JP Norair hosted an office hours session on OpenTag and DASH7 technology. The document provided an overview of DASH7 features, how to obtain the OpenTag code, the current beta release roadmap, and ways for the community to get involved through testing, development and documentation. Questions from the community were answered regarding location services, multi-hop networking and event processing capabilities.
Learn the latest about the DASH7 open source firmware project, OpenTag, with support for new DASH7 capabilities like RTLS, better sensor and security support, and bitrates of up to 200kbps.
This document discusses proposed revisions to ISO 18000-7 referred to as Mode 2. Key proposed changes include improvements to the physical layer to improve performance and reduce costs, improvements to the medium access control layer for better channel efficiency, and additions to allow for peer-to-peer communications and unsolicited packet transmissions. The revised standard would support features like decreased device size, external communication events, amorphous networks, and longer reading ranges.
Code Composer Studio
Total Code Size: Less than 20KB DASH7 Radio CC430 Radio
Cost: ~$25 Memory CC430 Memory
http://www.ti.com/tool/cc430f6137kit Processor CC430 Processor
Simple, low-cost kit for basic DASH7
development. No other features.
DASH7 Confidential www.dash7.org
DASH7 SOFTWARE
OpenTag: Open source DASH7 stack for
microcontrollers. C, portable, small footprint.
dash7-stack: C++ stack for Linux/Windows.
Full featured, command line tools.
dash7
An overview of Haystack's security features for low power IoT networks. Unlike most IoT stacks, when Haystack invented DASH7, security was an a priori principle and led to the most secure networking stack available in the low power, wide area networking (LPWAN) space today.
DPDK Summit 2015 - NTT - Yoshihiro NakajimaJim St. Leger
DPDK Summit 2015 in San Francisco.
NTT presentation by Yoshihiro Nakajima.
For additional details and the video recording please visit www.dpdksummit.com.
Eric Vyncke - Layer-2 security, ipv6 norwayIKT-Norge
The document discusses IPv6 first hop security features like DHCP snooping and dynamic ARP inspection for IPv6. It provides an overview of the security issues with IPv6 neighbor discovery such as router advertisements being sent without authentication, allowing for man-in-the-middle attacks and denial of service. It then describes various IPv6 first hop security features that can help mitigate these issues, such as RA guard, DHCP guard, and IPv6 neighbor discovery inspection.
DPDK Summit 2015 - Sprint - Arun RajagopalJim St. Leger
DPDK Summit 2015 in San Francisco.
Presentation by Arun Rajagopal, Sprint, and Sameh Gobriel, Intel.
For additional details and the video recording please visit www.dpdksummit.com.
Learn the latest about the DASH7 open source firmware project, OpenTag, with support for new DASH7 capabilities like RTLS, better sensor and security support, and bitrates of up to 200kbps.
This document discusses proposed revisions to ISO 18000-7 referred to as Mode 2. Key proposed changes include improvements to the physical layer to improve performance and reduce costs, improvements to the medium access control layer for better channel efficiency, and additions to allow for peer-to-peer communications and unsolicited packet transmissions. The revised standard would support features like decreased device size, external communication events, amorphous networks, and longer reading ranges.
Code Composer Studio
Total Code Size: Less than 20KB DASH7 Radio CC430 Radio
Cost: ~$25 Memory CC430 Memory
http://www.ti.com/tool/cc430f6137kit Processor CC430 Processor
Simple, low-cost kit for basic DASH7
development. No other features.
DASH7 Confidential www.dash7.org
DASH7 SOFTWARE
OpenTag: Open source DASH7 stack for
microcontrollers. C, portable, small footprint.
dash7-stack: C++ stack for Linux/Windows.
Full featured, command line tools.
dash7
An overview of Haystack's security features for low power IoT networks. Unlike most IoT stacks, when Haystack invented DASH7, security was an a priori principle and led to the most secure networking stack available in the low power, wide area networking (LPWAN) space today.
DPDK Summit 2015 - NTT - Yoshihiro NakajimaJim St. Leger
DPDK Summit 2015 in San Francisco.
NTT presentation by Yoshihiro Nakajima.
For additional details and the video recording please visit www.dpdksummit.com.
