Menu

Arnaud CONTES

Sophia Antipolis

En résumé

* Grid and Cloud Computing
* Parallel, distributed and Concurrent Programming
* Security
* Middleware and Web technologies
* Entreprise, Solution and Application Architect
* Project management (internal projects, EU proposal writing and WP lead)
* Teaching and Training
* Product Evangelist
* Good understanding of Open-Source Licenses and Dual-licensing model
Specialties

Mes compétences :
Architecture
Cloud
COMPUTING
Design
Distributed computing
optimization
Performance
Proactive
Security

Entreprises

  • Amadeus IT Group - QA Engineer

    Sophia Antipolis 2012 - maintenant
  • Avisto - Ingénieur

    Vallauris 2012 - maintenant
  • Activeeon - Architecte Logiciel

    2007 - 2012 * Tech Lead / Core designer of
    - ProActive Programming , a library for distributed and parallel programming in Java (600Kloc)
    - IC2D, an Eclipse RCP-based application for monitoring, optimizing and debugging distributed applications written using ProActive Programming (160Kloc)
    - Scheduling SaaS, a Software-as-a-Service version (access through either a REST api or a web portal based on the Google Web Toolkit) of the Scheduler and the Resource Manager (150Kloc)

    * On-site and Off-site Training on ActiveEon's products,
    * Teaching related to Cloud and Grid techonologies and Java
    * Project Management ( EU proposal writing and WP lead, internal project lead )
    * System Administrator
  • INRIA - Software Engineer

    Le Chesnay 2007 - 2007 The GridCOMP EU-FP6 funded project (http://gridcomp.ercim.org/). The project goals were to provide the reference implementation of the Grid Component Model.

    GridCOMP provides the reference implementation of the Grid Component Model (GCM). The developed prototype takes the ProActive Parallel Suite as the starting point to provide the functional features of GCM components.

    As expert of the ProActive Parallel Suite, my work consisted in fixing design and implementation to maximize the performance of the product as well as designing a security infrastructure for the reference model.
  • Cardiff University - Research Associate

    Pélissanne 2005 - 2006 The main concept behind the idea of data provenance is to enable the recording of the process by which a result was generated. This is fundamental for many real life applications (science, engineering, medical domain, supply management, etc). Without such information, users cannot reproduce, analyze or validate processes or experiments.

    I have been leading the technical part of the Tools and Setup Work Package whose aim is to provide a set of tool allowing the visualization and the analysis of an application workflow.

    In order to reach the level of flexibility required to express validation rules for any kind of applications, we have built the analysis engine out of a rule engine. In this configuration, the outcome of all parts of the application is put as collection of knowledge in the rule engine and the application manager writes a set of rules that validate or not the execution of the application. The validation can be perform either during or after the execution.

    A visualization tool was also developped to help application users, managers and developers understanding the behaviour of the application and its outcomes.
  • INRIA - Doctorat

    Le Chesnay 2001 - 2005 Middlewares provide all major security-related technologies to build a secure application. However developers still have to select the most accurate security technology given their needs and to handle all its underlying concepts and processes.

    my thesis proposes a decentralized security model which takes care of security requirements expressed by all actors (resource providers, administrators, users) involved in a computation. The security policy is read from external policy files allowing the adaptation of the application's security according to its deployment. It has been conceived to handle specific behaviors which could happen during a distributed application life-cycle. The implementation within the ProActive library has validated the approach and had demonstrated its advantages. Thanks to the use of a meta-object protocol, its use is not only transparent for the application itself but also for the other features of the library (migration, group comm., peer-to-peer).

Formations

Pas de formation renseignée

Réseau

Annuaire des membres :