SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
Autonomic Computing
      Ivo Neskovic
It all started in 1876...


                 •   Alexander Graham
                     Bell
                 •   Inventor of the
                     telephone
                 •   One of the most
                     influential inventions
                     ever
                 •   Widely adopted
                 •   By 1886 nearly
                     150.000 Americans
                     had telephones in
                     their homes




05/05/2010                                    2
The Telephony Crisis of 1920


                •   Manual telephone
                    switchboards
                •   By the year of 1980,
                    every woman in the
                    U.S. would have to
                    work as a
                    switchboard operator
                •   The Solution:
                    Automatic Branch
                    Exchanges




05/05/2010                                  3
Flash Forward to 2001


                •   The 'telephone' is the
                    computer
                •   The 'telephone
                    network' is the
                    Internet
                •   The 'telephone
                    operators' are system
                    administrators
                •   Predictions are that
                    by the year 2010, 200
                    million workers will
                    have to maintain
                    trillion systems
                •   We need to invent the
                    'automatic branch
                    exchanges' of the 21st
05/05/2010          century                  4
IBM's Vision


                •   Paul Horn, Senior Vice President of
                    Research
                •   Creator of the term 'autonomic
                    computing'
                •   Systems need to develop 'self-
                    managing' capabilities
                •   System administrators will no longer be
                    needed for maintaining computer
                    systems
                •   Author of the Autonomic Computing
                    Manifesto


05/05/2010                                                    5
Outline


                •   The Solution
                •   What is Autonomic Computing?
                •   Designing Autonomic Computer Systems
                •   Eight Principles of Autonomic Computing
                •   The Benefits
                    •   Short-term IT related benefits
                    •   Long-term, Higher Order Benefits
                •   Research Projects




05/05/2010                                                 6
The Solution


                •   End users of computer systems are the
                    primary stakeholders
                •   They desire:
                    •   Intuitive interaction with the system
                    •   Their involvement in the smooth running of the
                        system to be minimal to none
                •   Conclusion: the system has to be
                    autonomic
                •   The only know truly autonomic system is
                    the human central nervous system
                •   Sends control messages to the organs in
                    the human body at a sub-concious level

05/05/2010                                                         7
Central Nervous System




05/05/2010                            8
What is Autonomic Computing?


                •   A network of autonomic, smart computing
                    components which provide the user with
                    the desired functionality without a
                    concious effort
                •   A new computing paradigm, transferring
                    the focus from computing to data
                •   Key concept: Allow users to access data
                    from multiple distributed points, with
                    great transparency to how this is
                    achieved
                •   Focus in IT industry must change from
                    increasing processing speed and storage
                    capacity to developing large distributed,
                    self-managing, self-diagnostic networks
05/05/2010                                                9
Designing Autonomic Computer
             Systems

                •   Change in design, implementation and
                    support is imminent
                •   Three basic principles:
                    •   Flexible. Data transfer through a
                        platform/hardware independent approach
                    •   Accessible. The system must be always
                        accessible; always 'on'
                    •   Transparent. The system will function and
                        adapt to the users needs without any human
                        involvement




05/05/2010                                                      10
Eight Principles of Autonomic
             Computing

                •   An autonomic computing system needs
                    to ”know itself” - its components must
                    also possess a system identity
                •   An autonomic computing system must
                    configure and reconfigure itself under
                    varying and unpredictable conditions
                •   An autonomic computing system never
                    settles for the status quo - it always looks
                    for ways to optimize its workings
                •   An autonomic computing system must
                    perform something akin to healing - it
                    must be able to recover from routine and
                    extraordinary events that might cause
                    some of its parts to malfunction
05/05/2010                                                   11
Eight Principles of Autonomic
             Computing (Cont.)

