The document discusses RPC (remote procedure call) over DDS (Data Distribution Service). It outlines goals of providing a standard and interoperable way to support RPC communication patterns in DDS. Key points covered include supporting request/reply and remote method invocation patterns, leveraging DDS qualities of service, and language bindings. The status of the work as an OMG standard is also summarized.
This document discusses Web-Enabled DDS, which allows real-time data from DDS applications to be accessed from web-based applications. It provides a gateway that connects DDS applications to web clients using standard HTTP protocols. This allows for scenarios like mobile data access, web UIs/dashboards, and access across firewalls. It presents the WebDDS object model and RESTful API for accessing DDS entities like topics, publishers, and data writers from web clients.
This document outlines a specification for adding security features to the Data Distribution Service (DDS) protocol. It discusses the status of the specification, scope of security features, potential threats, and requirements from a request for proposals. The specification will define security plugins for authentication, access control, cryptography, data tagging, and data logging to address threats like unauthorized data access, tampering, and insider threats. It also describes the security model and how DDS and RTPS protocols will support integrated security capabilities.
This document provides an overview of data distribution service (DDS) and security considerations for DDS. It discusses the data-centric publish-subscribe model of DDS, how data is identified in the global data space, and approaches to software integration like point-to-point and broker-based that DDS improves upon. The document also touches on key aspects of the DDS security specification and next steps.
By John Breitenbach, RTI Field Applications Engineer
Contents
Introduction to RTI
Introduction to Data Distribution Service (DDS)
DDS Secure
Connext DDS Professional
Real-World Use Cases
RTI Professional Services
Is Your Data Secure?
Odds are good that your data is extremely important to you. Now consider how one secures that data. Typical approaches address access, authentication, integrity, non-repudiation and confidentiality concerns at the domain and link layers, implicitly securing the data. The challenge and need is to move these security specifications to the data itself, and provide explicit security policies on each element of system-identified data.
Why is this level of finesse needed? As you build out your systems, and systems of systems, how do you manage security when individually element of data, the communication links, and domain boundaries have different behaviors? With this level of complexity and risk, it's critical to have awareness at the level that matters – the data level – so you can make the right design and implementation decisions.
At this webinar, learn how to achieve an assured and predictable security footprint by minimizing the leak of information or exploitation of data through unintended consequences. Secure DDS offers data-centric configuration policies for content and behaviors. Recognizing that security isn't one-size fits all, a standards-based optional plugin SDK allows developers to create custom security plugins.
Connext Secure DDS is the world's first turnkey DDS security solution that conforms to the OMG specification and provides an essential security infrastructure that is data-focused for DDS and legacy systems.
Watch On-Demand: http://ecast.opensystemsmedia.com/478
The document discusses RPC (remote procedure call) over DDS (Data Distribution Service). It outlines goals of providing a standard and interoperable way to support RPC communication patterns in DDS. Key points covered include supporting request/reply and remote method invocation patterns, leveraging DDS qualities of service, and language bindings. The status of the work as an OMG standard is also summarized.
This document discusses Web-Enabled DDS, which allows real-time data from DDS applications to be accessed from web-based applications. It provides a gateway that connects DDS applications to web clients using standard HTTP protocols. This allows for scenarios like mobile data access, web UIs/dashboards, and access across firewalls. It presents the WebDDS object model and RESTful API for accessing DDS entities like topics, publishers, and data writers from web clients.
This document outlines a specification for adding security features to the Data Distribution Service (DDS) protocol. It discusses the status of the specification, scope of security features, potential threats, and requirements from a request for proposals. The specification will define security plugins for authentication, access control, cryptography, data tagging, and data logging to address threats like unauthorized data access, tampering, and insider threats. It also describes the security model and how DDS and RTPS protocols will support integrated security capabilities.
This document provides an overview of data distribution service (DDS) and security considerations for DDS. It discusses the data-centric publish-subscribe model of DDS, how data is identified in the global data space, and approaches to software integration like point-to-point and broker-based that DDS improves upon. The document also touches on key aspects of the DDS security specification and next steps.
By John Breitenbach, RTI Field Applications Engineer
Contents
Introduction to RTI
Introduction to Data Distribution Service (DDS)
DDS Secure
Connext DDS Professional
Real-World Use Cases
RTI Professional Services
Is Your Data Secure?
Odds are good that your data is extremely important to you. Now consider how one secures that data. Typical approaches address access, authentication, integrity, non-repudiation and confidentiality concerns at the domain and link layers, implicitly securing the data. The challenge and need is to move these security specifications to the data itself, and provide explicit security policies on each element of system-identified data.
Why is this level of finesse needed? As you build out your systems, and systems of systems, how do you manage security when individually element of data, the communication links, and domain boundaries have different behaviors? With this level of complexity and risk, it's critical to have awareness at the level that matters – the data level – so you can make the right design and implementation decisions.
At this webinar, learn how to achieve an assured and predictable security footprint by minimizing the leak of information or exploitation of data through unintended consequences. Secure DDS offers data-centric configuration policies for content and behaviors. Recognizing that security isn't one-size fits all, a standards-based optional plugin SDK allows developers to create custom security plugins.
Connext Secure DDS is the world's first turnkey DDS security solution that conforms to the OMG specification and provides an essential security infrastructure that is data-focused for DDS and legacy systems.
Watch On-Demand: http://ecast.opensystemsmedia.com/478
Revised Submission to the OMG Security RFP. Covers the plugin architecture and the proposed builtin plugins to provide Authentication, Access Control, Key Management, Confidentiality (Encryption), Message Authentication, and Auditing
Multiple protocols have been positioned as “the” application-layer messaging protocol for the Internet of Things (IoT) and Machine-to-Machine (M2M) communication. In fact, these protocols address different aspects of IoT messaging and are complementary more than competitive (other than for mindshare). This presentation compares two of these protocols, MQTT and DDS, and shows how they are designed and optimized for different communication requirements.
