CMPE172 Final

Ace your homework & exams now with Quizwiz!

Ethernet

Automation equipment vendors are implementing _________-based protocols as a replacement for traditional fieldbus networks.

Node

YARN's ______ Manager runs on the slave nodes. It is responsible for monitoring resource utilization and updating Resource Manager.

Big Bang

"____ ______" Deployment: Update whole or large parts of an application in one fell swoop, Largely or completely replacing an existing software version with a new one

world state

Database called the ______ ______ database is used to record the latest key-value pairs associated with blockchain participants and assets. A copy of this database resides on each peer along with the blockchain files

Majority

Early ________: open to new ideas but generally wait to see before investing. Late ________: conservative and risk-averse need convincing for investing in new

persistence

In Big Data, Data is ingested to ___________ tier - HDFS (Hadoop Distributed File System), AWS S3, SQL and NoSQL databases. -Flume for log aggregation, Sqoop for interoperating with databases used.

Decentralized

_______________ means that there is no single point where the decision is made

performance

10 elements important to integrating high- _______________ teams: ◦ Participative leadership ◦ Effective decision making ◦ Open and clear communication ◦ Value diversity ◦ Mutual trust ◦ Managing conflict ◦ Clear goals ◦ Defined roles and responsibilities ◦ Coordinated relationships ◦ Positive atmosphere

Blockchain

A BaaS(___________ As A Service) provides much of this hardware, software, and expertise behind the scenes, and puts the focus on the logic and workflow of the business network. Two free blockchain platforms currently among the most commonly used as a base for BaaS are Ethereum and Hyperledger Fabric

genesis

A _________ block is the first block in the blockchain that is hardcoded at the time the blockchain was first started

EMR

Amazon ____(Elastic Map Reduce) is a managed service that makes it fast, easy, and cost-effective to run Apache Hadoop and Spark to process vast amounts of data

Repository

Artifacts ____________ manager is a dedicated server for hosting multiple repositories of binary components (executables) of successful builds. Eg - Docker hub, Npm, Apache Archiva

data

Big ____ systems come in two general forms: -NoSQL databases that integrate these components into a database system, -Environments like Hadoop

stream

Big data systems are evolving to be more ________ oriented. Data is processed as it arrives, Leading to so-called fast data systems. Ingest and process continuous, potentially infinite data streams. Systems still support batch-mode and interactive processing, because traditional uses, such as data warehousing, haven't gone away

batch

Big data systems have been _______ oriented, where data is captured in distributed filesystems or databases and then processed in batches or studied interactively, as in data warehousing scenarios. Exclusive reliance on batch-mode processing, where data arrives without immediate extraction of valuable information, is a competitive disadvantage

filesystem

Blockchain transactions are stored in each peer's _____________

Deployment

Blue-Green, Red-Black or A/B ____________: Fail-safe process where two identical production environments work in parallel. One is the currently-running production environment receiving all user traffic (Blue). The other is idle (Green). Both use the same database back-end and app configuration: Blue-green deployments rely on traffic routing. This can be done by updating DNS CNAMES for hosts

BTM

Business Technology Management(_____): Understanding Current Trends in Technology. Allows a company to align and synchronize operations to optimize returns on innovation. Business have to keep up with evolving technology trends to stay competitive. provides a bridge between previously established tools and standards within a business environment and newer, more operationally efficient tools and standards in technology. Addressed in an organization by means of Processes, Strategic Business Units(SBU) for centralizing processes, Technology and Trend Evaluations

internet

CoAP and MQTT, on the other hand, communicate over the _________. They are both intended to be used with constrained devices and have different areas where each protocol shines

technology

Concepts for managerial ___________ assessment strategy: ◦ Technology Strategy - identifying the logic or role of technology ◦ Technology Forecasting - identifying applicable technologies, potentially through scouting. ◦ Technology Road mapping - ascertaining the trajectories of technological advancement and applying business or market needs to this assessment. ◦ Technology Portfolios - accumulating all technologies relevant to products or operations to determine which are ideal for internal implementation

RTLS

Connected factory solution involves a real-time location system (_____). An _____ utilizes small and easily deployed Wi-Fi RFID tags that attach to virtually any material and provide real-time location and status. These tags enable a facility to track production as it happens. These IoT sensors allow components and materials on an assembly line to talk to the network

CoAP

Constrained Application Protocol (______) is an IoT protocol for machine-to-machine communication. It has its roots in the HTTP protocol. follows the RESTful architectural model, where a device can have different resources, let's say, a temperature sensor and a humidity sensor. It may then be accessible via its URL. resulted from the IETF Constrained RESTful Environments (CoRE) working group's efforts to develop a generic framework for resource-oriented applications targeting constrained nodes and networks