                •   An autonomic computing system must
                    detect, identify and protect itself against
                    various types of attacks to maintain
                    overall system security and integrity
                •   An autonomic computing system must
                    know its environment and the context
                    surrounding its activity, and act
                    accordingly
                •   An autonomic computing system cannot
                    exist in a hermetic environment
                •   An autonomic computing system will
                    anticipate the optimized resources
                    needed while keeping its complexity
                    hidden
05/05/2010                                                   12
The Benefits


                •   Short-Term IT Related Benefits
                    •   Simplified user experience through a more
                        responsive, real-time system.
                    •   Cost-savings – scale to use.
                    •   Scaled power, storage and costs that optimize
                        usage across both hardware and software.
                    •   Full use of idle processing power, including
                        home PC's, through networked systems.
                    •   Natural language queries allow deeper and
                        more accurate returns.
                    •   Seamless access to multiple file types. Open
                        standards will allow users to pull data from all
                        potential sources by re-formatting on the fly.
                    •   Stability. High availability. High security
                        system. Fewer system or network errors due
05/05/2010
                        to self-healing.                            13
The Benefits (Cont.)


                •   Long-Term, Higher Order Benefits
                    •   Realize the vision of enablement by shifting
                        available resources to higher-order business.
                    •   Embedding autonomic capabilities in client or
                        access devices, servers, storage systems,
                        middle-ware and network itself.
                    •   Constructing autonomic federated systems.
                    •   Achieving end-to-end service level
                        management.
                    •   Collaboration and global problem-solving.
                    •   Massive simulation – weather, medical –
                        complex calculations like protein folding.




05/05/2010                                                        14
Research Projects


                •   Berkeley University of California:
                    Recovery-Oriented Computing
                    •   Joint Berkeley/Stanford project.
                    •   Investigating novel techniques for building
                        highly-dependable Internet services.
                    •   Emphasizes recovery from failures rather than
                        failure-avoidance.
                •   Carnegie Mellon University: Self-Securing
                    Storage & Devices
                    •   Enabling the storage device to safeguard data
                        even when the client OS is compromised.
                    •   Server-embedded security that cannot be
                        disabled by any software (event the OS).
                    •   Self-securing storage server actively looks for
                        suspicious behaviour.
05/05/2010                                                         15
Research Projects (Cont.)


                •   Georgia Institute of Technology: Qfabric
                    •   Closely integrating applications and resource
                        managers in the Quality of Service
                        management.
                    •   Achieved by tying applications and resource
                        managers through the same event-based
                        control path.
                    •   Application and resource managers can
                        interact freely to ensure optimal resource
                        scheduling and adaptations.
                •   NASA: Autonomous Nanotechnology
                    Swarm (ANTS)
                    •   1,000 pico-class spacecraft.
                    •   Each spacecraft caries only one instrument.
                    •   Swarm will be self-protecting, self-healing,
05/05/2010              self-configuring and self-optimizing.        16
Summary


               •   Inspired by biology.
               •   Evolved as a discipline to create software
                   systems and applications that self-
                   manage.
               •   Main purpose is to overcome the
                   complexities and inability to maintain
                   current and emerging systems effectively.
               •   IT industry, software engineering and
                   development must change the current
                   focus and the process for developing
                   autonomic systems.
               •   Still in the early research-only phases,
                   with hindsight of 'real' projects forming in
05/05/2010
                   the near future.                          17
Bibliography


                •   S. Ahmed, S.I. Ahamed, M. Sharmin, and M.M. Haque,
                    "Self-healing for autonomic pervasive computing,"
                    Proceedings of the 2007 ACM symposium on Applied
                    computing - SAC '07, 2007, p. 110.
                •   J. Cheng, W. Cheng, and R. Nagpal, "Robust and self-
                    repairing formation control for swarms of mobile agents,"
                    Proceedings of the National Conference on Artificial
                    Intelligence, Menlo Park, CA; Cambridge, MA; London;
                    AAAI Press; MIT Press; 1999, 2005, p. 59.
                •   S. Dobson, R. Sterritt, P. Nixon, and M. Hinchey,
                    "Fulfilling the Vision of Autonomic Computing," IEEE
                    Computer, vol. 43, 2010, p. 35–41.
                •   E. Mainsah, "Autonomic computing: the next era of
                    computing," Electronics and Communication
                    Engineering, 2002, pp. 8-9.
                •   B. Melcher and B. Mitchell, "Towards an autonomic
                    framework: Self-configuring network services and
                    developing autonomic applications," Intel Technology
05/05/2010          Journal, vol. 8, 2004, p. 279–290.                  18
Bibliography (Cont.)