The Industrial IoT depends on connectivity and information exchange. Much of the business value derives from the ability to have independent systems share information in order to derive knowledge, make "smart decisions", and offer behavior and functionality never before possible.
Many industrial systems were designed with a focus on reliability and safety at a time were implicit trust of all components and communication was the norm. Restricting physical access is currently the only practical method for protecting this existing critical infrastructure. This includes the electrical power grid, process control, transportation, or manufacturing systems. This is changing with increased connectivity to the Internet and personal computers as well as awareness of malicious insider threats. Many industrial systems are being (or want to be) connected to external networks using standard technologies like Ethernet and the Internet Protocol Suite (TCP/UDP/IP). These technologies make systems more functional and efficient, unfortunately they also open the critical infrastructure to cyber attacks.
New IIoT Systems are being designed with security as a key concern. New systems can leverage a solid set of security technologies and building blocks for Authentication, Cryptography, Integrity, etc. However these security technologies must be used correctly and in ways that do not disrupt the performance or access to the legitimate applications/devices, yet limit legitimate access to just the needed information (to minimize the insider threats) and denies access to all others. Adding to this difficulties the new systems need to co-exist and (securely) exchange information with the already-deployed legacy systems which were built without such security elements.
Secure DDS (a recent standard from the OMG) is a "secure connectivity middleware" technology that can be used to address these three needs: (1) Build modern secure IIoT systems, (2) Secure legacy Industrial systems being connected on the Internet, and (3) Securely bridge between new and legacy systems. Secure DDS extends the proven Data-Distribution Service (DDS) and Real-Time Publish-Subscribe Protocol (DDS-RTPS) standards with enterprise-grade authentication, encryption and fine-grained security controls while maintaining the peer-to-peer, robustness and scalability features (including secure multicast) that have made DDS a clear choice for critical infrastructure systems.
This presentation introduces the DDS Security specification and provide describe several use-cases that exemplify how these standards are deployed in real-world applications.
The document compares OPC UA and DDS, two key protocols for industrial IoT. OPC UA is object-oriented and client-server, targeting simpler systems with device interchangeability needs. DDS is data-centric and peer-to-peer, more suitable for systems with primary software integration challenges. Both communities are working to ensure their technologies can work together, preserving investments as architectures evolve.
The Object Management Group (OMG) Data Distribution Service (DDS) and the OPC Foundation OLE for Process Control Unified Architecture (OPC-UA) are commonly considered as two of the most relevant technologies for data and information management in the Industrial Internet of Things. Although several articles and quotes on the two technologies have appeared on various medias in the past six months, there is still an incredible confusion on how the two technology compare and what’s their applicability.
This presentation, was motivated by the author's frustration with reading and hearing so many mis-conceptions as well as “apple-to-oranges” comparisons. Thus to contribute to clarity and help with positioning and applicability this webcast will (1) explain the key concepts behind DDS and OPC-UA and relate them with the reason why these technologies were created in the first place, (2) clarify the differences and applicability in IoT for DDS and OPC-UA, and (3) report on the ongoing standardisation activities that are looking at DDS/OPC-UA inter-working.
What's the Right Messaging Standard for the IoT?Angelo Corsaro
Different messaging and data sharing standards, such as AMQP, CoAP, DDS, MQTT, and REST have been proposed as candidate for addressing the data sharing challenges of the Internet of Things (IoT) and the Industrial Internet (I2).
In technical forums and social media there is no lack of passionate discussions that praise the merits of one standard over the other. Yet, to date, there are little or perhaps no analysis that look at the details of the different standards and perform an in depth, qualitative, analytic and empirical evaluation.
This presentation, will (1) introduce the key standards that are being proposed for the Internet of Things and the Industrial Internet, such as AMQP, CoAP, DDS, MQTT and REST, (2) present a qualitative comparison that highlights the different features provided by the various standards, (3) present an analytic comparison looking at the efficiency and scalability of the various protocols and (3) report the results of an empirical evaluation comparing the actual performances of the various standards.
This presentation introduces the coordination model at the foundation of Vortex and explains its foundational concepts and features. Then it provides an overview of the various technological element that implement the model and how they are deployed in IoT applications such as connected vehicles, smart cities, smart grids and connected medical devices.
The document discusses security for the Industrial Internet of Things (IIoT) and Connext DDS Secure. It provides an overview of security frameworks from the Industrial Internet Consortium, including how they address threats in publish-subscribe systems. It then describes the key features of Connext DDS Secure, which is based on the DDS Security specification and provides authentication, access control, and encryption without a broker. The document demonstrates how to configure QoS profiles and permission files to set up secure domains for a Connext DDS shapes demo.
The document discusses cloud-based modeling solutions from IncQuery Labs that enable tool integration. It describes challenges with large-scale collaboration and automation across multiple teams and tools. The IncQuery Model Checking Tool Suite uses a custom query language to perform validation checks and transformations across models stored in a repository. Case studies demonstrate tool integration workflows at companies like Airbus. Live demos of the solutions are also provided.
DDS Security for the Industrial Internet - London Connext DDS ConferenceGerardo Pardo-Castellote
The document discusses security considerations for data-centric publish-subscribe systems like the Data Distribution Service (DDS). It describes how DDS can implement security features like authentication, access control, confidentiality and integrity without conflicting with its global data space model. A pluggable security architecture is proposed that uses authentication, access control and cryptography plugins to enforce security policies while remaining decoupled.
This presentation introduced Vortex by means of a running example. Throughout the presentation we will show how Vortex makes it easy to build a micro-blogging platform a la Twitter.
The document describes a demonstration of interoperability between 5 vendor DDS security implementations using a shapes demo application. The demo consists of 6 scenarios that illustrate different aspects of DDS security configuration and functionality, including controlling access to the domain, enabling open access to selected topics, comparing data integrity vs encryption, protecting metadata, securing discovery, and fine-grained access control at the topic level. Each scenario varies the security governance and permission files to achieve the desired access control configuration.