CI/CD

Enterprise __/__ Best Practices: Using version control Automate the build Test the build Early and frequent code commit Every change to be built Pre-production run

mobility

Enterprise __________ is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications Refers to the use of mobile devices, such as smartphones and tablets, for business purposes Early pioneers in the enterprise mobility front rely on custom-built mobile devices that are preloaded with enterprise applications Bring-your-own-device, also known as BYOD, where employers allow work-related activities on personal devices MDM (Mobile Device Management) and EMM (Enterprise Mobility Management) have emerged as Enterprise software's in order to address the problems related managing enterprise mobility

HDFS

Hadoop Distributed File System (_____) - It is the storage layer of Hadoop. -Master is a high-end machine where metadata is stored -Slaves are inexpensive computers. -The Big Data files get divided into the number of blocks. Hadoop stores these blocks in a distributed fashion on the cluster of slave nodes. -HDFS has two daemons running NameNode: Responsible for maintaining, monitoring and managing DataNodes. Records the metadata of the files like the location of blocks, file size, permission, hierarchy etc DataNode: Runs on the slave machine. Stores the actual business data. Serves the read-write request from the user

convergence

IT/OT _______________ is the integration of information technology (IT) systems used for data-centric computing with operational technology (OT) systems used to monitor events, processes and devices and make adjustments in enterprise and industrial operations

Code

Infrastructure as _____ (IaC) is a means to perform infrastructure services through the defining of configuration files. In DevOps' scope, IaC is the automation of routine tasks through code, typically as configuration definition files, such as shell scripts, Ansible playbooks, Chef recipes, or Puppet manifests

fat

Internet protocols are thin and hence applications capture most of the value. Blockchain protocols are ___ and can themselves capture value

security

IoT __________: -Be able to identify and authenticate all entities involved in the IoT service (that is, gateways, endpoint devices, home networks, roaming networks, service platforms) -Ensure that all user data shared between the endpoint device and back-end applications is encrypted -Comply with local data protection legislation so that all data is protected and stored correctly -Utilize an IoT connectivity management platform and establish rules-based security policies so immediate action can be taken if anomalous behavior is detected from connected devices -Take a holistic, network-level approach to security

Big Data

Major problems faced by ___ ____ majorly falls under three V's: Volume: Facebook generates 500 TB of data every day. Twitter generates 8TB of data daily Velocity: Need of framework which is capable of high-speed data Variety: Computations of data from various sources have varied formats

root

Merkle _____ is a hash of all of the nodes of a Merkle tree. is present in the block header section of a block, which is the hash of all transactions in a block. This means that verifying only the Merkle _____ is required to verify all transactions present in the Merkle tree instead of verifying all transactions one by one

MQTT

Message Queuing Telemetry Transport (______) protocol: An MQTT client can act as a publisher to send data (or resource information) to an MQTT server acting as an MQTT message broker. MQTT sessions between each client and server consist of four phases: session establishment, authentication, data exchange, and session termination.

Backend

Mobile _________: provides runtime services to mobile applications implementing server side logic, maintain data, use mobile services. provides an environment to run application logic/ API Implementation(runtimes such as Java or Node JS) to communicate with the applications in enterprise network. Mobile App Operational Analytics= collects and logs information from mobile apps. Push Notifications, Location Services, Location Services, Mobile App Security

testing

Mobile __________: Represents a complexity increase and cost over more traditional applications Need support multiple mobile devices and release levels Permutations of device, mobile OS level, network carrier, locale, and device combinations adds complexity Quality of the network connection can have profound impact on the behavior of a mobile application Effective and comprehensive testing of mobile apps requires that all tiers of the application be addressed, not only the code on the mobile device The setup and availability of test versions of the middle tier and backend services can present very large cost and complexity challenges for the testing of mobile applications Automated tests include, an agent by using either real physical devices or emulators for testing, and need setting up the devices and installing the test agents

challenges

Mobile ___________: Mobile Applications Front ending a Complex Enterprise Back Office Availability of back office systems for frequent testing Security, Code Signing - Insuring that a user is installing the approved banking application Deployment - App Stores add additional Steps ◦ Mobile applications typically have the ̳App store' sitting between a newly built application version to be deployed to a device Testing challenges ◦ Mobile platform fragmentation and the growing list of supported devices have made browser compatibility testing challenging

architecture

Mobile ______________ Needs: Mobile applications often reach into the services backend. These services may provide the mobile application the needed intelligence about the user. Enterprise logic used to make real-time decisions. Immersive user experiences created through connecting the mobile app to a sophisticated backend

Technology

New _____________ Challenges: Weigh benefits versus costs, rather yield to peer organization pressure Existing product technology/architecture/vision alignment Match user/customer needs Validate impact and viability Review process changes Might need to flip to startup mode + short delivery cycles Talent realignment + training Support + Security challenges

pure web

Newer smart phones and tablets come with advanced web browsers preinstalled, and it is relatively easy to implement a standard web application with special style sheets to accommodate the mobile form factor and approximate the mobile device "look and feel". Disadvantage of ____ ___ application implementation is that such apps have no access to functions/features that run directly on the mobile device, such as the camera, contact list, and so forth Hybrid - Write the mobile apps using industry standard web programming languages and techniques such as HTML5 and JavaScript, but package the app into a natively installable format that is distributed via the app store mechanism

Ledger

Open _________: Chain of transactions, which is open and public to all. All can see each transaction and its validity. Distributed _________: Each node can have a copy of the ledger, so not centralized. So need to see that all copies are synchronized and all participants se that same copy

innovations

Product life cycles shows how economic returns go through a steep exponential growth phase and an eventual flattens out, which motivates businesses to produce new ____________.

