Building city and nationwide Wi-Fi coverage via cooperation presents the problem of building yet another overlapping citywide network instead of choosing cooperative approach to connect existing Wi-Fi networks via common policies, configurations and authentication decisions. The presentation promotes expanding eduroam(tm) model from academic world to regional, intercompany and government roaming.
Building secure, privacy aware, quality Wi-Fi coverage via cooperationKarri Huhtanen
Building secure, privacy aware, quality Wi-Fi coverage via cooperation presentation for MindTrek 2015 ( #mtom2015 ) in Tampere, Finland. The presentation covers an idea to build community Wi-Fi networks by joining existing networks via federated RADIUS authentication just like eduroam, but for all organisations, cities, government organisations, operators and companies regardless if they are commercial or not.
With millions of hotspots deployed around the world, and ever growing integration of Wi-Fi into wireless devices, Wi-Fi is rapidly becoming ubiquitous. This presentation discusses Wi-Fi evolution, its critical role in addressing the looming 1000x data challenge, enabling smart connected homes, and exciting new frontiers it is poised to explore.
For more information please visit www.qualcomm.com/wi-fi
Download the presentation here: http://www.qualcomm.com/media/documents/wireless-networks-wi-fi-evolution
Building secure, privacy aware, quality Wi-Fi coverage via cooperationKarri Huhtanen
Building secure, privacy aware, quality Wi-Fi coverage via cooperation presentation for MindTrek 2015 ( #mtom2015 ) in Tampere, Finland. The presentation covers an idea to build community Wi-Fi networks by joining existing networks via federated RADIUS authentication just like eduroam, but for all organisations, cities, government organisations, operators and companies regardless if they are commercial or not.
With millions of hotspots deployed around the world, and ever growing integration of Wi-Fi into wireless devices, Wi-Fi is rapidly becoming ubiquitous. This presentation discusses Wi-Fi evolution, its critical role in addressing the looming 1000x data challenge, enabling smart connected homes, and exciting new frontiers it is poised to explore.
For more information please visit www.qualcomm.com/wi-fi
Download the presentation here: http://www.qualcomm.com/media/documents/wireless-networks-wi-fi-evolution
WiFi stands for Wireless Fidelity. WiFiIt is based on the IEEE 802.11 family of standards and is primarily a local area networking (LAN) technology designed to provide in-building broadband coverage.
Current WiFi systems support a peak physical-layer data rate of 54 Mbps and typically provide indoor coverage over a distance of 100 feet.
WiFi has become the de facto standard for last mile broadband connectivity in homes, offices, and public hotspot locations. Systems can typically provide a coverage range of only about 1,000 feet from the access point.
Wi-Fi (Wireless Fidelity) is a generic term owned by "WiFi Alliance" which refers to any Wireless Local Area Networks (WLANs) based on IEEE 802.11 standard.
This presentation is prepared as reference of "E-Commerce Infrastructure" for BBA 6th Semester Students of Prime College. Document includes general introduction of WiFi Technology, WiFi Specification, advantages of WiFi and so on. Resources from various portals and slides from other authors has been used as reference.
Building the perfect Wi-Fi network with xirrusXirrus
Did you know that the average university has about the same broadband access speed as a large business, yet hundreds of times as many users?
The demands of 3+ devices per student and government mandates for connectivity are swiftly necessitating high-performance Wi-Fi networks as the new norm on campus. This is easier said than done as mobile usage is exploding, education and personal applications are competing for bandwidth, 802.11ac is a must-have, and IT budgets are still constrained. But settling for networks that are “good enough” is no longer an option, careful planning of the next Wi-Fi design and upgrade is paramount as it must be capable of supporting the dramatic increases in device density and data usage, plus have the longevity to last into the next decade. i.e. “the Perfect Wi-Fi Network’
WiFi stands for Wireless Fidelity. WiFiIt is based on the IEEE 802.11 family of standards and is primarily a local area networking (LAN) technology designed to provide in-building broadband coverage.
Current WiFi systems support a peak physical-layer data rate of 54 Mbps and typically provide indoor coverage over a distance of 100 feet.