Eric Vyncke - Layer-2 security, ipv6 norwayIKT-Norge
The document discusses IPv6 first hop security features like DHCP snooping and dynamic ARP inspection for IPv6. It provides an overview of the security issues with IPv6 neighbor discovery such as router advertisements being sent without authentication, allowing for man-in-the-middle attacks and denial of service. It then describes various IPv6 first hop security features that can help mitigate these issues, such as RA guard, DHCP guard, and IPv6 neighbor discovery inspection.
DPDK Summit 2015 - Sprint - Arun RajagopalJim St. Leger
DPDK Summit 2015 in San Francisco.
Presentation by Arun Rajagopal, Sprint, and Sameh Gobriel, Intel.
For additional details and the video recording please visit www.dpdksummit.com.
This document provides an overview of Vector Packet Processing (VPP), an open source packet processing platform developed as part of the FD.io project. VPP is based on DPDK for high performance packet processing in userspace. It includes a full networking stack and can perform L2/L3 forwarding and routing at speeds of over 14 million packets per second on a single core. VPP processing is divided into individual nodes connected by a graph. Packets are passed between nodes as vectors to support batch processing. VPP supports both single and multicore modes using different threading models. It can be used to implement routers, switches, and other network functions and topologies.
The document discusses using Lagopus software-defined networking (SDN) switches to demonstrate an SDN internet exchange (IX) at the Interop Tokyo 2015 technology show. Key points:
- Two Lagopus SDN switches were deployed as the core switches in an SDN IX to enable automated provisioning of inter-autonomous system layer 2 connectivity and on-demand packet filtering between internet service providers.
- The Lagopus switches achieved an average throughput of 2Gbps with no packet drops over a week during the show, demonstrating the potential for software switches in next-generation SDNs.
- Previous work to optimize the Lagopus switch performance through techniques like hardware offloading to FPGAs helped enable its
Jan Zorz - IPv6 and mobile emergency response teamsIKT-Norge
Jan Žorž presented on his work with IPv6 and emergency response systems. He discussed the GEN6 project which is developing IPv6-enabled self-organizing systems for emergency teams. As part of this, Jan Žorž is leading a Slovenian pilot project that will deploy an IPv6 network for a fire department to demonstrate seamless connectivity, automatic configuration, mobility, and secure transmission of data, voice, and video across different network technologies. Jan Žorž also discussed his role in updating the RIPE-501 IPv6 procurement document and demonstrated the DSMIPv6-TLS technology for secure mobile IPv6 communications.
This white paper discusses various transition technologies that service providers need to support both IPv4 and IPv6 networks during the lengthy transition period to IPv6. It covers dual-stack networking, different types of network address translation (NAT44, NAT64, NAT444, etc.), and various tunneling methods like 6rd, DS-Lite, and IPv6 in MPLS. Dual-stack is preferred but requires maintaining both protocols. NAT extended the life of IPv4 by allowing private addressing but broke the end-to-end IP model. Transition technologies aim to provide a smooth path to the full deployment of IPv6 while still supporting legacy IPv4 devices and applications.
This document summarizes an article about SDN, OpenFlow, and the ONF. It discusses how OpenFlow and SDN are emerging technologies that have the potential to enable network innovation and optimize costs. It also introduces the Open Networking Foundation (ONF) and how the community around SDN and OpenFlow has grown rapidly.
