Linux has become one of the most important software to run the civil infrastructure systems such as power plants, water distribution, traffic control and healthcare. From computer system viewpoint, the systems require a very high level of quality on real-time performance, reliability and security to avoid serious failure. To overcome the issues to apply Linux on such systems, as the first step, we need to gather the actual requirements. Past few months, some companies who are interested in this area actually got together and discussed to put those requirements together. In this talk, we would like to share the current status of this requirement discussion and our future collaboration plan. Please join us to improve Linux together and make the world better place!
(LinuxCon Japan 2016)
Linux has become one of the most important software to run the Civil Infrastructure Systems such as power plants, water distribution, traffic control and healthcare. However, existing software platforms are not yet industrial grade (in addressing safety, reliability and other requirements for infrastructure). At the same time, rapid advances in machine-to-machine connectivity are driving change in industrial system architectures.
The Linux Foundation establishes "Civil Infrastructure Platform(CIP)" as a new collaborative project. CIP aims to develop a super long-term supported open source "base layer" of industrial grade software. This base layer enables the use of software building blocks that meet requirements of industrial and civil infrastructure projects. In this talk, we will explain the technical details and focuses of this project.
This is daily increasing. More relevant
http://publications.computer.org/software-magazine/2017/11/16/automotive-engineering-software-and-agile-development/
Since the system had been began to gain importance in the place of the software, intended to help better the work done. Waterfall method of software development methods, agile methods are constantly changing and evolving process is hardly surprising given that the development becomes clear. Practices applied in the software development work is most basically the same, however, has changed the practices described in the application form is shown in various sources. Basic software development cycle to determine the requirements, design, modified, implementation, testing and deployment phases is composed.
Agile methods are almost the beginning of the end of the loop with the development of test event, be considered as almost the first, has progressed to a place of importance given to the prediction, the progress continues. In this study,one of agile development practice e of the Test-Driven Development is applied by considering the exchange tried to test effectiveness.
The adoption of an Interoperable Open Architecture (IOA) by the UK MOD will have a
profound impact on defense procurement. With its new Generic Vehicle Architecture (GVA)
and Def Stan 23-09, the MOD has arguably been one of the most innovative and impactful
defense procurement agencies(DPA) of any democratic nation.
The MOD has raised the bar for systems-of-systems integration management by initiating a
fundamental shift in perspective regarding collaboration between DPAs and systems
integrators (SIs). This new approach provides for the development of all future vehicles using
a single, logically connected, cohesive and coherent architecture for maximized utility while
enabling field command to derive the best logistically from military assets. IOA adoption also
sets the stage for a more competitive procurement process that can only improve the
economics of future vehicle development. The MOD’sinitiative would not have been
successful without the support of industry leaders who invested time and effort to validate
this approach.
Driven by clear economic imperatives, both the MOD and the SIs have had to change,
accepting or divesting themselves of key responsibilitiesin the process. The MOD has less
money and needs to spend it more wisely to meet field requirements. For SIs, on the other
hand, risk reduction is essential. The contractual belt has been tightening globally. Risks of
delivery and other penalties for prime SIs have been increasing, which in turn forces them to
push down on tier-2 and tier-3 SIs and push back on DPAsto ensure there is enough “fat” in
a contract to mitigate risk. This downward economic spiral had to be stopped.
This white paper outlinesthe innovative aspects of this new IOA and acquisition approach
and highlightsthe confluence of thinking and events that led to a new engagement model
between the MOD and the SIs.
Key elements
Dynamic Distributed MILS platform
Dynamic MILS platform with deterministic networking
Mechanisms for dynamic reconfiguration and configuration introspection
Declarative dynamic architecture modeling and verification
Language to describe reconfigurable systems architecture, component models, failure models and fault propagation
Theory and framework for dynamic reconfiguration
Theory and framework for adaptation
Language to express critical properties to be verified
Compositional verification framework
Monitoring, Adaptation, Configuration, & Certification Assurance Planes
Assurance-based security evaluation methodology and runtime mechanisms for just-in-time certification of adaptive systems
(LinuxCon Japan 2016)
Linux has become one of the most important software to run the Civil Infrastructure Systems such as power plants, water distribution, traffic control and healthcare. However, existing software platforms are not yet industrial grade (in addressing safety, reliability and other requirements for infrastructure). At the same time, rapid advances in machine-to-machine connectivity are driving change in industrial system architectures.
The Linux Foundation establishes "Civil Infrastructure Platform(CIP)" as a new collaborative project. CIP aims to develop a super long-term supported open source "base layer" of industrial grade software. This base layer enables the use of software building blocks that meet requirements of industrial and civil infrastructure projects. In this talk, we will explain the technical details and focuses of this project.
This is daily increasing. More relevant
http://publications.computer.org/software-magazine/2017/11/16/automotive-engineering-software-and-agile-development/
Since the system had been began to gain importance in the place of the software, intended to help better the work done. Waterfall method of software development methods, agile methods are constantly changing and evolving process is hardly surprising given that the development becomes clear. Practices applied in the software development work is most basically the same, however, has changed the practices described in the application form is shown in various sources. Basic software development cycle to determine the requirements, design, modified, implementation, testing and deployment phases is composed.
Agile methods are almost the beginning of the end of the loop with the development of test event, be considered as almost the first, has progressed to a place of importance given to the prediction, the progress continues. In this study,one of agile development practice e of the Test-Driven Development is applied by considering the exchange tried to test effectiveness.
