Nane KratzkeLübeck University of Applied Sciences · Department for Electrical Engineering and Computer Science
Nane Kratzke
Prof. Dr. rer. nat.
Exploring Best Practices Integrating Large Language Models into Cloud-native Software Engineering
About
99
Publications
135,561
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,053
Citations
Introduction
Nane Kratzke is a professor for Computer Science at the Lübeck University of Applied Sciences in Germany. His research focuses on data science, cloud computing, and web-scale elastic systems. His latest project CloudTRANSIT deals with the question to transfer cloud applications between different cloud-service providers at runtime without downtime. He was employed at the German think-tank IABG and consulted the German Ministry of Defense and the German Air Force in questions concerning network-centric warfare as a consulting software architect.
Additional affiliations
Education
September 1996 - March 2000
Publications
Publications (99)
It is common sense that cloud-native applications (CNA) are intentionally designed for the cloud. Although this understanding can be broadly used it does not guide and explain what a cloud-native application exactly is. The term "cloud-native" was used quite frequently in birthday times of cloud computing (2006) which seems somehow obvious nowadays...
Cloud computing can be a game-changer for computationally intensive tasks like simulations. The computational power of Amazon, Google, or Microsoft is even available to a single researcher. However, the pay-as-you-go cost model of cloud computing influences how cloud-native systems are being built. We transfer these insights to the simulation domai...
Märkte verändern sich immer schneller, Kundenwünsche stehen im Mittelpunkt – viele Unternehmen sehen sich 𝗛𝗲𝗿𝗮𝘂𝘀𝗳𝗼𝗿𝗱𝗲𝗿𝘂𝗻𝗴𝗲𝗻 gegenüber, die nur 𝗱𝗶𝗴𝗶𝘁𝗮𝗹 𝗯𝗲𝗵𝗲𝗿𝗿𝘀𝗰𝗵𝗯𝗮𝗿 sind. Um diese Anforderungen zu bewältigen, bietet sich der Einsatz von 𝗖𝗹𝗼𝘂𝗱-𝗻𝗮𝘁𝗶𝘃𝗲-𝗧𝗲𝗰𝗵𝗻𝗼𝗹𝗼𝗴𝗶𝗲𝗻 an.
Dabei reicht es jedoch nicht aus, einen Account bei einem Cloud-Anbieter anzulegen....
Background: This study presents a graph-based, macro-scale, polarity-based, echo chamber detection approach for Twitter. Echo chambers are a concern as they can spread misinformation, and reinforce harmful stereotypes and biases in social networks. Methods: This study recorded the German-language Twitter stream over two months, recording about 6.7M...
Background: The intricate architecture of container orchestration systems like Kubernetes relies on the critical role of declarative manifest files that serve as the blueprints for orchestration. However, managing these manifest files often presents complex challenges requiring significant DevOps expertise. Methodology: This position paper explores...
Background: The intricate architecture of container orchestration systems like Kubernetes relies on the critical role of declarative manifest files that serve as the blueprints for orchestration. However, managing these manifest files often presents complex challenges requiring significant DevOps expertise. Methodology: This position paper explores...
Background: This study presents a graph-based and purely structural analysis to detect echo chambers on Twitter. Echo chambers are a concern as they can spread misinformation and reinforce harmful stereotypes and biases in social networks. Methods: The study recorded the German-language Twitter stream over two months, recording about 180.000 accoun...
This Special Issue presents some of the most recent innovations in cloud-native software and system engineering practices providing a broad and well-grounded picture of what the more and more frequently used term “Cloud-native” is currently used for. The contributions also address ad hoc approaches that became necessary as temporary measures in the...
Cloud-native software systems often have a much more decentralized structure and many independently deployable and (horizontally) scalable components, making it more complicated to create a shared and consolidated picture of the overall decentralized system state. Today, observability is often understood as a triad of collecting and processing metr...
Background: Cloud-native software systems often have a much more decentralized structure and many independently deployable and (horizontally) scalable components, making it more complicated to create a shared and consolidated picture of the overall decentralized system state. Today, observability is often understood as a triad of collecting and pro...
This volume contains the technical papers presented in the workshops, PhD Symposium and EU Projects Track which took place at the 8th European Conference on Service-Oriented and Cloud Computing, ESOCC 2020, held in Heraklion, Crete, Greece, in September 2020: 1st International Workshop on Edge Adoption and Migration, EdgeWays 2020, 16th Internation...
Kubernetes (k8s) is a kind of cluster operating system for cloud-native workloads that has become a de-facto standard for container orchestration. Provided by more than one hundred vendors, it has the potential to protect the customer from vendor lock-in. However, the open-source k8s distribution consists of many optional and alternative features t...