                •   A. Garcia, T. Batista, A. Rashid, and C. Sant'Anna,
                    "Autonomic computing: emerging trends and open
                    problems," SIGSOFT Softw Eng Notes, vol. 30, 2005,
                    pp. 1-7.
                •   P. Horn, "Autonomic Computing: IBM's Perspective on
                    the State of Information Technology," Computing
                    Systems, 2002.
                •   M.C. Huebscher and J.A. McCann, "A survey of
                    autonomic computing—degrees, models, and
                    applications," ACM Computing Surveys (CSUR), vol. 40,
                    2008.
                •   IBM, "White Paper: An architectural blueprint for
                    autonomic computing," white paper, 2005.
                •   J. Kephart, "Research challenges of autonomic
                    computing," Proceedings. 27th International Conference
                    on Software Engineering, 2005. ICSE 2005., 2005, pp.
                    15-22.
                •   J. Kephart and D. Chess, "The vision of autonomic
05/05/2010          computing," Computer, 2003, pp. 41-50.              19

Mais conteúdo relacionado

Mais procurados

Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Selected topics in Computer Science
Selected topics in Computer Science Selected topics in Computer Science
Selected topics in Computer Science Melaku Bayih Demessie
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityAvantika University
 
Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive ComputingPietro Leo
 
Cognitive computing ppt.
Cognitive computing ppt.Cognitive computing ppt.
Cognitive computing ppt.KRIPAPIOUS
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigmRipal Ranpara
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligenceDhrumil Shah
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligenceiarthur
 
Artificial intelligence and its application
Artificial intelligence and its applicationArtificial intelligence and its application
Artificial intelligence and its applicationMohammed Abdel Razek
 
Artificial Intelligence Presentation
Artificial Intelligence PresentationArtificial Intelligence Presentation
Artificial Intelligence Presentationlpaviglianiti
 
Applications of Artificial Intelligence-Past, Present & Future
Applications of Artificial Intelligence-Past, Present & FutureApplications of Artificial Intelligence-Past, Present & Future
Applications of Artificial Intelligence-Past, Present & FutureJamie Gannon
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security Robert Smith
 
Artificial intelligence - An Overview
Artificial intelligence - An OverviewArtificial intelligence - An Overview
Artificial intelligence - An OverviewGiri Dharan
 

Mais procurados (20)

Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Selected topics in Computer Science
Selected topics in Computer Science Selected topics in Computer Science
Selected topics in Computer Science
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive Computing
 
Cognitive computing ppt.
Cognitive computing ppt.Cognitive computing ppt.
Cognitive computing ppt.
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 
Hyperautomation
HyperautomationHyperautomation
Hyperautomation
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Artificial intelligence and its application
Artificial intelligence and its applicationArtificial intelligence and its application
Artificial intelligence and its application
 
Artificial Intelligence Presentation
Artificial Intelligence PresentationArtificial Intelligence Presentation
Artificial Intelligence Presentation
 
Applications of Artificial Intelligence-Past, Present & Future
Applications of Artificial Intelligence-Past, Present & FutureApplications of Artificial Intelligence-Past, Present & Future
Applications of Artificial Intelligence-Past, Present & Future
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Bio computing
Bio computingBio computing
Bio computing
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
Artificial intelligence - An Overview
Artificial intelligence - An OverviewArtificial intelligence - An Overview
Artificial intelligence - An Overview
 
