The Pug is a breed of dog with a wrinkly, short-muzzled face, and curled tail. The breed has a fine, glossy coat that comes in a variety of colours, most often fawn or black, and a compact square body with well-developed muscles.
Pugs were brought from China to Europe in the sixteenth century and were popularized in Western Europe by the House of Orange of the Netherlands, and the House of Stuart.In the United Kingdom, in the nineteenth century, Queen Victoria developed a passion for pugs which she passed on to other members of the Royal family. Pugs are known for being sociable and gentle companion dogs.[3] The breed remains popular into the twenty-first century, with some famous celebrity owners. A pug was judged Best in Show at the World Dog Show in 2004.
Donald J. Trump For President, Inc. –– Why Now?
On November 8, 2016, the American People delivered a historic victory and took our country back. This victory was the result of a Movement to put America first, to save the American economy, and to make America once again a shining city on the hill. But our Movement cannot stop now - we still have much work to do.
This is why our Campaign Committee, Donald J. Trump for President, Inc., is still here.
We will provide a beacon for this historic Movement as our lights continue to shine brightly for you - the hardworking patriots who have paid the price for our freedom. While Washington flourished, our American jobs were shipped overseas, our families struggled, and our factories closed - that all ended on January 20, 2017.
This Campaign will be a voice for all Americans, in every city near and far, who support a more prosperous, safe and strong America. That’s why our Campaign cannot stop now - our Movement is just getting started.
Together, we will Make America Great Again!
CisCon 2017 - I problemi di scalabilità delle tradizionali reti IP nei modern...AreaNetworking.it
Al CisCon 2017, Ruben del Monte (Network Consulting Engineer in IT Global Consulting Srl, CCIE #54221) ha tenuto uno speech dal titolo "I problemi di scalabilità delle tradizionali reti IP nei moderni datacenters".
Abstract presente su http://www.ciscon.net/il-programma/
CisCon 2017 - Anche le acciaierie si trasformano grazie all’innovazioneAreaNetworking.it
A CisCon 2017, Marco Carini (Architect System Engineer e Direttore Tecnico in Techlan srl) ha tenuto uno speech dal titolo "Anche le acciaierie si trasformano grazie all’innovazione".
Abstract presente su http://www.ciscon.net/il-programma/
Shedding light on PROFINET node development
Despite the availability of Real Time Ethernet in general and PROFINET in particular for many years there is still insecurity regarding the necessary hardware and software effort required to implement and certify a PROFINET node. This presentation aims to shed some light on node development based on 10 odd years practical experience in the development of PROFINET technology.
The presentation starts with some generic performance characteristics of Real Time Ethernet in general and PROFINET in particular. To satisfy these characteristics particular architectures are required and we enumerate these detailing the pros-and cons underlined with performance data and some experiences in the field. We finish up by discussing some future themes and their ramifications for the node developer.
Presented by:
Hans Dermot Doran, Head of Real Time Ethernet Research Group & Professor of Communication and Information Technologies, Institute of Embedded Systems, Zürich University of Applied Sciences
The Pug is a breed of dog with a wrinkly, short-muzzled face, and curled tail. The breed has a fine, glossy coat that comes in a variety of colours, most often fawn or black, and a compact square body with well-developed muscles.
Pugs were brought from China to Europe in the sixteenth century and were popularized in Western Europe by the House of Orange of the Netherlands, and the House of Stuart.In the United Kingdom, in the nineteenth century, Queen Victoria developed a passion for pugs which she passed on to other members of the Royal family. Pugs are known for being sociable and gentle companion dogs.[3] The breed remains popular into the twenty-first century, with some famous celebrity owners. A pug was judged Best in Show at the World Dog Show in 2004.
Donald J. Trump For President, Inc. –– Why Now?
On November 8, 2016, the American People delivered a historic victory and took our country back. This victory was the result of a Movement to put America first, to save the American economy, and to make America once again a shining city on the hill. But our Movement cannot stop now - we still have much work to do.
This is why our Campaign Committee, Donald J. Trump for President, Inc., is still here.