Host

Service Instance per _____: Advantage - Each service instance is launched as a VM image; CI server can package services as an EC2 AMI; Each service instance runs in complete isolation can leverage mature cloud infrastructure Disadvantage - Each service instance has the overhead of an entire VM, including the operating system; Deploying a new version of a service slow

Container

Service Instance per ___________: Advantage - isolate your service instances from each other. Can easily monitor the resources consumed by each container. Also, like VMs, containers encapsulate the technology used to implement the services Disadvantage - not as mature as the infrastructure for VMs, as containers are not secure as VMs, since the containers share the kernel of the host OS with one another; Overhead in administering the container images

React

Swift and Objective C are used for iOS apps; Kotlin and Java are used for Android OS; ______ Native is ideal for both

innovation

Technological ___________ takes place when companies try to gain a competitive advantage either by reducing costs or by introducing a new technology

scouting

Technology __________ is essentially forecasting technological developments through information gathering: ◦ Identify emerging technologies. ◦ Channel and organize new technological data within an organization. ◦ Provide a corporate context to support or refute the acquisition of said technology

nonce

The _________ is the number that miners are solving for. When the solution is found, the blockchain miners are offered cryptocurrency in exchange. is a 32-bit (4-byte) field whose value is set so that the hash of the block will contain a run of leading zeros. The rest of the fields may not be changed, as they have a defined meaning. Any change to the block data (such as the nonce) will make the block hash completely different. Since it is believed infeasible to predict which combination of bits will result in the right hash, many different nonce values are tried, and the hash is recomputed for each value until a hash containing the required number of zero bits is found

Raspberry

The ____________ Pi itself is an embedded computer, or also an SBC (single board computer). The processor on the Raspberry Pi is somewhat of a hybrid between a microprocessor and microcontroller. Leads to embedded development

tools

The choice of ______ and products used by teams is very important in DevOps, so as to shorten communication gaps

collaboration

The culture of _______________: This is the very essence of DevOps— the fact that teams are no longer separated as developers or Ops, or testers, but, have the same objective: to deliver added value to the product as quickly as possible.

mobile

The majority of ________ apps are based on multi-tier architecture, with the code running on the device itself serving as the frontend client to data, and the services supplied by more traditional middle-tier and data center representing the backend. In most cases, the integration layer are implemented as REST services, which use JSON as the data interchange format because it is easy to parse and lighter weight than XML

axes

Three _____ of DevOps cultureL: the collaboration between Dev and Ops, the processes, and the use of tools

UEM

Unified endpoint management (____): To manage all types of endpoints, including iOS, Android, Windows, Chrome OS, and Mac OS, through a single console

Resource

YARN's __________ Manager's job is to assign resources to various competing applications. Runs on the master node. It knows the location of slaves and the resources of each slave. Resource Scheduler is one of the important service run by it.

IoT

___ communication almost always uses UDP because when using TCP, each packet needs to add a minimum of 20 bytes of TCP overhead, while UDP adds only 8 bytes. TCP also requires to keep open the connection

MDM

____ or Mobile Device Management is a software application used for remotely managing endpoints such as laptops, smart phones, tablets etc. focuses on managing devices, mostly in Business to Employee (B2E) scenarios. provides services to keep track of enterprise owned devices and also manage devices that connect to corporate networks using management agents on the devices.

MAM

_____ (Mobile Application Management) is like MDM, except that it's only applied to specific applications on a device instead of the entire device. helps in creating an enterprise app store and pushing or updating necessary apps on business devices. IT can apply security policies to certain apps, limit the sharing of corporate data among apps, and selectively remove apps and any associated data without having to wipe an entire device

Early Adopters

_____ _________: generally risk-oriented follow the innovators in embracing new products, and tend to be young and well-educated

Mobile

________ Protection: Enables protection of enterprise data using a multilevel defense approach across infrastructure, application, and data layers. Infrastructure - Ensures no damage to infrastructure components Application security ◦ Enables security as part of the development, delivery, and execution of mobile apps. ◦ Makes sure that the Mobile application do not cause damage to the execution environment Data security capabilities. Support securing and monitoring access to data in mobile devices and additionally, ◦ Enterprise databases,◦ File shares,◦ Document-sharing solutions, ◦ Gig data environments Ensure that sensitive or confidential data do not remain on the mobile device after the business work is done

