61850easy is an IEC 61850 Test Tool solution that allows users to monitor, diagnose, troubleshoot and simulate messages over an IEC 61850 network. 61850easy, as a vendor independent tool, addresses inherent protocol complexities and simplifies them into an understandable and easy to use format for all users.
Overview Of I E C61850 Presentation..... W S Mginquesada
This document provides an overview of IEC 61850 and its benefits. IEC 61850 is a framework for substation automation that standardizes object models, data meanings, services, and device configurations. This standardization allows devices from different vendors to interoperate and reduces engineering and configuration costs. The benefits of IEC 61850 include lower installation, maintenance, wiring, and commissioning costs through the use of self-describing devices and a common configuration language.
Unique challenges arise for manufacturing smart, connected IoT devices including power efficiency, compatibility across different interfaces, and migration to new processors. However, FPGAs can help address these challenges in three ways. First, their low power consumption and programmability allows for more efficient power management. Second, FPGAs support various interfaces through customizable IP cores, improving interoperability. Third, a companion FPGA can augment processors to expand I/O and interfaces without requiring a new processor. In this way, FPGAs provide a low-cost, small-sized solution suitable for overcoming common IoT design problems.
The document discusses network troubleshooting techniques. It recommends completing all troubleshooting activities in the chapter, as they will help students preparing for the CCNA exam. The document outlines troubleshooting methodology, including using network documentation, following a troubleshooting process, and isolating issues by layer. It also discusses specific troubleshooting tools, symptoms at different layers, and steps for troubleshooting IP connectivity issues.
Industrial Internet of Things: Protocols an StandardsJavier Povedano
Presentation for the Distributed Systems Master at the University of Cordoba (Spain). In this presentation we review the state of the art in communication middlewares for Industrial Internet of Things
ComputeCore de CoreAVI es un conjunto de bibliotecas de ordenadores que proporciona los bloques de construcción para permitir la aceleración de sistemas informáticos y autónomos que utilizan la API Vulkan SC. Puedes descubrir los beneficios de esta herramienta en el siguiente documento.
Lightweight Virtualized Containers For Open Platform for NFV* (OPNFV*)Michelle Holley
We will examine the current state of container (and Kubernetes) support in Open Platform for Network Function Virtualization (OPNFV). We will also examine new container technologies that use lightweight virtual machines for containerized workloads, as exemplified by Intel Clear Containers and the upcoming Kata Containers project. We’ll look at the components of container management systems, with an eye towards the integration of lightweight virtualization into OPNFV’s container support. Finally, we’ll have a hands-on lab session in which you’ll be able to install Kubernetes with cc-runtime, the Intel Clear Containers runtime engine for containers. We'll explore how it functions and the challenges and opportunities for integrating into OPNFV.
Lab instructions can be found at http://www.dragstroke.org.s3-website.us-east-2.amazonaws.com/
Overview Of I E C61850 Presentation..... W S Mginquesada
This document provides an overview of IEC 61850 and its benefits. IEC 61850 is a framework for substation automation that standardizes object models, data meanings, services, and device configurations. This standardization allows devices from different vendors to interoperate and reduces engineering and configuration costs. The benefits of IEC 61850 include lower installation, maintenance, wiring, and commissioning costs through the use of self-describing devices and a common configuration language.
Unique challenges arise for manufacturing smart, connected IoT devices including power efficiency, compatibility across different interfaces, and migration to new processors. However, FPGAs can help address these challenges in three ways. First, their low power consumption and programmability allows for more efficient power management. Second, FPGAs support various interfaces through customizable IP cores, improving interoperability. Third, a companion FPGA can augment processors to expand I/O and interfaces without requiring a new processor. In this way, FPGAs provide a low-cost, small-sized solution suitable for overcoming common IoT design problems.
The document discusses network troubleshooting techniques. It recommends completing all troubleshooting activities in the chapter, as they will help students preparing for the CCNA exam. The document outlines troubleshooting methodology, including using network documentation, following a troubleshooting process, and isolating issues by layer. It also discusses specific troubleshooting tools, symptoms at different layers, and steps for troubleshooting IP connectivity issues.
Industrial Internet of Things: Protocols an StandardsJavier Povedano
Presentation for the Distributed Systems Master at the University of Cordoba (Spain). In this presentation we review the state of the art in communication middlewares for Industrial Internet of Things
ComputeCore de CoreAVI es un conjunto de bibliotecas de ordenadores que proporciona los bloques de construcción para permitir la aceleración de sistemas informáticos y autónomos que utilizan la API Vulkan SC. Puedes descubrir los beneficios de esta herramienta en el siguiente documento.
Lightweight Virtualized Containers For Open Platform for NFV* (OPNFV*)Michelle Holley
We will examine the current state of container (and Kubernetes) support in Open Platform for Network Function Virtualization (OPNFV). We will also examine new container technologies that use lightweight virtual machines for containerized workloads, as exemplified by Intel Clear Containers and the upcoming Kata Containers project. We’ll look at the components of container management systems, with an eye towards the integration of lightweight virtualization into OPNFV’s container support. Finally, we’ll have a hands-on lab session in which you’ll be able to install Kubernetes with cc-runtime, the Intel Clear Containers runtime engine for containers. We'll explore how it functions and the challenges and opportunities for integrating into OPNFV.