According to our data, about 15% of programming students trick if they are aware that only a "dumb" robot evaluates their programming assignments unattended by programming experts. Especially in large-scale formats like MOOCs, this might become a question because to trick current automated assignment assessment systems (APAAS) is astonishingly easy...
According to our data, about 15% of programming students trick if they are aware that only a "dumb" robot evaluates their programming assignments unattended by programming experts. Especially in large-scale formats like MOOCs, this might become a question because to trick current automated assignment assessment systems (APAAS) is astonishingly easy...
From close to scratch, the COVID-19 pandemic created the largest volunteer supercomputer on earth. Sadly, processing resources assigned to the corresponding Folding@home project cannot be shared with other volunteer computing projects efficiently. Consequently, the largest supercomputer had significant idle times. This perspective paper investigate...
From close to scratch, the COVID-19 pandemic created the largest volunteer supercomputer on earth. Sadly, processing resources assigned to the corresponding Folding@home project can not be shared with other volunteer computing projects efficiently. In consequence, the largest supercomputer had significant idle times. This perspective paper investig...
The data from social networks like Twitter is a valuable source for research but full of redundancy, making it hard to provide large-scale, self-contained, and small datasets. The data recording is a common problem in social media-based studies and could be standardized. Sadly, this is hardly done. This paper reports on lessons learned from a long-...
Cloud computing can be a game-changer for computationally intensive tasks like simulations. The computational power of Amazon, Google, or Microsoft is even available to a single researcher!
But the pay-as-you-go cost model of cloud computing influences how cloud-native systems are being built. We transfer these insights to the simulation domain.
Th...
Cloud applications expose besides service endpoints also potential or actual vulnerabilities. Therefore, cloud security engineering efforts focus on hardening the fortress walls but seldom assume that attacks may be successful. At least against zero-day exploits, this approach is often toothless. Other than most security approaches and comparable t...
This case study reports on two first-semester programming courses with more than 190 students. Both courses made use of automated assessments. We observed how students trick these systems by analysing the version history of suspect submissions. By analysing more than 3300 submissions, we revealed four astonishingly simple tricks (overfitting, evasi...
This case study reports on two first-semester programmings courses with more than 190 students. Both courses made use of automated assessments of students code submissions. We observed how students trick these systems by analyzing the version history of suspect submissions. By analyzing more than 3300 submissions we revealed four astonishingly simp...
Cloud applications expose - besides service endpoints - also potential or actual vulnerabilities. Therefore, cloud security engineering efforts focus on hardening the fortress walls but seldom assume that attacks may be successful. At least against zero-day exploits, this approach is often toothless. Other than most security approaches and comparab...
Cloud-native applications are often designed for only one specific cloud infrastructure or platform. The effort to port such kind of applications into a different cloud is usually a laborious one time exercise. Modern Cloud-native application architecture approaches make use of popular elastic container platforms (Apache Mesos, Kubernetes, Docker S...
The project CloudTRANSIT dealt with the question of how to transfer cloud applications and services at runtime without downtime across cloud infrastructures from different public and private cloud service providers. This technical report summarizes the outcomes of approximately 20 research papers that have been published throughout the project. Thi...
This paper presents a review of cloud application architectures and its evolution. It reports observations being made during a research project that tackled the problem to transfer cloud applications between different cloud infrastructures. As a side effect, we learned a lot about commonalities and differences from plenty of different cloud applica...
This paper presents a review of cloud application architectures and its evolution. It reports observations being made during the course of a research project that tackled the problem to transfer cloud applications between different cloud infrastructures. As a side effect we learned a lot about commonalities and differences from plenty of different...
Cloud-native applications are often designed for only one specific cloud infrastructure or platform. The effort to port such kind of applications into a different cloud is usually a laborious one time exercise. Modern Cloud-native application architecture approaches make use of popular elastic container platforms (Apache Mesos, Kubernetes, Docker S...
This review focuses on the evolution of cloud computing and distributed ledger technologies (blockchains) over the last decade. Cloud computing relies mainly on a conceptually centralized service provisioning model, while blockchain technologies originate from a peer-to-peer and a completely distributed approach. Still, noteworthy commonalities bet...
Cloud-native applications are intentionally designed for the cloud in order to leverage cloud platform features like horizontal scaling and elasticity-benefits coming along with cloud platforms. In addition to classical (and very often static) multi-tier deployment scenarios, cloud-native applications are typically operated on much more complex but...
Cloud applications expose - beside service endpoints - also potential or actual vulnerabilities. And attackers have several advantages on their side. They can select the weapons, the point of time and the point of attack. Very often cloud application security engineering efforts focus to harden the fortress walls but seldom assume that attacks may...
