SlideShare una empresa de Scribd logo
1 de 35
G-WAN®
Application Server
(Global-WAN.com's infrastructure)
Built For Clients And Servers
gwan.com
This document is aimed at helping people to understand the G-WAN technology. The data and
charts included here follow documented procedures that require system tuning, and proper
multi-thread client tools. This information is available on the G-WAN website. All these tests
have been made on an 6-Core Mac Pro (Intel Xeon CPU W3680 @ 3.33GHz) with earlier versions
of G-WAN. The latest release is faster due to constant improvements. This document is only a
quick overview of why using G-WAN brings benefits on multicore systems. Further information
regarding the internals of TWD Industries AG's technology are available under a proper NDA, to
selected partners.
2 | Copyright © 2013, TWD Industries AG. All rights reserved.
G-WAN
Faster, More Scalable,
Using Less CPU / RAM Resources
Than All
Web Server,
App. Servers, and
“Web Accelerators”
3 | Copyright © 2013, TWD Industries AG. All rights reserved.
G-WAN
Nginx – Web Server
4 | Copyright © 2013, TWD Industries AG. All rights reserved.
G-WAN
Lighttpd – Web Server
5 | Copyright © 2013, TWD Industries AG. All rights reserved.
G-WAN
Varnish – Web “Accelerator” (cache)
6 | Copyright © 2013, TWD Industries AG. All rights reserved.
G-WAN
Apache TomCat – Java App. Server
7 | Copyright © 2013, TWD Industries AG. All rights reserved.
G-WAN
Caucho Resin – Java App. Server
8 | Copyright © 2013, TWD Industries AG. All rights reserved.
G-WAN
Mono XPS – C# App. Server
9 | Copyright © 2013, TWD Industries AG. All rights reserved.
G-WAN
G-WAN – As A Mere Web Server
10 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
G-WAN – As A Web App. Server
asm, C/C++, C#, Objective-C/C++, D, Java, Scala,
JS, Go, Lua, PHP, Perl, Python, Ruby, etc.
11 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
In A Fraction Of The Time
12 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
1 billion of HTTP requests on the [1-1000] concurrency range
100-byte (static file):
G-WAN Average-RPS:826,821 Time: 1,516 seconds [00:25:16]
Lighty Average-RPS:219,562 Time: 4,740 seconds [01:19:00]
Nginx Average-RPS:167,977 Time: 6,823 seconds [01:53:43]
Varnish Average-RPS:103,996 Time:10,817 seconds [03:00:17]
hello world (dynamic contents):
G-WAN/C Average-RPS:801,585 Time: 1,551 seconds [00:25:51]
G-WAN/Java Average-RPS:759,726 Time: 1,648 seconds [00:27:28]
G-WAN/JS Average RPS:768,659 Time: 1,696 seconds [00:28:16]
G-WAN/Go Average RPS:784,113 Time: 1,892 seconds [00:31:32]
Tomcat Average-RPS: 76,556 Time:20,312 seconds [05:38:32]
Node.js Average-RPS: 14,209 Time:80,102 seconds [22:15:02]
Go Average-RPS: 12,801 Time:84,811 seconds [23:33:31]
Scalability & Performance
By-Design
13 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
The CPU
Freq. Halt
Since 2004,
CPUs run at 3GHz.
We should have
100GHz CPUs
today...
14 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
How: Lorenz-Waterwheel
Designed to Scale
From [1-∞] CPU Cores.
Lock-Free, Wait-Free,
Multi-Threaded and
Event-Based.
15 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
Connections
Result: Scaling on Multicore
16 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
How: A Custom Runtime
G-WAN's Runtime
Is Several Orders Of
Magnitude Faster
And Smaller Than
Linux's
System Runtime.
17 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
G-WAN
Optimized Runtime
Scripts: C/C++, Java, C#...
Greater Portability & Stability,
Speed-up Slow Languages.
Why Scale on CPU Cores
The Need For Efficiency:
● All Web/App. Servers Scale Horizontally
● Since 2004, CPUs Scale VERTICALLY
● Minimizing Resources Consumption
TWD's Projects Needs G-WAN On Both Sides
(Client and Server) without disturbing other tasks.
18 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
Scalability & Performance
Demo:
45,000 Persons
San Francisco
Social Network
19 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
ORACLE Open World 2012
20 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
ORACLE Open World 2012
Making The Impossible Become Routine
● G-WAN Accelerating ORACLE NoSQL
● In A Social Gaming Demo Of 100 Millions Bots
● All Moving In Real-Time (Heading, Speed, etc.)
● Queried by 45,000 Persons Joining The Game
● And Achieving A Whooping 1.2 Billion of TPS
● ...On A Mere 6-Core Desktop Machine!
21 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
Core Design Philosophy
Simplicity Rules
(For Machines & Humans)
Fly On Servers & Mobile Platforms
22 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
Security
An App. Server That Can be Trusted
Designed To Build A Secure Platform:
● Less Code, Less Bugs
● New Technologies (Parsing, Memory, etc.)
● No Vulnerability Found Since 2009 Launch
Needed a Safe Server to release Secure Services.