Lab instructions can be found at http://www.dragstroke.org.s3-website.us-east-2.amazonaws.com/
Enabling Multi-access Edge Computing (MEC) Platform-as-a-Service for EnterprisesMichelle Holley
The document discusses Intel's Network Edge Virtualization (NEV) SDK which provides tools and libraries for Multi-access Edge Computing (MEC). The NEV SDK supports 4G and 5G deployments, provides APIs for MEC applications, and optimizes the data plane for VNF routing. It also supports integration with cloud platforms and aims to provide a flexible edge computing platform for industries like transportation, healthcare, and smart cities.
The document discusses Cisco's Field Area Network solution including:
- Multi-service connectivity using smart endpoints, fog computing, security, management, and standards
- The DevNet and Solution Partner Program focusing on technology, partner stories, and participation levels
- Cisco's approach to enabling IoT applications including open standards, security, management, and providing application capabilities at the network edge
Ligato - A platform for development of Cloud-Native VNF's - SDN/NFV London me...Haidee McMahon
1. The document discusses the need for cloud-native network functions (CNFs) and proposes a platform called Ligato to develop CNFs.
2. Ligato provides lifecycle management, high-performance networking and forwarding, and easy installation and operation for container-based CNFs.
3. It describes how Ligato enables service function chaining by orchestrating CNFs and uses containers, VPP, and overlays for high performance networking between CNFs.
Are your backups are too big, and do you store them too long? Do missed SLAs, cost and complexity still vex you? Are you worried you won’t get all of your data back? Do you waste hours managing complicated, temperamental backup solutions?
We discuss ways to make backup predictable, shrink windows, over-perform on SLAs and get all your data back – every time, on time. See how others are matching their backup to their business, reducing stored data by up to 95% and speeding backups by 275%. Focus on your business—not your backups.
Ti k2 e for mission critical applicationsHitesh Jani
The document discusses the TI-K2E for mission critical applications. It introduces the Keystone II family of processors, specifically the 66AK2Ex and AM5K2Ex variants. These variants provide powerful ARM and DSP cores, high performance at low power, security and reliability features. Example application areas discussed include aerospace, medical, and industrial automation. Specific use cases in areas like medical robotics and industrial imaging are also described.
Software Defined Networking/Openflow: A path to Programmable NetworksMyNOG
(1) The document discusses software defined networking (SDN) and OpenFlow, introducing key concepts like separating the control plane from the data plane, using OpenFlow to program the flow table of OpenFlow-enabled switches from a central controller. (2) It explores SDN use cases like network virtualization for multi-tenancy in hyper-scale data centers and flow management in metro/WAN networks using OpenFlow. (3) The SDN architecture abstracts the physical network through the controller to support network programmability and flexibility through virtualization and services.
LTE: Building next-gen application services for mobile telecomsNuoDB
This document provides an overview of mobile network virtualization and how it enables telecommunications operators to reduce costs and support new services. It discusses concepts like network functions virtualization (NFV), software-defined networking (SDN), and the virtualization of different parts of the mobile network including the radio access network (RAN) and evolved packet core (EPC). The challenges of evolving networks through virtualization while maintaining service and revenues are also examined.
Building efficient 5G NR base stations with Intel® Xeon® Scalable Processors Michelle Holley
Speaker: Daniel Towner, System Architect for Wireless Access, Intel Corporation
5G brings many new capabilities over 4G including higher bandwidths, lower latencies, and more efficient use of radio spectrum. However, these improvements require a large increase in computing power in the base station. Fortunately the Xeon Scalable Processor series (Skylake-SP) recently introduced by Intel has a new high-performance instruction set called Intel® Advanced Vector Extensions 512 (Intel® AVX-512) which is capable of delivering the compute needed to support the exciting new world of 5G.
In his talk Daniel will give an overview of the new capabilities of the Intel AVX-512 instruction set and show why they are so beneficial to supporting 5G efficiently. The most obvious difference is that Intel AVX-512 has double the compute performance of previous generations of instruction sets. Perhaps surprisingly though it is the addition of brand new instructions that can make the biggest improvements. The new instructions mean that software algorithms can become more efficient, thereby enabling even more effective use of the improvements in computing performance and leading to very high performance 5G NR software implementations.
The document discusses network function virtualization (NFV) and software-defined networking (SDN). It provides an overview of Intel's strategy to support NFV/SDN, including enabling workload consolidation, bringing virtualization to networking through NFV, and optimizing open architectures on Intel Architecture through SDN. It also summarizes the OPNFV Brahmaputra release and highlights various Intel technologies that can accelerate NFV/SDN solutions like DPDK, QAT, and acceleration tools.
