aachen University Project Coordinator: Prof. Sami Repo Tampere University of Technology 5 th November 2014 SLIDE 2 Contents Overview of
More informationEnforcing Network- Wide Policies in the Presence of Dynamic Middlebox Ac>ons using FlowTags
Enforcing Network- Wide Policies in the Presence of Dynamic Middlebox Ac>ons using FlowTags Seyed K. Fayazbakhsh *, Luis Chiang, Vyas Sekar *, Minlan Yu, Jeffrey Mogul * CMU, Deutsche Telekom, USC, Google
More informationThe balancing act: Research vs. Produc7on. Kobus Van der Merwe
The balancing act: Research vs. Produc7on Kobus Van der Merwe 1 The balancing act: and Research vs. Produc7on Kobus Van der Merwe 2 Context All started with 3 Context All started with NSF program manager
More informationA generic conceptual framework for selfmanaged
A generic conceptual framework for selfmanaged environments E. Lavinal, T. Desprats, and Y. Raynaud IRIT, UMR 5505 - Paul Sabatier University 8 route de Narbonne, F-3062 Toulouse cedex 9 {lavinal, desprats,
More informationClinical Metadata A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang
A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang 1 Agenda How is metadata currently managed within the industry? Five key problems with current approaches.
More informationFounda'ons of So,ware Engineering. Lecture 11 Intro to QA, Tes2ng Claire Le Goues
Founda'ons of So,ware Engineering Lecture 11 Intro to QA, Tes2ng Claire Le Goues 1 Learning goals Define so;ware analysis. Reason about QA ac2vi2es with respect to coverage and coverage/adequacy criteria,
More informationComputation Independent Model (CIM): Platform Independent Model (PIM): Platform Specific Model (PSM): Implementation Specific Model (ISM):
viii Preface The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information
More informationSQL Injec*on. By Robin Gonzalez
SQL Injec*on By Robin Gonzalez Some things that can go wrong Excessive and Unused Privileges Privilege Abuse Input Injec>on Malware Week Audit Trail Other things that can go wrong Storage Media Exposure
More informationOntology engineering. Valen.na Tamma. Based on slides by A. Gomez Perez, N. Noy, D. McGuinness, E. Kendal, A. Rector and O. Corcho
Ontology engineering Valen.na Tamma Based on slides by A. Gomez Perez, N. Noy, D. McGuinness, E. Kendal, A. Rector and O. Corcho Summary Background on ontology; Ontology and ontological commitment; Logic
More informationTightly Integrated: Mike Cormier Bill Thackrey. Achieving Fast Time to Value with Splunk. Managing Directors Splunk Architects Concanon LLC
Copyright 2014 Splunk Inc. Tightly Integrated: Achieving Fast Time to Value with Splunk Mike Cormier Bill Thackrey Managing Directors Splunk Cer@fied Architects Concanon LLC Disclaimer During the course
More informationBackground. IBM sold expensive mainframes to large organiza<ons. Monitor sits between one or more OSes and HW
Virtual Machines Background IBM sold expensive mainframes to large organiza
More informationStrategies for Selecting the Right Open Source Framework for Cross-Browser Testing
BW6 Test Automation Wednesday, June 6th, 2018, 1:30 PM Strategies for Selecting the Right Open Source Framework for Cross-Browser Testing Presented by: Eran Kinsbruner Perfecto Brought to you by: 350 Corporate
More informationCon$nuous Integra$on Development Environment. Kovács Gábor
Con$nuous Integra$on Development Environment Kovács Gábor kovacsg@tmit.bme.hu Before we start anything Select a language Set up conven$ons Select development tools Set up development environment Set up
More informationHardware- assisted Virtualization