23 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
Ubiquity
A Lightweight (200 KB) App. Server
Designed To Run Everywhere:
● Smartphones (Low-Consumption, Low-Latency)
● Embedded (Control At The Lowest Level)
● Servers(Web, SaaS, PaaS, Cloud services)
With Scripts In 16 Programming Languages:
(asm, C/C++, C#, Java, Scala, Go, Javascript, Lua, Perl...)
24 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
Interoperability
An Universal Stack
Open to Third-Parties:
● Applications (C/C++, C#, Java, Obj-C, Perl)
● Middleware (G-WAN, HTTP, SSL, etc.)
● Database (Key-Value, SQLite, ORACLE)
25 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
Zero-Configuration
An Unobstrusive Stack
Why Configuration Files Are Bad:
● Confusing, User Errors, Buggy, Version Incompatibilities
● Mostly Redundant with File System Information
● Inadequate: Adaptive Options Are Much Safer / Efficient
Safer, Faster, Simpler, No Pointless User Lock-In, Able
to Run on Unattended Systems.
26 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
Proven
Industry Leaders
Use G-WAN to accelerate:
● NoSQL (ORACLE Open World 2012)
● Big Data (EON, Inc PaaS in California)
● Streaming (multimedia, transcoding)
27 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
The G-WAN Project
Development
Schedule
28 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
29 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
Reaching The Harvesting Phase
2-3 years 2-3 years 5 plus years
 Integration still dominating
 Exploitation gains speed
 Consolidation of
development processes is
key
 Minimize team churn and
grow it only slowly
 Focus on integration
 Only very few clients
 Gain experience in
automation
 Build a strong team
 Integration becomes less
important
 Exploitation takes lead and
grows significantly
 Quality becomes key topic
 Long term employees
perform best
Information
Integration
Information
Exploitation
1) Ramp-up phase,
2008
2) Consolidation
phase
3) Harvesting
phase, 2013
Productivity Standards
Favourably Comparing With The Next Best:
30 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
Server Birth Files Blank Comment Code Total
Nginx 2002 256 35,131 4,308 94,369 133,808
G-WAN 2009 171 11,198 42,706 56,766 110,670
G-WAN was written in less than half the time, and offers many
more features in half the code of Nginx. Further, G-WAN's source
code has 10x more comments than Nginx's code.
Source Code
Lines
The TrustLeap Project
The Need For G-WAN
On Both
Server and Client Sides
31 | Copyright © 2013, TWD Industries AG All rights reserved.
G-WAN
Unbreakable Security
● Future-Proof (I.e. QUANTUM Computers)
● Mathematically Proven (Can Be Trusted By All)
● Independent From Computing Power Used To Break It
● No More Need To Enlarge Encryption Keys
● No More Need To Change Encryption Algorithms
● Also Unbreakable Two & Three-Factor Authentication
● No Central Key Repository Needed (But Can Be Used)
● Mobiles / Embedded: Very Low CPU / RAM Overhead
32 | Copyright © 2013, TWD Industries AG All rights reserved.
TrustLea
p
The Value Of Trust
Applications
● Corporate Asset Protection (Patents, Talks, Databases)
● Public Asset Protection (e-Votes, Medical Records, Legal)
● International Negotiations (United Nations, Contracts)
● Transaction / Archiving Certifications (Indisputable)
● Defense (Impenetrable Communications, Drones, etc.)
● Chips Would Be Ideally Used (Tampering, I.P. Protection)
● Legitimacy to Impose A Licensing Monopole (Exclusivity)
33 | Copyright © 2013, TWD Industries AG All rights reserved.
TrustLea
p
Trust Starts With Identity
● Email (Data Protection, Negotiations, Board Talks)
● Routers / Firewalls (How Safe Are Barriers If Broken?)
● Transactions (Trading, Contracts, Non-Repudiation)
● Storage (Confidentiality, Tamper-Proof, Full-Control)
● Defence (Remote Presence / Control, Chain Of Orders)
● I.P. Rights (What Worth Is A Proof That Can Be Spoofed?)
● Legal (Customers / Lawyers / Regulators Security Chain)
34 | Copyright © 2013, TWD Industries AG All rights reserved.
TrustLea
p
TrustLeap
Worldwide Corporate HQ
TrustLeap
Paradiesli 17
CH-8842 Unteriberg SZ
Switzerland
Phone +41 (0)55 414 20 93
Fax +41 (0)55 414 20 67
Email contact@trustleap.com
www.trustleap.com
About TrustLeap
TrustLeap, the security division of TWD Industries AG, protects digital assets with cryptanalytically unbreakable technology
(safe against unlimited computing power as it is proven mathematically that no key leaks can be exploited). The TrustLeap
secure platform leverages offers of enterprise, cloud, networking, digital media and financial services in global strategic markets.
TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other.
Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely
market their digital assets.
TrustLea
p
35 | Copyright © 2013, TWD Industries AG All rights reserved.