This document discusses running Kubernetes on OpenStack at scale. It describes how OpenStack provides automated provisioning of infrastructure resources, while Kubernetes provides a container platform for consuming those resources. The advantages of combining these technologies include fully automated infrastructure, consistent management experience, isolation for workloads, and leveraging existing plugins. It provides an example architecture using Red Hat OpenShift on OpenStack with key components like Ceph storage, Neutron networking integrated via Kuryr, and Heat for orchestration.
Closed Loop Network Automation for Optimal Resource Allocation via Reinforcem...Liz Warner
In this talk, we present a closed-loop automation approach to dynamically adjust LLC cache allocation (Intel RDT) between high priority VNFs and BE workloads using reinforcement learning. The results demonstrated improved server utilization while maintaining required service level agreement for high priority VNFs.
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Liz Warner
Transformation of network softwarization towards 5G inherently requires satisfying the requirements across a broad scope of verticals while maintaining Quality of Service (QoS) and Quality of Experience (QoE) criteria required to satisfy various network slice constraints. This session with hands-on lab introduces 3 key elements of service assurance – Monitoring, Presentation & provisioning layers and introduction to various cloud-native open source frameworks like Collectd, Influxdb, Grafana, Prometheus, Kafka and Platform for Network Data Analytics (PNDA).
Practical IEC 61850 for Substation Automation for Engineers and TechniciansLiving Online
COPY THIS LINK INTO YOUR BROWSER TO FIND OUT MORE: bit.ly/11AM1oL
Older (‘legacy’) substation automation protocols and hardware/software architectures provided basic functionality for power system automation, and were designed to accommodate the technical limitations of the technologies available at the time. However, in recent years there have been vast improvements in technology, especially on the networking side. This has opened the door for dramatic improvements in the approach to power system automation in substations.
The latest developments in networking such as high-speed, deterministic, redundant Ethernet, as well as other technologies including TCP/IP, high-speed Wide Area Networks and high-performance embedded processors, are providing capabilities that could hardly be imagined when most legacy substation automation protocols were designed.
IEC61850 is a part of the International Electro-technical Commission (IEC) Technical Committee 57 (TC57) architecture for electric power systems. It is an important new international standard for substation automation, and it will have a significant impact on how electric power systems are designed and built in future. The model-driven approach of IEC61850 is an innovative approach and requires a new way of thinking about substation automation. This will result in significant improvements in the costs and performance of electric power systems.
This workshop provides comprehensive coverage of IEC 61850 and will provide you with the tools and knowledge to tackle your next substation automation project with confidence.
WHO SHOULD ATTEND?
This workshop is designed for personnel with a need to understand the techniques required to use and apply IEC 61850 to substation automation, hydro power plants, wind turbines and distributed energy resources as productively and economically as possible. This includes engineers and technicians involved with:
Consulting
Control and instrumentation
Control systems
Design
Maintenance supervisors
Electrical installations
Process control
Process development
Project management
SCADA and telemetry systems
COPY THIS LINK INTO YOUR BROWSER TO FIND OUT MORE: bit.ly/11AM1oL
Enabling Active Flow Manipulation In Silicon-based Network Forwarding Engines Tal Lavian Ph.D.
This document discusses enabling active flow manipulation in silicon-based network forwarding engines. It describes Nortel's Openet platform, which uses active flow manipulation to allow network services to define and alter network behavior in real-time. Examples of applications using this capability are presented, including SSL acceleration and an active firewall service. The presentation outlines the technology transfer of active network ideas into practical commercial products and considers future directions such as service-centric networks and integrated management of network services.
OMA is the organization that develops and maintains the device management protocol, OMA Lightweight M2M (LwM2M). During OMA’s presentation, you will learn:
● What is LwM2M architecture, interfaces, functions and operations
● The different organizations that interface with OMA to create the LwM2M ecosystem
● How LwM2M works
● Why LwM2M is secure
● What is next for OMA LwM2M
This document summarizes a presentation on software defined networking (SDN). It discusses how SDN virtualizes networks in the same way server and desktops have been virtualized. SDN decouples the control plane from the data plane, allowing centralized control of network behavior and dynamic infrastructure provisioning. OpenFlow is presented as one approach to enable SDN by allowing communication between the network control and network devices. Potential benefits of SDN include flexibility, provisioning speed, improved security, efficiency and cost savings.
The document discusses the open source Internet of Things (IoT) stack developed by the Eclipse Foundation. It describes how the open IoT stack provides open connectivity standards like MQTT, CoAP, and LWM2M to connect devices. It also includes IoT gateway services for remote management and application management. The stack supports various IoT solution frameworks for home automation, SCADA systems, and the OM2M standard. The Eclipse Foundation aims for an open ecosystem for IoT development and provides tools and projects through its open IoT stack.
Active Nets Technology Transfer through High-Performance Network DevicesTal Lavian Ph.D.