WiFi has become the de facto standard for last mile broadband connectivity in homes, offices, and public hotspot locations. Systems can typically provide a coverage range of only about 1,000 feet from the access point.
Wi-Fi (Wireless Fidelity) is a generic term owned by "WiFi Alliance" which refers to any Wireless Local Area Networks (WLANs) based on IEEE 802.11 standard.
This presentation is prepared as reference of "E-Commerce Infrastructure" for BBA 6th Semester Students of Prime College. Document includes general introduction of WiFi Technology, WiFi Specification, advantages of WiFi and so on. Resources from various portals and slides from other authors has been used as reference.
Building the perfect Wi-Fi network with xirrusXirrus
Did you know that the average university has about the same broadband access speed as a large business, yet hundreds of times as many users?
The demands of 3+ devices per student and government mandates for connectivity are swiftly necessitating high-performance Wi-Fi networks as the new norm on campus. This is easier said than done as mobile usage is exploding, education and personal applications are competing for bandwidth, 802.11ac is a must-have, and IT budgets are still constrained. But settling for networks that are “good enough” is no longer an option, careful planning of the next Wi-Fi design and upgrade is paramount as it must be capable of supporting the dramatic increases in device density and data usage, plus have the longevity to last into the next decade. i.e. “the Perfect Wi-Fi Network’
Li-Fi , or "light fidelity", refers to wireless communication systems using light from light-emitting diodes as a medium instead of traditional radio frequencies, as in technology using the trademark Wi-Fi. Li-Fi is expected to be ten times cheaper than Wi-Fi. Li-Fi has the advantage of being able to be used in electromagnetic sensitive areas such as in aircraft or nuclear power plants, without causing interference.
Unlike traditional Wi-Fi routers, which use radio signals, this LiFi system relies on light to send and receive data wirelessly. If you notice an Ethernet cable plugged into the laptops that’s just to get the data from the receiver into the computer. The problem with Wi-Fi is that it uses radio signals and the amount of radio spectrum is limited. LiFi, however, could be deployed in everyday LED bulbs and cover the entire interior of a home or office. The system on show ran at 150 Mbps, but with a more powerful LED light, it could reach 3.5Ghz.
Li-Fi (Light - Fedility) Technology New Version 2017Ajith Kumar Ravi
Li-Fi , or "light fidelity", refers to wireless communication systems using light from light-emitting diodes as a medium instead of traditional radio frequencies, as in technology using the trademark Wi-Fi. Li-Fi is expected to be ten times cheaper than Wi-Fi. Li-Fi has the advantage of being able to be used in electromagnetic sensitive areas such as in aircraft or nuclear power plants, without causing interference.
Unlike traditional Wi-Fi routers, which use radio signals, this LiFi system relies on light to send and receive data wirelessly. If you notice an Ethernet cable plugged into the laptops that’s just to get the data from the receiver into the computer. The problem with Wi-Fi is that it uses radio signals and the amount of radio spectrum is limited. LiFi, however, could be deployed in everyday LED bulbs and cover the entire interior of a home or office. The system on show ran at 150 Mbps, but with a more powerful LED light, it could reach 3.5Ghz.
With the invention of new Li-fi technology, you will soon find light bulbs of your car, light lamps in your room, lights in subway, flashlight of your mobile and any other light source are providing you internet access at very high speed.Li-fi technology is the another milestone in the history of information technology. You have got the idea that Li-Fi Technology is something light. Yes, Li-fi technology or light-fidelity technology transmits data wirelessly at high speeds with the use of light emitting diodes.
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and PrivacyKarri Huhtanen
Karri Huhtanen's presentation about Wi-Fi Roaming Security and Privacy in Disobey 2024 on the 16th of February 2024 ( https://disobey.fi/2024/profile/disobey2024-154-wi-fi-roaming-security-and-privacy ).
Wi-Fi network security presentations are often about breaking the link level (radio) encryption or deploying evil twin Wi-Fi access points to perform man-in-the-middle attacks. This presentation focuses instead to the security and privacy in Wi-Fi roaming, offloading and federated networks, where there are different issues and vectors to utilise or defend against.
