SlideShare ist ein Scribd-Unternehmen logo
1 von 55
Why “big, flat and dumb” isn’t enough
James Urquhart
CNET | The Wisdom of Clouds
Market Strategist, Cloud Computing, Cisco Systems, Inc.
James Urquhart
@jamesurquhart
CNET | The Wisdom of Clouds
In 20 years of
distributed
systems
practice, what
have I
learned?
We need to simplify
operations from the
point of view of the
application.
Application
a. A type of job or problem
that lends itself to
processing or solution by
computer: Inventory control
is a common business
application.
b. A program used for a
particular use (as opposed to
a system)
Cloud is an
application centric
operations model.
Why?
Prior to cloud, we
were server centric…
Pre-
Cloud
VM VM VM
OS OS OS
Pre-
Cloud
VM VM VM
OS OS OS
App App App App App App App App App
Pre-
Cloud
With the adoption of
cloud, we are now
application centric…
Cloud
Application
Config Code Data Policy
Cloud
Application
Config Code Data Policy
Service(s)
Other Services
Cloud
Application
Config Code Data Policy
Service(s)
Infrastructure
Other Services
Any cloud service or
enabling technology
must look at solutions
from an application
perspective.
So, what is
the network’s
role in cloud
computing?
Application
developers
want one thing
from the
network…
…invisibility.
The temptation is…
Big
Flat
Dumb
Put a little nicer…
Unified
Simplified
Pushed
to the
Edge
One topology
to rule them
all…
…and in the
darkness bind
them.
The problem is that the
actual requirements for
cloud infrastructure
don’t stop at the
application.
Take security…
Each solution will almost
certainly be only part of
the system(s) that is/are
being secured.
Security will
be distributed
throughout
the “cloud
stack”
Security will
be distributed
throughout
the network
stack
Security will be
distributed
across
geographical
and topological
boundaries
Security must
become
multi-tenant
Security must
scale.
Security must
scale.
* Chris Hoff (aka @beaker) will tell
you that this is impossible today.
Security must
meet a wide
variety of
application
needs.
Same goes for
Application
Management
Same goes for
Performance
Management
Same goes for
QoS
Same goes for
Load
Distribution
Same goes for
Etc.
Same goes for
Etc., Etc.
Same goes for
Etc., Etc., Etc.
So how will the
network adapt?
Five ways:
1. Data center
network
architectures
will simplify.
2. The network
will adapt to
new dominant
payloads and
traffic
patterns.
3. Core networks will become agile
and dynamic.
Enterprise
Network
Cloud Service
Provider
Network Service
Provider
Cloud Network Boundary
Cloud OS
Cloud OS
App
OS
App
OS
App
OS
App
OS
App
OS
App
OS
App
OS
App
OS
App
OS
App
OS
App
OS
App
OS
Network Transport Virtualization (VPN)
Network Services (Security, Performance, Monitoring)
Application
Security Services
Application
Security Services
Virtual Data
Center
Virtual Data
Center
4. The network
will introduce
new
abstractions to
simplify
configuration
and operation.
Private
Cloud
Public
Cloud
Firewall
Load
Balancer
Management
Network Container
5. The network and its capabilities
will become services to be
consumed by cloud services.
Routers, switches, services (physical and virtual), etc.
Network service catalog(s) and fulfillment
API(s)
IaaS PaaS SaaS
Thanks!
Why “big, flat and dumb” isn’t enough
James Urquhart
@jamesurquhart
jurquhar@cisco.com

Weitere ähnliche Inhalte

Was ist angesagt?

AWS Summit Sydney 2014 | Network-as-a-Service - Session Sponsored by Megaport
AWS Summit Sydney 2014 | Network-as-a-Service - Session Sponsored by MegaportAWS Summit Sydney 2014 | Network-as-a-Service - Session Sponsored by Megaport
AWS Summit Sydney 2014 | Network-as-a-Service - Session Sponsored by MegaportAmazon Web Services
 
linkerd: The Cloud Native Service Mesh
linkerd: The Cloud Native Service Meshlinkerd: The Cloud Native Service Mesh
linkerd: The Cloud Native Service MeshDario Simonetti
 
Elastic Connectivity - Session Sponsored by Megaport
Elastic Connectivity - Session Sponsored by Megaport Elastic Connectivity - Session Sponsored by Megaport
Elastic Connectivity - Session Sponsored by Megaport Amazon Web Services
 