Deploying commercial high performance network devices to construct a programmable AN platform
Supporting customizable network intelligences
Supporting excellent AN-specific research projects
Addressing AN and optical networking issues
Cloud native architecture is emerging for Telecom workloads. To support these emerging trends, Intel is targeting enhancements to the Dataplane Development Kit (DPDK). The enhancements would target network service mesh with dedicated sidecar accelerators and the mechanism to build the mesh dynamically.
Speaker: Gerald Rogers. Gerald Rogers is a Principal Engineer in the Network Products Group focused on virtual switching, network function virtualization and Data Plane Development Kit (DPDK). After joining Intel in 2005, Gerald has worked as a software engineer and architect in the embedded and networking groups. For the past 7 years Gerald has led the network virtual switching software and hardware acceleration effort to drive Intel architecture into the networking and telecommunications industry. Gerald holds a Bachelor’s degree in Electrical Engineering and a Master’s degree in Computer Science, and has 20 years of experience in the networking and telecommunications industry.
This document provides images and locations of landmarks from different continents around the world. It includes landmarks from North America like the Statue of Liberty and Hollywood Sign, South America like the Oliveira Bridge in Brazil, Europe like the Eiffel Tower and London Eye, Asia like the Cheonggyecheon in Seoul and Osaka Castle, Africa like the pyramids in Cairo, and Oceania like the Sydney Opera House and Auckland Harbour Bridge. In total, it highlights iconic structures and places from over a dozen cities across six continents.
- 61850easy is software that allows users to test IEC 61850 systems by simulating traffic, discovering devices, and monitoring live communications.
- It has applications in designing, testing, commissioning, and training on IEC 61850 systems.
- The software has tools for simulating GOOSE messages, discovering device models, and accessing live and archived reports from IEDs. It integrates various testing functions into a single workspace.
Enabling Multi-access Edge Computing (MEC) Platform-as-a-Service for EnterprisesMichelle Holley
The document discusses Intel's Network Edge Virtualization (NEV) SDK which provides tools and libraries for Multi-access Edge Computing (MEC). The NEV SDK supports 4G and 5G deployments, provides APIs for MEC applications, and optimizes the data plane for VNF routing. It also supports integration with cloud platforms and aims to provide a flexible edge computing platform for industries like transportation, healthcare, and smart cities.
The document discusses Cisco's Field Area Network solution including:
- Multi-service connectivity using smart endpoints, fog computing, security, management, and standards
- The DevNet and Solution Partner Program focusing on technology, partner stories, and participation levels
- Cisco's approach to enabling IoT applications including open standards, security, management, and providing application capabilities at the network edge
Ligato - A platform for development of Cloud-Native VNF's - SDN/NFV London me...Haidee McMahon
1. The document discusses the need for cloud-native network functions (CNFs) and proposes a platform called Ligato to develop CNFs.
2. Ligato provides lifecycle management, high-performance networking and forwarding, and easy installation and operation for container-based CNFs.
3. It describes how Ligato enables service function chaining by orchestrating CNFs and uses containers, VPP, and overlays for high performance networking between CNFs.
Are your backups are too big, and do you store them too long? Do missed SLAs, cost and complexity still vex you? Are you worried you won’t get all of your data back? Do you waste hours managing complicated, temperamental backup solutions?
We discuss ways to make backup predictable, shrink windows, over-perform on SLAs and get all your data back – every time, on time. See how others are matching their backup to their business, reducing stored data by up to 95% and speeding backups by 275%. Focus on your business—not your backups.
Ti k2 e for mission critical applicationsHitesh Jani
The document discusses the TI-K2E for mission critical applications. It introduces the Keystone II family of processors, specifically the 66AK2Ex and AM5K2Ex variants. These variants provide powerful ARM and DSP cores, high performance at low power, security and reliability features. Example application areas discussed include aerospace, medical, and industrial automation. Specific use cases in areas like medical robotics and industrial imaging are also described.
Software Defined Networking/Openflow: A path to Programmable NetworksMyNOG
(1) The document discusses software defined networking (SDN) and OpenFlow, introducing key concepts like separating the control plane from the data plane, using OpenFlow to program the flow table of OpenFlow-enabled switches from a central controller. (2) It explores SDN use cases like network virtualization for multi-tenancy in hyper-scale data centers and flow management in metro/WAN networks using OpenFlow. (3) The SDN architecture abstracts the physical network through the controller to support network programmability and flexibility through virtualization and services.
LTE: Building next-gen application services for mobile telecomsNuoDB
This document provides an overview of mobile network virtualization and how it enables telecommunications operators to reduce costs and support new services. It discusses concepts like network functions virtualization (NFV), software-defined networking (SDN), and the virtualization of different parts of the mobile network including the radio access network (RAN) and evolved packet core (EPC). The challenges of evolving networks through virtualization while maintaining service and revenues are also examined.