Hardware- assisted Virtualization Pra$k Shah (pcshah) Rohan Pa$l (rspa$l) 15-612 Opera,ng System Prac,cum Carnegie Mellon University 1 Agenda Introduc)on to VT- x CPU virtualiza)on with VT- x VMX VMX Transi$ons
More informationLeveraging User Session Data to Support Web Applica8on Tes8ng
Leveraging User Session Data to Support Web Applica8on Tes8ng Authors: Sebas8an Elbaum, Gregg Rotheermal, Srikanth Karre, and Marc Fisher II Presented By: Rajiv Jain Outline Introduc8on Related Work Tes8ng
More informationOrigin- des*na*on Flow Measurement in High- Speed Networks
IEEE INFOCOM, 2012 Origin- des*na*on Flow Measurement in High- Speed Networks Tao Li Shigang Chen Yan Qiao Introduc*on (Defini*ons) Origin- des+na+on flow between two routers is the set of packets that
More informationhashfs Applying Hashing to Op2mize File Systems for Small File Reads
hashfs Applying Hashing to Op2mize File Systems for Small File Reads Paul Lensing, Dirk Meister, André Brinkmann Paderborn Center for Parallel Compu2ng University of Paderborn Mo2va2on and Problem Design
More informationReview of the DCMI Abstract Model
Review of the DCMI Abstract Model Thomas Baker, DCMI Joint Mee>ng of the DCMI Architecture Forum and W3C Library Linked Data Incubator Group 22 October 2010 DRAFT SLIDES 2010-10- 06 Early 2000s DC straddling
More informationCombining Real Time Emula0on of Digital Communica0ons between Distributed Embedded Control Nodes with Real Time Power System Simula0on
1 Combining Real Time Emula0on of Digital Communica0ons between Distributed Embedded Control Nodes with Real Time Power System Simula0on Ziyuan Cai and Ming Yu Electrical and Computer Eng., Florida State
More informationModifying an Exis.ng Commercial Product for Cryptographic Module Evalua.on
Modifying an Exis.ng Commercial Product for Cryptographic Module Evalua.on ICMC16 O?awa, Canada 18-20 May 2016 Presented by Alan Gornall Introduc.on I provide cer.fica.on support to my clients: compliance
More informationAlterna(ve Architectures
Alterna(ve Architectures COMS W4118 Prof. Kaustubh R. Joshi krj@cs.columbia.edu hep://www.cs.columbia.edu/~krj/os References: Opera(ng Systems Concepts (9e), Linux Kernel Development, previous W4118s Copyright
More informationRISC-V, Rocket, and RoCC Spring 2017 James Mar2n
RISC-V, Rocket, and RoCC Spring 2017 James Mar2n What s new in Lab 2: In lab 1, you built a SHA3 unit that operates in isola2on We would like Sha3Accel to act as an accelerator for a processor Lab 2 introduces
More informationPANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014
PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014 Goal of the Panel Engage the workshop par/cipants in an interac/ve discussion of the experimenta/on capabili/es and
More informationObserva(on Processing. Nancy Collins or
Observa(on Processing Nancy Collins nancy@ucar.edu or dart@ucar.edu Roadmap What s in an Observa(on Provided tools and capabili(es Observa(on sources Observa(on and representa(veness error Types, Kinds,
More informationMonitoring & Analy.cs Working Group Ini.a.ve PoC Setup & Guidelines
Monitoring & Analy.cs Working Group Ini.a.ve PoC Setup & Guidelines Copyright 2017 Open Networking User Group. All Rights Reserved Confiden@al Not For Distribu@on Outline ONUG PoC Right Stuff Innova@on
More informationCH3: C# Programming Basics BUILD YOUR OWN ASP.NET 4 WEB SITE USING C# & VB
CH3: C# Programming Basics BUILD YOUR OWN ASP.NET 4 WEB SITE USING C# & VB Outlines of today s lecture In this lecture we will explore the following C# programming fundamentals: Control Events Event Subrou=nes
More informationDMTF Common Information Model (CIM) Specification
DMTF CIM Readme Version 2.15.0 DMTF Common Information Model (CIM) Specification Readme Version 2.15.0 April 2007 This document describes the changes that have been incorporated into the CIM schema for