The project CloudTRANSIT dealt with the question how to transfer cloud applications and services at runtime without downtime across cloud infrastructures from different public and private cloud service providers. This technical report summarizes the outcomes of more than 20 research papers and reports that have been published throughout the course...
There is no such thing as an impenetrable system, although the penetration of systems does get harder from year to year. The median days that intruders remained undetected on victim systems dropped from 416 days in 2010 down to 99 in 2016. Perhaps because of that, a new trend in security breaches is to compromise the forensic trail to allow the int...
Cloud-native applications are intentionally designed for the cloud in order to leverage cloud platform features like horizontal scaling and elasticity - benefits coming along with cloud platforms. In addition to classical (and very often static) multi-tier deployment scenarios, cloud-native applications are typically operated on much more complex b...
Elastic container platforms (ECP) like Docker Swarm, Kubernetes (k8s) and Apache Mesos have gotten more and more attention by practitioners in recent years [1]. Elastic container platforms fit very well with existing cloud-native application (CNA) architecture approaches [6]. Corresponding system designs often follow a microservice-based architectu...
Von Juni bis September wurden Twitter-Interaktionen mit deutschen Politikern des 18. deutschen Bundestags und bundespolitisch relevanten Politikern der FDP und AfD ”mitgeschnitten” und als Open Data Datensatz für weitere Analysen aufbereitet. Insgesamt wurden die Accounts von 364 Politikern verfolgt. Im Rahmen dessen wurden etwa 120.000 Twitter Use...
The German Bundestag elections are the most important elections in Germany. This dataset comprises Twitter interactions related to German politicians of the most important political parties over several months in the (pre-)phase of the German federal election campaigns in 2017. The Twitter accounts of more than 360 politicians were followed for fou...
The capability to operate cloud-native applications can generate enormous business growth and value. But enterprise architects should be aware that cloud-native applications are vulnerable to vendor lock-in. We investigated cloud-native application design principles, public cloud service providers, and industrial cloud standards. All results indica...
Microservices are used to build complex applications composed of small, independent and highly decoupled processes. Recently, microservices are often mentioned in one breath with container technologies like Docker. That is why operating system virtualization experiences a renaissance in cloud computing. These approaches shall provide horizontally s...
Twista is a Twitter streaming and analysis command line tool suite implemented in Python 3.6. It provides the following core features: To crawl HTML pages for Twitter accounts, to collect Tweets (statuses, replies, retweets, replies) for a specified set of screennames, and to transform collected chunks of Tweets into a NetworkX graph for follow up...
Elastic container platforms (like Kubernetes, Docker Swarm, Apache Mesos) fit very well with existing cloud-native application architecture approaches. So it is more than astonishing, that these already existing and open source available elastic platforms are not considered more consequently in multi-cloud research. Elastic container platforms prov...
Due to REST-based protocols, microservice architectures are inherently horizontally scalable. That might be why the microservice architectural style is getting more and more attention for cloud-native application engineering. Corresponding microservice architectures often rely on a complex technology stack which includes containers, elastic platfor...
Cloud computing enables companies getting computational and storage resources on demand. Especially when using features like elasticity and scaling, cloud computing can be a very powerful technology to run, e.g., a webservice without worries about failure by overload or wasting money by paid use of unneeded resources. For using these features, deve...
Cloud computing enables to deliver innovative services very agile and at world-scale. Even very small companies with access on first class cloud engineering knowledge can create exponential business growth. Companies like Instagram or Netflix proofed that impressively. But, operating cloud-native applications is extremely challenging and overburden...
The capability to operate cloud-native applications can create enormous business growth and value. But enterprise architects should be aware that cloud-native applications are vulnerable to vendor lock-in. We investigated cloud-native application design principles, public cloud service providers, and industrial cloud standards. All results indicate...
Companies like Netflix, Google, Amazon, Twitter successfully exemplified elastic and scalable microservice architectures for very large systems. Microservice architectures are often realized in a way to deploy services as containers on container clusters. Containerized microservices often use lightweight and REST-based mechanisms. However, this lig...
Project Cloud TRANSIT is a research project to support Small and Medium Sized Enterprise in deploying vendor lock-in avoiding and transferable cloud-native applications and services. The aim is to provide methodologies and tools to define secure, transferable and elastic services being deployable to any IaaS cloud infrastructure. The migration of t...
Container clusters have an inherent complexity. A distributed container application in the cloud can be complex at planning, installation and configuration, maintenance and search for failures. Small and medium enterprises (SMEs) are mostly limited by their personnel and financial restrictions. Using advanced cloud technologies like a container clu...