Elastic Connectivity - Session Sponsored by Megaport
Elastic Connectivity - Session Sponsored by MegaportElastic Connectivity - Session Sponsored by Megaport
Elastic Connectivity - Session Sponsored by MegaportAmazon Web Services
 
OSS in the era of SDN and NFV: Evolution vs Revolution - What we can learn f...
OSS in the era of SDN and NFV:  Evolution vs Revolution - What we can learn f...OSS in the era of SDN and NFV:  Evolution vs Revolution - What we can learn f...
OSS in the era of SDN and NFV: Evolution vs Revolution - What we can learn f...Colt Technology Services
 
Kubernetes 101
Kubernetes 101Kubernetes 101
Kubernetes 101Huy Vo
 
Five myths about Network Function Virtualization (NFV)
Five myths about Network Function Virtualization (NFV) Five myths about Network Function Virtualization (NFV)
Five myths about Network Function Virtualization (NFV) srichakra komatineni
 
SDN-Based Enterprise Connectivity Service
SDN-Based Enterprise Connectivity ServiceSDN-Based Enterprise Connectivity Service
SDN-Based Enterprise Connectivity ServiceOpen Networking Summit
 
Microservices with Spring Cloud
Microservices with Spring CloudMicroservices with Spring Cloud
Microservices with Spring CloudWilder Rodrigues
 
NATS: A Central Nervous System for IoT Messaging - Larry McQueary
NATS: A Central Nervous System for IoT Messaging - Larry McQuearyNATS: A Central Nervous System for IoT Messaging - Larry McQueary
NATS: A Central Nervous System for IoT Messaging - Larry McQuearyApcera
 
API World: The service-mesh landscape
API World: The service-mesh landscapeAPI World: The service-mesh landscape
API World: The service-mesh landscapeChristian Posta
 
Kubernetes Ingress to Service Mesh (and beyond!)
Kubernetes Ingress to Service Mesh (and beyond!)Kubernetes Ingress to Service Mesh (and beyond!)
Kubernetes Ingress to Service Mesh (and beyond!)Christian Posta
 
Integration Patterns and Anti-Patterns for Microservices Architectures
Integration Patterns and Anti-Patterns for Microservices ArchitecturesIntegration Patterns and Anti-Patterns for Microservices Architectures
Integration Patterns and Anti-Patterns for Microservices ArchitecturesApcera
 
Modernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Modernizing Application Deployments with HashiCorp Consul on Microsoft AzureModernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Modernizing Application Deployments with HashiCorp Consul on Microsoft AzureMitchell Pronschinske
 
Implementing rina in 5 g networks ws
Implementing rina in 5 g networks wsImplementing rina in 5 g networks ws
Implementing rina in 5 g networks wsEduard Grasa
 
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...Prasadu Peddi
 
Why NFV and Digital Transformation Projects Fail!
Why NFV and Digital Transformation Projects Fail! Why NFV and Digital Transformation Projects Fail!
Why NFV and Digital Transformation Projects Fail! Nati Shalom
 

Was ist angesagt? (20)

Istio a service mesh
Istio   a service meshIstio   a service mesh
Istio a service mesh
 
AWS Summit Sydney 2014 | Network-as-a-Service - Session Sponsored by Megaport
AWS Summit Sydney 2014 | Network-as-a-Service - Session Sponsored by MegaportAWS Summit Sydney 2014 | Network-as-a-Service - Session Sponsored by Megaport
AWS Summit Sydney 2014 | Network-as-a-Service - Session Sponsored by Megaport
 
linkerd: The Cloud Native Service Mesh
linkerd: The Cloud Native Service Meshlinkerd: The Cloud Native Service Mesh
linkerd: The Cloud Native Service Mesh
 
Elastic Connectivity - Session Sponsored by Megaport
Elastic Connectivity - Session Sponsored by Megaport Elastic Connectivity - Session Sponsored by Megaport
Elastic Connectivity - Session Sponsored by Megaport
 
Elastic Connectivity - Session Sponsored by Megaport
Elastic Connectivity - Session Sponsored by MegaportElastic Connectivity - Session Sponsored by Megaport
Elastic Connectivity - Session Sponsored by Megaport
 
OSS in the era of SDN and NFV: Evolution vs Revolution - What we can learn f...
OSS in the era of SDN and NFV:  Evolution vs Revolution - What we can learn f...OSS in the era of SDN and NFV:  Evolution vs Revolution - What we can learn f...
OSS in the era of SDN and NFV: Evolution vs Revolution - What we can learn f...
 