Adding OpenRoaming to existing IdP and roaming federation serviceKarri Huhtanen
The first deployment experiences of adding OpenRoaming functionality to existing IdP and roaming federation service. A presentation presented in the OpenRoaming Implementer's call on the 2nd of November 2022.
My presentation in the Radiator Software's webinar about OpenRoaming, how it works, what are its benefits and how Radiator Software can help to deploy it in your business.
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoamingKarri Huhtanen
A presentation at FUNET Technical Days 2021 about research projects combining (5G) SIM authentication to eduroam Finland and ongoing work and benefits with OpenRoaming global Wi-Fi roaming in roam.fi or eduroam Finland networks.
Routing host certificates in eduroam/govroamKarri Huhtanen
A presentation for govroam stakeholders' meeting about issuing, configuring and deploying such host client certificates, which can be used in roaming federation networks such as eduroam, govroam, roam.fi, openroaming etc.
A presentation for KyLÄ project opening seminar ( https://projects.tuni.fi/kyla/tapahtumat/avausseminaari/ ) about experiences and lessons learned in building cooperative labs, testbeds and networks.
Privacy and traceability in Wi-Fi networksKarri Huhtanen
Tampere Smart City Week 2021 presentation about recent privacy and traceability developments in Wi-Fi networks and especially about MAC address randomisation and its implications.
Updated, extended presentation how to deploy EAP-TLS based certificate authentication and authorisation solution within organisation or enterprise. In addition to EAP-TLS in general, the presentation also covers some features of Radiator RADIUS server software, which are particularly useful when used with certificates and EAP-TLS. The presentation was originally presented in the JISC govroam stakeholder's meeting 23rd of October 2019 in London, United Kingdom.
Security issues in RADIUS based Wi-Fi AAA (aka WPA2 Enterprise AAA) presentation in alumni seminar for Tampere University of Technology information technology, software engineering and telecommunications alumni at Tampere University of Technology, 13th of October 2018.
If you think they are easy, you are (probably) doing them wrong. A presentation about issues with TLS and X.509 certificates for Tampere security people (TreSec, @TreSecCommunity) meetup on 21st of March 2018.
What is Network Function Virtualisation (NFV)?Karri Huhtanen
An updated presentation (v1.2) about what is the concept and the idea behind Network Function Virtualisation (NFV) for Tampere University of Technology Service oriented architectures course. Includes introduction to NFV and VNF (Virtualised Network Function) architecture, components and interfaces.
What is Network Function Virtualisation (NFV)?Karri Huhtanen
A presentation about what is the concept and the idea behind Network Function Virtualisation (NFV). Includes introduction to NFV and VNF (Virtualised Network Function) architecture, components and interfaces.
Connecting the Dots: Integrating RADIUS to Network Measurement and MonitoringKarri Huhtanen
Nowadays data of the network usage is too often separated to various network components all around service provider network. Utilising RADIUS more efficiently is one approach to collect more data about network usage, combining it to network measurement, monitoring and management makes it even more efficient tool to use to get a real network situation and history overview.
Using NoSQL databases to store RADIUS and Syslog dataKarri Huhtanen
A seminar presentation done for TUT's NoSQL course. A brief look into the possibility and the feasibility of using NoSQL databases to store RADIUS accounting and Syslog data. In this particular case, Syslog-NG, Radiator RADIUS server and MongoDB were used as trial platforms. The presentation includes configuration examples and also some code.
5 minute pitch in Mobile Monday Tampere (#momotre) about the opportunties in cloud based identity management and what is Arch Red's (my company) offering.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
3. In the beginning...
already a lot of separate,
overlapping Wi-Fi
networks interfering
with each other
Map by OpenStreetMap
4. already a lot of separate,
overlapping Wi-Fi
networks interfering
with each other
+
one more, the new
common Wi-Fi
network
Then...