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...gogo6
gogo6 IPv6 Video Series. Event, presentation and speaker details below:
EVENT
gogoNET LIVE! 3: Enterprise wide Migration. http://gogonetlive.com
November 12 – 14, 2012 at San Jose State University, California
Agenda: http://gogonetlive.com/4105/gogonetlive3-agenda.asp
PRESENTATION
Deploying IPv6 in Cisco's Labs
Presentation video: http://www.gogo6.com/video/deploying-ipv6-in-cisco-s-labs-by-robert-beckett-at-gogonet-live
Interview video: http://www.gogo6.com/video/interview-with-robert-beckett-at-gogonet-live-3-ipv6-conference
SPEAKER
Robert Beckett - Services Technical Leader, Cisco Systems
Bio/Profile: http://www.gogo6.com/profile/RobertBeckett
MORE
Learn more about IPv6 on the gogoNET social network
http://www.gogo6.com
Get free IPv6 connectivity with Freenet6
http://www.gogo6.com/Freenet6
Subscribe to the gogo6 IPv6 Channel on YouTube
http://www.youtube.com/subscription_center?add_user=gogo6videos
Follow gogo6 on Twitter
http://twitter.com/gogo6inc
Like gogo6 on Facebook
http://www.facebook.com/pages/IPv6-products-community-and-services-gogo6/161626696777
This document discusses security considerations for IPv6. It notes that default IPv6 subnets have 264 addresses, making network scanning impractical. ICMPv6 limits ping responses to limit reconnaissance. IPv6 uses multicast for functionality replaced by broadcast in IPv4, preventing amplification attacks. Privacy extensions for IPv6 addresses inhibit device tracking but complicate internal network management. Overall, best practices for securing IPv4 against worms, sniffing and other attacks also apply to IPv6.
OVS and DPDK - T.F. Herbert, K. Traynor, M. Grayharryvanhaaren
The document discusses DPDK and software dataplane acceleration for Open vSwitch. It provides an overview of the OVS architecture and its evolution to integrate with DPDK. It shares one user's experience of initial challenges in using DPDK/OVS and improvements over time. Suggestions are made to improve areas like debugging, testing, documentation and training to enhance the usability of DPDK/OVS. Performance tuning techniques like using multiple threads are also briefly covered.
Troubleshooting Dual-Protocol Networks and Systems by Scott Hogg at gogoNET L...gogo6
gogo6 IPv6 Video Series. Event, presentation and speaker details below:
EVENT
gogoNET LIVE! 3: Enterprise wide Migration. http://gogonetlive.com
November 12 – 14, 2012 at San Jose State University, California
Agenda: http://gogonetlive.com/4105/gogonetlive3-agenda.asp
PRESENTATION
Troubleshooting Dual-Protocol Networks and Systems
Abstract: http://www.gogo6.com/profiles/blogs/my-presentation-at-gogonet-live-3-troubleshooting-in-a-dual-stack
Presentation video: http://www.gogo6.com/video/troubleshooting-dual-protocol-networks-and-systems-by-scott-hogg
Interview video: http://www.gogo6.com/video/interview-with-scott-hogg-at-gogonet-live-3-ipv6-conference
SPEAKER
Scott Hogg - Director of Advanced Technology Services, GTRI
Bio/Profile: http://www.gogo6.com/profile/ScottHogg986
MORE
Learn more about IPv6 on the gogoNET social network
http://www.gogo6.com
Get free IPv6 connectivity with Freenet6
http://www.gogo6.com/Freenet6
Subscribe to the gogo6 IPv6 Channel on YouTube
http://www.youtube.com/subscription_center?add_user=gogo6videos
Follow gogo6 on Twitter
http://twitter.com/gogo6inc
Like gogo6 on Facebook
http://www.facebook.com/pages/IPv6-products-community-and-services-gogo6/161626696777
DDS Advanced Tutorial - OMG June 2013 Berlin MeetingJaime Martin Losa
An extended, in-depth tutorial explaining how to fully exploit the standard's unique communication capabilities.Presented at the OMG June 2013 Berlin Meeting.
Users upgrading to DDS from a homegrown solution or a legacy-messaging infrastructure often limit themselves to using its most basic publish-subscribe features. This allows applications to take advantage of reliable multicast and other performance and scalability features of the DDS wire protocol, as well as the enhanced robustness of the DDS peer-to-peer architecture. However, applications that do not use DDS's data-centricity do not take advantage of many of its QoS-related, scalability and availability features, such as the KeepLast History Cache, Instance Ownership and Deadline Monitoring. As a consequence some developers duplicate these features in custom application code, resulting in increased costs, lower performance, and compromised portability and interoperability.
This tutorial will formally define the data-centric publish-subscribe model as specified in the OMG DDS specification and define a set of best-practice guidelines and patterns for the design and implementation of systems based on DDS.