We will provide a beacon for this historic Movement as our lights continue to shine brightly for you - the hardworking patriots who have paid the price for our freedom. While Washington flourished, our American jobs were shipped overseas, our families struggled, and our factories closed - that all ended on January 20, 2017.
This Campaign will be a voice for all Americans, in every city near and far, who support a more prosperous, safe and strong America. That’s why our Campaign cannot stop now - our Movement is just getting started.
Together, we will Make America Great Again!
CisCon 2017 - I problemi di scalabilità delle tradizionali reti IP nei modern...AreaNetworking.it
Al CisCon 2017, Ruben del Monte (Network Consulting Engineer in IT Global Consulting Srl, CCIE #54221) ha tenuto uno speech dal titolo "I problemi di scalabilità delle tradizionali reti IP nei moderni datacenters".
Abstract presente su http://www.ciscon.net/il-programma/
CisCon 2017 - Anche le acciaierie si trasformano grazie all’innovazioneAreaNetworking.it
A CisCon 2017, Marco Carini (Architect System Engineer e Direttore Tecnico in Techlan srl) ha tenuto uno speech dal titolo "Anche le acciaierie si trasformano grazie all’innovazione".
Abstract presente su http://www.ciscon.net/il-programma/
Shedding light on PROFINET node development
Despite the availability of Real Time Ethernet in general and PROFINET in particular for many years there is still insecurity regarding the necessary hardware and software effort required to implement and certify a PROFINET node. This presentation aims to shed some light on node development based on 10 odd years practical experience in the development of PROFINET technology.
The presentation starts with some generic performance characteristics of Real Time Ethernet in general and PROFINET in particular. To satisfy these characteristics particular architectures are required and we enumerate these detailing the pros-and cons underlined with performance data and some experiences in the field. We finish up by discussing some future themes and their ramifications for the node developer.
Presented by:
Hans Dermot Doran, Head of Real Time Ethernet Research Group & Professor of Communication and Information Technologies, Institute of Embedded Systems, Zürich University of Applied Sciences
For training sessions, demonstration sessions by vendors of diagnostic tools and for stress testing of PROFIBUS DP networks, a compact “error generator” tool was developed. The decoding of UART characters, testing for trigger conditions, generation of errors on RS485, the HMI, etc. of an FPGA based error generator is discussed.
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015Bruno Teixeira
With the changing paradigm of network programmability using Software Defined Network (SDN), we are seeing new ways for monitoring, scaling and configuring network devices. With new network programability capabilities utilizing NETCONF, OpenFlow, BGP-LS, and PCEP it is vital for network architects and operations engineers to understand how these SDN related technologies can be leveraged to streamline the way we view, design, and operate our networks today. This session introduces these concepts and focuses on the use cases, implementation, and troubleshooting of these technologies on the ASR9000 platform.
Enabling accelerated networking - seminar by Enea at the Embedded Conference ...EneaSoftware
The open source revolution brings a wealth of features and functionality at a rapid growth, and industry leaders come together to shape standardized interfaces, protocols, and ways of working. ARM is such a player and drives several collaborative projects under the Linaro (http://www.linaro.org) umbrella. One such initiative is the ODP (http://www.opendataplane.org/) open-source, cross-platform set of application programming interfaces for the networking data plane.
Next Generation Ethernet
Next Generation Ethernet is a platform that should deliver all of previous function requirements under on hood. I have grouped the Generations in this way because Cisco has different purpose-built product lines for each of 4 waves of technology. Counter to that Extreme offers a platform solution for a customer to build his network on. Extreme does not require different switches to address different convergence requirements, this would be cost prohibitive for most customers and complicated. Simply put to disrupt the Cisco market, Extreme must deliver more with less.
The IEEE is pushing Ethernet to unimaginable speeds, with the 40/100Gigabit Ethernet standard expected to be ratified in 2010 and Terabit Ethernet on the drawing board for 2015. Here's a timeline showing key milestones in the growth of Ethernet Sstandard's-compliant products are expected to ship in the second half of next year, not long after the expected June 2010 ratification of the 802.3ba standard.