Interoperability demonstration between 6 different products that implement the OMG DDS Interoperability Wire Protocol (DDS-RTPS).
The demonstration took place at the March 2012 OMG technical meeting in Washington DC.
The following companies demonstrated interoperability between their products: RTI (Connext DDS). TwinOaks Computing (CoreDX), PrismTech (OpenSpliceDDS), OCI (OpenDDS), ETRI (ETRI DDS), IBM.
This document summarizes a presentation about demonstrating the RTI DDS Toolkit for LabVIEW. It discusses what LabVIEW is and why it is used, provides an overview of the RTI DDS Toolkit for LabVIEW product, and demonstrates how to publish shapes data from a LabVIEW program to control a Lego Mindstorms EV3 robot using DDS. The implementation details and current limitations of the toolkit are also outlined.
The Future of Hadoop Security - Hadoop Summit 2014Cloudera, Inc.
Hadoop deployments are rapidly moving from pilots to production, enabling unprecedented opportunity to build big data applications that deliver faster access to more information to more users than ever before possible. Yet without the ability to address data security and compliance regulations, Hadoop will be limited to another data silo.
In this talk, Matt Brandwein and David Tishgart discuss the requirements for securing Hadoop and how Cloudera (now with Gazzang) and Intel are collaborating in the open to deliver comprehensive, transparent, compliance-ready security to unlock the potential of the Hadoop ecosystem and enable innovation without compromise.
Micro services Architecture with Vortex -- Part IAngelo Corsaro
Microservice Architectures — which are the norm in some domains — have recently received lots of attentions in general computing and are becoming the mainstream architectural style to develop distributed systems. As suggested by the name, the main idea behind micro services is to decompose complex applications in, small, autonomous and loosely coupled processes communicating through a language and platform independent API. This architectural style facilitates a modular approach to system-building.
This webcast will (1) introduce the main principles of the Microservice Architecture, (2) showcase how the Global Data Space abstraction provided by Vortex ideally support thee microservices architectural pattern, and (3) walk you through the design and implementation of a micro service application for a real-world use case.
This document discusses security challenges related to big data and Hadoop. It notes that as data grows exponentially, the complexity of managing, securing, and enforcing privacy restrictions on data sets increases. Organizations now need to control access to data scientists based on authorization levels and what data they are allowed to see. Mismanagement of data sets can be costly, as shown by incidents at AOL, Netflix, and a Massachusetts hospital that led to lawsuits and fines. The document then provides a brief history of Hadoop security, noting that it was originally developed without security in mind. It outlines the current Kerberos-centric security model and talks about some vendor solutions emerging to enhance Hadoop security. Finally, it provides guidance on developing security and privacy
This document discusses security considerations for data-centric publish-subscribe systems like the Data Distribution Service (DDS). It describes how DDS aims to create a global information space where data can be accessed, while also restricting communication and access. The document outlines several threats to DDS security like unauthorized subscription or publication. It proposes using public key infrastructure and cryptographic techniques to enforce access control policies in the global information space, similar to access controls on file systems. The document also describes the pluggable security architecture in DDS, including built-in plugins for authentication, access control, cryptography, and other functions.
DDS on the Web: Quick Recipes for Real-Time Web ApplicationsAngelo Corsaro
The Web is nowadays inextricably intertwined with our lives and our systems. The ability for a system to interact with web-based applications is not anymore a feature — it is the thin line that separates démodé from contemporary!
DDS-based systems are not exception to this rule and as a consequence more and more people are trying bring DDS data to web applications. In a technology rich environment such as the web there is no lack of choice when it comes to selecting the set of tools and technologies to integrate DDS and Web applications. Options are Web Services, REST,
REST Frameworks such as CometD, Silverlight, WebSockets, DART, the Play! Framework etc.
To help shed light, give insight and factually show that the DDS/Web integration is indeed easily achievable, this presentation will first provide an overview of the Web technologies that are most suited for integrating Web- and DDS-applications, such as plain REST, CometD, WebSockets, Google Dart, and Play! Then it will demonstrate how the integration can be achieved with just a few lines of code by using the OpenSplice Gateway.
Revised Submission to the OMG Security RFP. Covers the plugin architecture and the proposed builtin plugins to provide Authentication, Access Control, Key Management, Confidentiality (Encryption), Message Authentication, and Auditing
Multiple protocols have been positioned as “the” application-layer messaging protocol for the Internet of Things (IoT) and Machine-to-Machine (M2M) communication. In fact, these protocols address different aspects of IoT messaging and are complementary more than competitive (other than for mindshare). This presentation compares two of these protocols, MQTT and DDS, and shows how they are designed and optimized for different communication requirements.
The Industrial IoT depends on connectivity and information exchange. Much of the business value derives from the ability to have independent systems share information in order to derive knowledge, make "smart decisions", and offer behavior and functionality never before possible.
Many industrial systems were designed with a focus on reliability and safety at a time were implicit trust of all components and communication was the norm. Restricting physical access is currently the only practical method for protecting this existing critical infrastructure. This includes the electrical power grid, process control, transportation, or manufacturing systems. This is changing with increased connectivity to the Internet and personal computers as well as awareness of malicious insider threats. Many industrial systems are being (or want to be) connected to external networks using standard technologies like Ethernet and the Internet Protocol Suite (TCP/UDP/IP). These technologies make systems more functional and efficient, unfortunately they also open the critical infrastructure to cyber attacks.
New IIoT Systems are being designed with security as a key concern. New systems can leverage a solid set of security technologies and building blocks for Authentication, Cryptography, Integrity, etc. However these security technologies must be used correctly and in ways that do not disrupt the performance or access to the legitimate applications/devices, yet limit legitimate access to just the needed information (to minimize the insider threats) and denies access to all others. Adding to this difficulties the new systems need to co-exist and (securely) exchange information with the already-deployed legacy systems which were built without such security elements.