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
Henrik Strøm discusses IPv6 security from an attacker's perspective. He outlines 6 points on how attackers can exploit IPv6 vulnerabilities, including using IPv6 to bypass IPv4 access controls when on a local network, spoofing router advertisements to hijack traffic, using tunneling to enable inbound and outbound connectivity, and launching denial of service attacks. He recommends network administrators decide how to implement IPv6 security, monitor for IPv6 traffic, harden clients and servers, and filter all types of IPv6 tunneling. Further reading suggests there is still significant work needed on IPv6 firewalling and many IPv4 issues have been transferred to IPv6.
DPDK Summit 2015 in San Francisco.
Intel's presentation by Keith Wiles.
For additional details and the video recording please visit www.dpdksummit.com.
Yoshihiro Nakajima presented on software stacks that enable software-defined networking (SDN) and network functions virtualization (NFV). He discussed trends in SDN and NFV, introduced the Lagopus SDN software switch project, and described how Data Plane Development Kit (DPDK) helps optimize packet processing performance. The goal of his talk was to provide an NFV/SDN-aware software stack capable of 100Gbps switching through high-performance packet processing.
Fiware - communicating with ROS robots using Fast RTPSJaime Martin Losa
How to connect FIWARE to Robots ? We discuss how the FIWARE enablers can connect to ROS2, a de facto standard for robotic frameworks, using Fast RTPS and KIARA.
How to connect FIWARE to Robots ? We discuss how the FIWARE enablers can connect to ROS2, a de facto standard for robotic frameworks, using Fast RTPS and KIARA.
Wireless IoT connections fall into two low-power camps: local area and wide area. Historically the two have not overlapped but advances in networking technologies make it possible for wide area technologies to perform the same functions as local area technologies with no additional cost or feature "sacrifice".
Martin J Levy - Hurricane Electric - The IPv6 global view - norway ipv6 - apr...IKT-Norge
The document discusses Hurricane Electric's IPv6 network and services. It notes that Hurricane Electric has over a decade of experience with IPv6 and currently operates one of the largest IPv6 backbones globally. The presentation examines questions around IPv6 deployment worldwide and the readiness of the IPv6 routing table for real-world use. Tools for checking global IPv6 routing and statistics, such as Hurricane Electric's BGP monitoring site, are demonstrated.
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?Mark Smith
The document discusses network virtualization and various methods used to encapsulate virtual network traffic over a physical network. It identifies several opportunities to enhance existing encapsulation methods by leveraging IPv6 features. These include using the IPv6 flow label field or interface identifier fields to carry virtual network context identifiers in order to facilitate load balancing. It also proposes using IPv6 multicast scoping and address allocation to simplify virtual network multicast configurations. In total, the document outlines nine potential opportunities to improve virtual network encapsulation through the use of IPv6.
How new Low Power Wireless Area Networks (LPWAN's) are aggressively challenging the Internet of Things status quo and how industry can exploit this opportunity. Specifically, the ability to query IoT endpoints in real time, improve network capacity and data rates, and the ability to deploy a filesystem in order to create a "Hadoop"-like real-time query capability at the edge of the network is explored.
This document provides an overview of Vector Packet Processing (VPP), an open source packet processing platform developed as part of the FD.io project. VPP is based on DPDK for high performance packet processing in userspace. It includes a full networking stack and can perform L2/L3 forwarding and routing at speeds of over 14 million packets per second on a single core. VPP processing is divided into individual nodes connected by a graph. Packets are passed between nodes as vectors to support batch processing. VPP supports both single and multicore modes using different threading models. It can be used to implement routers, switches, and other network functions and topologies.
The document discusses using Lagopus software-defined networking (SDN) switches to demonstrate an SDN internet exchange (IX) at the Interop Tokyo 2015 technology show. Key points:
- Two Lagopus SDN switches were deployed as the core switches in an SDN IX to enable automated provisioning of inter-autonomous system layer 2 connectivity and on-demand packet filtering between internet service providers.
- The Lagopus switches achieved an average throughput of 2Gbps with no packet drops over a week during the show, demonstrating the potential for software switches in next-generation SDNs.