The adoption of an Interoperable Open Architecture (IOA) by the UK MOD will have a
profound impact on defense procurement. With its new Generic Vehicle Architecture (GVA)
and Def Stan 23-09, the MOD has arguably been one of the most innovative and impactful
defense procurement agencies(DPA) of any democratic nation.
The MOD has raised the bar for systems-of-systems integration management by initiating a
fundamental shift in perspective regarding collaboration between DPAs and systems
integrators (SIs). This new approach provides for the development of all future vehicles using
a single, logically connected, cohesive and coherent architecture for maximized utility while
enabling field command to derive the best logistically from military assets. IOA adoption also
sets the stage for a more competitive procurement process that can only improve the
economics of future vehicle development. The MOD’sinitiative would not have been
successful without the support of industry leaders who invested time and effort to validate
this approach.
Driven by clear economic imperatives, both the MOD and the SIs have had to change,
accepting or divesting themselves of key responsibilitiesin the process. The MOD has less
money and needs to spend it more wisely to meet field requirements. For SIs, on the other
hand, risk reduction is essential. The contractual belt has been tightening globally. Risks of
delivery and other penalties for prime SIs have been increasing, which in turn forces them to
push down on tier-2 and tier-3 SIs and push back on DPAsto ensure there is enough “fat” in
a contract to mitigate risk. This downward economic spiral had to be stopped.
This white paper outlinesthe innovative aspects of this new IOA and acquisition approach
and highlightsthe confluence of thinking and events that led to a new engagement model
between the MOD and the SIs.
Key elements
Dynamic Distributed MILS platform
Dynamic MILS platform with deterministic networking
Mechanisms for dynamic reconfiguration and configuration introspection
Declarative dynamic architecture modeling and verification
Language to describe reconfigurable systems architecture, component models, failure models and fault propagation
Theory and framework for dynamic reconfiguration
Theory and framework for adaptation
Language to express critical properties to be verified
Compositional verification framework
Monitoring, Adaptation, Configuration, & Certification Assurance Planes
Assurance-based security evaluation methodology and runtime mechanisms for just-in-time certification of adaptive systems
Eurotech M2M Building Blocks and Multi-Service Gateway ApproachEurotech
Eurotech assures a strong foundation for Machine-to-Machine applications by relying on leading industry partners like Oracle and Hitachi to provide the technology basis for device, network, and service abstraction as well as efficient development. That foundation with Eurotech’s long experience in delivering sophisticated M2M projects, coalesced into specifically designed M2M Multi-Service Gateways and a cloud-based M2M integration platform. These two pillars ensure successful and deterministic development and deployment of M2M solutions for a broad range of vertical markets.
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMInimmik4u
The Evolving role of Software – Software – The changing Nature of Software – Legacy software, Introduction to CASE tools, A generic view of process– A layered Technology – A Process Framework – The Capability Maturity Model Integration (CMMI) – Process Assessment – Personal and Team Process Models. Product and Process. Process Models – The Waterfall Model – Incremental Process Models – Incremental Model – The RAD Model – Evolutionary Process Models – Prototyping – The Spiral Model – The Concurrent Development Model – Specialized Process Models – the Unified Process.
Software Architecture: Introduction to the AbstractionHenry Muccini
The Software Architecture is the earliest model of the whole software system created along the software lifecycle
A Software Architecture can be designed along four perspectives:
- as A set of components and connectors communicating through interfaces
- as A set of architecture design decisions
- with Focus on set of views and viewpoints
- Written according to architectural styles
Loosely-Coupled Architecture - how to get rid of the domino effectRadosław Maziarka
Traditionally, while creating our system, you don't focus on creating our components separated from each other. As a result, one problem can lead you to the domino effect - the whole system stops working. How to counteract it?
"Loosely coupled architecture" is recognized as the main factor to create a highly-scalable system. It allows you to make changes in your application which won't effect on their other part. See yourself what are the criteria of this architecture to be able to introduce it to your solution from the very beginning.
Sản phẩm bổ dưỡng, tăng cường sức khỏe Nhật Bản - Hàng nội địa Nhật chính hãngThuốc bổ Nhật Bản
CAM KẾT CỦA SHOP:
- Chỉ bán hàng Made in Japan 100%. Hình ảnh cung cấp là hình ảnh chụp thực tế với thông tin đúng theo chỉ dẫn của nhà sản xuất.
- Giá luôn ưu đãi nhất
- Dịch vụ chuyên nghiệp, tận tâm, nhiệt tình
Tukesin vuoden 2015 Nuoret ja kemikaalit -viestintäkampanjan keulahahmo Kukkahattutäti valistaa nuoria kauneuden ja koristautumisen kemikaaleista. Kukkahattutädin aineistot löytyvät osoitteesta www.sussiunatkoon.fi ja videot osoitteesta www.youtube.com/TukesinKukkahattutäti
(Embedded Linux Conference Europe 2014)
Linux uses many kind of embedded products. The products include not only consumer electronics but also control systems such as programmable logic controllers. There are many type of infrastructure systems and each system has different technical requirements. The requirements include not only real-time performance but also reliability-related functions. The infrastructure systems have to meet all the requirements. This presentation gives a summary of our study and development to adapt the Linux to infrastructure systems. Then we discuss the direction of future development. Please note, this presentation doesn't focus on a specific product.
Improvement of Scheduling Granularity for Deadline Scheduler Yoshitake Kobayashi
(Embedded Linux Conference Europe 2012)
https://github.com/ystk/sched-deadline/tree/dlmiss-detection-dev
Real-time system need to meet deadline. In this point of view, the system is required two functions to have determinism. One is interruptlatency stabilization and the other one is processing time reservation. The SCHED_DEADLINE has a feature to reserve CPU time in advance to ensure predictable behavior. In our evaluation, the granularity of CPU reservation is millisecond order.In this presentation, we show the evaluation results of current implementation to make clear the issue. Then we explain how to overcome this issue and its results.
