The control and management of mobile networks is shifting from manual to automatic in order to boost performance and efficiency and reduce expenditures. Especially, base stations in today's 4G/LTE networks can automatically configure and operate themselves which is technically referred to as Self Organizing Networks (SON). Additionally, they can auto-tune themselves by learning from their surrounding base stations. This talk inspects the consequences of operating a rogue base station in an automated 4G/LTE network. We exploit the weaknesses we discovered in 4G/LTE mobile phones and SON protocols to inject malicious packets into the network. We demonstrate several attacks against the network and discuss mitigation from the mobile network operators perspective.
The control and management of mobile networks is shifting from manual to automatic in order to boost performance and efficiency and reduce expenditures. Especially, base stations in today's 4G/LTE networks can automatically configure and operate themselves which is technically referred to as Self Organizing Networks (SON). Additionally, they can auto-tune themselves by learning from their surrounding base stations. This talk inspects the consequences of operating a rogue base station in an automated 4G/LTE network. We exploit the weaknesses we discovered in 4G/LTE mobile phones and SON protocols to inject malicious packets into the network. We demonstrate several attacks against the network and discuss mitigation from the mobile network operators perspective.
Java Based RFID Attendance Management System Graduation Project Presentation
Source code is only available when having permissions from the whole team members.
Developing safety autonomous driving solutions based on the adaptive AUTOSAR ...Andrei Kholodnyi
This presentation provides an example of an implementation of Adaptive AUTOSAR implementation based on VxWorks RTOS from Wind River. As one of the very few solutions available on the market, VxWorks RTOS serves as a foundation for the Adaptive AUTOSAR-based autonomous driving development.
II-SV 2017: How to effectively monitor Technological Developments in IPDr. Haxel Consult
Modern, cutting-edge developments are not reflected in current patent classification systems, which tend to catalogue established technologies. Identifying patent portfolios in such emerging fields proves a challenging job for patent and technology experts.
Going beyond the mere identification of new IP, additional value may be added using a regional geographic weighting combined with consolidated portfolio owner information.
Effective monitoring of the technological field is achieved by training active-learning search engines to hunt for highly relevant patent documents, thus keeping IP portfolios for emerging technologies up to date. The system we have developed permits extremely accurate updates with drastically reduced noise and with low workload which have proven to be invaluable in a world of drastically increasing data blur.
ODIN's presentation on RFID for a 21 July 2009 IATA meeting. IATA selected ODIN to develop a standard and method for baggge tagging at airports and within airlines, using radio frequency identification (RFID). www.odintechnologies.com
Summit 16: The Hitchhiker/Hacker's Guide to NFV BenchmarkingOPNFV
The landscape of emerging NFV benchmarking can be very confusing to navigate for anybody who is not immersed in the relevant industry communities. There are specifications, standards and methodologies as well as frameworks, test-cases, traffic-profiles, KPIs, metrics, traffic generators with open-source and proprietary tools. Furthermore platform characterization includes VNFs, the VNFI as well as network controllers and managers all which have an impact on performance. This presentation will increase your NFV benchmarking IQ by explaining the history and state-of-art NFV benchmarking in ETSI NFV, IETF, OPNFV with examples of recent results. For anybody not actively working in benchmarking groups across NFV industry forums this presentation is sure to get your performance pulse racing.
Java Based RFID Attendance Management System Graduation Project Presentation
Source code is only available when having permissions from the whole team members.
Developing safety autonomous driving solutions based on the adaptive AUTOSAR ...Andrei Kholodnyi
This presentation provides an example of an implementation of Adaptive AUTOSAR implementation based on VxWorks RTOS from Wind River. As one of the very few solutions available on the market, VxWorks RTOS serves as a foundation for the Adaptive AUTOSAR-based autonomous driving development.
II-SV 2017: How to effectively monitor Technological Developments in IPDr. Haxel Consult
Modern, cutting-edge developments are not reflected in current patent classification systems, which tend to catalogue established technologies. Identifying patent portfolios in such emerging fields proves a challenging job for patent and technology experts.
Going beyond the mere identification of new IP, additional value may be added using a regional geographic weighting combined with consolidated portfolio owner information.
Effective monitoring of the technological field is achieved by training active-learning search engines to hunt for highly relevant patent documents, thus keeping IP portfolios for emerging technologies up to date. The system we have developed permits extremely accurate updates with drastically reduced noise and with low workload which have proven to be invaluable in a world of drastically increasing data blur.