Secure DDS (a recent standard from the OMG) is a "secure connectivity middleware" technology that can be used to address these three needs: (1) Build modern secure IIoT systems, (2) Secure legacy Industrial systems being connected on the Internet, and (3) Securely bridge between new and legacy systems. Secure DDS extends the proven Data-Distribution Service (DDS) and Real-Time Publish-Subscribe Protocol (DDS-RTPS) standards with enterprise-grade authentication, encryption and fine-grained security controls while maintaining the peer-to-peer, robustness and scalability features (including secure multicast) that have made DDS a clear choice for critical infrastructure systems.
This presentation introduces the DDS Security specification and provide describe several use-cases that exemplify how these standards are deployed in real-world applications.
The document compares OPC UA and DDS, two key protocols for industrial IoT. OPC UA is object-oriented and client-server, targeting simpler systems with device interchangeability needs. DDS is data-centric and peer-to-peer, more suitable for systems with primary software integration challenges. Both communities are working to ensure their technologies can work together, preserving investments as architectures evolve.
The Object Management Group (OMG) Data Distribution Service (DDS) and the OPC Foundation OLE for Process Control Unified Architecture (OPC-UA) are commonly considered as two of the most relevant technologies for data and information management in the Industrial Internet of Things. Although several articles and quotes on the two technologies have appeared on various medias in the past six months, there is still an incredible confusion on how the two technology compare and what’s their applicability.
This presentation, was motivated by the author's frustration with reading and hearing so many mis-conceptions as well as “apple-to-oranges” comparisons. Thus to contribute to clarity and help with positioning and applicability this webcast will (1) explain the key concepts behind DDS and OPC-UA and relate them with the reason why these technologies were created in the first place, (2) clarify the differences and applicability in IoT for DDS and OPC-UA, and (3) report on the ongoing standardisation activities that are looking at DDS/OPC-UA inter-working.
What's the Right Messaging Standard for the IoT?Angelo Corsaro
Different messaging and data sharing standards, such as AMQP, CoAP, DDS, MQTT, and REST have been proposed as candidate for addressing the data sharing challenges of the Internet of Things (IoT) and the Industrial Internet (I2).
In technical forums and social media there is no lack of passionate discussions that praise the merits of one standard over the other. Yet, to date, there are little or perhaps no analysis that look at the details of the different standards and perform an in depth, qualitative, analytic and empirical evaluation.
This presentation, will (1) introduce the key standards that are being proposed for the Internet of Things and the Industrial Internet, such as AMQP, CoAP, DDS, MQTT and REST, (2) present a qualitative comparison that highlights the different features provided by the various standards, (3) present an analytic comparison looking at the efficiency and scalability of the various protocols and (3) report the results of an empirical evaluation comparing the actual performances of the various standards.
This presentation introduces the coordination model at the foundation of Vortex and explains its foundational concepts and features. Then it provides an overview of the various technological element that implement the model and how they are deployed in IoT applications such as connected vehicles, smart cities, smart grids and connected medical devices.
The document discusses security for the Industrial Internet of Things (IIoT) and Connext DDS Secure. It provides an overview of security frameworks from the Industrial Internet Consortium, including how they address threats in publish-subscribe systems. It then describes the key features of Connext DDS Secure, which is based on the DDS Security specification and provides authentication, access control, and encryption without a broker. The document demonstrates how to configure QoS profiles and permission files to set up secure domains for a Connext DDS shapes demo.
The document discusses cloud-based modeling solutions from IncQuery Labs that enable tool integration. It describes challenges with large-scale collaboration and automation across multiple teams and tools. The IncQuery Model Checking Tool Suite uses a custom query language to perform validation checks and transformations across models stored in a repository. Case studies demonstrate tool integration workflows at companies like Airbus. Live demos of the solutions are also provided.
DDS Security for the Industrial Internet - London Connext DDS ConferenceGerardo Pardo-Castellote
The document discusses security considerations for data-centric publish-subscribe systems like the Data Distribution Service (DDS). It describes how DDS can implement security features like authentication, access control, confidentiality and integrity without conflicting with its global data space model. A pluggable security architecture is proposed that uses authentication, access control and cryptography plugins to enforce security policies while remaining decoupled.
This presentation introduced Vortex by means of a running example. Throughout the presentation we will show how Vortex makes it easy to build a micro-blogging platform a la Twitter.
The document describes a demonstration of interoperability between 5 vendor DDS security implementations using a shapes demo application. The demo consists of 6 scenarios that illustrate different aspects of DDS security configuration and functionality, including controlling access to the domain, enabling open access to selected topics, comparing data integrity vs encryption, protecting metadata, securing discovery, and fine-grained access control at the topic level. Each scenario varies the security governance and permission files to achieve the desired access control configuration.
Interoperability demonstration between 6 different products that implement the OMG DDS Interoperability Wire Protocol (DDS-RTPS).
The demonstration took place at the March 2012 OMG technical meeting in Washington DC.
The following companies demonstrated interoperability between their products: RTI (Connext DDS). TwinOaks Computing (CoreDX), PrismTech (OpenSpliceDDS), OCI (OpenDDS), ETRI (ETRI DDS), IBM.
This document summarizes a presentation about demonstrating the RTI DDS Toolkit for LabVIEW. It discusses what LabVIEW is and why it is used, provides an overview of the RTI DDS Toolkit for LabVIEW product, and demonstrates how to publish shapes data from a LabVIEW program to control a Lego Mindstorms EV3 robot using DDS. The implementation details and current limitations of the toolkit are also outlined.
The Future of Hadoop Security - Hadoop Summit 2014Cloudera, Inc.
Hadoop deployments are rapidly moving from pilots to production, enabling unprecedented opportunity to build big data applications that deliver faster access to more information to more users than ever before possible. Yet without the ability to address data security and compliance regulations, Hadoop will be limited to another data silo.
In this talk, Matt Brandwein and David Tishgart discuss the requirements for securing Hadoop and how Cloudera (now with Gazzang) and Intel are collaborating in the open to deliver comprehensive, transparent, compliance-ready security to unlock the potential of the Hadoop ecosystem and enable innovation without compromise.