Real-time system need to meet deadline. In this point of view, the system is required two functions to have determinism. One is interruptlatency stabilization and the other one is processing time reservation. The SCHED_DEADLINE has a feature to reserve CPU time in advance to ensure predictable behavior. In our evaluation, the granularity of CPU reservation is millisecond order.In this presentation, we show the evaluation results of current implementation to make clear the issue. Then we explain how to overcome this issue and its results.
Suomen 100 kokeilua -hankeidea (2016-2017). Tule mukaan!Vesa Auvinen
Kuvaus vireillä olevasta, ainulaatuisesta ’Suomen 100 kokeilua’ -hankkeesta (2016-2017), jossa kannustetaan suomalaisia yrityksiä, organisaatioita ja yhteisöjä rohkeasti uudistumaan kokeilujen ja kokeilukulttuurin kautta.
Haemme nyt hankkeellemme 3-5 sopivaa pääkumppania Suomi 100-ohjelman ja Kokeilevasuomi.fi:n lisäksi.
3-vaiheisen hankkeen ensimmäinen vaihe, jossa haastatellaan 100 suomalaista vaikuttajaa, käynnistyy syksyllä 2016 ja vauhti kiihtyy sitten Suomen 100-vuotisjuhlavuonna 2017 isommalla kokeilutapahtumalla ja suomalaisissa yrityksissä ja organisaatioissa tehtävillä konkreettisilla kokeiluilla.
Hanke itsessään toteutetaan kokeiluotteella ja vaikuttavuus edellä - eli mahdollisimman vähän perinteisen hankkeen byrokratiaa ja haittoja, mutta paljon tekemistä, aikaansaantia ja näkyvyyttä.
’Suomen 100 kokeilua’ -hankkeen kumppaneille tämä on loistava tilaisuus edistää koko Suomen kannalta tärkeää asiaa ja saada kustannustehokkaasti laajaa valtakunnallista näkyvyyttä uudistumisen, kokeilujen ja ”Suomi nousuun” -teeman edelläkävijänä. Ota yhteyttä: heli.vahatiitto(ät)dazzle.fi ja vesa.auvinen(ät)dazzle.fi
#100kokeilua #suomen100kokeilua #uudistuminen #uusiutuminen #innovointi #johtaminen #strategia
Eurotech M2M Building Blocks and Multi-Service Gateway ApproachEurotech
Eurotech assures a strong foundation for Machine-to-Machine applications by relying on leading industry partners like Oracle and Hitachi to provide the technology basis for device, network, and service abstraction as well as efficient development. That foundation with Eurotech’s long experience in delivering sophisticated M2M projects, coalesced into specifically designed M2M Multi-Service Gateways and a cloud-based M2M integration platform. These two pillars ensure successful and deterministic development and deployment of M2M solutions for a broad range of vertical markets.
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMInimmik4u
The Evolving role of Software – Software – The changing Nature of Software – Legacy software, Introduction to CASE tools, A generic view of process– A layered Technology – A Process Framework – The Capability Maturity Model Integration (CMMI) – Process Assessment – Personal and Team Process Models. Product and Process. Process Models – The Waterfall Model – Incremental Process Models – Incremental Model – The RAD Model – Evolutionary Process Models – Prototyping – The Spiral Model – The Concurrent Development Model – Specialized Process Models – the Unified Process.
Software Architecture: Introduction to the AbstractionHenry Muccini
The Software Architecture is the earliest model of the whole software system created along the software lifecycle
A Software Architecture can be designed along four perspectives:
- as A set of components and connectors communicating through interfaces
- as A set of architecture design decisions
- with Focus on set of views and viewpoints
- Written according to architectural styles
Loosely-Coupled Architecture - how to get rid of the domino effectRadosław Maziarka
Traditionally, while creating our system, you don't focus on creating our components separated from each other. As a result, one problem can lead you to the domino effect - the whole system stops working. How to counteract it?
"Loosely coupled architecture" is recognized as the main factor to create a highly-scalable system. It allows you to make changes in your application which won't effect on their other part. See yourself what are the criteria of this architecture to be able to introduce it to your solution from the very beginning.
Sản phẩm bổ dưỡng, tăng cường sức khỏe Nhật Bản - Hàng nội địa Nhật chính hãngThuốc bổ Nhật Bản
CAM KẾT CỦA SHOP:
- Chỉ bán hàng Made in Japan 100%. Hình ảnh cung cấp là hình ảnh chụp thực tế với thông tin đúng theo chỉ dẫn của nhà sản xuất.
- Giá luôn ưu đãi nhất
- Dịch vụ chuyên nghiệp, tận tâm, nhiệt tình
Tukesin vuoden 2015 Nuoret ja kemikaalit -viestintäkampanjan keulahahmo Kukkahattutäti valistaa nuoria kauneuden ja koristautumisen kemikaaleista. Kukkahattutädin aineistot löytyvät osoitteesta www.sussiunatkoon.fi ja videot osoitteesta www.youtube.com/TukesinKukkahattutäti
(Embedded Linux Conference Europe 2014)
Linux uses many kind of embedded products. The products include not only consumer electronics but also control systems such as programmable logic controllers. There are many type of infrastructure systems and each system has different technical requirements. The requirements include not only real-time performance but also reliability-related functions. The infrastructure systems have to meet all the requirements. This presentation gives a summary of our study and development to adapt the Linux to infrastructure systems. Then we discuss the direction of future development. Please note, this presentation doesn't focus on a specific product.