ODIN's presentation on RFID for a 21 July 2009 IATA meeting. IATA selected ODIN to develop a standard and method for baggge tagging at airports and within airlines, using radio frequency identification (RFID). www.odintechnologies.com
Summit 16: The Hitchhiker/Hacker's Guide to NFV BenchmarkingOPNFV
The landscape of emerging NFV benchmarking can be very confusing to navigate for anybody who is not immersed in the relevant industry communities. There are specifications, standards and methodologies as well as frameworks, test-cases, traffic-profiles, KPIs, metrics, traffic generators with open-source and proprietary tools. Furthermore platform characterization includes VNFs, the VNFI as well as network controllers and managers all which have an impact on performance. This presentation will increase your NFV benchmarking IQ by explaining the history and state-of-art NFV benchmarking in ETSI NFV, IETF, OPNFV with examples of recent results. For anybody not actively working in benchmarking groups across NFV industry forums this presentation is sure to get your performance pulse racing.
Monitor and manage everything Cisco using OpManagerManageEngine
Cisco, The leader in enterprise networking and communication technology exposes lot of proprietary and standard protocols/ technologies to monitor and manage its devices. To name few SNMP, CDP, NetFlow, NBAR, CBQoS, IP SLA, & much more… Know how to monitor and manage everything Cisco using ManageEngine OpManager.
RFID Shopping system uses RFID tags to identify products while providing automated shopping experience. The shopping system also provides integrated data mining techniques to facilitate management with real time data with product sales and inventory tracking. The system consists of smart cart system which is attached to the customer cart. The smart cart system also includes intercom module, which facilitates the customer to talk directly to customer service without having to search for one. All the data processing is provided by the central server system which handles all the carts in the system.
In the latest ONF and SDxCentral webianr, two of the researchers from the iSDX project, Nick Feamster, professor of computer science at Princeton University, and Arpit Gupta, leading researcher on iSDX at Princeton University. ONF's Technical Program Manager Rick Bauer will also present protion of the webinar, which will look at:
- why the industry needs iSDX
- how iSDX compares to other initiatives in the SDN ecosystem today
- a short demo of iSDX
- iSDX in practice – a customer viewpoint
http://bit.ly/1TAhUlA
Patient Journey in Oncology 2025: Molecular Tumour Boards in PracticeMatthieu Schapranow
The slide deck was presented at the Bio Data World Congress in Basel on Dec. 04, 2019. It shares first results from the work in the HiGHmed consortium on the use case oncology.
The given presentation showcases examples of how artificial intelligence technology can be used to improve the patient journey in the specific medical field of oncology.
The given presentations share a specific use case from the medical field of oncology and outlines the potentials of applying artificial intelligence to it.
AnalyzeGenomes.com: A Federated In-Memory Database Platform for Digital HealthMatthieu Schapranow
The slide deck of the presentation "AnalyzeGenomes.com: A Federated In-Memory Database Platform for Digital Health" of the 2017 BMBF All Hands Meeting in Karlsruhe are online available now.
A Federated In-Memory Database Computing Platform Enabling Real-Time Analysis...Matthieu Schapranow
The slide deck "A Federated In-Memory Database Computing Platform Enabling Real-time Analysis of Big Medical Data" presented on May 17, 2017 at Intel Tech Talks hosted by SAPPHIRE 2017 in Orlando, FL is online available now.
The given presentation was presented at SAPPHIRE 2017 in Orlando, FL on May 18, 2017. It highlights latest research results focusing on user-centered in-memory applications for precision medicine.
The given slide deck was presented on the 2017 Festival of Genomics in London, UK. It depicts how latest in-memory database technology supports clinicians in finding the best treatment options incorporating genetic data.
ICT Platform to Enable Consortium Work for Systems Medicine of Heart FailureMatthieu Schapranow
The slide deck "ICT Platform to Enable Consortium Work for Systems Medicine of Heart Failure" was presented on Oct 5, 2016 at the 2016 e:Med Meeting on Systems Medicine in Kiel, Germany.
The given presentation outlines services of the cloud platform "Analyze Genomes" enabling precision medicine. It was presented on the mHealth meets Diagnostics symposium in Berlin on Jun 21, 2016.
This presentation provides a brief overview of how in-memory database technology can be applied to support systems medicine approaches. For that, it shares real-world experiences, e.g. from the SMART project consortium funded by the German Federal Ministry of Education and Research.
This presentation shows application examples of the analyzegenomes.com service for precision medicine. It was presented at 2016 HIMSS conference in Las Vegas, NV
Festival of Genomics 2016 London: Mining and Processing of Unstructured Medic...Matthieu Schapranow
This presentation covers the "Mining and Processing of Unstructured Medical Data" presentation of the 2016 Festival of Genomics workshop "Big Medical Data in Precision Medicine: Challenges or Opportunities?" on Jan 19, 2016 in London.
Festival of Genomics 2016 London: Analyze Genomes: Modeling and Executing Gen...Matthieu Schapranow
This presentation covers the "Analyze Genomes: Modeling and Executing Genome Data Processing Pipelines" presentation of the 2016 Festival of Genomics workshop "Big Medical Data in Precision Medicine: Challenges or Opportunities?" on Jan 19, 2016 in London.