In previous work, we concluded that container technologies and overlay networks typically have negative performance impacts, mainly due to an additional layer to networking. This is what everybody would expect, only the degree of impact might be questionable. These negative performance impacts can be accepted (if they stay moderate), due to a bette...
Werden Bachelor- oder Masterarbeiten in Unternehmen geschrieben, werden diese häufig mit Sperrvermerken versehen, um die Interessen der Unternehmen zu schützen. Solche Abschlussarbeiten bearbeiten häufig interessante und äußerst praxisrelevante Fragestellungen. Erkenntnisse und Lösungsansätze gelangen jedoch kaum an das Licht der Öffentlichkeit. In...
Cloud service selection can be a complex and challenging task for a cloud engineer. Most current approaches try to identify a best cloud service provider by evaluating several relevant criteria like prices, processing, memory, disk, network performance, quality of service and so on. Nevertheless, the decision making problem involves so many variabl...
Microservices are used to build complex applications composed of small, independent and highly decoupled processes. Recently, microservices are often mentioned in one breath with container technologies like Docker. That is why operating system virtualization experiences a renaissance in cloud computing. These approaches shall provide horizontally s...
A summary of some key findings and online sources how to convince a reviewer in his or her first 10 minutes reviewing a paper by paying special attention to a paper's title, abstract, introduction, conclusion and summary.
http://www.nkode.io/2015/01/22/how-to-write-a-paper.html
To overcome vendor lock-in obstacles in public cloud computing the capability to define transferable cloud-based services is crucial but not yet solved satisfactory. This is especially true for small and medium sized enterprises being typically not able to operate a vast staff of cloud service and IT experts. Actual state of the art cloud service d...
Actual state of the art of cloud service design does not deal systematically how to define, deploy and operate cross-platform capable cloud services. By simplifying and harmonizing the use of IaaS cloud infrastructures using lightweight virtualization approaches, the transfer of cloud deployments between a variety of cloud service providers becomes...
Cost efficiency is an often mentioned strength of cloud computing. In times of decreasing educational budgets virtual labs provided by cloud computing might be therefore an interesting option for higher education organizations or IT training facilities. An analysed use case of a web technology lecture and a corresponding practical course of a compu...
Although cloud computing is in all mouth today it seems that there exist only little evidences in literature that it is more economical effective than classical data center approaches. Due to a performed qualitative analysis on COBIT, TOGAF and ITIL this paper postulates that cloud-based approaches are likely to provide more benefits than disprofit...
Coud computing is characterized by ex ante cost intransparency making it difficult - from a decision point of view - to decide for or against a cloud based approach before a system enters its operational phase. This contribution develops a four step decision making model and describe its application by a performed use case analysis of the higher ed...
Cost efficiency is an often mentioned strength of cloud computing (Talukader et al., 2010). In times of decreasing educational budgets virtual labs provided by cloud computing might be an interesting alternative for higher education organizations or IT training facilities. This contribution analyzes the cost advantage of virtual educational labs pr...
We present an agent-based model to compare different coordination patterns in joint fire support (JFS) scenarios. Modern warfighting
approaches depend heavily on a separation of concerns (like reconnaissance, coordination and engagement) and therefore impose
high requirements on the coordination of all involved parties. Following the General Refere...
This paper presents an agent-based model to compare different coordination patterns in joint fire support (JFS) scenarios. Modern war fighting approaches depend heavily on a separation of concerns (like reconnaissance, coordination and engagement) and therefore impose high requirements on the coordination of all involved parties. Following the Gene...
On the one hand models can be used as navigational tools respecting men-tal processing capabilities of persons. On the other hand models can be analyzed au-tomatically by information systems to deduce relevant content for knowledge manage-ment IT-components as E-Learning-Applications, KM-Portals, document management systems, etc.. Therefore models...
Identification of tracked objects is a key capability of surveillance and information systems for air, surface (maritime), ground, and space environments. It improves situational awareness and offers decision support to operational users. Bayesian-style identification processes provide an identity as result. As input for taking further operational...
This paper covers the influence of system- and enterprise architectures on knowledge management in software development projects. The common impact of architectures is researched in the context of six case studies of medium and large sized software- and system development as well as technical and organizational consultancy companies in the military...
Zahlreiche Unternehmen betreiben Wissensmanagement, um ihr vorhandenes Wissen gezielt zu nutzen, zu vermehren und in Wettbewerbsvorteile umzusetzen. Dabei herrscht zumeist eine intraorganisationale Sichtweise vor. Jedoch erlangen interorganisationale Aspekte im zunehmend vom Outsourcing und der Konzentration auf Kernkompetenzen bestimmten betriebsw...