Más contenido relacionado

La actualidad más candente

Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
 Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ... Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...Hyperleger Tokyo Meetup
 
Developing IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SAC
Developing IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SACDeveloping IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SAC
Developing IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SACMediaTek Labs
 
Introduction to the new MediaTek LinkIt™ Development Platform for RTOS
Introduction to the new MediaTek LinkIt™ Development Platform for RTOSIntroduction to the new MediaTek LinkIt™ Development Platform for RTOS
Introduction to the new MediaTek LinkIt™ Development Platform for RTOSMediaTek Labs
 
Creating a successful IoT product with MediaTek Labs
Creating a successful IoT product with MediaTek LabsCreating a successful IoT product with MediaTek Labs
Creating a successful IoT product with MediaTek LabsMediaTek Labs
 
DevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @CrowdstrikeDevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @CrowdstrikeCosmin Bratu
 
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...MediaTek Labs
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Real-Time Innovations (RTI)
 
Juan Francisco Losa - Nuevos enfoques de seguridad en un Banco Digital [roote...
Juan Francisco Losa - Nuevos enfoques de seguridad en un Banco Digital [roote...Juan Francisco Losa - Nuevos enfoques de seguridad en un Banco Digital [roote...
Juan Francisco Losa - Nuevos enfoques de seguridad en un Banco Digital [roote...RootedCON
 
エンタープライズブロックチェーン基盤のひとつとしてのHyperledger Fabricの強みと課題
エンタープライズブロックチェーン基盤のひとつとしてのHyperledger Fabricの強みと課題エンタープライズブロックチェーン基盤のひとつとしてのHyperledger Fabricの強みと課題
エンタープライズブロックチェーン基盤のひとつとしてのHyperledger Fabricの強みと課題Hyperleger Tokyo Meetup
 