Types Of Operating Systems
Types Of Operating SystemsTypes Of Operating Systems
Types Of Operating Systems
 

Destaque

01 characteristics of life
01   characteristics of life01   characteristics of life
01 characteristics of lifegquinn617
 
Langton artificial life
Langton artificial lifeLangton artificial life
Langton artificial lifeJORGE
 
Artificial life (2005)
Artificial life (2005)Artificial life (2005)
Artificial life (2005)Miriam Ruiz
 
Autonomic Computing - Dataflow Programming and Reactive State Machines
Autonomic Computing - Dataflow Programming and Reactive State MachinesAutonomic Computing - Dataflow Programming and Reactive State Machines
Autonomic Computing - Dataflow Programming and Reactive State MachinesPeter Lee
 
Signal processing and linear systems b.p.lathi
Signal processing and linear systems b.p.lathiSignal processing and linear systems b.p.lathi
Signal processing and linear systems b.p.lathiSwathi Padimi
 
Google sky ppt
Google sky pptGoogle sky ppt
Google sky pptkasmus
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)Angel Sophie
 
Google Wave Introduction
Google Wave IntroductionGoogle Wave Introduction
Google Wave IntroductionCraig Dickson
 
Brain Computer Interface
Brain Computer InterfaceBrain Computer Interface
Brain Computer Interfacedeaneal
 

Destaque (20)

9. the semantic grid and autonomic grid
9. the semantic grid and autonomic grid9. the semantic grid and autonomic grid
9. the semantic grid and autonomic grid
 
Robots, Prosthesis & Artificial Life (2007)
Robots, Prosthesis & Artificial Life (2007)Robots, Prosthesis & Artificial Life (2007)
Robots, Prosthesis & Artificial Life (2007)
 
01 characteristics of life
01   characteristics of life01   characteristics of life
01 characteristics of life
 
Langton artificial life
Langton artificial lifeLangton artificial life
Langton artificial life
 
Artificial life (2005)
Artificial life (2005)Artificial life (2005)
Artificial life (2005)
 
Taming Big Data with NoSQL
Taming Big Data with NoSQLTaming Big Data with NoSQL
Taming Big Data with NoSQL
 
Autonomic Computing - Dataflow Programming and Reactive State Machines
Autonomic Computing - Dataflow Programming and Reactive State MachinesAutonomic Computing - Dataflow Programming and Reactive State Machines
Autonomic Computing - Dataflow Programming and Reactive State Machines
 
Signal processing and linear systems b.p.lathi
Signal processing and linear systems b.p.lathiSignal processing and linear systems b.p.lathi
Signal processing and linear systems b.p.lathi
 
Google wave2010
Google wave2010Google wave2010
Google wave2010
 
Google Sky At GSFC
Google Sky At GSFCGoogle Sky At GSFC
Google Sky At GSFC
 
Google sky ppt
Google sky pptGoogle sky ppt
Google sky ppt
 
GoogleWave
GoogleWave GoogleWave
GoogleWave
 
Rainbow technology doc
Rainbow technology docRainbow technology doc
Rainbow technology doc
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Rainbow technology
Rainbow technologyRainbow technology
Rainbow technology
 
Google Wave Introduction
Google Wave IntroductionGoogle Wave Introduction
Google Wave Introduction
 
Brain Computer Interface
Brain Computer InterfaceBrain Computer Interface
Brain Computer Interface
 
Rainbow technology
Rainbow technology Rainbow technology
Rainbow technology
 
Hologram technology
Hologram technologyHologram technology
Hologram technology
 

Semelhante a Autonomic Computing: Vision or Reality - Presentation

Properties of ubiquitous computing
Properties of ubiquitous computingProperties of ubiquitous computing
Properties of ubiquitous computingPurvi Sankhe
 