Complexity - Complex systems are a special type of chaotic system. They display a very interesting type of emergent behavior called, logically enough, complex adaptive behavior. But we are getting ahead of ourselves. There’s a need to back up a bit and describe a fundamental behavior that occurs at the granular level and leads to complex adaptive behavior. It is self -organization. Complex Adaptive Behavior is the name given to this forming-falling apart-reforming-falling apart-… behavior. Specifically it is defined as many agents working in parallel to accomplish a goal. It is conflict ridden, very fluid, and very positive. The hallmark of emergent, complex adaptive behavior is it brings about a change from the starting point that is not just different in degree but in kind. In biology a good example of this is the emergence of consciousness. Another example is the Manhattan Project and the development of the atomic bomb. Below is a checklist that helps facilitate a qualitative assessment of the level of complexity. It is in everyday language to facilitate use by a broad range of stakeholders and team members. In other words, it stays away from jargon, which can be the kiss of death when requesting information from people.
The Checklist
Not sure how the project will get done; Many stakeholders, teams and sub-teams;
Too Many vendors; New vendors;
New client; Team members are geographically dispersed;
End-users are geographically dispersed; Many organizations;
Many cultures (professional, organizational, sociological);
Many languages (professional, organizational, sociological);
High risk;
Lack of quality best characterized by lack of acceptance criteria;
Lack of clear requirements and too Many tasks;
Arbitrary budget or end date;
Inadequate resources;
Leading-edge technology;
New, unproven application of existing technology;
High degree of interconnectedness (professional, technological, political, sociological).
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017Bruno Teixeira
This session provides an overview of the segment routing technology and its use cases. This new routing paradigm provides high operational simplicity and maximum network scalability and flexibility. You will get an understanding of the basic concepts behind the technology and its wide applicability ranging from simple transport for MPLS services, disjoint routing, traffic engineering and its benefits in the context of software defined networking. Previous knowledge of IP routing and MPLS is required.
Devconf2017 - Can VMs networking benefit from DPDKMaxime Coquelin
DPDK brings high-performance/low-latency virtualization networking capabilities thanks to its Vhost/Virtio support. The session will first introduce DPDK and its Vhost/Virtio implementations, exposing to the audience examples of possible uses, and challenges that need to be addressed to achieve high-performance, functionality and reliability. Then, Vhost/Virtio improvements introduced in last DPDK release will be covered, such as receive path optimizations, Virtio's indirect descriptors support, or transmit zero copy to name a few. The speakers will explain which problems they aim to address, how they address them, mentioning their limitations.
Finally, the speakers, who are active DPDK's Virtio/Vhost contributors, will expose what new developments are in the pipe to tackle the remaining challenges.
The session will be presented so that DPDK developers and users find useful information on current developments and status. People not familiar with DPDK may find a overview, get and share ideas with other projects.
Luky Gábor (Alcatel-Lucent Hungary) előadása a LAN és WiFi újdonságokról. Kiemelten foglalkozott a felhasználók saját mobil eszközeinek vállalati környezetben történő professzionális integrálásával. Az új 6900-as sorozatú 10 Gigabit Ethernet LAN Mesh adatközponti switchek a sávszélesség-emésztő, valós idejű alkalmazásokat (pl. virtuális desktop, mobil munkavégzés, videó konferencia, üzleti és privát felhő szolgáltatások igénybevétele) kezelő infrastruktúrák zökkenőmentes kezelést támogatják. Nagy hangsúlyt fektetett a POD rendszerekre, mely több adatközponti switchet kapcsol össze, és az információkat a leggyorsabb és legrövidebb úton szállítja. Bemutatta a "gondolat sebességével" száguldó új Omni Access vezetéknélküli megoldásokat is.
iDiff 2008 conference #01 IP-Racine : Cinema production infrastructure on 10G...Benoit Michel
Today, we have a bunch of interfaces on production devices
There is no interoperability with IT based post units
Common equipment connection technology is restricted to
3Gbit/s, but 10Gbit/s or even more already required
We demonstrate a validated future strategic interface
technology for power sensitive applications and long
distances
IP-Racine is sponsored by the European Commission 6th Framework Programme. see www.ipracine.org for details.