Cloud

________-Based: A mobile application can connect to APIs to Cloud backends. Most of the cloud platforms or business application platforms that exist in a public cloud use token-based authorization, such as OAuth, which makes it pretty straightforward to build mobile applications

Flutter

_________ is an open-source mobile application framework by Google. used for developing Android and IOS applications. uses modern reactive framework allowing developers to build awesome UI with native look and feel. under the hood uses a 2D rendering engineto build all the UI elements. Thus apps built in flutter look the same on Android and iOS. Provide its own widgets, drawn with high-performance rendering engine, fast, pretty & customizable widgets. Architecture based on React

Multiple

__________ Service Instances Per Host: Run multiple service instances in the same process deploy multiple Java web applications on same server Advantage - deploying and start service instance is relatively fast Disadvantage - no isolation of the service instances; Deployment team need to know all deployments

Machine

__________ learning is used in smart cars to develop many of its essential features: Detect the street, other cars, and people Understand signs and speed limits Identify dangerous situations and know how to solve them Visual interpretation of a human's view of a street and the digital representation of the same theme, the two differ enormously Machine learning makes this data more usable by training the computer based on input footage—for example, by supplying a large number of images depicting street views After many learning iterations, the computer might be able to identify a street using fresh footage. Machine learning and IoT will be good friends in the future as internet-enabled microcontrollers become smaller and more powerful Apart from machine learning, to understand their surroundings, smart cars can communicate with each other

Innovative

___________ employees increase productivity by creating and executing new processes, which in turn may increase competitive advantage. React faster and more effectively to avoid risk and capture opportunities. ___________ employees tend to be more motivated and involved in the organization. Empowers employees to innovate and improve their work processes and provides a sense of autonomy that boosts job satisfaction. ___________ environment can see value through increased employee motivation, creativity, and autonomy and stronger teams

Rainforest

____________ Connection: Devices are based on recycled smartphones, which have many of the ingredients of an IoT device on- board—a microprocessor, sensors, and a way to communicate via the cell phone's network over the internet Guardians are hung inside the trees, their microphone transmitting the ambient sound via the cell phone network 24/7, forming a huge grid of microphones Google's open source TensorFlow library detect the sound of chainsaws and trucks used in deforestation operations Devices equipped with GPS and a sensor are used to detect earthquakes—once an earthquake is detected by the sensors, people can be warned accordingly

Disruptive

____________ innovation is usually a technological advancement that renders previous products/services (or even entire industries) irrelevant. For example, the smartphone disrupted landlines, Netflix made Blockbuster obsolete, and mp3s have marginalized CD players

Innovation

____________ is a primary source of competitive advantage for companies in essentially all industries and environments, and drives forward efficiency, higher productivity, and differentiation to fill a wide variety of needs. New ____________ trend toward improving upon current ones

Traditional

____________(On-premise) Corporate IT: Many productivity enhancing, employee-facing mobile applications fall into this category, where the backends are deployed behind corporate firewalls and are accessed either from the company intranet or through VPN. It is relatively simple to build a mobile application that can assume existing connectivity to the corporate network. Security infrastructure is needed to ensure only the authorized parties are able to access the services

Laggards

____________: Extremely frugal, conservative, and often technology-averse

Innovators

____________: Risk-oriented, leading-edge, extremely interested in new developments

Responsive

_____________ web design is a technique that uses CSS media queries to load different CSS rules under different browser form factors (width, orientation, etc.) to achieve optimal layout of the HTML content. To achieve optimal rendering for both desktop and mobile channels, web sites will redirect the mobile browser to a mobile-specific implementation that is built with UI widgets designed specifically for optimal user experiences on mobile phones

Management

______________ Agent: Apply policies of the enterprise, typically for devices used by employees of the enterprise dealing sensitive enterprise data. The agent is a part of the SDK that stores, enforces, and manages policies, including security policies, on the device

Configuration

______________ Management is the broad subject of governing configuration items at enterprise level. popular software configuration management tools are as follows: Chef, Puppet, Ansible

Kubernetes

______________ architecture: Composed of a master node and a set of worker nodes. The nodes can be either physical servers or virtual machines (VMs). Users of the environment interact with the master node using either a command-line interface (kubectl), an application programming interface (API), or a graphical user interface (GUI). The master node is responsible for managing the cluster and scheduling work across the worker nodes. the unit of work that is scheduled is called a Pod, and a Pod can hold one or more container. The primary components that exist on the master node are kube-apiserver, kube-scheduler, and kube-controller-manager.