Building efficient 5G NR base stations with Intel® Xeon® Scalable Processors Michelle Holley
Speaker: Daniel Towner, System Architect for Wireless Access, Intel Corporation
5G brings many new capabilities over 4G including higher bandwidths, lower latencies, and more efficient use of radio spectrum. However, these improvements require a large increase in computing power in the base station. Fortunately the Xeon Scalable Processor series (Skylake-SP) recently introduced by Intel has a new high-performance instruction set called Intel® Advanced Vector Extensions 512 (Intel® AVX-512) which is capable of delivering the compute needed to support the exciting new world of 5G.
In his talk Daniel will give an overview of the new capabilities of the Intel AVX-512 instruction set and show why they are so beneficial to supporting 5G efficiently. The most obvious difference is that Intel AVX-512 has double the compute performance of previous generations of instruction sets. Perhaps surprisingly though it is the addition of brand new instructions that can make the biggest improvements. The new instructions mean that software algorithms can become more efficient, thereby enabling even more effective use of the improvements in computing performance and leading to very high performance 5G NR software implementations.
The document discusses network function virtualization (NFV) and software-defined networking (SDN). It provides an overview of Intel's strategy to support NFV/SDN, including enabling workload consolidation, bringing virtualization to networking through NFV, and optimizing open architectures on Intel Architecture through SDN. It also summarizes the OPNFV Brahmaputra release and highlights various Intel technologies that can accelerate NFV/SDN solutions like DPDK, QAT, and acceleration tools.
This document discusses running Kubernetes on OpenStack at scale. It describes how OpenStack provides automated provisioning of infrastructure resources, while Kubernetes provides a container platform for consuming those resources. The advantages of combining these technologies include fully automated infrastructure, consistent management experience, isolation for workloads, and leveraging existing plugins. It provides an example architecture using Red Hat OpenShift on OpenStack with key components like Ceph storage, Neutron networking integrated via Kuryr, and Heat for orchestration.
Closed Loop Network Automation for Optimal Resource Allocation via Reinforcem...Liz Warner
In this talk, we present a closed-loop automation approach to dynamically adjust LLC cache allocation (Intel RDT) between high priority VNFs and BE workloads using reinforcement learning. The results demonstrated improved server utilization while maintaining required service level agreement for high priority VNFs.
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Liz Warner
Transformation of network softwarization towards 5G inherently requires satisfying the requirements across a broad scope of verticals while maintaining Quality of Service (QoS) and Quality of Experience (QoE) criteria required to satisfy various network slice constraints. This session with hands-on lab introduces 3 key elements of service assurance – Monitoring, Presentation & provisioning layers and introduction to various cloud-native open source frameworks like Collectd, Influxdb, Grafana, Prometheus, Kafka and Platform for Network Data Analytics (PNDA).
Practical IEC 61850 for Substation Automation for Engineers and TechniciansLiving Online
COPY THIS LINK INTO YOUR BROWSER TO FIND OUT MORE: bit.ly/11AM1oL
Older (‘legacy’) substation automation protocols and hardware/software architectures provided basic functionality for power system automation, and were designed to accommodate the technical limitations of the technologies available at the time. However, in recent years there have been vast improvements in technology, especially on the networking side. This has opened the door for dramatic improvements in the approach to power system automation in substations.
The latest developments in networking such as high-speed, deterministic, redundant Ethernet, as well as other technologies including TCP/IP, high-speed Wide Area Networks and high-performance embedded processors, are providing capabilities that could hardly be imagined when most legacy substation automation protocols were designed.
IEC61850 is a part of the International Electro-technical Commission (IEC) Technical Committee 57 (TC57) architecture for electric power systems. It is an important new international standard for substation automation, and it will have a significant impact on how electric power systems are designed and built in future. The model-driven approach of IEC61850 is an innovative approach and requires a new way of thinking about substation automation. This will result in significant improvements in the costs and performance of electric power systems.
This workshop provides comprehensive coverage of IEC 61850 and will provide you with the tools and knowledge to tackle your next substation automation project with confidence.
WHO SHOULD ATTEND?
This workshop is designed for personnel with a need to understand the techniques required to use and apply IEC 61850 to substation automation, hydro power plants, wind turbines and distributed energy resources as productively and economically as possible. This includes engineers and technicians involved with:
Consulting
Control and instrumentation
Control systems
Design
Maintenance supervisors
Electrical installations
Process control
Process development
Project management
SCADA and telemetry systems
COPY THIS LINK INTO YOUR BROWSER TO FIND OUT MORE: bit.ly/11AM1oL
Enabling Active Flow Manipulation In Silicon-based Network Forwarding Engines Tal Lavian Ph.D.
This document discusses enabling active flow manipulation in silicon-based network forwarding engines. It describes Nortel's Openet platform, which uses active flow manipulation to allow network services to define and alter network behavior in real-time. Examples of applications using this capability are presented, including SSL acceleration and an active firewall service. The presentation outlines the technology transfer of active network ideas into practical commercial products and considers future directions such as service-centric networks and integrated management of network services.
