One of the fallacies of distributed communication erroneously classify latency as 0. With extensive NR-NSR Non Reproducible - Not So Rigorous research, and service oriented implementation of RESTFul micro-services using TWS (Tachyon Web Service) hybrid clouds has enabled us to communicate with negative latencies. Our flagship products NL-Service Bus, NL-Enterprise Service Bus, NL - Message broker and NL - Messaging Hub rely on this ground breaking technology to communicate, and pass messages with negative latencies. This allows enterprises to offer increased performance, high availability, maximum throughput, and support communications faster than arbitrary values of c
This paper non-deterministically show how to effectively achieve negative latency, changing the very nature of causality as a results, since latency signifies time interval between the request and response. From a more general point of view, as a time delay between the cause and the effect of some physical change in the system being observed. Our NR-NSR enterprise service bus allows for circumventing the necessary consequence of the limited velocity with which any physical interaction can propagate.
An interesting portrayal of Microservices by Martin Fowler.
The term "Microservice Architecture" has sprung up over the last few years to describe a particular way of designing software applications as suites of independently deployable services. While there is no precise definition of this architectural style, there are certain common characteristics around organization around business capability, automated deployment, intelligence in the endpoints, and decentralized control of languages and data.
In a recent podcast by Scott Hanselman and Erica Stanley, an Internet of Things (IoT) primer, the guest mentioned how security is being treated as an afterthought for most things IoT. This is unfortunately true in various areas of software development; but especially with the unprecedented growth of IoT, this lax in providing security standards will fast become a safety and security dilemma.
To borrow the variety, velocity and volume analogy of Big Data, IoT is also subject to a very large variety of devices, supporting different velocities (performance capacities) and volumes (large number of devices, meshes etc). Protection of data in these devices and providing privacy of is definitely the key challenges in the IoT. It is also bad for business since lax security measures will cause decreased adoption impacting the success of the IoT and hinder overall development.
Following are some of the relevant links and papers which provide overview, analysis and taxonomy of security and privacy challenges in IoT.
References and Further Reading
- Erica's talk on The Internet of Things from the All Things Open Conference
- Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)
- Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges
- Internet of Things Demands Security by Design
- Internet of Things (IOT): Seven enterprise risks to consider
- SECURITY IN THE INTERNET OF THINGS Lessons from the Past for the Connected Future
- Cisco Security Products for the IoT
- IoT security: How to do it (mostly) right
- Developers Discuss IoT Security And Platforms Trends
- Understanding The Protocols Behind The Internet Of Things
- The Nest
- Intel Edison
- The Internet Of Things Is A Standards Thing
Systems and methods for dynamic protection from electronic attacks - US Patent 8726379 B1
Penetration Testing techniques in web applications by Dimitris Mandilaras, Nikolaos Tsalis is an succinct info-graphic review of different security frameworks / methodologies including OWASP, PTES, ISSAF, NIST, OSSTM and PTF.
A short poster can be downloaded from here.
- Functional Programming For All! Scaling a MOOC for Students and Professionals Alike
- Reactive Web Applications with Dynamic Dataflow in F# A Tayanovskyy, S Fowler, L Denuzière, A Granicz - ifl2014.github.io
- The F# Computation Expression Zoo Tomas Petricek, Don Syme
- Thinking in LINQ: Harnessing the Power of Functional Programming in .NET ... By Sudipta Mukherjee
- Clash of the Lambdas by Aggelos Biboudis, Nick Palladinos, Yannis Smaragdakis
- Concurrency in Intrusion Detection Systems: A Study in F# by Deines, Jessica
- Functional Thinking: Paradigm Over Syntax By Neal Ford
- Experience in using a typed functional language for the development of a security application Damien Doligez (Inria), Christèle Faure (SafeRiver), Thérèse Hardin (UPMC), Manuel Maarek (SafeRiver)
Here is Prof. Hastie's recent talk from the H2O World conference. In this talk, professor Hastie takes us through Ensemble Learners like decision trees and random forests for classification problems.
Other excellent talks from the conference include the following.
- Michael Marks - Values and Art of Scale in Business
- Nachum Shacham of Paypal - R and ROI for Big Data
- Hassan Namarvar, ShareThis - Conversion Estimation in Display Advertising
- Ofer Mendelevitch, Hortonworks - Bayesian Networks with R and Hadoop,
- Sandy Ryza, Cloudera - MLlib and Apache Spark
- Josh Bloch, Lord of the APIs - A Brief, Opinionated History of the API
- Macro and Micro Trends in Big Data, Hadoop and Open Source
- Competitive Data Science Panel: Kaggle, KDD and data sports
- Practical Data Science Panel
The complete playlist can be found here.