You may have hoped to retire before IPv6 became a reality, but unfortunately the IPv4 address exhaustion came too fast. For the rest of us, we’re going to bite off a small piece of the 15-year old IPv6 pie and talk about how to get started!
• Address format refresher
• IPv4 and IPv6 protocol comparison
• IPv6 neighbor discovery and auto-configuration
• Current migration and coexistence strategies
• ICMPv6, DHCPv6, and DNSv6
• How to get started at home
For training sessions, demonstration sessions by vendors of diagnostic tools and for stress testing of PROFIBUS DP networks, a compact “error generator” tool was developed. The decoding of UART characters, testing for trigger conditions, generation of errors on RS485, the HMI, etc. of an FPGA based error generator is discussed.
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015Bruno Teixeira
With the changing paradigm of network programmability using Software Defined Network (SDN), we are seeing new ways for monitoring, scaling and configuring network devices. With new network programability capabilities utilizing NETCONF, OpenFlow, BGP-LS, and PCEP it is vital for network architects and operations engineers to understand how these SDN related technologies can be leveraged to streamline the way we view, design, and operate our networks today. This session introduces these concepts and focuses on the use cases, implementation, and troubleshooting of these technologies on the ASR9000 platform.
Enabling accelerated networking - seminar by Enea at the Embedded Conference ...EneaSoftware
The open source revolution brings a wealth of features and functionality at a rapid growth, and industry leaders come together to shape standardized interfaces, protocols, and ways of working. ARM is such a player and drives several collaborative projects under the Linaro (http://www.linaro.org) umbrella. One such initiative is the ODP (http://www.opendataplane.org/) open-source, cross-platform set of application programming interfaces for the networking data plane.
Next Generation Ethernet
Next Generation Ethernet is a platform that should deliver all of previous function requirements under on hood. I have grouped the Generations in this way because Cisco has different purpose-built product lines for each of 4 waves of technology. Counter to that Extreme offers a platform solution for a customer to build his network on. Extreme does not require different switches to address different convergence requirements, this would be cost prohibitive for most customers and complicated. Simply put to disrupt the Cisco market, Extreme must deliver more with less.
The IEEE is pushing Ethernet to unimaginable speeds, with the 40/100Gigabit Ethernet standard expected to be ratified in 2010 and Terabit Ethernet on the drawing board for 2015. Here's a timeline showing key milestones in the growth of Ethernet Sstandard's-compliant products are expected to ship in the second half of next year, not long after the expected June 2010 ratification of the 802.3ba standard.
Complexity - Complex systems are a special type of chaotic system. They display a very interesting type of emergent behavior called, logically enough, complex adaptive behavior. But we are getting ahead of ourselves. There’s a need to back up a bit and describe a fundamental behavior that occurs at the granular level and leads to complex adaptive behavior. It is self -organization. Complex Adaptive Behavior is the name given to this forming-falling apart-reforming-falling apart-… behavior. Specifically it is defined as many agents working in parallel to accomplish a goal. It is conflict ridden, very fluid, and very positive. The hallmark of emergent, complex adaptive behavior is it brings about a change from the starting point that is not just different in degree but in kind. In biology a good example of this is the emergence of consciousness. Another example is the Manhattan Project and the development of the atomic bomb. Below is a checklist that helps facilitate a qualitative assessment of the level of complexity. It is in everyday language to facilitate use by a broad range of stakeholders and team members. In other words, it stays away from jargon, which can be the kiss of death when requesting information from people.
The Checklist
Not sure how the project will get done; Many stakeholders, teams and sub-teams;
Too Many vendors; New vendors;
New client; Team members are geographically dispersed;
End-users are geographically dispersed; Many organizations;
Many cultures (professional, organizational, sociological);
Many languages (professional, organizational, sociological);
High risk;
Lack of quality best characterized by lack of acceptance criteria;
Lack of clear requirements and too Many tasks;
Arbitrary budget or end date;
Inadequate resources;
Leading-edge technology;
New, unproven application of existing technology;
High degree of interconnectedness (professional, technological, political, sociological).