OMA is the organization that develops and maintains the device management protocol, OMA Lightweight M2M (LwM2M). During OMA’s presentation, you will learn:
● What is LwM2M architecture, interfaces, functions and operations
● The different organizations that interface with OMA to create the LwM2M ecosystem
● How LwM2M works
● Why LwM2M is secure
● What is next for OMA LwM2M
This document summarizes a presentation on software defined networking (SDN). It discusses how SDN virtualizes networks in the same way server and desktops have been virtualized. SDN decouples the control plane from the data plane, allowing centralized control of network behavior and dynamic infrastructure provisioning. OpenFlow is presented as one approach to enable SDN by allowing communication between the network control and network devices. Potential benefits of SDN include flexibility, provisioning speed, improved security, efficiency and cost savings.
The document discusses the open source Internet of Things (IoT) stack developed by the Eclipse Foundation. It describes how the open IoT stack provides open connectivity standards like MQTT, CoAP, and LWM2M to connect devices. It also includes IoT gateway services for remote management and application management. The stack supports various IoT solution frameworks for home automation, SCADA systems, and the OM2M standard. The Eclipse Foundation aims for an open ecosystem for IoT development and provides tools and projects through its open IoT stack.
Active Nets Technology Transfer through High-Performance Network DevicesTal Lavian Ph.D.
Deploying commercial high performance network devices to construct a programmable AN platform
Supporting customizable network intelligences
Supporting excellent AN-specific research projects
Addressing AN and optical networking issues
Cloud native architecture is emerging for Telecom workloads. To support these emerging trends, Intel is targeting enhancements to the Dataplane Development Kit (DPDK). The enhancements would target network service mesh with dedicated sidecar accelerators and the mechanism to build the mesh dynamically.
Speaker: Gerald Rogers. Gerald Rogers is a Principal Engineer in the Network Products Group focused on virtual switching, network function virtualization and Data Plane Development Kit (DPDK). After joining Intel in 2005, Gerald has worked as a software engineer and architect in the embedded and networking groups. For the past 7 years Gerald has led the network virtual switching software and hardware acceleration effort to drive Intel architecture into the networking and telecommunications industry. Gerald holds a Bachelor’s degree in Electrical Engineering and a Master’s degree in Computer Science, and has 20 years of experience in the networking and telecommunications industry.
This document provides images and locations of landmarks from different continents around the world. It includes landmarks from North America like the Statue of Liberty and Hollywood Sign, South America like the Oliveira Bridge in Brazil, Europe like the Eiffel Tower and London Eye, Asia like the Cheonggyecheon in Seoul and Osaka Castle, Africa like the pyramids in Cairo, and Oceania like the Sydney Opera House and Auckland Harbour Bridge. In total, it highlights iconic structures and places from over a dozen cities across six continents.
- 61850easy is software that allows users to test IEC 61850 systems by simulating traffic, discovering devices, and monitoring live communications.
- It has applications in designing, testing, commissioning, and training on IEC 61850 systems.
- The software has tools for simulating GOOSE messages, discovering device models, and accessing live and archived reports from IEDs. It integrates various testing functions into a single workspace.
IEC 61850 Interoperability at information level: a challenge for all market p...Schneider Electric
IEC is one of the front-running bodies for providing standards to manage Smart Grids, such as CIM and IEC 61850. However, standardization in such an area is so wide with so many different actors, that this is also raising new challenges to IEC, such as having top-down standardization process, or in providing and maintaining domains cross-cutting data modeling activities. This presentations examines what vendors and standardisation bodies are currently doing independently and collaboratively to achieve a multi-vendor network.
Overview about smart grid projects in Brazil and how the security requiments have been considered in R&D projects. Results related to a smart metering security assessment project are presented.
Cyber Security in Substation Automation (IEC 61850)Nikandrov Maxim
This document discusses cyber security risks in electrical substation automation systems that use IEC 61850 protocols. It outlines how unauthorized access and spoofing attacks can manipulate systems by sending false operational commands and positioning data. Specifically, it demonstrates how Man-in-the-Middle attacks can spoof Multicast MAC Secure (MMS) and Generic Object Oriented Substation Event (GOOSE) messages to send false commands. The document calls for improvements in cyber security practices, policies, personnel training, use of encryption and other protections to address these risks.
The document discusses cyber security threats to the US power grid. It notes that the power grid consists of over 300,000 km of transmission lines operated by 500 companies. Cyber attacks on critical infrastructure like the power grid are increasing in frequency and sophistication, which could have severe consequences. For example, a DDoS attack costing just $40 could overwhelm network links and cause a blackout. The document also provides examples of past cyber attacks on energy systems like Stuxnet and the 2015 attack on Ukraine's power grid that left 700,000 residents without electricity for 7 hours.
The cyber criminal community has evolved from pranksters, lone wolves, and organized
gangs to nation-states and hacktivist groups whose primary results have been increased
costs and lost productivity. As enterprises and governments connect literally everything to
the Internet, the size of their attack surface has grown, opening more opportunities for
cyber criminals. Many of their current exploits are going unnoticed.