Kubernetes 101
Kubernetes 101Kubernetes 101
Kubernetes 101
 
State of Packet Optical Integration
State of Packet Optical IntegrationState of Packet Optical Integration
State of Packet Optical Integration
 
Five myths about Network Function Virtualization (NFV)
Five myths about Network Function Virtualization (NFV) Five myths about Network Function Virtualization (NFV)
Five myths about Network Function Virtualization (NFV)
 
SDN-Based Enterprise Connectivity Service
SDN-Based Enterprise Connectivity ServiceSDN-Based Enterprise Connectivity Service
SDN-Based Enterprise Connectivity Service
 
Network Automation at Colt
Network Automation at ColtNetwork Automation at Colt
Network Automation at Colt
 
Microservices with Spring Cloud
Microservices with Spring CloudMicroservices with Spring Cloud
Microservices with Spring Cloud
 
NATS: A Central Nervous System for IoT Messaging - Larry McQueary
NATS: A Central Nervous System for IoT Messaging - Larry McQuearyNATS: A Central Nervous System for IoT Messaging - Larry McQueary
NATS: A Central Nervous System for IoT Messaging - Larry McQueary
 
API World: The service-mesh landscape
API World: The service-mesh landscapeAPI World: The service-mesh landscape
API World: The service-mesh landscape
 
Kubernetes Ingress to Service Mesh (and beyond!)
Kubernetes Ingress to Service Mesh (and beyond!)Kubernetes Ingress to Service Mesh (and beyond!)
Kubernetes Ingress to Service Mesh (and beyond!)
 
Integration Patterns and Anti-Patterns for Microservices Architectures
Integration Patterns and Anti-Patterns for Microservices ArchitecturesIntegration Patterns and Anti-Patterns for Microservices Architectures
Integration Patterns and Anti-Patterns for Microservices Architectures
 
Modernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Modernizing Application Deployments with HashiCorp Consul on Microsoft AzureModernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Modernizing Application Deployments with HashiCorp Consul on Microsoft Azure
 
Implementing rina in 5 g networks ws
Implementing rina in 5 g networks wsImplementing rina in 5 g networks ws
Implementing rina in 5 g networks ws
 
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
 
Why NFV and Digital Transformation Projects Fail!
Why NFV and Digital Transformation Projects Fail! Why NFV and Digital Transformation Projects Fail!
Why NFV and Digital Transformation Projects Fail!
 

Andere mochten auch

Powerpoint fiesta jesus elices 6 horas @ sala becker (29 09-2012)
Powerpoint fiesta jesus elices 6 horas @ sala becker (29 09-2012)Powerpoint fiesta jesus elices 6 horas @ sala becker (29 09-2012)
Powerpoint fiesta jesus elices 6 horas @ sala becker (29 09-2012)RAZORDJ
 
Unit 11d Property disadvantages
Unit 11d Property disadvantagesUnit 11d Property disadvantages
Unit 11d Property disadvantagesAndrew Hingston
 
technorati
technoratitechnorati
technoratiFELIX75
 
Способы создания качественного программного продукта
Способы создания качественного программного продуктаСпособы создания качественного программного продукта
Способы создания качественного программного продуктаIngria. Technopark St. Petersburg
 
06.Programming Media on Windows Phone
06.Programming Media on Windows Phone06.Programming Media on Windows Phone
06.Programming Media on Windows PhoneNguyen Tuan
 
Abya Yala, L'Amèrica Marginada
Abya Yala, L'Amèrica MarginadaAbya Yala, L'Amèrica Marginada
Abya Yala, L'Amèrica MarginadaJoan Inglada
 
Malaysia Assembly powerpoint
Malaysia Assembly powerpointMalaysia Assembly powerpoint
Malaysia Assembly powerpointjoannalindon
 
Software for Learning - ULearn09
Software for Learning - ULearn09Software for Learning - ULearn09
Software for Learning - ULearn09P H
 
How to Get a Job in PR: Understand the Power of Connectivity
How to Get a Job in PR: Understand the Power of ConnectivityHow to Get a Job in PR: Understand the Power of Connectivity
How to Get a Job in PR: Understand the Power of ConnectivityShelly Kramer
 
Essay Writing Business 2010
Essay Writing Business 2010Essay Writing Business 2010
Essay Writing Business 2010Orna Farrell
 
Photos In Every Day Of Lif3
Photos In Every Day Of Lif3Photos In Every Day Of Lif3
Photos In Every Day Of Lif3byanca16
 
Mongara presentation
Mongara presentationMongara presentation
Mongara presentationMongara AB
 

Andere mochten auch (20)