Micro services Architecture with Vortex -- Part IAngelo Corsaro
Microservice Architectures — which are the norm in some domains — have recently received lots of attentions in general computing and are becoming the mainstream architectural style to develop distributed systems. As suggested by the name, the main idea behind micro services is to decompose complex applications in, small, autonomous and loosely coupled processes communicating through a language and platform independent API. This architectural style facilitates a modular approach to system-building.
This webcast will (1) introduce the main principles of the Microservice Architecture, (2) showcase how the Global Data Space abstraction provided by Vortex ideally support thee microservices architectural pattern, and (3) walk you through the design and implementation of a micro service application for a real-world use case.
This document discusses security challenges related to big data and Hadoop. It notes that as data grows exponentially, the complexity of managing, securing, and enforcing privacy restrictions on data sets increases. Organizations now need to control access to data scientists based on authorization levels and what data they are allowed to see. Mismanagement of data sets can be costly, as shown by incidents at AOL, Netflix, and a Massachusetts hospital that led to lawsuits and fines. The document then provides a brief history of Hadoop security, noting that it was originally developed without security in mind. It outlines the current Kerberos-centric security model and talks about some vendor solutions emerging to enhance Hadoop security. Finally, it provides guidance on developing security and privacy
This document discusses security considerations for data-centric publish-subscribe systems like the Data Distribution Service (DDS). It describes how DDS aims to create a global information space where data can be accessed, while also restricting communication and access. The document outlines several threats to DDS security like unauthorized subscription or publication. It proposes using public key infrastructure and cryptographic techniques to enforce access control policies in the global information space, similar to access controls on file systems. The document also describes the pluggable security architecture in DDS, including built-in plugins for authentication, access control, cryptography, and other functions.
DDS on the Web: Quick Recipes for Real-Time Web ApplicationsAngelo Corsaro
The Web is nowadays inextricably intertwined with our lives and our systems. The ability for a system to interact with web-based applications is not anymore a feature — it is the thin line that separates démodé from contemporary!
DDS-based systems are not exception to this rule and as a consequence more and more people are trying bring DDS data to web applications. In a technology rich environment such as the web there is no lack of choice when it comes to selecting the set of tools and technologies to integrate DDS and Web applications. Options are Web Services, REST,
REST Frameworks such as CometD, Silverlight, WebSockets, DART, the Play! Framework etc.
To help shed light, give insight and factually show that the DDS/Web integration is indeed easily achievable, this presentation will first provide an overview of the Web technologies that are most suited for integrating Web- and DDS-applications, such as plain REST, CometD, WebSockets, Google Dart, and Play! Then it will demonstrate how the integration can be achieved with just a few lines of code by using the OpenSplice Gateway.
This document discusses RPC over DDS, which aims to provide a standard way to support remote procedure call communication patterns in the DDS middleware. It outlines goals such as supporting request/reply patterns and IDL-specified interfaces over DDS. It describes advantages like decoupling clients and servers. It then discusses implementation details, such as basic and enhanced service mappings, language bindings, and what needs to be specified.
NOTE: This document has been obsoleted by the Adopted DDS Specification
OMG DDS Security Draft Specification. This is the 4th Revised Submission to the DDS Security Specification.
Also accessible from the OMG at:
http://www.omg.org/members/cgi-bin/doc?mars/13-02-15.pdf
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
The document describes an adaptable DDS solution called sDDS for wireless sensor networks. sDDS uses a model-driven software development approach to tailor DDS middleware functionality and generate optimized code for heterogeneous sensor nodes. It includes a custom protocol called SNPS that is influenced by RTPS but optimized for low bandwidth wireless networks. SNPS allows aggregation of data from different topics into single messages to reduce overhead. An example shows how sensor nodes can selectively process only relevant data from SNPS messages to further reduce resource usage.
1) GE Healthcare is using RTI Connext DDS as the connectivity platform for its Industrial Internet of Things (IIoT) architecture. Connext DDS can handle many classes of intelligent machines and satisfies GE's demanding requirements.
2) GE Healthcare is leveraging the Predix architecture to connect medical devices, cloud analytics, and mobile/wearable instruments. The future communication fabric of its monitoring technology is based on Connext DDS.
3) Physio-Control uses Connext DDS to exchange critical patient care information throughout the system of care, connecting vehicle systems, cloud systems, and infrastructure systems.
Building Real-Time Web Applications with Vortex-WebAngelo Corsaro
The Real-Time Web is rapidly growing and as a consequence an increasing number of applications require soft-real time interactions with the server-side as well as with peer web applications. In addition, real-time web technologies are experiencing swift adoption in traditional systems as a means of providing portable and ubiquitously accessible thin client applications.
In spite of this trend, few high level communication frameworks exist that allow efficient and timely data exchange between web applications as well as with the server-side and the back-end system. Vortex Web is one of the first technologies to bring the powerful OMG Data Distribution Service (DDS) abstractions to the world of HTML5 / JavaScript applications. With Vortex Web, HTML5 / JavaScript applications can seamlessly and efficiently share data in a timely manner amongst themselves as well as with any other kind of device or system that supports the standard DDS Interoperability wire protocol (DDSI).
This presentation will (1) introduce the key abstractions provided by Vortex Web, (2) provide an overview of its architecture and explain how Vortex Web uses Web Sockets and Web Workers to provide low latency and high throughput, and (3) get you started developing real-time web applications.
This presentation provides an overview of the initial submission to the OMG RFP on DDS Security. The presentation introduces the overall security model proposed for DDS and the protocols.
Introduced in 2004, the Data Distribution Service (DDS) has been steadily growing in popularity and adoption. Today, DDS is at the heart of a large number of mission and business critical systems, such as, Air Traffic Control and Management, Train Control Systems, Energy Production Systems, Medical Devices, Autonomous Vehicles, Smart Cities and NASA’s Kennedy Space Centre Launch System.