The document discusses the 61850IMU software which allows users to capture, analyze, and monitor IEC 61850 network traffic in substations. The 61850IMU provides archiving, reporting, and monitoring of substation data. It offers key features such as GOOSE subscriber, MMS discovery, buffered report monitoring, and embedded analysis tools. The 61850IMU software can be installed on compatible hardware or as a virtual appliance, and support packages are available.
The document discusses Grid Smart's 61850IMU software, which allows users to capture, record, process, and monitor IEC 61850 network traffic in substations. The 61850IMU can be installed on the user's own hardware or supplied by Grid Smart. It has features like GOOSE subscriber, MMS discovery and client, embedded tools, and support packages. The 61850IMU provides visibility into IEC 61850 networks to optimize maintenance, protect assets, and increase profitability for users.
Cisco prime-nms-overview-hi-techdays deep divesolarisyougood
This document discusses Cisco Prime Network Management and its benefits over traditional point-product network management solutions. It provides an overview of Cisco Prime's integrated workflows, common user experience, consolidated management capabilities, and benefits such as reduced costs, accelerated service rollout, and consistent user experience. Key features covered include comprehensive device lifecycle management, deep application visibility and performance assurance, and consolidated reporting and compliance auditing through a single management interface.
Cisco prime-nms-overview-hi-techdays deep divesolarisyougood
This document discusses Cisco Prime Network Management and its benefits over traditional point-product network management solutions. It provides an overview of Cisco Prime's integrated workflows, common user experience, consolidated management capabilities, and support for the full device lifecycle. Key features highlighted include comprehensive device manageability, assurance of application experience and visibility, simplified deployment of Cisco devices, and support for network lifecycle management.
The number of internet-connected devices is growing exponentially, enabling an increasing number of edge applications in environments such as smart cities, retail, and industry 4.0. These intelligent solutions often require processing large amounts of data, running models to enable image recognition, predictive analytics, autonomous systems, and more. Increasing system workloads and data processing capacity at the edge is essential to minimize latency, improve responsiveness, and reduce network traffic back to data centers. Purpose-built systems such as Supermicro’s short-depth, multi-node SuperEdge, powered by 3rd Gen Intel® Xeon® Scalable processors, increase compute and I/O density at the edge and enable businesses to further accelerate innovation.
Join this webinar to discover new insights in edge-to-cloud infrastructures and learn how Supermicro SuperEdge multi-node solutions leverage data center scale, performance, and efficiency for 5G, IoT, and Edge applications.
The document summarizes a final software engineering project titled "CyberGIS" developed by three students. The project aims to develop a web-based geographic information system that allows users to tag domain entities on customizable maps, store and share map data, and includes mobile apps for field data collection. Key features include using Google Maps, private data domains, GPS tracking, and reporting/analysis capabilities. The document discusses the project design, development challenges overcome, testing approach and results, as well as potential future enhancements.
Enterprise Architecture, Deployment and Positioning Cisco Russia
The document discusses enterprise network deployment models and Cisco products for each model. It provides an overview of unified access, traditional access, converged access, and instant access deployment models. For each model, it describes the key characteristics and considerations, as well as which Cisco products are best suited as the lead platform. The document also covers topics like Cisco TrustSec for security, application visibility and control, and resiliency features of Cisco Catalyst infrastructure products.
Intels presentation at blue line industrial computer seminarBlue Line
This document provides an overview of Intel Corporation in 2014. It discusses Intel's mission to bring smart, connected devices to everyone using Moore's Law. Over 75% of Intel's business is outside the US, with key focus areas including data center, client, ultra-mobile, and wearables/IoT. Intel has a track record of executing Moore's Law and developing new process technologies like 14nm. The document outlines Intel's various business groups and labs focusing on areas like the internet of things. It provides a roadmap for Intel gateways for IoT and discusses Intel's history and position as the world's largest semiconductor manufacturer.
The document discusses new features in recent versions of InduSoft Web Studio including:
- Support for screen gestures like swiping on touch screens to navigate between screens.
- Multiple zoom modes for Studio Mobile Access thin clients to provide compatibility with previous versions.
- Global text-based find and replace capability for improved productivity when developing, maintaining and troubleshooting applications.
- Support for executing custom logic and built-in functions on IoTView to manipulate and transform data before presentation.
Data Center, Private Cloud/IT transformationCisco Canada
The private cloud is one of today’s fastest growing data center solutions, and the significance of a secure architecture for business applications agnostic to the infrastructure is increasing. Cisco IT is building the foundation for business resiliency; however, resiliency, at every layer of the business environment requires a holistic approach to managing and orchestrating infrastructure, platform, and application resources within a data center and across multiple data centers.
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBMmfrancis
This document discusses IBM's Sensor & Actuator Solutions Framework and the Data Capture domain. It describes how the Device Kit and Eclipse OHF SODA project are used to develop device agents that interface with hardware devices and expose their interfaces as services. The Device Kit provides tools to generate code for communicating with devices and integrating them into solutions using IBM WebSphere Premises Server.