Powerpoint fiesta jesus elices 6 horas @ sala becker (29 09-2012)
Powerpoint fiesta jesus elices 6 horas @ sala becker (29 09-2012)Powerpoint fiesta jesus elices 6 horas @ sala becker (29 09-2012)
Powerpoint fiesta jesus elices 6 horas @ sala becker (29 09-2012)
 
Unit 11d Property disadvantages
Unit 11d Property disadvantagesUnit 11d Property disadvantages
Unit 11d Property disadvantages
 
technorati
technoratitechnorati
technorati
 
edu
eduedu
edu
 
Alex Grey
Alex GreyAlex Grey
Alex Grey
 
WTR Team
WTR TeamWTR Team
WTR Team
 
Tinjauan organisasi
Tinjauan organisasiTinjauan organisasi
Tinjauan organisasi
 
Способы создания качественного программного продукта
Способы создания качественного программного продуктаСпособы создания качественного программного продукта
Способы создания качественного программного продукта
 
06.Programming Media on Windows Phone
06.Programming Media on Windows Phone06.Programming Media on Windows Phone
06.Programming Media on Windows Phone
 
De Todo C Orazon
De  Todo  C OrazonDe  Todo  C Orazon
De Todo C Orazon
 
Abya Yala, L'Amèrica Marginada
Abya Yala, L'Amèrica MarginadaAbya Yala, L'Amèrica Marginada
Abya Yala, L'Amèrica Marginada
 
Malaysia Assembly powerpoint
Malaysia Assembly powerpointMalaysia Assembly powerpoint
Malaysia Assembly powerpoint
 
manejo de formas
manejo de formasmanejo de formas
manejo de formas
 
Software for Learning - ULearn09
Software for Learning - ULearn09Software for Learning - ULearn09
Software for Learning - ULearn09
 
How to Get a Job in PR: Understand the Power of Connectivity
How to Get a Job in PR: Understand the Power of ConnectivityHow to Get a Job in PR: Understand the Power of Connectivity
How to Get a Job in PR: Understand the Power of Connectivity
 
Essay Writing Business 2010
Essay Writing Business 2010Essay Writing Business 2010
Essay Writing Business 2010
 
Photos In Every Day Of Lif3
Photos In Every Day Of Lif3Photos In Every Day Of Lif3
Photos In Every Day Of Lif3
 
Sanctuary
SanctuarySanctuary
Sanctuary
 
Mongara presentation
Mongara presentationMongara presentation
Mongara presentation
 
iakhomasuridze
iakhomasuridzeiakhomasuridze
iakhomasuridze
 

Ähnlich wie Cloud and the Future of Networked Systems

Glue con2011 future_of_net_systems
Glue con2011 future_of_net_systemsGlue con2011 future_of_net_systems
Glue con2011 future_of_net_systemsJames Urquhart
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptxcloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptxPriyadharshiniMuruge10
 
Workshop cloud computing basics (1)
Workshop cloud computing basics (1)Workshop cloud computing basics (1)
Workshop cloud computing basics (1)Infraright
 
Cloud computing Disambiguation using Kite Model
Cloud computing Disambiguation using Kite ModelCloud computing Disambiguation using Kite Model
Cloud computing Disambiguation using Kite ModelTzar Umang
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
Cloud computing presentation
Cloud computing  presentationCloud computing  presentation
Cloud computing presentationAkshra Gurav
 
Cloud computing presentation
Cloud computing  presentationCloud computing  presentation
Cloud computing presentationAkshra Gurav
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingArwa
 
7 habits of highly effective private cloud architects
7 habits of highly effective private cloud architects7 habits of highly effective private cloud architects
7 habits of highly effective private cloud architectsHARMAN Services
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudNETSCOUT
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingMauricio Godoy
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharmaAnil Sharma
 

Ähnlich wie Cloud and the Future of Networked Systems (20)

Glue con2011 future_of_net_systems
Glue con2011 future_of_net_systemsGlue con2011 future_of_net_systems
Glue con2011 future_of_net_systems
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptxcloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
 
Workshop cloud computing basics (1)
Workshop cloud computing basics (1)Workshop cloud computing basics (1)
Workshop cloud computing basics (1)
 
Cloud computing Disambiguation using Kite Model
Cloud computing Disambiguation using Kite ModelCloud computing Disambiguation using Kite Model
Cloud computing Disambiguation using Kite Model
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
Cloud computing presentation
Cloud computing  presentationCloud computing  presentation
Cloud computing presentation
 