Intel Movidius Neural Compute Stick presentation @QConf San Francisco
Intel Movidius Neural Compute Stick presentation @QConf San FranciscoIntel Movidius Neural Compute Stick presentation @QConf San Francisco
Intel Movidius Neural Compute Stick presentation @QConf San FranciscoDarren Crews
 
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Canada
 
IoT Saturday PN 2019 - Eurotech
IoT Saturday PN 2019 - EurotechIoT Saturday PN 2019 - Eurotech
IoT Saturday PN 2019 - EurotechLuca Dazi
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudAmazon Web Services
 
Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Hannes Tschofenig
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based SecurityLiwei Ren任力偉
 
David Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & RansomwareDavid Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & RansomwareCSNP
 

La actualidad más candente (20)

Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
 Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ... Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
 
BlockchainLAB Hackathon
BlockchainLAB HackathonBlockchainLAB Hackathon
BlockchainLAB Hackathon
 
Developing IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SAC
Developing IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SACDeveloping IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SAC
Developing IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SAC
 
Introduction to the new MediaTek LinkIt™ Development Platform for RTOS
Introduction to the new MediaTek LinkIt™ Development Platform for RTOSIntroduction to the new MediaTek LinkIt™ Development Platform for RTOS
Introduction to the new MediaTek LinkIt™ Development Platform for RTOS
 
Creating a successful IoT product with MediaTek Labs
Creating a successful IoT product with MediaTek LabsCreating a successful IoT product with MediaTek Labs
Creating a successful IoT product with MediaTek Labs
 
DevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @CrowdstrikeDevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @Crowdstrike
 
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
 
Juan Francisco Losa - Nuevos enfoques de seguridad en un Banco Digital [roote...
Juan Francisco Losa - Nuevos enfoques de seguridad en un Banco Digital [roote...Juan Francisco Losa - Nuevos enfoques de seguridad en un Banco Digital [roote...
Juan Francisco Losa - Nuevos enfoques de seguridad en un Banco Digital [roote...
 
エンタープライズブロックチェーン基盤のひとつとしてのHyperledger Fabricの強みと課題
エンタープライズブロックチェーン基盤のひとつとしてのHyperledger Fabricの強みと課題エンタープライズブロックチェーン基盤のひとつとしてのHyperledger Fabricの強みと課題
エンタープライズブロックチェーン基盤のひとつとしてのHyperledger Fabricの強みと課題
 
citus™ iot ecosystem
citus™ iot ecosystemcitus™ iot ecosystem
citus™ iot ecosystem
 
Intel Movidius Neural Compute Stick presentation @QConf San Francisco
Intel Movidius Neural Compute Stick presentation @QConf San FranciscoIntel Movidius Neural Compute Stick presentation @QConf San Francisco
Intel Movidius Neural Compute Stick presentation @QConf San Francisco
 
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
 
IoT Saturday PN 2019 - Eurotech
IoT Saturday PN 2019 - EurotechIoT Saturday PN 2019 - Eurotech
IoT Saturday PN 2019 - Eurotech
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the Cloud
 
Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0
 
Azure Sphere
Azure SphereAzure Sphere
Azure Sphere
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
 
David Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & RansomwareDavid Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & Ransomware
 

Similar a TrustLeap GWAN - The multicore Future requires Parallelism Programming tools

RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsAdaCore
 
Software Engineering in the Age of SaaS and Cloud Computing - SERA 2013 - MFF...
Software Engineering in the Age of SaaS and Cloud Computing - SERA 2013 - MFF...Software Engineering in the Age of SaaS and Cloud Computing - SERA 2013 - MFF...
Software Engineering in the Age of SaaS and Cloud Computing - SERA 2013 - MFF...Jaroslav Gergic
 
