Nane Kratzke

Nane Kratzke
Lübeck University of Applied Sciences · Department for Electrical Engineering and Computer Science

Prof. Dr. rer. nat.
CfP => Future Internet: Special Issue "Cloud-Native Observability" https://bit.ly/3pHIx1O

About

77
Publications
122,399
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
782
Citations
Citations since 2017
44 Research Items
673 Citations
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
Introduction
Nane Kratzke is a professor for Computer Science at the Lübeck University of Applied Sciences in Germany. His research focuses on data science, cloud computing, and web-scale elastic systems. His latest project CloudTRANSIT deals with the question to transfer cloud applications between different cloud-service providers at runtime without downtime. He was employed at the German think-tank IABG and consulted the German Ministry of Defense and the German Air Force in questions concerning network-centric warfare as a consulting software architect.
Additional affiliations
September 2010 - present
Technische Hochschule Lübeck
Position
  • Professor
September 2010 - present
Technische Hochschule Lübeck
Position
  • Professor (Full)
Description
  • Programming, Web Technologies, Cloud Computing, Databases Enterprise Architectures
April 2009 - August 2010
Universität der Bundeswehr München
Position
  • Visiting Lecturer
Description
  • Enterprise Architectures
Education
September 1996 - March 2000
Universität der Bundeswehr München
Field of study
  • Computer Science