Cloud computing presentation
Cloud computing  presentationCloud computing  presentation
Cloud computing presentation
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
7 habits of highly effective private cloud architects
7 habits of highly effective private cloud architects7 habits of highly effective private cloud architects
7 habits of highly effective private cloud architects
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud Computing
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
 

Mehr von James Urquhart

Flow Architectures: An Introduction
Flow Architectures: An IntroductionFlow Architectures: An Introduction
Flow Architectures: An IntroductionJames Urquhart
 
Deliver agile flow presentation (1)
Deliver agile   flow presentation (1)Deliver agile   flow presentation (1)
Deliver agile flow presentation (1)James Urquhart
 
Jurquhart o reilly_radar_preso_3
Jurquhart o reilly_radar_preso_3Jurquhart o reilly_radar_preso_3
Jurquhart o reilly_radar_preso_3James Urquhart
 
The Outcome Conversation: Aligning DevOps and Business Through Understanding ...
The Outcome Conversation: Aligning DevOps and Business Through Understanding ...The Outcome Conversation: Aligning DevOps and Business Through Understanding ...
The Outcome Conversation: Aligning DevOps and Business Through Understanding ...James Urquhart
 
Defrag2014 anomalies final
Defrag2014 anomalies finalDefrag2014 anomalies final
Defrag2014 anomalies finalJames Urquhart
 
Dev opsdayssv2014 devopsasrelationshipmanagement
Dev opsdayssv2014 devopsasrelationshipmanagementDev opsdayssv2014 devopsasrelationshipmanagement
Dev opsdayssv2014 devopsasrelationshipmanagementJames Urquhart
 
Cloud Computing for Business - The Road to IT-as-a-Service
Cloud Computing for Business - The Road to IT-as-a-ServiceCloud Computing for Business - The Road to IT-as-a-Service
Cloud Computing for Business - The Road to IT-as-a-ServiceJames Urquhart
 
Don't let this happen to you! Cloud, complexity and drift
Don't let this happen to you! Cloud, complexity and driftDon't let this happen to you! Cloud, complexity and drift
Don't let this happen to you! Cloud, complexity and driftJames Urquhart
 
The New DevOps Designers: Cloud and The Big Rethink
The New DevOps Designers: Cloud and The Big RethinkThe New DevOps Designers: Cloud and The Big Rethink
The New DevOps Designers: Cloud and The Big RethinkJames Urquhart
 

Mehr von James Urquhart (10)

Flow Architectures: An Introduction
Flow Architectures: An IntroductionFlow Architectures: An Introduction
Flow Architectures: An Introduction
 
Deliver agile flow presentation (1)
Deliver agile   flow presentation (1)Deliver agile   flow presentation (1)
Deliver agile flow presentation (1)
 
Jurquhart o reilly_radar_preso_3
Jurquhart o reilly_radar_preso_3Jurquhart o reilly_radar_preso_3
Jurquhart o reilly_radar_preso_3
 
The Outcome Conversation: Aligning DevOps and Business Through Understanding ...
The Outcome Conversation: Aligning DevOps and Business Through Understanding ...The Outcome Conversation: Aligning DevOps and Business Through Understanding ...
The Outcome Conversation: Aligning DevOps and Business Through Understanding ...
 
Defrag2014 anomalies final
Defrag2014 anomalies finalDefrag2014 anomalies final
Defrag2014 anomalies final
 
Dev opsdayssv2014 devopsasrelationshipmanagement
Dev opsdayssv2014 devopsasrelationshipmanagementDev opsdayssv2014 devopsasrelationshipmanagement
Dev opsdayssv2014 devopsasrelationshipmanagement
 
Mining for gold 2.0
Mining for gold 2.0Mining for gold 2.0
Mining for gold 2.0
 
Cloud Computing for Business - The Road to IT-as-a-Service
Cloud Computing for Business - The Road to IT-as-a-ServiceCloud Computing for Business - The Road to IT-as-a-Service
Cloud Computing for Business - The Road to IT-as-a-Service
 
Don't let this happen to you! Cloud, complexity and drift
Don't let this happen to you! Cloud, complexity and driftDon't let this happen to you! Cloud, complexity and drift
Don't let this happen to you! Cloud, complexity and drift
 
The New DevOps Designers: Cloud and The Big Rethink
The New DevOps Designers: Cloud and The Big RethinkThe New DevOps Designers: Cloud and The Big Rethink
The New DevOps Designers: Cloud and The Big Rethink
 

Kürzlich hochgeladen

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Kürzlich hochgeladen (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Cloud and the Future of Networked Systems