Hyperledger

_______________ Fabric : A popular open source blockchain platform generally used for permissioned networks, it was developed by a consortium of organizations that include the Linux Foundation, IBM, and Oracle, and they offer blockchain service based on it.

architecture

A Big Data ____________ requires three components: -A scalable and available storage mechanism, such as a distributed filesystem or database -A distributed compute engine, for processing and querying the data at scale -Tools to manage the resources and services used to implement these systems

Rolling

_________ Deployment: Rolling, phased, an application's new version gradually replaces the old one, over a period of time. During that time, new and old versions will coexist

Canary

_________ Deployment: new application code is deployed in a small part of the production infrastructure. Once the application is signed off for release, only a few users are routed to it, thus minimizing any impact

DevOps

Benefits of establishing a _________ culture: -Better collaboration and communication in teams -Shorter lead times to production -Better performance and end user satisfaction -Reduced infrastructure costs -Significant time saved with iterative cycles that reduce application errors and automation tools that reduce manual tasks, so teams focus more on developing new functionalities with added business value -Automation of development cycle -Single version of truth, source code management -Consistent configuration management -Product readiness to markets -Automation of manual processes -Containers

delivery

Continuous ___________ is the approach whereby we get constant feedback on the production readiness of each and every check-in. Furthermore treat each and every check-in as a release candidate. Need to model all the processes involved in getting our software from check-in to production. we extend the idea of the multistage build pipeline to model each and every stage our software has to go through

delivery

Continuous ___________ is the next step of continuous integration in the software development cycle; it enables rapid and reliable development of software and delivery of product with the least amount of manual effort or overhead. the product is moved to the preproduction (staging) environment in small frequent units to thoroughly test for user acceptance. is the fully matured and complete process cycle of code change, passing through every phase of the software life cycle to be deployed to production environments. requires the entire process to be automated

Integration

Continuous ____________ benefits: We get some level of fast feedback as to the quality of our Code It allows us to automate the creation of our binary artifacts All the code required to build the artifact is itself version controlled Can re-create the artifact if needed Traceability from a deployed artifact back to the code, and Run tests on the code and artifacts

integration

Continuous ____________ is a DevOps best practice wherein developers continuously integrate their code in small logical units to a common shared repository with regularity . Eg - Jenkins, Travis, Go CD. a software development practice where members of a team integrate their work frequently... Each integration is verified by an automated build (including test) to detect integration errors as quickly as possible. multiple developers adhere to agile methodology. requires the implementation of processes (branch, commit, pull request, code review, and so on) with automation. need collect feedback on code integration to deliver new features quickly to users.

deployment

Continuous ____________ is an extension of Continuous Delivery, and a process that automates the entire CI/CD pipeline from the moment the developer commits their code to deployment in production through all of the verification steps. Requires a wide coverage of tests (unit, functional, integration, performance, and so on) for the application, and the successful execution of these tests, sufficient to validate the proper functioning of the application with all of these dependencies. Automated deployment to a production environment without any approval

toggle

Continuous deployment can be implemented with the use and implementation of feature ________ techniques (or feature flags), which involves encapsulating the application's functionalities in features and activating its features on demand, directly in production, without having to redeploy the code of the application.

processes

To expect rapid deployment, these teams must follow development ___________ from agile methodologies with iterative phases that allow for better functionality quality and rapid feedback. divided into several phases: The planning and prioritization of functionalities, Development, Continuous integration and delivery, Continuous deployment, Continuous monitoring

web3

Two pillars to a _____ project setup: -Web3.js (a dapp's gateway to the Ethereum blockchain and smart contracts) and the most advanced Ethereum JS library. -TestRPC (your local Ethereum blockchain), which is currently the simplest way to get a local node running

CD

___ often starts with an application package prepared by CI, which will be installed according to a list of automated tasks. These tasks can be of any type: unzip, stop and restart service, copy files, replace configuration, and so on. The execution of functional and acceptance tests can also be performed during the CD process. ___ aims to test the entire application with all of its dependencies. This is very visible in microservices applications composed of several services and APIs;

IoT

____ CHALLENGES -Scale: IOT networks are several orders of magnitude larger. Eg. Smart meters. Need to develop measures to extend IPv6 to millions of devices -Security: to address increased threat -Privacy: to be addressed while sharing data -Big data analytics: fully connected car can generate 25Gb/hr -Interoperability: to address proprietary architectures and protocols

Map Reduce

____ _______ algorithm: ◦ Data is processed in parallel on different CPU nodes. ◦ Capable of running on clusters of computers ◦ Could perform a complete statistical analysis for a huge amount of data. -is the data processing layer of Hadoop: -Data processes in two phases: Map Phase- This phase applies business logic to the data. The input data gets converted into key-value pairs. Reduce Phase- The Reduce phase takes as input the output of Map Phase. It applies aggregation based on the key of the key-value pairs.