Introduction of os and types
Introduction of os and typesIntroduction of os and types
Introduction of os and typesPrakash Sir
 
Research Issues in P2P Netwroks
Research Issues in P2P NetwroksResearch Issues in P2P Netwroks
Research Issues in P2P Netwrokssabumt
 
7 distributed and real systems
7 distributed and real systems7 distributed and real systems
7 distributed and real systemsmyrajendra
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating SystemRashmi Bhat
 
Operating System-Types-Examples-Advantages & disadvantages
Operating System-Types-Examples-Advantages & disadvantagesOperating System-Types-Examples-Advantages & disadvantages
Operating System-Types-Examples-Advantages & disadvantagesOPTOM Nimra Murtaza
 
Operating System Unit 1
Operating System Unit 1Operating System Unit 1
Operating System Unit 1SanthiNivas
 
An introduction to Autonomous mobile robots
An introduction to Autonomous mobile robotsAn introduction to Autonomous mobile robots
An introduction to Autonomous mobile robotsZahra Sadeghi
 
Unit 1 introduction to os
Unit 1 introduction to osUnit 1 introduction to os
Unit 1 introduction to osGaneshThapa27
 
Lecture 1- Introduction to Operating Systems.pdf
Lecture 1- Introduction to Operating Systems.pdfLecture 1- Introduction to Operating Systems.pdf
Lecture 1- Introduction to Operating Systems.pdfAmanuelmergia
 
Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.pptmiki304759
 
Introduction to Operating system CBSE
Introduction to Operating system CBSE Introduction to Operating system CBSE
Introduction to Operating system CBSE PrashantChahal3
 
Operating System Components.pptx
Operating System Components.pptxOperating System Components.pptx
Operating System Components.pptxpkavithascs
 

Semelhante a Autonomic Computing: Vision or Reality - Presentation (20)

Properties of ubiquitous computing
Properties of ubiquitous computingProperties of ubiquitous computing
Properties of ubiquitous computing
 
Introduction of os and types
Introduction of os and typesIntroduction of os and types
Introduction of os and types
 
Research Issues in P2P Netwroks
Research Issues in P2P NetwroksResearch Issues in P2P Netwroks
Research Issues in P2P Netwroks
 
7 distributed and real systems
7 distributed and real systems7 distributed and real systems
7 distributed and real systems
 
Chapter 1-1.pptx
Chapter 1-1.pptxChapter 1-1.pptx
Chapter 1-1.pptx
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating System
 
os_1.pdf
os_1.pdfos_1.pdf
os_1.pdf
 
Chapter 5(2).pdf
Chapter 5(2).pdfChapter 5(2).pdf
Chapter 5(2).pdf
 
Operating System-Types-Examples-Advantages & disadvantages
Operating System-Types-Examples-Advantages & disadvantagesOperating System-Types-Examples-Advantages & disadvantages
Operating System-Types-Examples-Advantages & disadvantages
 
Operating System Overview.pdf
Operating System Overview.pdfOperating System Overview.pdf
Operating System Overview.pdf
 
Operating System Unit 1
Operating System Unit 1Operating System Unit 1
Operating System Unit 1
 
An introduction to Autonomous mobile robots
An introduction to Autonomous mobile robotsAn introduction to Autonomous mobile robots
An introduction to Autonomous mobile robots
 
8.5 martin
8.5 martin8.5 martin
8.5 martin
 
Unit 1 introduction to os
Unit 1 introduction to osUnit 1 introduction to os
Unit 1 introduction to os
 
OS_MD_1.pdf
OS_MD_1.pdfOS_MD_1.pdf
OS_MD_1.pdf
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 1- Introduction to Operating Systems.pdf
Lecture 1- Introduction to Operating Systems.pdfLecture 1- Introduction to Operating Systems.pdf
Lecture 1- Introduction to Operating Systems.pdf
 
Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.ppt
 
Introduction to Operating system CBSE
Introduction to Operating system CBSE Introduction to Operating system CBSE
Introduction to Operating system CBSE
 
Operating System Components.pptx
Operating System Components.pptxOperating System Components.pptx
Operating System Components.pptx
 

Último

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Último (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Autonomic Computing: Vision or Reality - Presentation

  • 1. Autonomic Computing Ivo Neskovic
  • 2. It all started in 1876... • Alexander Graham Bell • Inventor of the telephone • One of the most influential inventions ever • Widely adopted • By 1886 nearly 150.000 Americans had telephones in their homes 05/05/2010 2
  • 3. The Telephony Crisis of 1920 • Manual telephone switchboards • By the year of 1980, every woman in the U.S. would have to work as a switchboard operator • The Solution: Automatic Branch Exchanges 05/05/2010 3
  • 4. Flash Forward to 2001 • The 'telephone' is the computer • The 'telephone network' is the Internet • The 'telephone operators' are system administrators • Predictions are that by the year 2010, 200 million workers will have to maintain trillion systems • We need to invent the 'automatic branch exchanges' of the 21st 05/05/2010 century 4
  • 5. IBM's Vision • Paul Horn, Senior Vice President of Research • Creator of the term 'autonomic computing' • Systems need to develop 'self- managing' capabilities • System administrators will no longer be needed for maintaining computer systems • Author of the Autonomic Computing Manifesto 05/05/2010 5
  • 6. Outline • The Solution • What is Autonomic Computing? • Designing Autonomic Computer Systems • Eight Principles of Autonomic Computing • The Benefits • Short-term IT related benefits • Long-term, Higher Order Benefits • Research Projects 05/05/2010 6
  • 7. The Solution • End users of computer systems are the primary stakeholders • They desire: • Intuitive interaction with the system • Their involvement in the smooth running of the system to be minimal to none • Conclusion: the system has to be autonomic • The only know truly autonomic system is the human central nervous system • Sends control messages to the organs in the human body at a sub-concious level 05/05/2010 7
  • 9. What is Autonomic Computing? • A network of autonomic, smart computing components which provide the user with the desired functionality without a concious effort • A new computing paradigm, transferring the focus from computing to data • Key concept: Allow users to access data from multiple distributed points, with great transparency to how this is achieved • Focus in IT industry must change from increasing processing speed and storage capacity to developing large distributed, self-managing, self-diagnostic networks 05/05/2010 9
  • 10. Designing Autonomic Computer Systems • Change in design, implementation and support is imminent • Three basic principles: • Flexible. Data transfer through a platform/hardware independent approach • Accessible. The system must be always accessible; always 'on' • Transparent. The system will function and adapt to the users needs without any human involvement 05/05/2010 10
  • 11. Eight Principles of Autonomic Computing • An autonomic computing system needs to ”know itself” - its components must also possess a system identity • An autonomic computing system must configure and reconfigure itself under varying and unpredictable conditions • An autonomic computing system never settles for the status quo - it always looks for ways to optimize its workings • An autonomic computing system must perform something akin to healing - it must be able to recover from routine and extraordinary events that might cause some of its parts to malfunction 05/05/2010 11
  • 12. Eight Principles of Autonomic Computing (Cont.) • An autonomic computing system must detect, identify and protect itself against various types of attacks to maintain overall system security and integrity • An autonomic computing system must know its environment and the context surrounding its activity, and act accordingly • An autonomic computing system cannot exist in a hermetic environment • An autonomic computing system will anticipate the optimized resources needed while keeping its complexity hidden 05/05/2010 12