The document describes new and advanced features in InduSoft Web Studio v8.1+SP3. It includes the HTML5 Remote Database Spy, which allows monitoring and setting tags remotely from any HTML5 browser. It also includes tag integration for OPC UA and OPC DA servers to browse and import tags without typing. Enhanced animations are supported on mobile access thin clients for alarms, grids, trends, buttons and other objects.
InduSoft Web Studio 8.0 + SP1 + Patch One ReviewAVEVA
This month’s webinar will offer a review of our newest Patch for InduSoft Web Studio! Please join us this month to learn more about what’s included in InduSoft Web Studio 8.0 + SP1 + P1! In this patch we have added several major improvements to the InduSoft HMI/SCADA software, as well as solving some minor issues from previous versions.
Ken Owens, the CTO of Cisco Intercloud Services, presented on Cisco's migration from MapReduce jobs to Spark jobs for processing customer interaction data. The document discussed Cisco's need to embrace both traditional and hyperscale application deployment across data centers, clouds, and edges. It also covered Cisco's analysis platform requirements, AWS and Cisco Intercloud sizing comparisons, and performance results from testing the migration of MapReduce jobs to Spark on the Cisco Intercloud.
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015StampedeCon
At the StampedeCon 2015 Big Data Conference: The starting point for this project was a MapReduce application that processed log files produced by the support portal. This application was running on Hadoop with Ruby Wukong. At the time of the project start it was underperforming and did not show good scalability. This made the case for redesigning it using Spark with Scala and Java.
Initial review of the Ruby code revealed that it was using disk IO excessively, in order to communicate between MapReduce jobs. Each job was implemented as a separate script passing large data volumes through. Spark is more efficient in managing intermediate data passed between MapReduce jobs – not only it keeps it in memory whenever possible, it often eliminates the need for intermediate data at all. However, that alone not brought us much improvement since there were additional bottlenecks at data aggregation stages.
The application involved a global data ordering step, followed by several localized aggregation steps. This first global sort required significant data shuffle that was inefficient. Spark allowed us to partition the data and convert a single global sort into many local sorts, each running on a single node and not exchanging any data with other nodes. As a result, several data processing steps started to fit into node memory, which brought about a tenfold performance improvement.
This document describes an IIoT platform that connects assets to the cloud using plug and play hardware and software. The platform's agile hardware collects data from assets via cellular or WiFi and sends it to backend services for storage and analysis. Users can access data and control assets through a web application. The solution reduces development costs by allowing custom applications to easily build on top of provided products and services. The document promotes the platform's free hardware options, cloud features, and ease of getting assets connected in three steps.
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...mfrancis
The “internet of things” is the next revolutionary wave following profound changes brought to us by Personal Computers (connecting places) and Mobile Phones (connecting people on the go). This third wave heralds the beginning of the new era of pervasive connectivity, embedded intelligence, and application convergence. It will be the world where smart things will communicate among themselves and with us enabling greener, more efficient, and at the same time more comfortable environment.
This talk will present a platform and products designed to serve the new markets enabled by the Internet of Things, with a particular focus on the value of the OSGi framework enabling convergence of Home Automation, Smart Energy, Electric Vehicle Charging, and e-health on a single remotely manageable platform. It will also provide insights on how the platform was developed leveraging the extensibility offered by the OSGi framework and ProSyst’s modular architecture.
The built-in OSGi stack provides Java-level abstraction of the network interfaces and Smart Energy Profile 2.0 stack as well as cloud integration features such as web server, web services and standards-based remote management. The OSGi framework is the key enabler of the product lifecycle and remote application management mandatory for service provider driven deployments. The Smart Energy 2.0 standard is a key element of the future smart grid. And the work presented in this talk describes the first platform integrating the SEP 2.0 protocol stack with an OSGi based middleware. The OSGi based solution also provides higher level of device security through the use of secure element. The UDK-21 is build around a System-on-Chip STreamPlug (ST2100), the solution features a fully integrated HomePlug PHY/MAC and Analog Front End combined with the ARM926EJ-S processor and a rich set of interfaces.
A demo showing Smart Energy Profile 2.0 use cases will outline these features. The demo will show how web based applications can interact with the OSGi stack on the already publicly available UDK-21 based gateway to control remote devices, such as a thermostat or an electric load. The access to SEP 2.0 devices will be done by the means of JSON-RPC based APIs, independent of the underlying device protocol, hence highlighting the benefits of a generic protocol agnostic architecture from the application standpoint. Other examples of the products that can be built around UDK-21 include Electric Vehicle Charger, Smart Meter, and a Basement Sensor Hub.
The document provides an overview of new capabilities and features for IBM SmartCloud Enterprise that were released in December 2012. Key additions include larger VM sizes, alternate Windows instance capture options, pre-release of Windows import/copy and Windows 2012, and expanded geographic availability in the Middle East.
Similar to 61850easy Test Tool for IEC 61850 Networks & Systems (20)
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!