Improvement of Scheduling Granularity for Deadline Scheduler Yoshitake Kobayashi
(Embedded Linux Conference Europe 2012)
https://github.com/ystk/sched-deadline/tree/dlmiss-detection-dev
Real-time system need to meet deadline. In this point of view, the system is required two functions to have determinism. One is interruptlatency stabilization and the other one is processing time reservation. The SCHED_DEADLINE has a feature to reserve CPU time in advance to ensure predictable behavior. In our evaluation, the granularity of CPU reservation is millisecond order.In this presentation, we show the evaluation results of current implementation to make clear the issue. Then we explain how to overcome this issue and its results.
Real-time system need to meet deadline. In this point of view, the system is required two functions to have determinism. One is interruptlatency stabilization and the other one is processing time reservation. The SCHED_DEADLINE has a feature to reserve CPU time in advance to ensure predictable behavior. In our evaluation, the granularity of CPU reservation is millisecond order.In this presentation, we show the evaluation results of current implementation to make clear the issue. Then we explain how to overcome this issue and its results.
Suomen 100 kokeilua -hankeidea (2016-2017). Tule mukaan!Vesa Auvinen
Kuvaus vireillä olevasta, ainulaatuisesta ’Suomen 100 kokeilua’ -hankkeesta (2016-2017), jossa kannustetaan suomalaisia yrityksiä, organisaatioita ja yhteisöjä rohkeasti uudistumaan kokeilujen ja kokeilukulttuurin kautta.
Haemme nyt hankkeellemme 3-5 sopivaa pääkumppania Suomi 100-ohjelman ja Kokeilevasuomi.fi:n lisäksi.
3-vaiheisen hankkeen ensimmäinen vaihe, jossa haastatellaan 100 suomalaista vaikuttajaa, käynnistyy syksyllä 2016 ja vauhti kiihtyy sitten Suomen 100-vuotisjuhlavuonna 2017 isommalla kokeilutapahtumalla ja suomalaisissa yrityksissä ja organisaatioissa tehtävillä konkreettisilla kokeiluilla.
Hanke itsessään toteutetaan kokeiluotteella ja vaikuttavuus edellä - eli mahdollisimman vähän perinteisen hankkeen byrokratiaa ja haittoja, mutta paljon tekemistä, aikaansaantia ja näkyvyyttä.
’Suomen 100 kokeilua’ -hankkeen kumppaneille tämä on loistava tilaisuus edistää koko Suomen kannalta tärkeää asiaa ja saada kustannustehokkaasti laajaa valtakunnallista näkyvyyttä uudistumisen, kokeilujen ja ”Suomi nousuun” -teeman edelläkävijänä. Ota yhteyttä: heli.vahatiitto(ät)dazzle.fi ja vesa.auvinen(ät)dazzle.fi
#100kokeilua #suomen100kokeilua #uudistuminen #uusiutuminen #innovointi #johtaminen #strategia
NOM-020-STPS-2011, Recipientes sujetos a presión, recipientes criogénicos y g...AnNa Santana
implementacion en la NOM 020 de equipos sujetos a presión. NORMA Oficial Mexicana NOM-020-STPS-2011, Recipientes sujetos a presión, recipientes criogénicos y
generadores de vapor o calderas - Funcionamiento - Condiciones de Seguridad. Objetivo
Establecer los requisitos de seguridad para el funcionamiento de los recipientes sujetos a presión,
recipientes criogénicos y generadores de vapor o calderas en los centros de trabajo, a fin de prevenir riesgos
a los trabajadores y daños en las instalaciones.La presente Norma Oficial Mexicana rige en todo el territorio nacional y aplica en todos los centros de
trabajo en donde funcionen recipientes sujetos a presión, recipientes criogénicos y generadores de vapor o
calderas.
SLTS kernel and base-layer development in the Civil Infrastructure PlatformYoshitake Kobayashi
The Civil Infrastructure Platform (CIP) is creating a super long-term supported (SLTS) open source "base layer" for industrial grade software. We have been working on security fixes and some backported features since the moment we decided that Linux kernel v4.4 would be the first SLTS version. In this talk, we will describe the current development status of the SLTS kernel and testing environment. First, we'll explain our kernel development policy. Then, we'll describe the functionality that has been backported. Second, we'll talk about testing before using our base-layer on real products. We have been developing a test framework to collect and share test results. To build it, we don't want to duplicate existing work such as KernelCI, Fuego and others. For that reason, we are trying to collaborate and contribute to such projects. And finally, we'll discuss the future roadmap.
The Civil Infrastructure Platform (CIP) is creating a super long-term supported (SLTS) open source "base layer" for industrial grade software. We have been working on security fixes and some backported features since the moment we decided that Linux kernel v4.4 would be the first SLTS version. In this talk, we will describe the current development
status of the SLTS kernel and testing environment. First, we'll explain our kernel development policy. Then, we'll describe the functionality that has been backported. Second, we'll talk about testing before using our base-layer on real products. We have been developing a test framework to collect and share test results. To build it, we don't want to duplicate existing work such as KernelCI, Fuego and others. For that reason, we are trying to collaborate and contribute to such projects.
The Civil Infrastructure Platform (CIP) - launched in April - CIP defined and started to realize a super long-term supported open source "base layer" for industrial grade software. This base layer aims to be used for current and future industrial systems which supports machine-to-machine connectivity for digital future. This kind of systems, being the field for decades, should have long-term support for security and robustness reasons. In this talk, we will show the first steps on CIP development. This includes initial set of components for the base layer and its maintainers. Are you ready? It’s time to start your development with and for the CIP.