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017Bruno Teixeira
This session provides an overview of the segment routing technology and its use cases. This new routing paradigm provides high operational simplicity and maximum network scalability and flexibility. You will get an understanding of the basic concepts behind the technology and its wide applicability ranging from simple transport for MPLS services, disjoint routing, traffic engineering and its benefits in the context of software defined networking. Previous knowledge of IP routing and MPLS is required.
Devconf2017 - Can VMs networking benefit from DPDKMaxime Coquelin
DPDK brings high-performance/low-latency virtualization networking capabilities thanks to its Vhost/Virtio support. The session will first introduce DPDK and its Vhost/Virtio implementations, exposing to the audience examples of possible uses, and challenges that need to be addressed to achieve high-performance, functionality and reliability. Then, Vhost/Virtio improvements introduced in last DPDK release will be covered, such as receive path optimizations, Virtio's indirect descriptors support, or transmit zero copy to name a few. The speakers will explain which problems they aim to address, how they address them, mentioning their limitations.
Finally, the speakers, who are active DPDK's Virtio/Vhost contributors, will expose what new developments are in the pipe to tackle the remaining challenges.
The session will be presented so that DPDK developers and users find useful information on current developments and status. People not familiar with DPDK may find a overview, get and share ideas with other projects.
Luky Gábor (Alcatel-Lucent Hungary) előadása a LAN és WiFi újdonságokról. Kiemelten foglalkozott a felhasználók saját mobil eszközeinek vállalati környezetben történő professzionális integrálásával. Az új 6900-as sorozatú 10 Gigabit Ethernet LAN Mesh adatközponti switchek a sávszélesség-emésztő, valós idejű alkalmazásokat (pl. virtuális desktop, mobil munkavégzés, videó konferencia, üzleti és privát felhő szolgáltatások igénybevétele) kezelő infrastruktúrák zökkenőmentes kezelést támogatják. Nagy hangsúlyt fektetett a POD rendszerekre, mely több adatközponti switchet kapcsol össze, és az információkat a leggyorsabb és legrövidebb úton szállítja. Bemutatta a "gondolat sebességével" száguldó új Omni Access vezetéknélküli megoldásokat is.
iDiff 2008 conference #01 IP-Racine : Cinema production infrastructure on 10G...Benoit Michel
Today, we have a bunch of interfaces on production devices
There is no interoperability with IT based post units
Common equipment connection technology is restricted to
3Gbit/s, but 10Gbit/s or even more already required
We demonstrate a validated future strategic interface
technology for power sensitive applications and long
distances
IP-Racine is sponsored by the European Commission 6th Framework Programme. see www.ipracine.org for details.
You may have hoped to retire before IPv6 became a reality, but unfortunately the IPv4 address exhaustion came too fast. For the rest of us, we’re going to bite off a small piece of the 15-year old IPv6 pie and talk about how to get started!
