NL-ESB - A Negative Latency Enterprise Service Bus

0

Abstract:

One of the fallacies of distributed communication erroneously classify latency as 0. With extensive NR-NSR Non Reproducible - Not So Rigorous research, and service oriented implementation of RESTFul micro-services using TWS (Tachyon Web Service) hybrid clouds has enabled us to communicate with negative latencies. Our flagship products NL-Service Bus, NL-Enterprise Service Bus, NL - Message broker and NL - Messaging Hub rely on this ground breaking technology to communicate, and pass messages with negative latencies. This allows enterprises to offer increased performance, high availability, maximum throughput, and support communications faster than arbitrary values of c
.

This paper non-deterministically show how to effectively achieve negative latency, changing the very nature of causality as a results, since latency signifies time interval between the request and response. From a more general point of view, as a time delay between the cause and the effect of some physical change in the system being observed[1]. Our NR-NSR enterprise service bus allows for circumventing the necessary consequence of the limited velocity with which any physical interaction can propagate.

Share

Monads by David Crockford

The monadic curse is that once someone learns what monads are and how to use them, they lose the ability to explain it to other people.

Excellent lecture. Transcript and Monads for Humans

Share

Microservices by Martin Fowler @ Goto Conference

An interesting portrayal of Microservices by Martin Fowler.

 

The term "Microservice Architecture" has sprung up over the last few years to describe a particular way of designing software applications as suites of independently deployable services. While there is no precise definition of this architectural style, there are certain common characteristics around organization around business capability, automated deployment, intelligence in the endpoints, and decentralized control of languages and data.

Share

State of the IoT Security

In a recent podcast by Scott Hanselman and Erica Stanley, an Internet of Things (IoT) primer, the guest mentioned how security is being treated as an afterthought for most things IoT. This is unfortunately true in various areas of software development; but especially with the unprecedented growth of IoT, this lax in providing security standards will fast become a safety and security dilemma.

To borrow the variety, velocity and volume analogy of Big Data, IoT is also subject to a very large variety of devices, supporting different velocities (performance capacities) and volumes (large number of devices, meshes etc). Protection of data in these devices and providing privacy of is definitely the key challenges in the IoT. It is also bad for business since lax security measures will cause decreased adoption impacting the success of the IoT and hinder overall development.

Following are some of the relevant links and papers which provide overview, analysis and taxonomy of security and privacy challenges in IoT.

 

References and Further Reading

Share

Norse - IPViking Live - honeypots for visualization

Systems and methods for dynamic protection from electronic attacks - US Patent 8726379 B1

Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and reporting in real time the degree and character of such security threats.

Attacks

Share

Penetration Testing techniques in Web Applications - Infographic

Penetration Testing techniques in web applications by Dimitris Mandilaras, Nikolaos Tsalis is an succinct info-graphic review of different security frameworks / methodologies including OWASP, PTES, ISSAF, NIST, OSSTM and PTF.

A short poster can be downloaded from here.

 

Share

Functional Humor -I don't even see the loops anymore I just see map, foldl, filter

functional-humor

Share

Selection of 2014 F# / Functional Programming Resources

Share

Excellent list of Cyber Security Resources

Top 100+ Cyber Security Blogs & Infosec Resources - Excellent List by DDOS Protection

 

top-cyber-security-blogs

Share

Gradient Boosting Machine Learning by Prof. Hastie

Here is Prof. Hastie's recent talk from the H2O World conference. In this talk, professor Hastie takes us through Ensemble Learners like decision trees and random forests for classification problems.

 

Other excellent talks from the conference include the following.

  • Michael Marks - Values and Art of Scale in Business
  • Nachum Shacham of Paypal - R and ROI for Big Data
  • Hassan Namarvar, ShareThis - Conversion Estimation in Display Advertising
  • Ofer Mendelevitch, Hortonworks - Bayesian Networks with R and Hadoop,
  • Sandy Ryza, Cloudera - MLlib and Apache Spark
  • Josh Bloch, Lord of the APIs - A Brief, Opinionated History of the API
  • Macro and Micro Trends in Big Data, Hadoop and Open Source
  • Competitive Data Science Panel: Kaggle, KDD and data sports
  • Practical Data Science Panel

The complete playlist can be found here.

Share
Go to Top