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...GoGrid Cloud Hosting
 
Oracle GoldenGate Roadmap Oracle OpenWorld 2020
Oracle GoldenGate Roadmap Oracle OpenWorld 2020 Oracle GoldenGate Roadmap Oracle OpenWorld 2020
Oracle GoldenGate Roadmap Oracle OpenWorld 2020 Oracle
 
202104 technical challenging and our solutions - golang taipei
202104   technical challenging and our solutions - golang taipei202104   technical challenging and our solutions - golang taipei
202104 technical challenging and our solutions - golang taipeiRonald Hsu
 
What is expected from Chief Cloud Officers?
What is expected from Chief Cloud Officers?What is expected from Chief Cloud Officers?
What is expected from Chief Cloud Officers?Bernard Paques
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus SDN/OpenFlow switch
 
Locationless data science on a modern secure edge
Locationless data science on a modern secure edgeLocationless data science on a modern secure edge
Locationless data science on a modern secure edgeJohn Archer
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupHaidee McMahon
 
Enterprise Deployments: The Real World of Best Practices
Enterprise Deployments: The Real World of Best PracticesEnterprise Deployments: The Real World of Best Practices
Enterprise Deployments: The Real World of Best PracticesSimon Haslam
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...Cohesive Networks
 
Device to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in OracleDevice to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in OracleJunSeok Seo
 
[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...
[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...
[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...OpenStack Korea Community
 
Building Scalable Applications using Pivotal Gemfire/Apache Geode
Building Scalable Applications using Pivotal Gemfire/Apache GeodeBuilding Scalable Applications using Pivotal Gemfire/Apache Geode
Building Scalable Applications using Pivotal Gemfire/Apache Geodeimcpune
 
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...Linaro
 
SunGrid: Cloud Computing
SunGrid: Cloud ComputingSunGrid: Cloud Computing
SunGrid: Cloud ComputingUday Subbarayan
 
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...Cloudflare
 
Connecting the Smart Factory to the Cloud
Connecting the Smart Factory to the CloudConnecting the Smart Factory to the Cloud
Connecting the Smart Factory to the CloudHiveMQ
 
NTTドコモ様 導入事例 OpenStack Summit 2016 Barcelona 講演「Expanding and Deepening NTT D...
NTTドコモ様 導入事例 OpenStack Summit 2016 Barcelona 講演「Expanding and Deepening NTT D...NTTドコモ様 導入事例 OpenStack Summit 2016 Barcelona 講演「Expanding and Deepening NTT D...
NTTドコモ様 導入事例 OpenStack Summit 2016 Barcelona 講演「Expanding and Deepening NTT D...VirtualTech Japan Inc.
 

Similar a TrustLeap GWAN - The multicore Future requires Parallelism Programming tools (20)

RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
 
Software Engineering in the Age of SaaS and Cloud Computing - SERA 2013 - MFF...
Software Engineering in the Age of SaaS and Cloud Computing - SERA 2013 - MFF...Software Engineering in the Age of SaaS and Cloud Computing - SERA 2013 - MFF...
Software Engineering in the Age of SaaS and Cloud Computing - SERA 2013 - MFF...
 
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...
 
Oracle GoldenGate Roadmap Oracle OpenWorld 2020
Oracle GoldenGate Roadmap Oracle OpenWorld 2020 Oracle GoldenGate Roadmap Oracle OpenWorld 2020
Oracle GoldenGate Roadmap Oracle OpenWorld 2020
 
202104 technical challenging and our solutions - golang taipei
202104   technical challenging and our solutions - golang taipei202104   technical challenging and our solutions - golang taipei
202104 technical challenging and our solutions - golang taipei
 
What is expected from Chief Cloud Officers?
What is expected from Chief Cloud Officers?What is expected from Chief Cloud Officers?
What is expected from Chief Cloud Officers?
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
 
Locationless data science on a modern secure edge
Locationless data science on a modern secure edgeLocationless data science on a modern secure edge
Locationless data science on a modern secure edge
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
 
Enterprise Deployments: The Real World of Best Practices
Enterprise Deployments: The Real World of Best PracticesEnterprise Deployments: The Real World of Best Practices
Enterprise Deployments: The Real World of Best Practices
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 
Device to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in OracleDevice to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in Oracle
 
[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...
[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...
[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...
 