Considered the technological trends toward data-centricity and the rate of adoption, tomorrow, DDS will be at the at the heart of an incredible number of Industrial IoT systems.
To help you become an expert in DDS and exploit your skills in the growing DDS market, we have designed the DDS in Action webcast series. This series is a learning journey through which you will (1) discover the essence of DDS, (2) understand how to effectively exploit DDS to architect and program distributed applications that perform and scale, (3) learn the key DDS programming idioms and architectural patterns, (4) understand how to characterise DDS performances and configure for optimal latency/throughput, (5) grow your system to Internet scale, and (6) secure you DDS system.
DDS Advanced Tutorial - OMG June 2013 Berlin MeetingJaime Martin Losa
An extended, in-depth tutorial explaining how to fully exploit the standard's unique communication capabilities.Presented at the OMG June 2013 Berlin Meeting.
Users upgrading to DDS from a homegrown solution or a legacy-messaging infrastructure often limit themselves to using its most basic publish-subscribe features. This allows applications to take advantage of reliable multicast and other performance and scalability features of the DDS wire protocol, as well as the enhanced robustness of the DDS peer-to-peer architecture. However, applications that do not use DDS's data-centricity do not take advantage of many of its QoS-related, scalability and availability features, such as the KeepLast History Cache, Instance Ownership and Deadline Monitoring. As a consequence some developers duplicate these features in custom application code, resulting in increased costs, lower performance, and compromised portability and interoperability.
This tutorial will formally define the data-centric publish-subscribe model as specified in the OMG DDS specification and define a set of best-practice guidelines and patterns for the design and implementation of systems based on DDS.
Desktop, Embedded and Mobile Apps with Vortex CaféAngelo Corsaro
In the past few years we have been experiencing an amazing proliferation of mobile and embedded platforms. Contemporary developers are increasingly faced with the challenge of writing applications that can run on desktop, mobile (e.g. Android), and on low-cost embedded platforms (e.g. Raspberry-Pi and Beaglebone). This is causing a rejuvenated interest in the Java platform as the mean to achieve the holy grail of write-once and run-everywhere. With the availability of Java environments supporting almost any kind of device in several different form factors, the missing element to the picture is an effective way of enabling communication between them.
Vortex Café is a pure Java implementation of the OMG Data Distribution Service (DDS) that enables seamless, efficient and timely data sharing across many-core machines, mobile and embedded devices.
This presentation will (1) introduce the main abstractions provided by Vortex Café, (2) provide an overview of its architecture and explain how it exploits Staged Event Driven Architectures to optimize its runtime depending of the target hardware, (3) provide an overview of the typical performance delivered by Vortex Café, and (3) get you started developing distributed Java and Scala applications with Vortex Café.
In the past few years we have experienced an amazing proliferation of mobile and embedded platforms. Contemporary developers are increasingly being faced with the challenge of writing applications that can run on desktop, mobile (e.g. Android and iOS), and on low-cost embedded platforms (e.g. Raspberry-Pi and Beaglebone). This is causing a rejuvenated interest in the Java platform as a means to achieve the holy grail of write-once and run-everywhere. With the availability of Java environments supporting almost any kind of device in several different form factors, the missing element of the picture is an effective way of enabling communication between them.
Vortex Café is a pure Java implementation of the OMG Data Distribution Service (DDS) that enables seamless, efficient and timely data sharing across multi-core machines, mobile and embedded devices.
This presentation will (1) introduce the main abstractions provided by Vortex Café, (2) provide an overview of its architecture and explain how it exploits Staged Event Driven Architectures to optimize its runtime behavior depending on the target hardware, (3) provide an overview of the typical performance delivered by Vortex Café, and (4) get you started developing distributed Java and Scala applications with Vortex Café.
Mobile platforms such as Android/iOS based smart phones, phablets , and tablets are swiftly establishing as the target client platform for a large class of consumer as well as enterprise and mission/business critical applications. OpenSplice Mobile is a pure Java DDS implementation optimized for Android and the JVM that provides effective and efficient DDS connectivity to Android based devices – as well as any JVM enabled device.
OpenSplice Mobile is the first peer-to-peer middleware infrastructure designed for Android that allow seamless interoperability with existing DDS systems and provides a powerful infrastructure for next generation peer-to-peer Android applications.
This presentation introduces OpenSplice Mobile, provides and overview of its architecture and performances and gets you started writing DDS applications for Android!
Mobile Application Framework - OFM Canberra September 2014Joelith
Slides from the Mobile Application Framework presentation at the Oracle Middleware Forum - September 2014 held in Canberra. For more information please see ofmcanberra.wordpress.com
This document introduces Darwino, an open platform for rapidly developing social business applications targeting mobile and cloud. Darwino allows developers to focus on the application instead of specifics of each mobile platform or wiring applications to legacy systems. It provides seamless offline capability and adapts to a developer's preferred tools. The key components of Darwino include a studio, UI components, REST services, and DarwinoDB, a JSON data store. DarwinoDB enables multi-point synchronization of data across devices and data sources. Darwino aims to make applications fully portable across platforms and reduce costs of building mobile, social, and cloud business applications.
Cloudera Navigator provides integrated data governance and security for Hadoop. It includes features for metadata management, auditing, data lineage, encryption, and policy-based data governance. KeyTrustee is Cloudera's key management server that integrates with hardware security modules to securely manage encryption keys. Together, Navigator and KeyTrustee allow users to classify data, audit usage, and encrypt data at rest and in transit to meet security and compliance needs.
An increasing number of Consumer and Internet Internet of Things applications require some form of edge computing characterised by low latency, peer-to-peer communication, and mobility. Fog computing has recently emerged as the paradigm to address the needs of edge computing in IoT applications. Fog computing complements Cloud computing to allow the design and implementation of IoT systems that scale better, are more reactive and in which local communication and decision is enabled whenever possible.
This presentation introduces the key concepts behind Fog Computing, compare and contrast it with Cloud Computing and explain how the VORTEX platform enables Fog computing architectures.