More informationProofs about Programs
Proofs about Programs Program Verification (Rosen, Sections 5.5) TOPICS Program Correctness Preconditions & Postconditions Program Verification Assignment Statements Conditional Statements Loops Composition
More informationIntegrated Access Control Policy Management Profile
1 2 3 4 Document Number: DSP1106 Date: 2011-09-16 Version: 1.0.0 5 6 Integrated Access Control Policy Management Profile 7 8 9 Document Type: Specification Document Status: DMTF Standard Document Language:
More informationHabanero-Java Library: a Java 8 Framework for Multicore Programming
Habanero-Java Library: a Java 8 Framework for Multicore Programming PPPJ 2014 September 25, 2014 Shams Imam, Vivek Sarkar shams@rice.edu, vsarkar@rice.edu Rice University https://wiki.rice.edu/confluence/display/parprog/hj+library
More informationHow to sleep *ght and keep your applica*ons running on IPv6 transi*on. The importance of IPv6 Applica*on Tes*ng
How to sleep *ght and keep your applica*ons running on IPv6 transi*on The importance of IPv6 Applica*on Tes*ng About this presenta*on It presents a generic methodology to test the IPv6 func*onality of
More informationWelcome and introduction to SU 2
Welcome and introduction to SU 2 SU 2 Release Version 2. Workshop Stanford University Tuesday, January 5 th, 23 Dr. F. Palacios and Prof. J. J. Alonso Department of Aeronautics & Astronautics Stanford
More informationA Demand Side Management Framework Driven by Ambient Services and Consumer Profiling
A Demand Side Management Framework Driven by Ambient Services and Consumer Profiling Konstan>nos Tsatsakis k.tsatsakis@hypertech.gr Anastasios Tsitsanis HYPERTECH S.A. Mission & Objec>ves Explore alterna1ve
More informationOrchestrated Network Services with LSO, SDN and NFV
Host Sponsor Co- Sponsor Orchestrated Network Services with LSO, SDN and NFV Darryl Stork Regional Director WebNMS 1 PresentaBon Agenda Overview of LSO, SDN, NFV, and the Third Network Using LSO, SDN and
More informationArchitectural Requirements Phase. See Sommerville Chapters 11, 12, 13, 14, 18.2
Architectural Requirements Phase See Sommerville Chapters 11, 12, 13, 14, 18.2 1 Architectural Requirements Phase So7ware requirements concerned construc>on of a logical model Architectural requirements
More informationOpenWorld 2015 Oracle Par22oning
OpenWorld 2015 Oracle Par22oning Did You Think It Couldn t Get Any Be6er? Safe Harbor Statement The following is intended to outline our general product direc2on. It is intended for informa2on purposes
More informationFor more information about how to cite these materials visit
Author(s): Jeremy York, 2010 License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution Noncommercial Share Alike 3.0 License: http://creativecommons.org/licenses/by-nc-sa/3.0/
More informationRaceMob: Crowdsourced Data Race Detec,on
RaceMob: Crowdsourced Data Race Detec,on Baris Kasikci, Cris,an Zamfir, and George Candea School of Computer & Communica3on Sciences Data Races to shared memory loca,on By mul3ple threads At least one
More informationIntroduc)on to Plug- in Development
Introduc)on to Plug- in Development Eclipse Based Development and Integra)on h:p://www.inf.mit.bme.hu/edu/courses/eafi Budapes( Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek
More informationMulG-Vendor Key Management with KMIP
MulG-Vendor Key Management with KMIP Tim Hudson CTO Cryptso2 tjh@cryptso2.com GS13A 19-May-2016 1:35pm Key Management 1000011010100100101100101010000010101000101001101001111010001100 Key Management Standards
More informationHigh-Level Synthesis Creating Custom Circuits from High-Level Code