Publications

Publications (77)
Article
Full-text available
It is common sense that cloud-native applications (CNA) are intentionally designed for the cloud. Although this understanding can be broadly used it does not guide and explain what a cloud-native application exactly is. The term "cloud-native" was used quite frequently in birthday times of cloud computing (2006) which seems somehow obvious nowadays...
Article
Full-text available
Cloud computing can be a game-changer for computationally intensive tasks like simulations. The computational power of Amazon, Google, or Microsoft is even available to a single researcher. However, the pay-as-you-go cost model of cloud computing influences how cloud-native systems are being built. We transfer these insights to the simulation domai...
Article
Full-text available
Kubernetes (k8s) is a kind of cluster operating system for cloud-native workloads that has become a de-facto standard for container orchestration. Provided by more than one hundred vendors, it has the potential to protect the customer from vendor lock-in. However, the open-source k8s distribution consists of many optional and alternative features t...
Book
Märkte verändern sich immer schneller, Kundenwünsche stehen im Mittelpunkt – viele Unternehmen sehen sich 𝗛𝗲𝗿𝗮𝘂𝘀𝗳𝗼𝗿𝗱𝗲𝗿𝘂𝗻𝗴𝗲𝗻 gegenüber, die nur 𝗱𝗶𝗴𝗶𝘁𝗮𝗹 𝗯𝗲𝗵𝗲𝗿𝗿𝘀𝗰𝗵𝗯𝗮𝗿 sind. Um diese Anforderungen zu bewältigen, bietet sich der Einsatz von 𝗖𝗹𝗼𝘂𝗱-𝗻𝗮𝘁𝗶𝘃𝗲-𝗧𝗲𝗰𝗵𝗻𝗼𝗹𝗼𝗴𝗶𝗲𝗻 an. Dabei reicht es jedoch nicht aus, einen Account bei einem Cloud-Anbieter anzulegen....
Article
Full-text available
Cloud-native software systems often have a much more decentralized structure and many independently deployable and (horizontally) scalable components, making it more complicated to create a shared and consolidated picture of the overall decentralized system state. Today, observability is often understood as a triad of collecting and processing metr...
Article
Full-text available
This Special Issue presents some of the most recent innovations in cloud-native software and system engineering practices providing a broad and well-grounded picture of what the more and more frequently used term “Cloud-native” is currently used for. The contributions also address ad hoc approaches that became necessary as temporary measures in the...
Preprint
Full-text available
Background: Cloud-native software systems often have a much more decentralized structure and many independently deployable and (horizontally) scalable components, making it more complicated to create a shared and consolidated picture of the overall decentralized system state. Today, observability is often understood as a triad of collecting and pro...
Book
This volume contains the technical papers presented in the workshops, PhD Symposium and EU Projects Track which took place at the 8th European Conference on Service-Oriented and Cloud Computing, ESOCC 2020, held in Heraklion, Crete, Greece, in September 2020: 1st International Workshop on Edge Adoption and Migration, EdgeWays 2020, 16th Internation...
Chapter
According to our data, about 15% of programming students trick if they are aware that only a "dumb" robot evaluates their programming assignments unattended by programming experts. Especially in large-scale formats like MOOCs, this might become a question because to trick current automated assignment assessment systems (APAAS) is astonishingly easy...
Preprint
Full-text available
According to our data, about 15% of programming students trick if they are aware that only a "dumb" robot evaluates their programming assignments unattended by programming experts. Especially in large-scale formats like MOOCs, this might become a question because to trick current automated assignment assessment systems (APAAS) is astonishingly easy...
Article
Full-text available
From close to scratch, the COVID-19 pandemic created the largest volunteer supercomputer on earth. Sadly, processing resources assigned to the corresponding Folding@home project cannot be shared with other volunteer computing projects efficiently. Consequently, the largest supercomputer had significant idle times. This perspective paper investigate...
Preprint
Full-text available
From close to scratch, the COVID-19 pandemic created the largest volunteer supercomputer on earth. Sadly, processing resources assigned to the corresponding Folding@home project can not be shared with other volunteer computing projects efficiently. In consequence, the largest supercomputer had significant idle times. This perspective paper investig...
Preprint
Full-text available
The data from social networks like Twitter is a valuable source for research but full of redundancy, making it hard to provide large-scale, self-contained, and small datasets. The data recording is a common problem in social media-based studies and could be standardized. Sadly, this is hardly done. This paper reports on lessons learned from a long-...
Preprint
Cloud computing can be a game-changer for computationally intensive tasks like simulations. The computational power of Amazon, Google, or Microsoft is even available to a single researcher! But the pay-as-you-go cost model of cloud computing influences how cloud-native systems are being built. We transfer these insights to the simulation domain. Th...
Article
Full-text available
Cloud applications expose besides service endpoints also potential or actual vulnerabilities. Therefore, cloud security engineering efforts focus on hardening the fortress walls but seldom assume that attacks may be successful. At least against zero-day exploits, this approach is often toothless. Other than most security approaches and comparable t...
Conference Paper
Full-text available
This case study reports on two first-semester programming courses with more than 190 students. Both courses made use of automated assessments. We observed how students trick these systems by analysing the version history of suspect submissions. By analysing more than 3300 submissions, we revealed four astonishingly simple tricks (overfitting, evasi...
Preprint
Full-text available
This case study reports on two first-semester programmings courses with more than 190 students. Both courses made use of automated assessments of students code submissions. We observed how students trick these systems by analyzing the version history of suspect submissions. By analyzing more than 3300 submissions we revealed four astonishingly simp...
Preprint
Full-text available
Cloud applications expose - besides service endpoints - also potential or actual vulnerabilities. Therefore, cloud security engineering efforts focus on hardening the fortress walls but seldom assume that attacks may be successful. At least against zero-day exploits, this approach is often toothless. Other than most security approaches and comparab...
Preprint
Full-text available
Cloud-native applications are often designed for only one specific cloud infrastructure or platform. The effort to port such kind of applications into a different cloud is usually a laborious one time exercise. Modern Cloud-native application architecture approaches make use of popular elastic container platforms (Apache Mesos, Kubernetes, Docker S...
Technical Report
Full-text available
The project CloudTRANSIT dealt with the question of how to transfer cloud applications and services at runtime without downtime across cloud infrastructures from different public and private cloud service providers. This technical report summarizes the outcomes of approximately 20 research papers that have been published throughout the project. Thi...
Article
Full-text available
This paper presents a review of cloud application architectures and its evolution. It reports observations being made during a research project that tackled the problem to transfer cloud applications between different cloud infrastructures. As a side effect, we learned a lot about commonalities and differences from plenty of different cloud applica...