Here is an paper published on software PLC Checker by Itris Automation Square, in the French journal "Mesures" : "La qualité des programmes vérifiée par leurs concepteurs".
Enjoy the reading!
Find us at http://www.itris-automation.com/
Contact us at commercial@itris-automation.com for more information.
Overcome Hardware And Software Challenges - Medical Device Case StudyICS
In this webinar presented with leading System-on-Module designer and ICS partner Variscite, we will present a real example of a medical device featuring the DART-MX8M-PLUS, i.MX8 Plus-based System on Module. Walking through this case study will allow us to showcase specific challenges that characterize the medical field as well as common software challenges.
As a webinar attendee, you will:
Gain tools that will help you choose the hardware that best suits your project needs.
Receive useful software tips that will help you get your project off the ground.
CNCF general introduction to beginners at openstack meetup Pune & Bangalore February 2018. Covers broadly the activities and structure of the Cloud Native Computing Foundation.
"OpenHPC is a collaborative, community effort that initiated from a desire to aggregate a number of common ingredients required to deploy and manage High Performance Computing (HPC) Linux clusters including provisioning tools, resource management, I/O clients, development tools, and a variety of scientific libraries. Packages provided by OpenHPC have been pre-built with HPC integration in mind with a goal to provide re-usable building blocks for the HPC community. Over time, the community also plans to identify and develop abstraction interfaces between key components to further enhance modularity and interchangeability. The community includes representation from a variety of sources including software vendors, equipment manufacturers, research institutions, supercomputing sites, and others."
Watch the video: http://wp.me/p3RLHQ-gKz
Learn more: http://openhpc.community/
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Cloud continuous integration- A distributed approach using distinct servicesAndré Agostinho
In cloud computing services the ability to share and deliver services, scale computing resources and distribute data storage and files requires a deployment process aligned with agility and scalability. The continuous integration can automate process reducing operational effort, improving code quality and reducing time to market. This presentation shows a proposal for distributed continuous integration to use differents cloud computing services, from planning to execution of scenarios.
It's a pivotal challenge to update the software in embedded systems due to many restrictions such as unreliable network and power supply, limited bandwidth, harsh environment, etc. This slide aims to provide the background knowledge and the open source tool to achieve the software update in embedded systems.
Similar to Applying Linux to the Civil Infrastructure (20)
The Latest Status of CE Workgroup Shared Embedded Linux Distribution ProjectYoshitake Kobayashi
The CE workgroup of Linux Foundation has started a project to share the work of maintaining long-term support for an embedded distribution, by leveraging the work of the Debian and Debian LTS project. Debian gives you pre-compiled binary packages but the meta-debian layer enables to install customized packages to create similar or smaller images. If both usecases are able to share the source code, it is good to share the maintenance effort.
In this talk, Yoshitake will describe the details of meta-debian which provides a meta layer for the Poky build system. This talk will to gives the latest status, technical details and lessons learned from its development.
All source code are available on GitHub and related document also available on Github and elinux wiki.
Poky meets Debian: Understanding how to make an embedded Linux by using an ex...Yoshitake Kobayashi
Embedded Linux Conference 2015
Poky has already become one of the most popular build system to make an embedded Linux environment. Poky refers to OpenEmbedded originally. However if you want to use other source code, how to do it? We have some experience we would like to share with you. For this study, We choose Debian source and already tried two ways to use it. The first try was probably an incorrect way and the second try may be a correct way.
In this talk, we will show both of them and also describe why we choose Debian. If you are interested in this implementation, you can download the source code from GitHub. There are some implementations available for development boards such as pandaboard, minnowboard and etc. Let's enjoy Bitbake!
ELC 2014
The LTSI kernel has a high degree of usability for embedded systems. However lack of real-time extension makes it difficult to adapt LTSI to control systems. We made LTSI kernel with RT patch (LTSI-RT) to follow the LTS kernel and are evaluating it on several boards. This presentation shows requirement and issues to make LTSI-RT. LTSI-RT is available on GitHub
https://github.com/ystk/linux-ltsi-work/tree/ltsi-3.10.y-rt
An Essential Relationship between Real-time and Resource PartitioningYoshitake Kobayashi
(ELC Europe 2013)
Running real-time and general purpose applications on a same hardware is normally a crazy idea in most case. However, we strongly focus to run both applications on a hardware without virtualization. Resource Partitioning enables the assignment of hardware resource (e.g.: core, execution time, memory bandwidth or device access) to processes with special requirements (e.g: real-time performance or safety requirements).
In this talk, we would like to discuss current limitation on Linux kernel and describe how to solve it.
Embedded Linux Conference 2013
https://github.com/ystk/sched-deadline/tree/dlmiss-detection-dev
Real-time system need to meet deadline. In this point of view, the system is required two functions to have determinism. One is interrupt latency stabilization and the other one is processing time reservation. SCHED_DEADLINE has a feature to reserve CPU time in advance to ensure predictable behavior. However there is a lack of feature to control deadline missed processes.
In this presentation, we would like to discuss the requirement for the feature and also show a sample implementation to control deadline missed processes.
Some data written on data storage are very important for users. The data needs to ensure consistency when the application received a result from a file write functions even if the system crashed.
In this talk, we will show the evaluation results on data consistency for SYNC mode write on a number of Linux file systems. The evaluation is also conducted on more than one kernel version and disk types, and we will show all the results from different perspectives.