Securing your Applications for the Cloud AgeArtur Alves
Slide deck used for an Oracle EMEA Developers webinar, where I explain how to embrace cloud age security for custom built Node.js applications, using Oracle IDCS platform.
Reaching out from ADF Mobile (ODTUG KScope 2014)Luc Bors
The document discusses various features of Oracle ADF Mobile including:
1) Using remote URLs to embed existing web content in mobile apps.
2) Displaying remote files by downloading them locally and opening in native viewers.
3) Integrating REST services like Google Places to embed external data.
4) Embedding Twitter timelines using local HTML and Twitter widgets.
5) Enabling inter-app communication through URL schemes.
6) Implementing push notifications which require a complex setup but allow powerful delivery of messages.
This document discusses Digia's Qt Cloud Services, including their history providing cloud services for Qt applications since 2010. It describes their new Managed Application Runtime service, which provides a scalable and multi-language application platform as a service. Some example applications that could benefit are IoT/embedded devices, websites, and customer-facing apps. Developers can deploy their Qt or other language applications to the cloud service using common version control systems like Git for an agile development flow.
Media mosa architecture - features -10 june 2010Andrii Podanenko
Frans Ward presents on MediaMosa, an open source media management and distribution platform. Some key points:
1. MediaMosa has a service-oriented architecture with a frontend and backend separation for flexibility and scalability.
2. It uses REST APIs and has over 150 web services for functions like video playback, uploading, transcoding, metadata, and more.
3. MediaMosa is built on Drupal and supports flexible metadata sets and harvesting via OAI-PMH. Access management can restrict media access by domain, realm, groups, or users.
4. The platform and applications are open source. The community provides code, documentation, forums, and projects to support developers.
This presentation discusses the following topics:
1. the three types of mobile architecture that are available in the market today
2. Oracle MAF
3. Impact on your services
4. Impact on security
5. Impact on scalability
6. Three uses cases to illustrate the previous topics
7. Summary
OpenDDR is the ultimate open solution to the device fragmentation issues. Because of the wide
diversity of devices available on the market, the developers dealing with web content optimization
need to know hardware and software specs of each device. To face this situation the most effective
solution is using a Device Description Repository, a database storing a huge amount of information
concerning mobile phones, tablets, Interactive TVs, set top boxes and any device with a Web browser.
Running your Spring Apps in the Cloud Javaone 2014cornelia davis
Walk through what it took to bring a Srping App initially built for 2nd platform (infrastructure dependent) deployment, and make it deployable to 3rd platform (Cloud Foundry).
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...VMworld
This document discusses use cases and configuration for VMware Horizon Workspace. It provides an overview of Horizon Workspace and its capabilities for file collaboration, application access, and virtual desktop access. It then defines common Horizon Workspace use cases such as call centers, BYOD, and desktop outsourcing. Specific business requirements and considerations are discussed for each use case, including defining user profiles. The document concludes with a customer success story and details about deploying the Horizon Workspace virtual application.
What is a portal/ Java portal/ Enterprise portal ?tallashan
This document discusses what a portal is. A portal is a framework that combines multiple web applications into a single interface to provide common services like single sign-on, personalization, integration, role-based access controls, and search across applications. Portals pull common functionality out of separate applications and provide standardized ways to develop modular components called portlets. Major portal platforms include IBM WebSphere, Liferay, uPortal, and JBoss Portal.
Cloud Messaging is a key building block at the foundation of any Internet Scale native and web application. PrismTech’s Vortex Cloud provides an innovative solution to address the problems of efficiently and securely distributing data and raising events on an Internet Scale.
This presentation will (1) position Vortex Cloud with respect to some of the mainstream Cloud Messaging implementations, such as those found as part of the Microsoft Azure Platform, Amazon EC2, and the Google Cloud Platform (2) explain the unique features provided by Vortex Cloud, and (3) teach you how to get started writing native or web applications that leverage Vortex Cloud.
Securely Deploying Android Device - ISSA (Ireland)Angelill0
Angel Alonso-Parrizas presented ways to securely deploy Android devices. The document discussed improving security in areas like communications channels, access control, software policies and passwords. It proposed establishing an encrypted VPN tunnel for all device traffic. The document also suggested disabling USB access, enforcing strong passwords, and remotely installing authorized apps only. The goal was to align Android devices with corporate security policies and IT management.
Real-Time Innovations (RTI) is the largest software framework provider for smart machines and real-world systems. The company’s RTI Connext® product enables intelligent architecture by sharing information in real-time, making large applications work together as one.
Originally presented on April 11, 2017
Watch on-demand: https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&referrer=&eventid=1383298&sessionid=1&key=96B34B2E00F5FAA33C2957FE29D84624®Tag=&sourcepage=register
The document discusses a presentation given by Dr. Stan Schneider, CEO of RTI, and Dr. Rajive Joshi, Principal Solution Architect at RTI, on how the Industrial Internet Consortium's (IIC) Connectivity Framework guides selection of connectivity technologies for industrial internet of things (IIoT) systems. The presentation covered the goals of the IIC Connectivity Framework in providing guidance to practitioners on IIoT connectivity, the layers of the IIoT connectivity stack model, core connectivity standards, and a process for assessing and selecting the appropriate connectivity standard.
This document summarizes a presentation on the ISO 26262 approval of automotive software components. The presentation discusses ISO 26262 objectives for software, key characteristics of reusable software components, and the integration of qualified software components. It notes that ISO 26262 qualification of software components is possible if components have certain characteristics like modularity and provide documentation like a compliance matrix to guide integrators.
This document summarizes a presentation on developing autonomous vehicle architectures. It discusses using a data-centric middleware approach like the Data Distribution Service (DDS) standard to integrate sensors, fusion software, and control systems. DDS provides a common data model, quality of service controls, security features, and other benefits to help lower development risks. It also advocates consolidating electronic control units using a hypervisor and safety-certified operating system like QNX to isolate functions with different safety requirements. The presentation argues this is a lower-risk path to autonomous vehicle architecture than point-to-point and client-server approaches.