Preprint
Full-text available
This paper presents a review of cloud application architectures and its evolution. It reports observations being made during the course of a research project that tackled the problem to transfer cloud applications between different cloud infrastructures. As a side effect we learned a lot about commonalities and differences from plenty of different...
Chapter
Full-text available
Cloud-native applications are often designed for only one specific cloud infrastructure or platform. The effort to port such kind of applications into a different cloud is usually a laborious one time exercise. Modern Cloud-native application architecture approaches make use of popular elastic container platforms (Apache Mesos, Kubernetes, Docker S...
Preprint
Full-text available
This review focuses on the evolution of cloud computing and distributed ledger technologies (blockchains) over the last decade. Cloud computing relies mainly on a conceptually centralized service provisioning model, while blockchain technologies originate from a peer-to-peer and a completely distributed approach. Still, noteworthy commonalities bet...
Conference Paper
Full-text available
Cloud-native applications are intentionally designed for the cloud in order to leverage cloud platform features like horizontal scaling and elasticity-benefits coming along with cloud platforms. In addition to classical (and very often static) multi-tier deployment scenarios, cloud-native applications are typically operated on much more complex but...
Conference Paper
Full-text available
Cloud applications expose - beside service endpoints - also potential or actual vulnerabilities. And attackers have several advantages on their side. They can select the weapons, the point of time and the point of attack. Very often cloud application security engineering efforts focus to harden the fortress walls but seldom assume that attacks may...
Preprint
Full-text available
The project CloudTRANSIT dealt with the question how to transfer cloud applications and services at runtime without downtime across cloud infrastructures from different public and private cloud service providers. This technical report summarizes the outcomes of more than 20 research papers and reports that have been published throughout the course...
Conference Paper
Full-text available
There is no such thing as an impenetrable system, although the penetration of systems does get harder from year to year. The median days that intruders remained undetected on victim systems dropped from 416 days in 2010 down to 99 in 2016. Perhaps because of that, a new trend in security breaches is to compromise the forensic trail to allow the int...
Article
Full-text available
Cloud-native applications are intentionally designed for the cloud in order to leverage cloud platform features like horizontal scaling and elasticity - benefits coming along with cloud platforms. In addition to classical (and very often static) multi-tier deployment scenarios, cloud-native applications are typically operated on much more complex b...
Conference Paper
Full-text available
Elastic container platforms (ECP) like Docker Swarm, Kubernetes (k8s) and Apache Mesos have gotten more and more attention by practitioners in recent years [1]. Elastic container platforms fit very well with existing cloud-native application (CNA) architecture approaches [6]. Corresponding system designs often follow a microservice-based architectu...
Presentation
Full-text available
Von Juni bis September wurden Twitter-Interaktionen mit deutschen Politikern des 18. deutschen Bundestags und bundespolitisch relevanten Politikern der FDP und AfD ”mitgeschnitten” und als Open Data Datensatz für weitere Analysen aufbereitet. Insgesamt wurden die Accounts von 364 Politikern verfolgt. Im Rahmen dessen wurden etwa 120.000 Twitter Use...
Article
Full-text available
The German Bundestag elections are the most important elections in Germany. This dataset comprises Twitter interactions related to German politicians of the most important political parties over several months in the (pre-)phase of the German federal election campaigns in 2017. The Twitter accounts of more than 360 politicians were followed for fou...
Article
Full-text available
The capability to operate cloud-native applications can generate enormous business growth and value. But enterprise architects should be aware that cloud-native applications are vulnerable to vendor lock-in. We investigated cloud-native application design principles, public cloud service providers, and industrial cloud standards. All results indica...
Article
Full-text available
Microservices are used to build complex applications composed of small, independent and highly decoupled processes. Recently, microservices are often mentioned in one breath with container technologies like Docker. That is why operating system virtualization experiences a renaissance in cloud computing. These approaches shall provide horizontally s...
Code
Twista is a Twitter streaming and analysis command line tool suite implemented in Python 3.6. It provides the following core features: To crawl HTML pages for Twitter accounts, to collect Tweets (statuses, replies, retweets, replies) for a specified set of screennames, and to transform collected chunks of Tweets into a NetworkX graph for follow up...
Conference Paper
Full-text available
Elastic container platforms (like Kubernetes, Docker Swarm, Apache Mesos) fit very well with existing cloud-native application architecture approaches. So it is more than astonishing, that these already existing and open source available elastic platforms are not considered more consequently in multi-cloud research. Elastic container platforms prov...
Conference Paper
Full-text available
Due to REST-based protocols, microservice architectures are inherently horizontally scalable. That might be why the microservice architectural style is getting more and more attention for cloud-native application engineering. Corresponding microservice architectures often rely on a complex technology stack which includes containers, elastic platfor...
Article
Full-text available
Cloud computing enables companies getting computational and storage resources on demand. Especially when using features like elasticity and scaling, cloud computing can be a very powerful technology to run, e.g., a webservice without worries about failure by overload or wasting money by paid use of unneeded resources. For using these features, deve...
Chapter
Full-text available
Cloud computing enables to deliver innovative services very agile and at world-scale. Even very small companies with access on first class cloud engineering knowledge can create exponential business growth. Companies like Instagram or Netflix proofed that impressively. But, operating cloud-native applications is extremely challenging and overburden...
Conference Paper
Full-text available
The capability to operate cloud-native applications can create enormous business growth and value. But enterprise architects should be aware that cloud-native applications are vulnerable to vendor lock-in. We investigated cloud-native application design principles, public cloud service providers, and industrial cloud standards. All results indicate...
Conference Paper
Full-text available
Companies like Netflix, Google, Amazon, Twitter successfully exemplified elastic and scalable microservice architectures for very large systems. Microservice architectures are often realized in a way to deploy services as containers on container clusters. Containerized microservices often use lightweight and REST-based mechanisms. However, this lig...
Presentation
Full-text available