LoRa

_____ (Long Range) is a low-power wide-area network (LPWAN) technology.

Need

_____ for Continuous Deployment: Shorter deployment cycles. Time-to-market is reduced. Customers get product value in less time. Customer feedback also flows back into the product team faster, which means the team can iterate on features and fix problems faster. Overall developer morale goes up

Hive

_____ is an ETL and data warehouse tool on top of Hadoop ecosystem and used for processing structured and semi structured data. is a database present in Hadoop ecosystem performs DDL and DML operations

Chef

_____ is one of the prominent configuration management and infrastructure automation platforms; it provides a full suite of enterprise capabilities such as workflow, visibility, and compliance. enables continuous deployments for both infrastructure and applications from development to production. Infrastructure configuration automation as code is written, tested, deployed, and managed by _____

Blue-green

_____-_______ deployment is a technique that enables continuous delivery to production with reduced downtime and risk. Achieves this by running two identical production environments called Blue and Green. Green is the existing live instance and Blue is the new version of the application. At any time, only one of the environments is live, with the live environment serving all production traffic

Pods

_____: Smallest deployable unit holding multiple containers. Containers share an IP address and port space, share the same hostname, and can communicate with each other using native interprocess communication (IPC)

Web2

_____: brought us social media and e-commerce platforms. The Web2 revolutionized social interactions, bringing producers and consumers of information, goods, and services closer together, and allowed us to enjoy P2P interactions on a global scale, but always with a middleman: a platform acting as a trusted intermediary between two people who do not know or trust each other. different hashes. has both the capability of reading and writing web contents. Static websites had been replaced with interactive dynamic websites, and named Social Web. Today's internet is a stateless internet — its participants can't hold their own state, nor transfer it from one to another, natively

Web3

_____: data is stored in multiple copies of a P2P network. Blockchain, as the backbone of the it, redefines the data structures in the backend of the Web by introducing a governance layer that runs on top of the current Internet, that allows for two people who do not know or trust each other to reach and settle agreements over the Web. The consensus protocol is designed in a way that the network can collectively remember preceding events or user interactions. is a backend revolution. holds state in a digitally native way.

Kafka

______ components: 1. Producer 2. Consumer 3. Broker 4. Cluster 5. Topic 6. Partitions - sits on a single machine 7. Offset - Sequence number of message in a partition 8. Consumer groups

YARN

_______ - Yet Another Resource Negotiator: Basic idea of YARN to split the task of resource management and job scheduling. It has one global Resource Manager and per-application Application Master. An application can be either one job or more jobs. is used as a system for managing distributed application.

Spark

_______ is built around the concepts of Resilient Distributed Datasets(RDD) and Direct Acyclic Graph representing transformations and dependencies between them. Spark Application (Driver Program or Application Master) at high level consists of SparkContext and user code which interacts with it creating RDDs and performing series of transformations to achieve final result. These transformations of RDDs are then translated into DAG and submitted to Scheduler to be executed on set of worker nodes.

Build

_______ management is the process of preparing a build environment to assemble all the components of a software application as a finished, workable product, fit for its intended purpose. Tools include - Ant, Maven, Gradle

Smart

_______ object: is a device that has, at a minimum, the following four defining characteristics: ◦ Processing unit: has some type of processing unit for acquiring data, processing and analyzing sensing information received by the sensor(s), coordinating control signals to any actuators, and controlling a variety of functions on the smart object, including the communication and power systems. ◦ Ability to interact: capable of interacting with the physical world through sensors and actuators ◦ Communication device: The communication unit is responsible for connecting it with the outside world ◦ Power source: have components that need to be powered

Spark

_______: Open source and General-purpose Distributed computing engine Used for processing and analyzing a large amount of data Works mostly (if not all) in-memory, thus reducing the latency associated with Disk I/O, but it can be run with a Streaming Context (micro-batches) that processes data nearly on arrival Like Hadoop MapReduce, Spark also works ◦ Distribute data across the cluster ◦ Process the data in parallel ◦ It can run on Hadoop with YARN to work with MASSIVE data sets in a distributed fashion Extensible API that makes it extremely easy to write code

Public

________ Blockchain: It is a blockchain that allows any anonymous user to be added to the blockchain network, sends a new transaction, verifies newly added blocks and reads the content of the blockchain. is open for all types of entities to participate in the network. examples of public blockchains - Ethereum, Bitcoin and NXT

web3j

________ is a lightweight, highly modular, reactive, type safe Java and Android library for working with Smart Contracts and integrating with clients (nodes) on the Ethereum network.

Spark

________ was built on the top of Hadoop MapReduce Extends the MapReduce model has its own cluster management and is not a modified version of Hadoop utilizes Hadoop in two ways - one is storage and second is processing. Since cluster management is arriving from Spark itself, it uses Hadoop for storage purposes only.

staging

________: deploy the application automatically in one or more non-production environments after continuous integration has been completed. CI will only test the microservice under development while, once deployed in a _________ environment, it will be possible to test and validate the entire application as well as the APIs

Spark

________: helps run an application in a Hadoop cluster, multiple times faster in memory. Faster by reducing the number of read/write operations to disk Stores the intermediate processing data in memory, saving read/write operations. Spark also provides built-in APIs in Java, Python or Scala Spark not only provides a Map and Reduce strategy but also support SQL queries, Streaming data, Machine learning (MLLib) and Graph Algorithms.