Yoshitake Kobayashi joined Corporate Software Engineering Center, Toshiba Corporation in 2008. Before that he received his Ph.D. degree in computer science at University of Electro-Communications in 2002 and worked as an assistant professor. His research interests include operating systems, distributed systems and dynamically reconfigurable systems.
https://github.com/ystk/fs-test
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
1. Applying Linux to the Civil
Infrastructure
LinuxCon Japan 2015
3-5 June 2015
Yoshitake Kobayashi1), Toshiba
Urs Gleim, Siemens AG
1) CE Workgroup
2. 2LinuxCon Japan 2015
Scope of this presentation
Create a place for collaboration
Share opinions with audience about the “future” of civil
infrastructure systems
Collect “requirements” for civil infrastructure systems.
Recruit companies/developers to work with us in this area.
3. 3LinuxCon Japan 2015
Outline
Definition of Civil infrastructure
Motivation and goal
Target Platform Building blocks and
Technical requirements
Current status
4. 4LinuxCon Japan 2015
Definition
Civil Infrastructure Systems
are technical systems responsible for
supervision, control, and management of
infrastructure supporting human
activities, including, for example, electric
power generation and energy distribution,
oil and gas, water and wastewater,
healthcare, communications,
transportation, and the collections of
buildings that make up urban and rural
communities. These networks deliver
essential services, provide shelter, and
support social interactions and economic
development. They are society's
lifelines.1)
1) adapted from https://www.ce.udel.edu/current/graduate_program/civil.html
Note: Most of Japanese company use “Social infrastructure” instead of “Civil infrastructure”.
However, Civil Infrastructure is more suitable term in other countries.
5. 5
Motivation
1. Civil infrastructure systems are currently
built from the ground up for each product,
with little re-use of existing software
building blocks, for example:
Operating systems
Virtualization technologies
Middleware
Mechanisms for
software/firmware updates
2. Functionality required for industrial-grade
applications is in many aspects converging to
that offered by IT driven solutions1).
However, by today’s software platforms many
non-functional requirements are not
addressed sufficiently:
Functional Safety
Reliability
Maintainability, long term support
Security
Real-time support
3. The Internet-of-Things connects previously stand-alone systems with open protocols to create
systems of systems. This trend will substantially influence industrial system architectures.
stand alone connected
1) Open Source Software / Linux
6. 6LinuxCon Japan 2015
Vision
Jointly establish a scalable Open Source “base layer”
of industrial grade software:
Speed up implementation of civil infrastructure systems.
Build upon existing open source foundations and expertise without
reinventing non-domain specific technology.
Establish (de facto) standards by providing a base layer reference
implementation.
Contribute & influence upstream projects regarding industrial needs.
Motivate suppliers to actively support these platform / provide an
implementation (e.g. silicon vendors).
Ensure long term stability and maintainability.
A “base layer” – like the plain operating system – does not contribute to
competitive innovation, but needs to be provided by every single vendor.
7. 7LinuxCon Japan 2015
CIP Reference Hardware
Goals
Sharing development effort for development of industrial
grade base systems.
Fill the gap between capabilities of the existing Open
Source Software and industrial requirements.
Reference-implementation consisting of
Specification of on-device software stack and tools
infrastructure
Linux kernel, file system, etc. selected reference
hardware
Build environment and tools for companies to build their
own distribution.
Test framework and test cases
SDK (e.g., poky based) and APIs (based on POSIX;
compatibility layers for legacy APIs)
Wide usage and acceptance in industry.
Trigger development of an emerging ecosystem including
tools and domain specific extensions.
CIP Reference
Filesystem
image with
SDK
CIP Kernel
UserspaceKernel
Reference-implementation
works with (or can be extended
by) any Linux distribution
(e.g. Yocto Project, Debian,
CentOS, openSUSE, etc..)
Hardware
Specifications Documentation
Implement
8. 8LinuxCon Japan 2015
Outcome
CIP realizes an industrial grade, sustainable, standard software stack.
Integrated reference platform
implementation and build
environment:
Reference architecture of
base platform and CIP
specific extensions
Selection/support of
applicable upstream
projects
Tool chain set-up, platform
implementation, integration
Platform implementation
for selected device classes
and use cases
Processes for industrial use
and sustainable
long-term support:
Test and validation:
frameworks for first release
and updates
Maintenance strategy and
long term support
(LTS, LTSI)
License clearing of used
open source components
Export control classification
(ECC)
License barrier architecture
guidance
Harmonize base platform and
fulfill certification standards:
Standardize base platform
components (select exis-
ting standards and fill gaps
with de-facto standards)
Foster OSS acceptance
for safety/security critical
projects
Provision of artefacts
needed for certification
(e.g. test reports)
Development process
assessment of relevant
upstream projects
Reference implementation Life-cycle management Setting standards
9. 9LinuxCon Japan 2015
Comparison with existing Alliances
Other domains already benefit from collaborative development.
Even competing
companies as car
manufacturers work in
alliances already.
(Genivi, for example)
• Development speed,
shorter product
cycles
• Software quality
• Establish a standard
platform and enable
ecosystems
(e.g. for development
tools, system
extensions)
10. 10LinuxCon Japan 2015
Target Systems
Excluded:
Enterprise IT and cloud system platforms.
Proposed reference hardware for common software platform:
Start from working the common HW platform, like a PC
Later extend it to smaller/low power devices.