Building Scalable Applications using Pivotal Gemfire/Apache Geode
Building Scalable Applications using Pivotal Gemfire/Apache GeodeBuilding Scalable Applications using Pivotal Gemfire/Apache Geode
Building Scalable Applications using Pivotal Gemfire/Apache Geode
 
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
 
LoRaWAN Overview for Retail
LoRaWAN Overview for RetailLoRaWAN Overview for Retail
LoRaWAN Overview for Retail
 
SunGrid: Cloud Computing
SunGrid: Cloud ComputingSunGrid: Cloud Computing
SunGrid: Cloud Computing
 
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
 
Connecting the Smart Factory to the Cloud
Connecting the Smart Factory to the CloudConnecting the Smart Factory to the Cloud
Connecting the Smart Factory to the Cloud
 
NTTドコモ様 導入事例 OpenStack Summit 2016 Barcelona 講演「Expanding and Deepening NTT D...
NTTドコモ様 導入事例 OpenStack Summit 2016 Barcelona 講演「Expanding and Deepening NTT D...NTTドコモ様 導入事例 OpenStack Summit 2016 Barcelona 講演「Expanding and Deepening NTT D...
NTTドコモ様 導入事例 OpenStack Summit 2016 Barcelona 講演「Expanding and Deepening NTT D...
 

Último

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Último (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