The document discusses fog computing and its role in industrial IoT (IIoT) systems. Fog computing refers to flexible, distributed computing resources and services located between end devices and centralized cloud computing infrastructure. It helps enable real-time response, reliable availability, and complex data management required for IIoT applications. The Industrial Internet Consortium is working to develop common architectures to connect sensors to cloud across industries using fog computing technologies like the Data Distribution Service standard.
This document discusses cyber security challenges for connected cars. It notes connected cars have multiple attack surfaces through the internet, cloud, communication with other cars, and in-car systems. The document advocates for a layered security approach, including boundary security, transport-level security, and fine-grained data-centric security. It describes using Real-Time Innovation's Connext DDS Secure product to implement fine-grained security at the individual data topic level to control access and ensure proper system operation in a secure manner.
This document discusses lessons learned from space rovers and surgical robots that can inform system architecture. It advocates for a common architecture across industries using the Data Distribution Service (DDS) standard. DDS provides a data-centric middleware that maintains distributed state and facilitates plug-and-play connectivity between devices and across networks. It ensures real-time communication with quality of service guarantees to support applications from robotics to healthcare. DDS has been adopted in over 1000 industrial IoT systems and several standards/consortia due to its ability to securely connect sensors to cloud with interoperability between vendors.
This document discusses safety considerations for next-generation autonomous vehicles and how RTI's data distribution service (DDS) middleware can help address them. DDS ensures reliable data availability in real-time across complex systems, facilitates integration of diverse components, and enables flexible deployment. Its use of a common data model simplifies safety certification processes.
This document discusses RTI's Transport Services Segment (TSS) Reference Implementation, which is built on Connext DDS Cert and conforms to the FACE Safety Base Profile. It provides an overview of the TSS context within FACE, the Transport Services API, and the modular and configurable architecture of Connext DDS Micro and Cert. Connext DDS Cert is designed for safety-critical applications and its code is certifiable to DO-178C Level A, the most stringent safety standard, with reusable certification evidence.
This document discusses how integrating time-sensitive networking (TSN) with a data-centric connectivity approach using the Data Distribution Service (DDS) can improve industrial control systems. TSN provides real-time and deterministic networking over Ethernet, while DDS enables loose coupling, plug-and-play integration, and data sharing through its publish-subscribe model. Together, TSN and DDS can address challenges with traditional connectivity approaches by leveraging commodity hardware, simplifying integration, and allowing for improved data usage. The document outlines relevant TSN standards and how DDS quality of service policies can map to TSN priorities to provide deterministic networking.
The document discusses autonomous vehicle design and RTI's expertise in autonomy. It begins by outlining the challenges of autonomous vehicle technical including rapid evolution, complex system integration, on/off vehicle communications, perception and sensing, decision making, safety certification, and software dominance in a mechanical world. It then describes RTI's experience in various industries and standards efforts. RTI is said to have deep expertise in autonomy from its founders' background and use of its middleware to power unmanned systems. The document discusses how RTI can help with autonomous vehicle development through ensuring data availability, guaranteeing real-time response, managing complex data flows and states, easing system integration, building in security, making deployments flexible, and easing safety
This document discusses cybersecurity considerations for industrial Internet of Things (IIoT) systems. It describes how IIoT systems are distributed across sensors, actuators and other devices with streaming data, analytics/control, and connectivity to IT systems and clouds. This distributed nature introduces potential vulnerabilities from threats. The document then introduces the Data Distribution Service (DDS) standard as a connectivity platform that can address challenges like security while supporting real-time and reliable data distribution. Key features of DDS like decentralization and publish/subscribe capabilities are described. Finally, the document outlines DDS security capabilities like authentication, access control, encryption and logging to secure IIoT systems from unauthorized access and tampering.
This document discusses data distribution service (DDS) security for the industrial internet of things (IIoT). It provides background on DDS and the IIoT. It then discusses how DDS security works, including pluggable security architectures, authentication, access control, and message security. The goal of DDS security is to prevent unauthorized access to data in the global data space shared by DDS applications. Built-in security capabilities include X.509 authentication, access control configuration, and encryption/message authentication algorithms.
1) The document discusses using the Data Distribution Service (DDS) standard and Connext DDS middleware to develop mission-critical systems with Ada. DDS handles connectivity and allows applications to communicate in a loosely coupled publish-subscribe manner.
2) Developing applications directly with traditional inter-process communication approaches is expensive and ties applications to specific communication mechanisms. DDS simplifies application logic and reduces development and integration costs.
3) DDS supports real-time and safety-critical systems and has been used for systems like avionics and defense applications. It interfaces with Ada through code generation from IDL definitions.
This document discusses data centric safety and security for the industrial internet of things (IIoT). It highlights how the IIoT will be disruptive and transform industries. The real value of the IIoT is a common architecture that connects sensors to the cloud, allows for interoperability between vendors, and spans multiple industries. The document discusses the role of Real-Time Innovations (RTI) and their data distribution service (DDS) standard in developing a common architecture for the IIoT. It also outlines RTI's experience with over $1 trillion in IIoT designs and involvement in several standards and consortium efforts.
Connext DDS Cert provides a certifiable implementation of the Data Distribution Service (DDS) standard for safety-critical and mission-critical systems. It handles connectivity and integration challenges and supports DO-178C Level A certification. Using Connext DDS Cert can reduce certification costs by replacing custom connectivity code and simplifying system architecture. Real-Time Innovations provides a full certification data package to support certification of systems using Connext DDS Cert.
Mahindra Group has a history of global collaboration and pioneering globalization. Its purpose is to challenge conventional thinking and enable stakeholders to rise. Tech Mahindra is a leader in engineering for next-gen connected solutions and the internet of things. It provides connected engineering and analytics services across industries like automotive, healthcare, smart cities, and renewable energy to manage the changing world.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away