AI within O'Reilly Media
January 3, 2020
Paco Nathan explains how O'Reilly employs AI, from the obvious (chatbots, case studies about other firms) to the less so (using AI to show the structure of content in detail, enhance search and recommendations, and guide editors for gap analysis, assessment, pathing, etc.). Approaches include vector embedding search, summarization, TDA for content gap analysis, and speech-to-text to index video.
Kubernetes on EGO -- Bringing Enterprise Resource Management and Scheduling to Kubernetes
January 2, 2020
IBM developed EGO as a powerful resource management technology, which helps to abstract all hardware into a resource pool for a variety of analytic and high performance workloads. It is similar to ope …
Human-in-the-loop: a design pattern for managing teams that leverage ML
December 31, 2019
Human-in-the-loop is an approach which has been used for simulation, training, UX mockups, etc. A more recent design pattern is emerging for human-in-the-loop (HITL) as a way to manage teams working with machine learning (ML). A variant of semi-supervised learning called active learning allows for mostly automated processes based on ML, where exceptions get referred to human experts.
R you ready for the cloud? Using R for operationalizing an enterprise-grade data science solution on Azure
December 30, 2019
R has long been criticized for its limitations on scalable data analytics. What's needed is an R-centric paradigm that enables data scientists to elastically harness cloud resources of manifold computing capability for large-scale data analytics. Le Zhang and Graham Williams demonstrate how to operationalize an E2E enterprise-grade pipeline for big data analyticsall within R.
Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
December 29, 2019
Malicious BGP route hi-jacks and and accidental mis-originations continue to threaten the security and robustness of the global Internet. Over the last several yea …
December 27, 2019
DevOps and test-driven infrastructure radically shifted the way we develop and deploy applications and infrastructure. Compliance-driven infrastructure builds on the same foundation, incorporating compliance and security into the mix. Christoph Hartmann and Dominik Richter explore InSpec and explain how it enables you to easily incorporate compliance and security in your development workflow.
Enabling a true omnichannel ecosystem using adaptable backend platforms
December 26, 2019
Every retailer is grappling with the challenge of creating a seamless omnichannel presence. While most understand that omnichannel is a necessity, its extremely difficult to build the proper architecture to gather, exchange, and draw insights from raw data. Kyu Cho and Sajid Mohamedy share the five elements that retailers must put in place to ensure a seamless ecommerce presence.
Platform as product: Serving the customer who serves the customer
December 26, 2019
Whether an organization is an established leader, or breaking new ground, the mantra is always that we need to move faster. And of course, we need to scale. Architectural and development practices abound that should get us there: agile engineering, microservices, DevOps and so on. But it is not just the our software that needs to scale, but also our approach to delivering it.
POSIX for the data center
December 26, 2019
The container orchestration wars are upon us. A dozen container orchestrators vie to be the kernel of the modern data center. But can the warring parties come together on a standard interface for modern cluster operations? Karl Isenberg explores what these parties have in common and outlines what a common interface might look like for operating these distributed operating systems.
Continuous auditing for effective compliance with Rudder
December 25, 2019
Rudder is an open source IT compliance automation tool that focuses on continuously checking configurations to provide a real-time high-level compliance status or break down noncompliance issues to a deep technical level. Jonathan Clarke offers an overview of Rudder and demonstrates how to use it to drill down to any issues that need remediating.
A data-first approach to drive real-time applications
December 16, 2019
Leading companies that are getting the most out of their data are not focusing on queries and data lakes; they are actively integrating analytics into their operations. Jack Norris reviews three customer case studies in ad/media, financial services, and healthcare to show how a focus on real-time data streams can transform the development, deployment, and future agility of applications.
Hadoop and Spark at ING: An overview of the architecture, security, and business cases at a large international bank
December 12, 2019
Bas Geerdink offers an overview of the evolution that the Hadoop ecosystem has taken at ING. Since 2013, ING has invested heavily in a central data lake and data management practice. Bas shares historical lessons and best practices for enterprises that are incorporating Hadoop into their infrastructure landscape.
Lessons learned running Hadoop and Spark in Docker
December 11, 2019
Many initiatives for running applications inside containers have been scoped to run on a single host. Using Docker containers for large-scale environments poses new challenges, especially for big data applications like Hadoop. Thomas Phelan shares lessons learned and some tips and tricks on how to Dockerize your big data applications in a reliable, scalable, and high-performance environment.
Ansible for SRE teams
December 3, 2019
Ansible is a "batteries included" automation, configuration management, and orchestration tool that's fast to learn and flexible enough for any architecture. Join James Meickle to get started with Ansible, with an eye toward sustainable development in cloud environments.
Attack trees: Security modeling for Agile teams
December 3, 2019
Traditional security approaches to threat and risk management are highly optimized to work within a traditional software development lifecycle. Michael Brunton-Spall shares a new approach to reviewing systems along with real-life examples to help you prioritize where to focus security efforts and what sorts of security threats you should worry about.