Hadoop

_________ Advantages: -Flexibility to store and mine any type of data whether it is structured, semi-structured or unstructured. -Excels at processing data of complex nature. Its scale-out architecture divides workloads across many nodes -Scales economically -Distributed Processing and Storage -Fault Tolerance

Web3.js

_________ is a collection of libraries which allows to interact with a local or remote Ethereum node using a HTTP or IPC connection. talks to The Ethereum Blockchain with JSON RPC. Similar to jQuery with a JSON API to read and write data with a web server. Collection of libraries to perform sending Ether from one account to another, create/read/write data smart contracts

Thread

_________ is a wireless radio protocol that can be used to form mesh networks. Some key features of the Thread protocol are energy efficiency and security and the fact that it is based on IPv6, which makes it easier to address specific nodes, independent of the technology used to reach them (Wi-Fi/radio), both inside and outside the network.

Jenkins

_________ is an open source automation tool written in Java with plugins built for Continuous Integration purpose. is used to build and test your software projects continuously making it easier for developers to Integrate changes to the project, Making it easier for users to obtain a fresh build, Continuously deliver the software, Integrating with a large number of testing technologies, and deployment technologies. achieves Continuous Integration with the help of plugins. Plugins allows the integration of Various DevOps stages

DevOps

_________: methodology for helping organizations build teams and software. Creates a culture and environment where building, testing and releasing software can happen rapidly, more reliably. is a group of procedure and products that empower the continuous delivery to value the end-user. Team works with efficient practice and mutual understanding and shared tools. Includes the agile infrastructure, continues integration, continuous delivery and application tracking. is the practice of operations and development engineers participating together in the entire service lifecycle, from design through the development process to production support. Collaboration of developer and the operations

Private

__________ Blockchain: a specific organization has the authority to join the blockchain network, send a new transaction, and participate in the consensus mechanism. Users willing to participate have to gain their permissions from the organization before joining the blockchain network. Likely applications that used it include database management and auditing.

Resilient

__________ Distributed Dataset: RDD could be thought as an immutable parallel data structure with failure recovery possibilities. It provides API for various transformations and materializations of data as well as for control over caching and partitioning of elements Execution workflow ◦ User code containing RDD transformations forms Direct Acyclic Graph which is then split into stages of tasks by DAGScheduler. ◦ Stages combine tasks which don't require shuffling/repartitioning ◦ Tasks run on workers and results then return to client.

Source code

__________ ______ management - enables multiple developers to develop code concurrently across multiple development centers spread across diverse geographies. Eg - ClearCase, SVN, CVS, Git

Hadoop

__________ consists of three core components: ◦ Hadoop Distributed File System (HDFS) - It is the storage layer of Hadoop. ◦ Map-Reduce - It is the data processing layer of Hadoop. ◦ YARN - It is the resource management layer of Hadoop.

ZigBee

__________ is a specification for local networks using low-power radio signals. It is used in home automation and sensor networks when multiple devices need to talk to one another in relatively close proximity (10-100 m line of sight) without an internet connection

Hadoop

__________ is a technology to store massive datasets on a cluster of cheap machines in a distributed manner. a registered trademark of the Apache software foundation. basically split files into the large blocks and distribute them across the clusters, transfer code into nodes to process data in parallel. Datasets processed faster and more efficiently.

Ansible

__________ provides following features: Modernize - Automate existing deployment process Manage - legacy systems and process, updated like DevOps Migrate - Define applications once and redeploy anywhere DevOps - Model everything, deploy continuously

actuators

__________ receive a signal or command, and trigger an action. complements to sensors by receiving some type of control signal (commonly an electric signal or digital command) that triggers a physical effect, usually some type of motion, force etc

Hadoop

__________ utilizes a simple programming model to perform the required operation among clusters. All modules in Hadoop are designed with a fundamental assumption that hardware failures are common occurrences and should be dealt with by the framework. It runs the application using the MapReduce algorithm

Monolithic

___________ builds: A one-line change to the user service could break the build Whole need be deployment tested

Container

___________ is dependent on the operating system it runs on. use the resource isolation features of the Linux kernel such as kernel namespaces. Isolates an application's view of the operating environment; Including process trees, network, user IDs and mounted file systems and cgroups. Provides resource limiting, such as CPU, memory, block I/O and network

Ethereum

___________: Open source blockchain platform generally used to create public networks and generate cryptocurrency. a blockchain-based, distributed computing platform that provides scripting functionality through smart contracts. Dapps(Decentralized Applications)can utilize it and associated technologies. Smart contracts are scripts that are executed on a global network of public nodes — the EVM (____________ Virtual Machine) — and can read/write transactions from/to the blockchain. Smart contracts can be thought of as decentralised computation for a dapp; serving a similar role to an HTTP API interacting with a datastore, just not on centralised servers