• Address format refresher
• IPv4 and IPv6 protocol comparison
• IPv6 neighbor discovery and auto-configuration
• Current migration and coexistence strategies
• ICMPv6, DHCPv6, and DNSv6
• How to get started at home
50 billion connected wireless devices... IPv6, anyone?: Fredrik Garneij, Syst...IPv6no
50 billion connected wireless devices... IPv6, anyone?: Fredrik Garneij, Systems Manager, Ericsson
IKT-Norge IPv6 forum IPV6 konferanse 23 & 24 mai 2011
Troubleshooting Dual-Protocol Networks and Systems by Scott Hogg at gogoNET L...gogo6
gogo6 IPv6 Video Series. Event, presentation and speaker details below:
EVENT
gogoNET LIVE! 3: Enterprise wide Migration. http://gogonetlive.com
November 12 – 14, 2012 at San Jose State University, California
Agenda: http://gogonetlive.com/4105/gogonetlive3-agenda.asp
PRESENTATION
Troubleshooting Dual-Protocol Networks and Systems
Abstract: http://www.gogo6.com/profiles/blogs/my-presentation-at-gogonet-live-3-troubleshooting-in-a-dual-stack
Presentation video: http://www.gogo6.com/video/troubleshooting-dual-protocol-networks-and-systems-by-scott-hogg
Interview video: http://www.gogo6.com/video/interview-with-scott-hogg-at-gogonet-live-3-ipv6-conference
SPEAKER
Scott Hogg - Director of Advanced Technology Services, GTRI
Bio/Profile: http://www.gogo6.com/profile/ScottHogg986
MORE
Learn more about IPv6 on the gogoNET social network
http://www.gogo6.com
Get free IPv6 connectivity with Freenet6
http://www.gogo6.com/Freenet6
Subscribe to the gogo6 IPv6 Channel on YouTube
http://www.youtube.com/subscription_center?add_user=gogo6videos
Follow gogo6 on Twitter
http://twitter.com/gogo6inc
Like gogo6 on Facebook
http://www.facebook.com/pages/IPv6-products-community-and-services-gogo6/161626696777
Internet draft presentation: Benchmarking Methodology for IPv6 Transition Technologies (draft-georgescu-bmwg-ipv6-tran-tech-benchmarking-00). IETF 92, Dallas, Texas, USA
Packet processing in the fast path involves looking up bit patterns and deciding on an actions at line rate. The complexity of these functions at Line Rate, have been traditionally handled by ASICs and NPUs. However with the availability of faster and cheaper CPUs and hardware/software accelerations, it is possible to move these functions onto commodity hardware. This tutorial will talk about the various building blocks available to speed up packet processing both hardware based e.g. SR-IOV, RDT, QAT, VMDq, VTD and software based e.g. DPDK, Fd.io/VPP, OVS etc and give hands on lab experience on DPDK and fd.io fast path look up with following sessions. 1: Introduction to Building blocks: Sujata Tibrewala
Google and Intel speak on NFV and SFC service delivery
The slides are as presented at the meet up "Out of Box Network Developers" sponsored by Intel Networking Developer Zone
Here is the Agenda of the slides:
How DPDK, RDT and gRPC fit into SDI/SDN, NFV and OpenStack
Key Platform Requirements for SDI
SDI Platform Ingredients: DPDK, IntelⓇRDT
gRPC Service Framework
IntelⓇ RDT and gRPC service framework
Mario Smarduch, Senior Virtualization Engineer from the Samsung OSG, gives his perspective on Network Function Virtualization, including discussions of the Xen platform.
CIF16: Building the Superfluid Cloud with Unikernels (Simon Kuenzer, NEC Europe)The Linux Foundation
The confluence of a number of relatively recent trends including the development of virtualization technologies, the deployment of micro datacenters at PoPs, and the availability of microservers, opens up the possibility of evolving the cloud, and the network it is connected to, towards a superfluid cloud: a model where parties other than infrastructure owners can quickly deploy and migrate virtualized services throughout the network (in the core, at aggregation points and at the edge), enabling a number of novel use cases including virtualized CPEs and on-the-fly services, among others. Towards this goal, we identify a number of required mechanisms and present early evaluation results of their implementation.
On an inexpensive commodity server, we are able to concurrently run up to 10,000 specialized virtual machines (based on unikernels), instantiate a VM in as little as 10 milliseconds, and migrate it in under 100 milliseconds.
Similar to 17-Pete_Vickers-IPv6-in-the-Mobile-Net (20)
Mobile Broadband and IPv6 in Slovenia: Jan Zorz, Co-Founder Go6 Institute og ...IPv6no
Mobile Broadband and IPv6 in Slovenia: Jan Zorz, Co-Founder Go6 Institute og aktiv bidragsyter i RIPE-community
IKT-Norge IPv6 forum IPV6 konferanse 23 & 24 mai 2011
IPv6 - The Time Is Now: Latif Ladid, President, IPv6 forumIPv6no
IPv6 - The Time Is Now. Resistance is Futile & IPv6 Ready program: Latif Ladid, President, IPv6 forum
IKT-Norge IPv6 forum IPV6 konferanse 23 & 24 mai 2011
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
17-Pete_Vickers-IPv6-in-the-Mobile-Net
1. in the Mobile Net
Pete Vickers, Network Norway AS.