Festival of Genomics 2016 London: Analyze Genomes: A Federated In-Memory Comp...Matthieu Schapranow
This presentation covers the "Analyze Genomes: A Federated In-Memory Computing Platform for Life Sciences" presentation of the 2016 Festival of Genomics workshop "Big Medical Data in Precision Medicine: Challenges or Opportunities?" on Jan 19, 2016 in London.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
PHP Frameworks: I want to break free (IPC Berlin 2024)
Best Practices for Rigorous Evaluation of RFID Software Components
1. Best Practices for Rigorous Evaluation
of RFID Software Components
RFID-SysTech 2010, 06/15/2010
Matthieu-P. Schapranow
2. Outline
2
■ Introduction
■ Use Case: The European Pharmaceutical Supply Chain
■ Generating Realistic Test Data
■ Selected Metrics to Consider
■ Benchmarking EPC Network Components
■ Summary
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
3. Introduction
3
■ Conducting rigorous evaluation of software artifacts is hard
■ This is especially true for RFID software components
□ high throughput and
□ large data volume
■ We want to share our insights into
evaluating RFID components
□ EPCIS servers and
□ EPC Discovery Services
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
4. Outline
4
■ Introduction
■ Use Case: The European Pharmaceutical Supply Chain
■ Generating Realistic Test Data
■ Selected Metrics to Consider
■ Benchmarking EPC Network Components
■ Summary
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
5. Use Case: The European
Pharmaceutical Supply Chain
5
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
6. Use Case: The European
Pharmaceutical Supply Chain
6
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
7. Use Case: The European
Pharmaceutical Supply Chain
7
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
8. Outline
8
■ Introduction
■ Use Case: The European Pharmaceutical Supply Chain
■ Generating Realistic Test Data
■ Selected Metrics to Consider
■ Benchmarking EPC Network Components
■ Summary
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
9. Generating Realistic Test Data
9
■ Two possibilities
□ Data Generators
□ Simulation
■ Our conclusion: only simulation can reflect the complex
dependencies of RFID-aided supply chains
■ We implemented a special-purpose simulator
■ Four scenarios of the pharmaceutical supply chain
Interference No interference
Scale 1:2000 Scenario 1 Scenario 3
Scale 1:1000 Scenario 2 Scenario 4
■ Download at epic.hpi.uni-potsdam.de/Home/RFIDSySTech2010
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
10. Outline
10
■ Introduction
■ Use Case: The European Pharmaceutical Supply Chain
■ Generating Realistic Test Data
■ Selected Metrics to Consider
■ Benchmarking EPC Network Components
■ Summary
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
11. Selected Metrics to Consider
11
■ Application Performance Index (Apdex)
□ satisfied: 0≤t<x
□ tolerating: x ≤ t < 4x
□ frustrating: t ≥ 4x
□ RS = number of satisfied response time samples
□ RT = number of tolerating response time samples
□ N = number of all samples in the report group
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
12. Selected Metrics to Consider
12
■ Throughput
□ A = Amount of completed tasks
□ T = Observation time
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
13. Outline
13
■ Introduction
■ Use Case: The European Pharmaceutical Supply Chain
■ Generating Realistic Test Data
■ Selected Metrics to Consider
■ Benchmarking EPC Network Components
■ Summary
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
14. Benchmarking EPC Network Components
14
■ System in test
□ EPCIS server and/ or
□ EPC Discovery Service
■ Apache JMeter as a test tool
□ Apache Project
□ Widely accepted performance test tool for web applications
□ Property files for variables, e.g. server URLs
□ Very flexible through BeanShell scripting
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
15. Single System in Test
15
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
16. Multiple Systems in Test
16
■ Define system URLs in JMeter “user.properties”,
■ Store EPCIS server addresses in JMeter variables
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
17. Multiple Systems in Test
17
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
18. Multiple Systems in Test
18
■ and send events to respective EPCIS servers.
■ Files and Scripts for download at epic.hpi.uni-potsdam.de/Home/
RFIDSySTech2010
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
19. Outline
19
■ Introduction
■ Use Case: The European Pharmaceutical Supply Chain
■ Generating Realistic Test Data
■ Selected Metrics to Consider
■ Benchmarking EPC Network Components
■ Summary
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
20. Summary
20
■ Evaluating software systems is important
■ How to create realistic data simulation
■ What to measure see “metrics to consider” (Apdex, throughput)
■ How to put load on the software system Apache JMeter
■ How to test multiple systems at once JMeter & BeanShell
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010
21. 21
Thank you for
your attention!
Questions?
Best Practices for Rigorous Evaluation of RFID Software Components, RFID-SysTech 2010