Architecture, clock
non-volatile storage
HW ref. platform
Processor
(example)
ARM M0/M0+/M3/M4 ARM A53/A57,Xeon
8/16/32-bit,< 100 MHz 32-bit, <1 GHz 32/64-bit, <2 GHz 64-bit, >2 GHz
RAM
n MiB flash n GiB flash n GiB flash n TiB flash/HDD
< 1 MiB 1 MiB - 1 GiB 256 MiB - 2 GiB 2 GiB - 768 GiB
Arduino class board Raspberry Pi class board SoC-FPGA, e.g.Zync industrial PC
ARM M4/7,A9,R4/5/7,Atom
Networked Node Embedded ServerEmbedded ComputerControl Unit
special purpose server based controllerscontrol systems
multi-purpose controllersPLC gateways
Sensor, field device
Target systems
application
examples
1 2 3 4
ARM A9/A15,R7,Core,PPC
nDevice class no.
11. 11
Platform Building Blocks
UserspaceKernelspace
Linux Kernel
App Container
Infrastructure = TBD
App Framework = TBD
Middleware/Libraries
Safe & Secure
Update
Monitoring
Domain Specific communication
(e.g. OPC UA)
Shared config. & logging
Real-time support
Real-time /
safe virtualization
Tools Concepts
Yocto Project
(recipes)
Test automation
Tracing & reporting
tools
Configuration
management
Device management
(update, download)
Functional safety
architecture/strategy,
including compliance
w/ standards (e.g., NERC
CIP, IEC61508)
Long-term support
Strategy:
security patch
management
Standardization
collaborative effort with
others
License clearing
ECC
Export Control Classification
On device software stack Product development
and maintenance
Application life-
cycle management
Security
12. 12
Platform Building Blocks
UserspaceKernelspace
Linux Kernel
App Container
Infrastructure = TBD
App Framework = TBD
Middleware/Libraries
Safe & Secure
Update
Monitoring
Domain Specific communication
(e.g. OPC UA)
Shared config. & logging
Real-time support
Real-time /
safe virtualization
Tools Concepts
Yocto Project
(recipes)
Test automation
Tracing & reporting
tools
Configuration
management
Device management
(update, download)
Functional safety
architecture/strategy,
including compliance
w/ standards (e.g., NERC
CIP, IEC61508)
Long-term support
Strategy:
security patch
management
Standardization
collaborative effort with
others
License clearing
ECC
Export Control Classification
On device software stack Product development
and maintenance
Application life-
cycle management
Security
13. 13LinuxCon Japan 2015
Requirements: Real-time performance
Typical Latency
100μsec - 1msec response time
100msec network communication frequency
5msec in control frequency
Number of I/Os
Over 10 I/O cards, and 30K in/out-puts
Resource management
CPU consumption
Memory consumption
Coupled with container technology
Related activities
Preempt-RT
14. 14LinuxCon Japan 2015
Requirements: Virtualization
Real-time safe virtualization
Multi OS approach (Run with other RTOS beside the Linux)
E.g. Jailhouse, SafeG
Virtual machine
Real-time hypervisor enhancement (KVM)
Real-time OS API support
E.g. Xenomai
Related Activities
KVM
Jailhouse
SafeG by TOPPERS Project
Xenomai
V2lin
15. 15
Platform Building Blocks
UserspaceKernelspace
Linux Kernel
App Container
Infrastructure = TBD
App Framework = TBD
Middleware/Libraries
Safe & Secure
Update
Monitoring
Domain Specific communication
(e.g. OPC UA)
Shared config. & logging
Real-time support
Real-time /
safe virtualization
Tools Concepts
Yocto Project
(recipes)
Test automation
Tracing & reporting
tools
Configuration
management
Device management
(update, download)
Functional safety
architecture/strategy,
including compliance
w/ standards (e.g., NERC
CIP, IEC61508)
Long-term support
Strategy:
security patch
management
Standardization
collaborative effort with
others
License clearing
ECC
Export Control Classification
On device software stack Product development
and maintenance
Application life-
cycle management
Security
16. 16LinuxCon Japan 2015
Requirements: Security
Access / execution control
Access Management (SE Linux/SMACK)
Anomaly-based prevention systems
Network security
Firewall technology
Untrusted activity detection
One-Way gate way (Date Diode)
Non-IP network
Pervasive Crypto
Consistent standard cryptographic primitives for all core components
Trust authority with updated information
Service that aggregates the security status (tractability) of nodes in the
network and validates certificates
Test cases for certification
E.g EDSA IEC62443
Related activities
Linux security module
EDSA
17. 17LinuxCon Japan 2015
Requirements: Reliability enhancements
High availability
24/7 operation support
Failover in less than 5msec
Live patching with deterministic behavior
System health monitoring
Framework for failure detection and recovery
Hardware error detection
Error detection (CPU/Memory/BUS etc)
Error record (trace/Panic Log/Crash dump)
Degeneration operation support
Verification test cases
18. 18LinuxCon Japan 2015
Requirements: Update / Deployment
Hardware update mechanism
E.g. I/O card hot swap
Software deployment
Application deployment and update mechanism (device part)
Firmware update
Device management, server side backend
Related activities
Livepatch
19. 19
Platform Building Blocks
UserspaceKernelspace
Linux Kernel
App Container
Infrastructure = TBD
App Framework = TBD
Middleware/Libraries
Safe & Secure
Update
Monitoring
Domain Specific communication
(e.g. OPC UA)
Shared config. & logging
Real-time support
Real-time /
safe virtualization
Tools Concepts
Yocto Project
(recipes)
Test automation
Tracing & reporting
tools
Configuration
management
Device management
(update, download)
Functional safety
architecture/strategy,
including compliance
w/ standards (e.g., NERC
CIP, IEC61508)
Long-term support
Strategy:
security patch