Project Cloud TRANSIT is a research project to support Small and Medium Sized Enterprise in deploying vendor lock-in avoiding and transferable cloud-native applications and services. The aim is to provide methodologies and tools to define secure, transferable and elastic services being deployable to any IaaS cloud infrastructure. The migration of t...
Conference Paper
Full-text available
Container clusters have an inherent complexity. A distributed container application in the cloud can be complex at planning, installation and configuration, maintenance and search for failures. Small and medium enterprises (SMEs) are mostly limited by their personnel and financial restrictions. Using advanced cloud technologies like a container clu...
Article
Full-text available
In previous work, we concluded that container technologies and overlay networks typically have negative performance impacts, mainly due to an additional layer to networking. This is what everybody would expect, only the degree of impact might be questionable. These negative performance impacts can be accepted (if they stay moderate), due to a bette...
Article
Full-text available
Werden Bachelor- oder Masterarbeiten in Unternehmen geschrieben, werden diese häufig mit Sperrvermerken versehen, um die Interessen der Unternehmen zu schützen. Solche Abschlussarbeiten bearbeiten häufig interessante und äußerst praxisrelevante Fragestellungen. Erkenntnisse und Lösungsansätze gelangen jedoch kaum an das Licht der Öffentlichkeit. In...
Article
Full-text available
Cloud service selection can be a complex and challenging task for a cloud engineer. Most current approaches try to identify a best cloud service provider by evaluating several relevant criteria like prices, processing, memory, disk, network performance, quality of service and so on. Nevertheless, the decision making problem involves so many variabl...
Conference Paper
Full-text available
Microservices are used to build complex applications composed of small, independent and highly decoupled processes. Recently, microservices are often mentioned in one breath with container technologies like Docker. That is why operating system virtualization experiences a renaissance in cloud computing. These approaches shall provide horizontally s...
Article
Full-text available
A summary of some key findings and online sources how to convince a reviewer in his or her first 10 minutes reviewing a paper by paying special attention to a paper's title, abstract, introduction, conclusion and summary. http://www.nkode.io/2015/01/22/how-to-write-a-paper.html
Article
Full-text available
To overcome vendor lock-in obstacles in public cloud computing the capability to define transferable cloud-based services is crucial but not yet solved satisfactory. This is especially true for small and medium sized enterprises being typically not able to operate a vast staff of cloud service and IT experts. Actual state of the art cloud service d...
Article
Full-text available
Actual state of the art of cloud service design does not deal systematically how to define, deploy and operate cross-platform capable cloud services. By simplifying and harmonizing the use of IaaS cloud infrastructures using lightweight virtualization approaches, the transfer of cloud deployments between a variety of cloud service providers becomes...
Article
Full-text available
Cost efficiency is an often mentioned strength of cloud computing. In times of decreasing educational budgets virtual labs provided by cloud computing might be therefore an interesting option for higher education organizations or IT training facilities. An analysed use case of a web technology lecture and a corresponding practical course of a compu...
Chapter
Full-text available
Although cloud computing is in all mouth today it seems that there exist only little evidences in literature that it is more economical effective than classical data center approaches. Due to a performed qualitative analysis on COBIT, TOGAF and ITIL this paper postulates that cloud-based approaches are likely to provide more benefits than disprofit...
Conference Paper
Full-text available
Coud computing is characterized by ex ante cost intransparency making it difficult - from a decision point of view - to decide for or against a cloud based approach before a system enters its operational phase. This contribution develops a four step decision making model and describe its application by a performed use case analysis of the higher ed...
Conference Paper
Full-text available
Cost efficiency is an often mentioned strength of cloud computing (Talukader et al., 2010). In times of decreasing educational budgets virtual labs provided by cloud computing might be an interesting alternative for higher education organizations or IT training facilities. This contribution analyzes the cost advantage of virtual educational labs pr...
Chapter
Full-text available
We present an agent-based model to compare different coordination patterns in joint fire support (JFS) scenarios. Modern warfighting approaches depend heavily on a separation of concerns (like reconnaissance, coordination and engagement) and therefore impose high requirements on the coordination of all involved parties. Following the General Refere...
Conference Paper
Full-text available
This paper presents an agent-based model to compare different coordination patterns in joint fire support (JFS) scenarios. Modern war fighting approaches depend heavily on a separation of concerns (like reconnaissance, coordination and engagement) and therefore impose high requirements on the coordination of all involved parties. Following the Gene...
Conference Paper
Full-text available
On the one hand models can be used as navigational tools respecting men-tal processing capabilities of persons. On the other hand models can be analyzed au-tomatically by information systems to deduce relevant content for knowledge manage-ment IT-components as E-Learning-Applications, KM-Portals, document management systems, etc.. Therefore models...
Conference Paper
Full-text available
Identification of tracked objects is a key capability of surveillance and information systems for air, surface (maritime), ground, and space environments. It improves situational awareness and offers decision support to operational users. Bayesian-style identification processes provide an identity as result. As input for taking further operational...
Conference Paper
Full-text available
This paper covers the influence of system- and enterprise architectures on knowledge management in software development projects. The common impact of architectures is researched in the context of six case studies of medium and large sized software- and system development as well as technical and organizational consultancy companies in the military...
Book
Full-text available
Zahlreiche Unternehmen betreiben Wissensmanagement, um ihr vorhandenes Wissen gezielt zu nutzen, zu vermehren und in Wettbewerbsvorteile umzusetzen. Dabei herrscht zumeist eine intraorganisationale Sichtweise vor. Jedoch erlangen interorganisationale Aspekte im zunehmend vom Outsourcing und der Konzentration auf Kernkompetenzen bestimmten betriebsw...
Article
Full-text available
Im interorganisationalen Wissensmanagement müssen Organisationen zum einen Kernkompetenz relevantes Wissen schützen, um überhaupt attraktiv für Kooperationen zu sein. Anderseits müssen Organisationen innerhalb von Partnerschaften Wissen teilen, um wertvoll für eine Kooperation zu sein. Daher muss interorganisationales Wissensmanagement gleichzeitig...
Article
Full-text available
Im Kontext des IT-unterst ¤ utzten WM sind eine Vielzahl von Vorgehensmo- dellen (VM) zur ganzheitlichen Einfuhrung von Wissensmanagement Systemen ent- wickelt worden. Grunds¤ atzlich ist also davon auszugehen, dass unterschiedliche Or- ganisationen nach verschiedenen VM vorgehen. Entsprechende Komplikationen beim îBetriebî eines gemeinsamen Wissen...