  • 13. The Benefits • Short-Term IT Related Benefits • Simplified user experience through a more responsive, real-time system. • Cost-savings – scale to use. • Scaled power, storage and costs that optimize usage across both hardware and software. • Full use of idle processing power, including home PC's, through networked systems. • Natural language queries allow deeper and more accurate returns. • Seamless access to multiple file types. Open standards will allow users to pull data from all potential sources by re-formatting on the fly. • Stability. High availability. High security system. Fewer system or network errors due 05/05/2010 to self-healing. 13
  • 14. The Benefits (Cont.) • Long-Term, Higher Order Benefits • Realize the vision of enablement by shifting available resources to higher-order business. • Embedding autonomic capabilities in client or access devices, servers, storage systems, middle-ware and network itself. • Constructing autonomic federated systems. • Achieving end-to-end service level management. • Collaboration and global problem-solving. • Massive simulation – weather, medical – complex calculations like protein folding. 05/05/2010 14
  • 15. Research Projects • Berkeley University of California: Recovery-Oriented Computing • Joint Berkeley/Stanford project. • Investigating novel techniques for building highly-dependable Internet services. • Emphasizes recovery from failures rather than failure-avoidance. • Carnegie Mellon University: Self-Securing Storage & Devices • Enabling the storage device to safeguard data even when the client OS is compromised. • Server-embedded security that cannot be disabled by any software (event the OS). • Self-securing storage server actively looks for suspicious behaviour. 05/05/2010 15
  • 16. Research Projects (Cont.) • Georgia Institute of Technology: Qfabric • Closely integrating applications and resource managers in the Quality of Service management. • Achieved by tying applications and resource managers through the same event-based control path. • Application and resource managers can interact freely to ensure optimal resource scheduling and adaptations. • NASA: Autonomous Nanotechnology Swarm (ANTS) • 1,000 pico-class spacecraft. • Each spacecraft caries only one instrument. • Swarm will be self-protecting, self-healing, 05/05/2010 self-configuring and self-optimizing. 16
  • 17. Summary • Inspired by biology. • Evolved as a discipline to create software systems and applications that self- manage. • Main purpose is to overcome the complexities and inability to maintain current and emerging systems effectively. • IT industry, software engineering and development must change the current focus and the process for developing autonomic systems. • Still in the early research-only phases, with hindsight of 'real' projects forming in 05/05/2010 the near future. 17
  • 18. Bibliography • S. Ahmed, S.I. Ahamed, M. Sharmin, and M.M. Haque, "Self-healing for autonomic pervasive computing," Proceedings of the 2007 ACM symposium on Applied computing - SAC '07, 2007, p. 110. • J. Cheng, W. Cheng, and R. Nagpal, "Robust and self- repairing formation control for swarms of mobile agents," Proceedings of the National Conference on Artificial Intelligence, Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999, 2005, p. 59. • S. Dobson, R. Sterritt, P. Nixon, and M. Hinchey, "Fulfilling the Vision of Autonomic Computing," IEEE Computer, vol. 43, 2010, p. 35–41. • E. Mainsah, "Autonomic computing: the next era of computing," Electronics and Communication Engineering, 2002, pp. 8-9. • B. Melcher and B. Mitchell, "Towards an autonomic framework: Self-configuring network services and developing autonomic applications," Intel Technology 05/05/2010 Journal, vol. 8, 2004, p. 279–290. 18
  • 19. Bibliography (Cont.) • A. Garcia, T. Batista, A. Rashid, and C. Sant'Anna, "Autonomic computing: emerging trends and open problems," SIGSOFT Softw Eng Notes, vol. 30, 2005, pp. 1-7. • P. Horn, "Autonomic Computing: IBM's Perspective on the State of Information Technology," Computing Systems, 2002. • M.C. Huebscher and J.A. McCann, "A survey of autonomic computing—degrees, models, and applications," ACM Computing Surveys (CSUR), vol. 40, 2008. • IBM, "White Paper: An architectural blueprint for autonomic computing," white paper, 2005. • J. Kephart, "Research challenges of autonomic computing," Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005., 2005, pp. 15-22. • J. Kephart and D. Chess, "The vision of autonomic 05/05/2010 computing," Computer, 2003, pp. 41-50. 19