TrustLeap GWAN - The multicore Future requires Parallelism Programming tools

  • 2. This document is aimed at helping people to understand the G-WAN technology. The data and charts included here follow documented procedures that require system tuning, and proper multi-thread client tools. This information is available on the G-WAN website. All these tests have been made on an 6-Core Mac Pro (Intel Xeon CPU W3680 @ 3.33GHz) with earlier versions of G-WAN. The latest release is faster due to constant improvements. This document is only a quick overview of why using G-WAN brings benefits on multicore systems. Further information regarding the internals of TWD Industries AG's technology are available under a proper NDA, to selected partners. 2 | Copyright © 2013, TWD Industries AG. All rights reserved. G-WAN
  • 3. Faster, More Scalable, Using Less CPU / RAM Resources Than All Web Server, App. Servers, and “Web Accelerators” 3 | Copyright © 2013, TWD Industries AG. All rights reserved. G-WAN
  • 4. Nginx – Web Server 4 | Copyright © 2013, TWD Industries AG. All rights reserved. G-WAN
  • 5. Lighttpd – Web Server 5 | Copyright © 2013, TWD Industries AG. All rights reserved. G-WAN
  • 6. Varnish – Web “Accelerator” (cache) 6 | Copyright © 2013, TWD Industries AG. All rights reserved. G-WAN
  • 7. Apache TomCat – Java App. Server 7 | Copyright © 2013, TWD Industries AG. All rights reserved. G-WAN
  • 8. Caucho Resin – Java App. Server 8 | Copyright © 2013, TWD Industries AG. All rights reserved. G-WAN
  • 9. Mono XPS – C# App. Server 9 | Copyright © 2013, TWD Industries AG. All rights reserved. G-WAN
  • 10. G-WAN – As A Mere Web Server 10 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 11. G-WAN – As A Web App. Server asm, C/C++, C#, Objective-C/C++, D, Java, Scala, JS, Go, Lua, PHP, Perl, Python, Ruby, etc. 11 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 12. In A Fraction Of The Time 12 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN 1 billion of HTTP requests on the [1-1000] concurrency range 100-byte (static file): G-WAN Average-RPS:826,821 Time: 1,516 seconds [00:25:16] Lighty Average-RPS:219,562 Time: 4,740 seconds [01:19:00] Nginx Average-RPS:167,977 Time: 6,823 seconds [01:53:43] Varnish Average-RPS:103,996 Time:10,817 seconds [03:00:17] hello world (dynamic contents): G-WAN/C Average-RPS:801,585 Time: 1,551 seconds [00:25:51] G-WAN/Java Average-RPS:759,726 Time: 1,648 seconds [00:27:28] G-WAN/JS Average RPS:768,659 Time: 1,696 seconds [00:28:16] G-WAN/Go Average RPS:784,113 Time: 1,892 seconds [00:31:32] Tomcat Average-RPS: 76,556 Time:20,312 seconds [05:38:32] Node.js Average-RPS: 14,209 Time:80,102 seconds [22:15:02] Go Average-RPS: 12,801 Time:84,811 seconds [23:33:31]
  • 13. Scalability & Performance By-Design 13 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 14. The CPU Freq. Halt Since 2004, CPUs run at 3GHz. We should have 100GHz CPUs today... 14 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 15. How: Lorenz-Waterwheel Designed to Scale From [1-∞] CPU Cores. Lock-Free, Wait-Free, Multi-Threaded and Event-Based. 15 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN Connections
  • 16. Result: Scaling on Multicore 16 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 17. How: A Custom Runtime G-WAN's Runtime Is Several Orders Of Magnitude Faster And Smaller Than Linux's System Runtime. 17 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN G-WAN Optimized Runtime Scripts: C/C++, Java, C#... Greater Portability & Stability, Speed-up Slow Languages.
  • 18. Why Scale on CPU Cores The Need For Efficiency: ● All Web/App. Servers Scale Horizontally ● Since 2004, CPUs Scale VERTICALLY ● Minimizing Resources Consumption TWD's Projects Needs G-WAN On Both Sides (Client and Server) without disturbing other tasks. 18 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 19. Scalability & Performance Demo: 45,000 Persons San Francisco Social Network 19 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 20. ORACLE Open World 2012 20 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 21. ORACLE Open World 2012 Making The Impossible Become Routine ● G-WAN Accelerating ORACLE NoSQL ● In A Social Gaming Demo Of 100 Millions Bots ● All Moving In Real-Time (Heading, Speed, etc.) ● Queried by 45,000 Persons Joining The Game ● And Achieving A Whooping 1.2 Billion of TPS ● ...On A Mere 6-Core Desktop Machine! 21 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 22. Core Design Philosophy Simplicity Rules (For Machines & Humans) Fly On Servers & Mobile Platforms 22 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 23. Security An App. Server That Can be Trusted Designed To Build A Secure Platform: ● Less Code, Less Bugs ● New Technologies (Parsing, Memory, etc.) ● No Vulnerability Found Since 2009 Launch Needed a Safe Server to release Secure Services. 