management
Standardization
collaborative effort with
others
License clearing
ECC
Export Control Classification
On device software stack Product development
and maintenance
Application life-
cycle management
Security
20. 20LinuxCon Japan 2015
Requirements: Long-term support
Very long term support (e.g. more than 15 years)
Patch management tools
Mainly focus on security fixes
Migration support
Enable old Linux drivers
Compatibility evaluation between current and new environment
Test cases required to ensure it
Related activities
Long Term Support Initiative (LTSI)
LTSI Testing Project
Driver backport
21. 21LinuxCon Japan 2015
Requirements: Functional safety
IEC61508
Development process
SILx Linux kernel (e.g SIL2, SIL3, SIL4)
SILx VM
Monitoring Support
Non-intrusive system health monitoring
Related activities
SIL2LinuxMP
Jailhouse
22. 22
Platform Building Blocks
UserspaceKernelspace
Linux Kernel
App Container
Infrastructure = TBD
App Framework = TBD
Middleware/Libraries
Safe & Secure
Update
Monitoring
Domain Specific communication
(e.g. OPC UA)
Shared config. & logging
Real-time support
Real-time /
safe virtualization
Tools Concepts
Yocto Project
(recipes)
Test automation
Tracing & reporting
tools
Configuration
management
Device management
(update, download)
Functional safety
architecture/strategy,
including compliance
w/ standards (e.g., NERC
CIP, IEC61508)
Long-term support
Strategy:
security patch
management
Standardization
collaborative effort with
others
License clearing
ECC
Export Control Classification
On device software stack Product development
and maintenance
Application life-
cycle management
Security
23. 23LinuxCon Japan 2015
Requirements: Communication stacks
IoT middleware
AllJoyn
IoTivity
OM2M
Domain specific communication
ZigBee
AVnu
ECHONET (might be ECHONET Lite)
Other industrial standard protocols
E.g. Real-time Ethernet
24. 24LinuxCon Japan 2015
Covered topics and related projects
Linux Kernel RTOS
Virtualization / Dual kernel Real-time Safe virtualization
Jailhouse SafeG
Real-time support
Xenomai
Real-time support
PREEMPT-RT
Security
LSM Anomaly-based prevention
Isolation mechanism
Funcional Safety
SIL3 support
LXC Cgroups
Heterogeneous Computing
SoC FPGASIL2LinuxMP
Communication Stacks for IoT
AllJoyn IoTivity
Middleware / Tools
Toolchain
CIP TCK tests Yocto Project
Application support
App Framework HMI Framework
SIL2LinuxMP (OSADL)
Deploy and update mechanism
FW update App deploy Device manager
Update mechanism
Live patching Safe FW update
Testing
kselftest
CIP TCK tests
LTSI test
Integration tests
LTP
Configuration/Device management
Self-config Auto config
Domain specific communication
ZigBee Avnu ECHONET
Industrial specific protocols
Integration with non-RT apps
Monitoring / Tracing
Error detection RAS
Ftrace ktap
Safety
Health monitor
General topics Support
VLTS
Legal topics SPDX
Export Control
Development process
SIL3 supportSIL2 support
(Out of scope)
To be specified / implemented by CIP
Integration / cooperation
Jailhouse
License Clearing
OM2M …
FOSSology
Real-time capable GPGPU
FPGA enhanced real-time
SELinux
Backwards compatibility
26. 26
Detailed prioritization
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Container technology for appplications
CPU Core Isolation
App framework
HMI Framework
Preempt-RT enhancement
Xenomai/Ipipe enhancement
Dual Kernel approach
Integration of real-time and non-RT application components
Standard test cases for real-time capabilities
Real-time capable GPGPU computing
FPGA enhanced real-time
Pervasive Crypto
White-List based execution
Untrusted activity detection
IoT middleware intergration
Domain specific communication stacks
Support for industrial protocols and busses
Device and service discovery
Network autoconfiguration
Self-Configuration
Semantic matching
Application deployment and update mechanism (device part)
Firmware update
Device management, server side backend
Live Patching
CIP specific tests and test test framework
Contribute test cases to upstream projects
Integration tests
Safe partitioning
SIL2 support
SIL3 support
SIL4 support
Monitoring support
Build environement for CIP reference software stack
CIP TCK (Technology Compatibility Kit)
Tracing
System integration examples
Multi-kernel approaches
Integration with standard tool chains
Integration of legacy languages and APIs
Long term support strategy
License clearing
Export control classification
Isolation
Mechan
isms
Applicat
ion
support
Real-timeoperating
systemsupport
Security
mechanism
s,libraries
Communicationstacks
andIoT
Deployand
update
mechnisms,
device
managementTestingFunctionalsafety
Toolchain,
development
environment,
system
integration
Heterog
eneous
computi
ng
Back
ward
s
comp
atibili
ty
Supp
ort
and
Main
tena
nce
Legal
topics
essential appreciated optional out of scope
28. 28LinuxCon Japan 2015
What’s next?
Our current activities
Collecting topics for civil infrastructure
Topic prioritization
Discussing with the Linux Foundation regarding organization
Have conference calls with Linux Foundation and companies
Have F2F meetings at Linux Foundation’s conference
Looking for more participating companies
Civil Infrastructure related vendors
Silicon vendors
Tool vendors
...
29. 29LinuxCon Japan 2015
Please join!
Any comments and suggestions are welcome
Contact information
To get the latest information, please send an email to the
following address:
Noriaki Fukuyasu fukuyasu@linuxfoundation.org
Urs Gleim urs.gleim@siemens.com
Yoshitake Kobayashi yoshitake.kobayashi@toshiba.co.jp
Satoshi Oshima satoshi.oshima.fk@hitachi.com