Network

Cited By

Projects

Projects (3)
Project
Data-driven political campaigns can be successful. "The Obama 2012 campaign used data analytics and the experimental method to assemble a winning coalition vote by vote. In doing so, it overturned the long dominance of TV advertising in U.S. politics and created something new in the world: a national campaign run like a local ward election, where the interests of individual voters were known and addressed." But four years later, Hillary Clinton’s data-driven campaign organized by the same party failed under the eyes of the world. The question is why data-driven campaigns worked for Barack Obama but not for Hillary Clinton? There is an interesting article proclaiming that ‘data-driven’ campaigns are killing the US Democratic Party, because the wrong lessons from Obama’s success have been learned. Dave Gold states that "Democrats have allowed microtargeting to become microthinking. Each cycle, we speak to fewer and fewer people and have less and less to say" although adressing the right audience. So, whether this is true or not can not be answered by a dataset. However, it should be obvious for the reader that data collected acompanying such election campaigns might contain worthful insights. Especially Twitter analysis of US election campaigns are done for a while. However, there exist only some open accessible Twitter datasets with a clear focus on political election campaigns in countries of the European Union. That is why this project records Twitter interactions for one further European country (Germany). The project has the following objectives: - Record a representative dataset of Twitter interactions during to pre- and hot-phase for the 19th German Bundestag elections. - Provide this dataset via an Open Data platform like Zenodo. - Develop or contribute to pragmatic software tools that enable to record Twitter datasets over long period of times. - Perform a network analysis of the recorded dataset regarding political parties in Germany. - Publish analysis results in Open Access scholary contribution channels.
Project
All project results can be found here: https://cosa.fh-luebeck.de/en/cloud/projects/cloud-transit Current state of the art cloud based software services are often characterized by a highly implicit technological dependency on underlying hosting cloud infrastructures. The project Cloud TRANSIT investigates, how to design cloud based software services to reduce technological dependencies on underlying cloud infrastructures. By designing and developing a generic cloud service description language, it should be possible to define secure, transferable and elastic services of typical complexity being deployable to any IaaS cloud infrastructure. Furthermore, it should be possible to migrate these services from one private or public cloud infrastructure to another (not necessary compatible) cloud infrastructure. This kind of transferability reduces cloud infrastructure related technical vendor lock-in problems for small and medium sized enterprises.