Proceedings of the 19th International Middleware Conference Industry 2018
DOI: 10.1145/3284028.3284029
|View full text |Cite
|
Sign up to set email alerts
|

Serverless Data Analytics in the IBM Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
45
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 65 publications
(45 citation statements)
references
References 2 publications
0
45
0
Order By: Relevance
“…To demonstrate this point, consider an application built with the Pywren [17,29] runtime, shown in Figure 1. In this experiment, 100 containers start simultaneously, each performing a basic computation before sending an ack to a leader node when completed.…”
Section: Introductionmentioning
confidence: 99%
“…To demonstrate this point, consider an application built with the Pywren [17,29] runtime, shown in Figure 1. In this experiment, 100 containers start simultaneously, each performing a basic computation before sending an ack to a leader node when completed.…”
Section: Introductionmentioning
confidence: 99%
“…Serverless platforms thus provide a scalable computation substrate where the amount of computational resources available to a task can be rapidly altered. Prior work has exploited this flexibility for video processing [11,27], numerical computation [15,25,33,34,40,81,96], data analytics [43,44,70,76], machine learning [18,39,83], and parallel compilation [26].…”
Section: Background and Motivationmentioning
confidence: 99%
“…Due to these benefits, serverless computing is being offered by all major cloud providers [7,32,38,55] and rapidly adopted by tenants [23], mainly for event-driven workloads (e.g., file transcoders). Recent work, however, has explored more general applications on serverless including video processing [11,27], numerical computing [40,81], and analytics [44,70,76]. These examples indicate significant interest in exploiting serverless computing beyond event handling, presumably because of its elasticity and ease of deployment.…”
Section: Introductionmentioning
confidence: 99%
“…These functions often read or write private data stored in the cloud infrastructure in order to achieve their operational goal (e.g. serverless data analytics applications [86]). This necessitates a robust access control mechanism in the serverless platforms to determine if a function invocation request is properly authenticated and has the required permissions to access a piece of data.…”
Section: Introductionmentioning
confidence: 99%