1
tirsdag 24. mai 2011
2. Introduction
Scope Eye Candy
Challenges Hall of Fame
Mobile Architecture Hall of Shame
Imp. Methodology Questions
Preparation
Connectivity options
2
tirsdag 24. mai 2011
3. Scope
Attempt to avoid overly technical
focus on mobile net differences
Innovation stifled by 3GPP / IETF friction.
Frustrated by telco sector’s CS vs. PS rationale
3
tirsdag 24. mai 2011
4. Challenges
air/freq. is a shared medium,
SIM card + $random terminal type.
$vendor terminal support
Roaming = guest status.
telco vendors license models discourage IPv6.
radio resources.
4
tirsdag 24. mai 2011
5. Mobile Net architecture
SKIP - E/ /’s Fredrick did it with much better graphics 20mins ago.
/
2/3/4 G
GPRS
PDP context - GTP tunnel
SGSN(local) GGSN(home)
5
tirsdag 24. mai 2011
6. BTW: here we go again...
IPv4 to IPv6
~=
IPX, LAT, ISO, X.25, (or whatever) to IPv4.
your oldest staff might be your best asset ?
6
tirsdag 24. mai 2011
7. Implementation methodology
started at outside layer, work inwards towards customer
less customer breakage
easy to verify along way
Management plane, AAA, licensing, logging, security etc.
SSH, radius, NTP, DNS, syslog, h/w ACLs.
multi-vendor hybrid (E///, Cisco, Juniper, Opensource).
7
tirsdag 24. mai 2011
8. Preparation
MPLS core... 6VPE ( individual PEs & RRs only, no P changes)
s/w upgrades, licensing, labbing.
Establishing IPv6 BGP peerings (NIX: 50xIPv4 vs. 16xIPv6)
# show bgp vpnv6 unicast vrf internet regexp _39029$
BGP table version is 1238870, local router ID is 89.254.100.3
Status codes: s suppressed, d damped, h history, * valid, > best, i -
internal,
r RIB-failure, S Stale
Origin codes: i - IGP, e - EGP, ? - incomplete
Network Next Hop Metric LocPrf Weight Path
Route Distinguisher: 41483:1002 (default for vrf internet)
*> 2001:67C:21E0::/48 2001:7F8:12:1::3:9029 0 39029 i
*> 2A02:C0::/32 2001:7F8:12:1::3:9029 0 39029 i
8
tirsdag 24. mai 2011
9. more preparation ...
IGPs: OSPFv3 or ISIS
prefixes obviously not easily memorable or uniquely
displayed (cf. IPv4 or E.164)
those who static route IPv4 should lose their jobs
those who static route IPv6 will lose their jobs ;)
9
tirsdag 24. mai 2011
10. Quick Rant
•but seriously, let the client O/S &
applications ‘manage’ multipath
connectivity (& name resolution) ?
•Support nightmare. ‘NxN unfixable’
handset problems. (OTA reconfig
limited)
•Sane approach: pure IPv6. (w/
Stateful NAT64 for legacy IPv4
content) Dual Stack car ?
•It breaks your App ? well maybe you
hardcoded stuff, so fix it ! Hint: P2Ps
enjoy IPv6 end-end connectivity.
10
tirsdag 24. mai 2011
11. connectivity options
1. IPv4 APN (today)
2. IPv6 APN
3. IPv4v6 APN
A dual stack client can use either :
(3) Release8/9
(1)+(2) on Release4 [Ole T. w/Nokia MT does this].