High-Level Synthesis Creating Custom Circuits from High-Level Code Hao Zheng Comp Sci & Eng University of South Florida Exis%ng Design Flow Register-transfer (RT) synthesis - Specify RT structure (muxes,
More informationMastering Enterprise Metadata with Seman2c Modeling
Unlocking the Power of Seman4c Knowledge Mastering Enterprise Metadata with Seman2c Modeling 1 Enterprise Metadata: The descrip4on of the organiza4onal context processes, roles, policies, products and
More informationSEDA An architecture for Well Condi6oned, scalable Internet Services
SEDA An architecture for Well Condi6oned, scalable Internet Services Ma= Welsh, David Culler, and Eric Brewer University of California, Berkeley Symposium on Operating Systems Principles (SOSP), October
More informationDecision Support Systems
Decision Support Systems 2011/2012 Week 3. Lecture 5 Previous Class: Data Pre- Processing Data quality: accuracy, completeness, consistency, 4meliness, believability, interpretability Data cleaning: handling
More informationCollateral Damage. Impact of Frequent Policy Changes on Vendors and Customers
Collateral Damage Impact of Frequent Policy Changes on Vendors and Customers Joshua Brickman Director, Security Evalua:ons Oracle Global Product Security Glenn BruneFe Dis:nguished Security Architect Oracle
More informationJeff Gooding Southern California Edison. Innovation at Southern California Edison
Jeff Gooding Southern California Edison Innovation at Southern California Edison Understand Cultural Risk Aversion to Innova
More informationRegister Alloca.on Deconstructed. David Ryan Koes Seth Copen Goldstein
Register Alloca.on Deconstructed David Ryan Koes Seth Copen Goldstein 12th Interna+onal Workshop on So3ware and Compilers for Embedded Systems April 24, 12009 Register Alloca:on Problem unbounded number
More informationModel based Design. Embedded Systems Engineering Benedikt Huber WS 2010/ Model based Design
Model based Design Embedded Systems Engineering Benedikt Huber WS 2010/11 1 Overview Introduction System Theory Model Driven Architecture (MDA) MATLAB/SimuLink Demo Summary 2 History General Systems Theory
More informationDatabase Machine Administration v/s Database Administration: Similarities and Differences
Database Machine Administration v/s Database Administration: Similarities and Differences IOUG Exadata Virtual Conference Vivek Puri Manager Database Administration & Engineered Systems The Sherwin-Williams
More informationThe informa(on model at Banco de Portugal: innova(ve and flexible data solu(ons
The informa(on model at Banco de Portugal: innova(ve and flexible data solu(ons João Cadete de Matos Director, Sta1s1cs Department 15 May 2014 CEMLA Mee(ng on Financial Informa(on Needs for Sta(s(cs, Macropruden(al
More informationReusability of So/ware- Defined Networking Applica=ons: A Run=me, Mul=- Controller Approach
Reusability of So/ware- Defined Networking Applica=ons: A Run=me, Mul=- Controller Approach Roberto Doriguzzi Corin (CREATE- NET), Pedro A. Aranda Gu=érrez (Telefonica), Elisa Rojas (Telcaria), Holger
More informationApplica'on-level protocols, AAA, Management, Security
LP-WAN BOF Applica'on-level protocols, AAA, Management, Security Rafa Mar'n Lopez (rafa@um.es) Dan García Carrillo (dan.garcia@um.es) LP-WAN network access control Only authen'cated and authorized nodes
More informationM2 STL PPC. Introduc2on to SCADE. Philippe Esling, Carlos Agon. 1 M2 STL PPC UPMC
M2 STL PPC Introduc2on to SCADE Philippe Esling, Carlos Agon esling@ircam.fr 1 M2 STL PPC UPMC SCADE: Basic no2ons Goals and aims SCADE is aimed towards crea:ng cri2cal, reac2ve, embedded so=ware. 2 M2
More information