Map by OpenStreetMap
5. So this is bad, because...
• more overlapping Wi-Fi networks => more radio
interference => all Wi-Fi network users suffer
• providing additional coverage, capacity and
bandwidth always generates costs to someone
• maintaining, upgrading and repairing additional
network always generates costs to someone
• often the additional coverage is also provided
outdoors and from outside => which means
excellent Wi-Fi coverage for magpies during
Finnish winters
Photo by Andrew King
10. We must be realistic...
• Somebody has to cover the costs of providing coverage, capacity,
bandwidth and maintaining, upgrading and repairing network =>
Dividing work and costs makes sense => Let everyone handle and
control their part of the network
• We need unified policies for network configuration, authentication,
access filtering, IP addressing etc. => Let’s just choose open
standard interfaces and policies, no specific vendors or service
providers
• There will still be overlapping private networks, home networks
etc. => interference cannot be removed but it can be reduced
• Coverage is not really needed everywhere, it is needed where the
existing networks already are => with unified network settings
around it is easier to access Internet in various places
13. “Easy”
• use common but original Wi-Fi network name for all
cooperating networks, make the name neutral so that it is
easier to adopt
• leave Wi-Fi network without authentication or encryption
or specify common WPA2 pre-shared secret, share this
secret to everyone
• have and enforce a common policy for Internet filtering
and IP addressing everywhere
• wish for the best and believe in the goodness of the people
• that’s it: everyone controls and is responsible of their own
part of network and partially what happens through it
Photo by RobbyVan Moor
14. For few reasons “easy” option
has not catched on
• People want to have unauthenticated, unencrypted and unfiltered
networks to use, but very few want to provide such ones
themselves.
• People still want to have curtains for privacy, doors for access
control, pin codes for credit cards and mobile phones.
• People responsible of what happens in or through their networks
are even more careful.
• “easy” networks are often filtered so heavily that instead of ‘open’
they often should be called ‘broken’.
• Access and capacity control, monitoring and network
management are still needed, even in so called ‘open’ networks.
15. Photo by Thomas Guine
Photo by RobbyVan Moor
“Proper”
• use common but original Wi-Fi network name for all
cooperating networks, make the name neutral so that it is
easier to adopt
• use WPA2 encryption and authentication for everyone and
every network, connect networks into coverage area by
authentication federation, at the minimum use MAC address
control
• have and enforce a common policy for Internet filtering, IP
addressing and network configuration everywhere
• that’s it: everyone controls and is responsible of their own
part of network and partially what happens through it,
visitors leave trails that can be followed, device and visitor
access can be controlled
16. But has this then catched on?
• Short answer: Yes.
• eduroam(tm) (www.eduroam.org), the global authentication
federation for universities and research organisations is the world’s
3rd most advertised Wi-Fi network and the roaming standard of
academic world
• eduroam(tm) technologies and architecture have been applied in
Wireless Tampere community network, which is used already in
Tampere and neighboring cities
• Belnet has started a pilot in Belgium about government roaming
called govroam(tm) (www.govroam.be)
• The architecture is compatible with operator roaming and
technologies such as SIM card or certificate authentication, elliptic
curves etc. in addition to traditional username and password
17. What are the additional benefits?
• A common Wi-Fi network with same network configuration
accessible everywhere securely with home organisation credentials
but at the same time protecting the user privacy.
• Access to the network, used capacity and traffic can be controlled
and prioritized. Trail of accountability exists.
• The core infrastructure and architecture is field tested, it has already
been used and developed for over 10 years by operators, by
eduroam etc.
• The core infrastructure can be extended and evolved as
authentication and network technologies develop, in most times even
without changes to the core.
• All technologies and interfaces used are open standards, defined
mostly in IETF. There exists both open source and commercial
options for components and services from several suppliers.
18. What now and in the
future?
• All the components for building this kind of cooperative
Wi-Fi authentication federation exists.
• What is needed is the interest and will to do this kind of
cooperation and expand it from academic world and
regional cooperation to national cooperation between
cities, companies and government and beyond to connect
to similar initiatives abroad.
• If interested, come and discuss with me about details.
19. Thank you. Questions?
my contact information
Karri Huhtanen
firstname.surname@archred.com
http://www.archred.com/
these and more slides:
http://www.slideshare.net/
khuhtanen/