Deployment

____________ Strategies: ◦ "Big Bang" Deployment ◦ Rolling Deployment ◦ Blue-Green, Red-Black or A/B Deployment ◦ Canary Deployment

Zookeeper

____________ used for the following: Electing a controller. The controller is one of the brokers and is responsible for maintaining the leader/follower relationship for all the partitions Cluster membership - which brokers are alive and part of the cluster Topic configuration - which topics exist, how many partitions each has, where are the replicas, who is the preferred leader, what configuration overrides are set for each topic Quotas - how much data is each client allowed to read and write ACLs - who is allowed to read and write to which topic

Ethereum

____________ was intended as a platform to facilitate immutable, programmatic contracts, and applications via its own currency, Ether. enables the deployment of smart contracts and decentralized applications (Dapps) to be built and run without any downtime, fraud, control or interference from a third party. comes complete with its own programming language which runs on a blockchain, enabling developers to build and run distributed applications. use decentralized and distributed ledger

Blockchains

____________: Technology enabling moving digital assets from one individual to another. How nodes synchronized: Intended transaction published by a node and all nodes sees it. Miners - special nodes, who compete to take an intended transaction do following to gets a reward. Validate it first. Find a special key(invest computational power) that will enable this miner to take the previous transaction and lock the present transaction. Key is random and miner repeatedly guessing to find match Publish solution to entire network, and other nodes add transaction to its own ledger, and look for next transaction

Federated

_____________ Blockchain: It is considered as partly private blockchain. It is operated under the authority of a group of companies or organizations. Unlike public blockchain, it is faster and delivers better scalability and privacy. Examples of federated blockchains are R3, EWF, and B3i

Blockchain

_____________ is an ever-growing, secure, shared record keeping system in which each user of the data holds a copy of the records, which can only be updated if all parties involved in a transaction agree to update. Technical definition= ______________ is a peer-to-peer, distributed ledger that is cryptographically-secure, append-only, immutable (extremely hard to change), and updateable only via consensus or agreement among peers

Distributed

_____________ means that the processing is shared across multiple nodes, but the decisions may still be centralized and use complete system knowledge

Blockchain

______________ Challenges: Scalability Transaction speed Decentralisation Lack of Talent Not fully developed Ecosystem Energy consumption for solving complicated puzzles Lack of standards

Kubernetes

______________ is a leading container management open-source platform (Google open sourced it in 2014) that manages the deployment of containers, resource allocation of the containers, health check and monitoring, replication and auto-scaling of containers, abstraction of containers to expose it as a service and load balancing, service discovery, and much more. master node schedules Pods to run on different worker nodes. Each Pod contains one or more containers, and each Pod is assigned its own IP address. deploys multiple replica copies of the same Pod to improve scalability and availability.

Blockchain

______________ provides an efficient way to maintain security and data integrity in which a transaction must be verified by the majority of participating users in the blockchain network to be eligible to add in the ledger. is a distributed and decentralized ledger of transactions used to manage a constantly increasing set of records. To store a transaction in the ledger, the majority of participating users in the blockchain network should agree and record their consent. A set of transactions are grouped together and allocate a block in the ledger, which is chained of blocks. To link the blocks together, each block encompasses a timestamp and hash function to the previous block. The hash function validates the integrity and non-repudiation of the data inside the block. Moreover, to keep all participating users of the blockchain network updated, each user holds a copy of the original ledger and all users are synchronized and updated with newly change. This type of databases is characterized by having a high-throughput, decentralized control, low latency, immutable data storage and built- in security.

streaming

______________: 1. Streams of data arrive into the system over sockets from other servers within the environment or from outside, such as telemetry feeds from IoT devices in the field, social network feeds like the Twitter "firehose," etc 2&3. Normally it will be used for administration requests, such as for management and monitoring consoles 4.Kafka is a distributed system and it uses ZooKeeper (ZK) for tasks requiring consensus 5. Using Kafka Connect, raw data can be persisted directly to longer-term, persistent storage 6. For low-latency stream processing, the most robust mechanism is to ingest data from Kafka into the stream processing engine 7. Stream processing results can also be written to persistent storage 8. The mini-batch model of Spark is ideal when longer latencies can be tolerated and the extra window of time is valuable for more expensive calculations, such as training machine learning models using Spark's Mllib 9. Similarly, data can be moved between Spark and persistent storage 10. Batch-mode processing, Stream processing and interactive analytics. With Spark 11. All of the above can be deployed toHadoop/YARN clusters, as well as to cloud environments like AWS, Google Cloud Environment, or Microsoft Azure


Related study sets

Basic Physical Care - PassPoint NCLEX

View Set

International Marketing FINAL EXAM

View Set

Business Analytics Master Quizlet

View Set

Ch 32: Health Promotion & Care for the Older Adult

View Set

Module 16: Computer Security and Internet Research

View Set