where (2). optional complemented w/NAT64 for legacy IPv4 access
11
tirsdag 24. mai 2011
12. Eye Candy...
$ tail /var/log/ppp.log
Tue May 10 11:28:59 2011 : Apple Base Script.ccl Version 3.3
…
Tue May 10 11:29:05 2011 : Using interface ppp0
Tue May 10 11:29:05 2011 : Connect: ppp0 <--> /dev/cu.Bluetooth-Modem
…
Tue May 10 11:29:11 2011 : sent [IPV6CP ConfReq id=0x1 <addr fe80::d69a:20ff:fe0f:3e1e>]
Tue May 10 11:29:13 2011 : rcvd [IPV6CP ConfNak id=0x1 <addr fe80::0000:0007:73a7:6501>]
Tue May 10 11:29:13 2011 : sent [IPV6CP ConfReq id=0x2 <addr fe80::0000:0007:73a7:6501>]
Tue May 10 11:29:13 2011 : rcvd [IPV6CP ConfAck id=0x2 <addr fe80::0000:0007:73a7:6501>]
$ ifconfig ppp0
ppp0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
! inet6 fe80::8:f11f:a601%ppp0 prefixlen 64 scopeid 0x9
! inet6 2a00:e18:8000:15::8:f11f:a601 prefixlen 64 autoconf
12
tirsdag 24. mai 2011
13. Hall of Fame
Nokia
handsets. e.g. E71 (4 years old !)
Juniper
early hardware NAT64 solution (stable & scaleable)
(sys)logging not suitable for DLD ?
Cisco
early NAT-PT (not scalable)
NAT64 in EFT, + netflow logging
13
tirsdag 24. mai 2011
14. Hall of Shame
Apple - iOS no PDPv6 support
Google - Android no PDPv6 support
ZTE, Option, Nokia, Huawei - no dongle PDPv6 support ?
Ericsson - unable to verify. Apparently MMDM support ?
discouraging licensing (IPv6 extra).
All - feature parity ?
14
tirsdag 24. mai 2011
15. Questions ?
Pete Vickers
pete@systemnet.no
(+47) 48179100
15
tirsdag 24. mai 2011
16. Example of typical problem
$ screen /dev/tty.Mobile-Modem 9600
at+cgdcont=?
+CGDCONT: (1-16),"IP",,,(0-2),(0-4)
+CGDCONT: (1-16),"PPP",,,(0-2),(0-4)
+CGDCONT: (1-16),"IPV6",,,(0-2),(0-4))
OK
=> so PDP type IPV6 is listed.
=> can we can select it ?
See “ETSI TR 127 007” for
at+cgdcont=1,"IPV6","v6",,0,0 commands overview
OK
=> great.
=> and verify it took it:
at+cgdcont?
+CGDCONT: 1,"IPV6","v6","0.0.0.0",0,0
...Opps, notice the “0.0.0.0” not “::/0”
=> try to dial
ATD*99***1#
ERROR
16
tirsdag 24. mai 2011
17. NAT64 logging example
May 19 15:57:53 mx240-nat64-re0 (FPC Slot 1, PIC Slot 0) {SET_O}[FWNAT]:
ASP_SFW_CREATE_ACCEPT_FLOW: proto 6 (TCP) application: any,
ge-2/0/0.0:2a00:e18:8000:25:0:8:5889:2601:33500 -> 64:ff9b:0:0:0:0:3e3d:45d9:80,
creating forward or watch flow ; source address and port translate to
89.254.77.118:1788 ; destination address translates to 62.61.69.217
May 19 15:57:55 mx240-nat64-re0 (FPC Slot 1, PIC Slot 0) {SET_O}[FWNAT]:
ASP_NAT_RULE_MATCH: proto 6 (TCP) application: any,
ge-2/0/0.0:2a00:e18:8000:25:0:8:5889:2601:54369 -> 64:ff9b:0:0:0:0:42dc:950c:80,
Match NAT rule-set: , rule: NAT64, term: INSIDE
17
tirsdag 24. mai 2011
18. References
3gv6 mailing list:
https://www.ietf.org/mailman/listinfo/3gv6
Handset HotSpot:
http://www.joiku.com/ - please hassle them for IPv6 WWAN->WLAN
No IPv6 on Android:
http://code.google.com/p/android/issues/detail?id=3389
other pres:
http://ipv6ws.arkko.com/report.html#presentations
18
tirsdag 24. mai 2011