23 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 24. Ubiquity A Lightweight (200 KB) App. Server Designed To Run Everywhere: ● Smartphones (Low-Consumption, Low-Latency) ● Embedded (Control At The Lowest Level) ● Servers(Web, SaaS, PaaS, Cloud services) With Scripts In 16 Programming Languages: (asm, C/C++, C#, Java, Scala, Go, Javascript, Lua, Perl...) 24 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 25. Interoperability An Universal Stack Open to Third-Parties: ● Applications (C/C++, C#, Java, Obj-C, Perl) ● Middleware (G-WAN, HTTP, SSL, etc.) ● Database (Key-Value, SQLite, ORACLE) 25 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 26. Zero-Configuration An Unobstrusive Stack Why Configuration Files Are Bad: ● Confusing, User Errors, Buggy, Version Incompatibilities ● Mostly Redundant with File System Information ● Inadequate: Adaptive Options Are Much Safer / Efficient Safer, Faster, Simpler, No Pointless User Lock-In, Able to Run on Unattended Systems. 26 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 27. Proven Industry Leaders Use G-WAN to accelerate: ● NoSQL (ORACLE Open World 2012) ● Big Data (EON, Inc PaaS in California) ● Streaming (multimedia, transcoding) 27 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 28. The G-WAN Project Development Schedule 28 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 29. 29 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN Reaching The Harvesting Phase 2-3 years 2-3 years 5 plus years  Integration still dominating  Exploitation gains speed  Consolidation of development processes is key  Minimize team churn and grow it only slowly  Focus on integration  Only very few clients  Gain experience in automation  Build a strong team  Integration becomes less important  Exploitation takes lead and grows significantly  Quality becomes key topic  Long term employees perform best Information Integration Information Exploitation 1) Ramp-up phase, 2008 2) Consolidation phase 3) Harvesting phase, 2013
  • 30. Productivity Standards Favourably Comparing With The Next Best: 30 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN Server Birth Files Blank Comment Code Total Nginx 2002 256 35,131 4,308 94,369 133,808 G-WAN 2009 171 11,198 42,706 56,766 110,670 G-WAN was written in less than half the time, and offers many more features in half the code of Nginx. Further, G-WAN's source code has 10x more comments than Nginx's code. Source Code Lines
  • 31. The TrustLeap Project The Need For G-WAN On Both Server and Client Sides 31 | Copyright © 2013, TWD Industries AG All rights reserved. G-WAN
  • 32. Unbreakable Security ● Future-Proof (I.e. QUANTUM Computers) ● Mathematically Proven (Can Be Trusted By All) ● Independent From Computing Power Used To Break It ● No More Need To Enlarge Encryption Keys ● No More Need To Change Encryption Algorithms ● Also Unbreakable Two & Three-Factor Authentication ● No Central Key Repository Needed (But Can Be Used) ● Mobiles / Embedded: Very Low CPU / RAM Overhead 32 | Copyright © 2013, TWD Industries AG All rights reserved. TrustLea p
  • 33. The Value Of Trust Applications ● Corporate Asset Protection (Patents, Talks, Databases) ● Public Asset Protection (e-Votes, Medical Records, Legal) ● International Negotiations (United Nations, Contracts) ● Transaction / Archiving Certifications (Indisputable) ● Defense (Impenetrable Communications, Drones, etc.) ● Chips Would Be Ideally Used (Tampering, I.P. Protection) ● Legitimacy to Impose A Licensing Monopole (Exclusivity) 33 | Copyright © 2013, TWD Industries AG All rights reserved. TrustLea p
  • 34. Trust Starts With Identity ● Email (Data Protection, Negotiations, Board Talks) ● Routers / Firewalls (How Safe Are Barriers If Broken?) ● Transactions (Trading, Contracts, Non-Repudiation) ● Storage (Confidentiality, Tamper-Proof, Full-Control) ● Defence (Remote Presence / Control, Chain Of Orders) ● I.P. Rights (What Worth Is A Proof That Can Be Spoofed?) ● Legal (Customers / Lawyers / Regulators Security Chain) 34 | Copyright © 2013, TWD Industries AG All rights reserved. TrustLea p
  • 35. TrustLeap Worldwide Corporate HQ TrustLeap Paradiesli 17 CH-8842 Unteriberg SZ Switzerland Phone +41 (0)55 414 20 93 Fax +41 (0)55 414 20 67 Email contact@trustleap.com www.trustleap.com About TrustLeap TrustLeap, the security division of TWD Industries AG, protects digital assets with cryptanalytically unbreakable technology (safe against unlimited computing power as it is proven mathematically that no key leaks can be exploited). The TrustLeap secure platform leverages offers of enterprise, cloud, networking, digital media and financial services in global strategic markets. TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other. Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely market their digital assets. TrustLea p 35 | Copyright © 2013, TWD Industries AG All rights reserved.