- Previous work to optimize the Lagopus switch performance through techniques like hardware offloading to FPGAs helped enable its
Jan Zorz - IPv6 and mobile emergency response teamsIKT-Norge
Jan Žorž presented on his work with IPv6 and emergency response systems. He discussed the GEN6 project which is developing IPv6-enabled self-organizing systems for emergency teams. As part of this, Jan Žorž is leading a Slovenian pilot project that will deploy an IPv6 network for a fire department to demonstrate seamless connectivity, automatic configuration, mobility, and secure transmission of data, voice, and video across different network technologies. Jan Žorž also discussed his role in updating the RIPE-501 IPv6 procurement document and demonstrated the DSMIPv6-TLS technology for secure mobile IPv6 communications.
This white paper discusses various transition technologies that service providers need to support both IPv4 and IPv6 networks during the lengthy transition period to IPv6. It covers dual-stack networking, different types of network address translation (NAT44, NAT64, NAT444, etc.), and various tunneling methods like 6rd, DS-Lite, and IPv6 in MPLS. Dual-stack is preferred but requires maintaining both protocols. NAT extended the life of IPv4 by allowing private addressing but broke the end-to-end IP model. Transition technologies aim to provide a smooth path to the full deployment of IPv6 while still supporting legacy IPv4 devices and applications.
This document summarizes an article about SDN, OpenFlow, and the ONF. It discusses how OpenFlow and SDN are emerging technologies that have the potential to enable network innovation and optimize costs. It also introduces the Open Networking Foundation (ONF) and how the community around SDN and OpenFlow has grown rapidly.
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...gogo6
gogo6 IPv6 Video Series. Event, presentation and speaker details below:
EVENT
gogoNET LIVE! 3: Enterprise wide Migration. http://gogonetlive.com
November 12 – 14, 2012 at San Jose State University, California
Agenda: http://gogonetlive.com/4105/gogonetlive3-agenda.asp
PRESENTATION
Deploying IPv6 in Cisco's Labs
Presentation video: http://www.gogo6.com/video/deploying-ipv6-in-cisco-s-labs-by-robert-beckett-at-gogonet-live
Interview video: http://www.gogo6.com/video/interview-with-robert-beckett-at-gogonet-live-3-ipv6-conference
SPEAKER
Robert Beckett - Services Technical Leader, Cisco Systems
Bio/Profile: http://www.gogo6.com/profile/RobertBeckett
MORE
Learn more about IPv6 on the gogoNET social network
http://www.gogo6.com
Get free IPv6 connectivity with Freenet6
http://www.gogo6.com/Freenet6
Subscribe to the gogo6 IPv6 Channel on YouTube
http://www.youtube.com/subscription_center?add_user=gogo6videos
Follow gogo6 on Twitter
http://twitter.com/gogo6inc
Like gogo6 on Facebook
http://www.facebook.com/pages/IPv6-products-community-and-services-gogo6/161626696777
This document discusses security considerations for IPv6. It notes that default IPv6 subnets have 264 addresses, making network scanning impractical. ICMPv6 limits ping responses to limit reconnaissance. IPv6 uses multicast for functionality replaced by broadcast in IPv4, preventing amplification attacks. Privacy extensions for IPv6 addresses inhibit device tracking but complicate internal network management. Overall, best practices for securing IPv4 against worms, sniffing and other attacks also apply to IPv6.
OVS and DPDK - T.F. Herbert, K. Traynor, M. Grayharryvanhaaren
The document discusses DPDK and software dataplane acceleration for Open vSwitch. It provides an overview of the OVS architecture and its evolution to integrate with DPDK. It shares one user's experience of initial challenges in using DPDK/OVS and improvements over time. Suggestions are made to improve areas like debugging, testing, documentation and training to enhance the usability of DPDK/OVS. Performance tuning techniques like using multiple threads are also briefly covered.
Troubleshooting Dual-Protocol Networks and Systems by Scott Hogg at gogoNET L...gogo6
gogo6 IPv6 Video Series. Event, presentation and speaker details below:
EVENT
gogoNET LIVE! 3: Enterprise wide Migration. http://gogonetlive.com
November 12 – 14, 2012 at San Jose State University, California
Agenda: http://gogonetlive.com/4105/gogonetlive3-agenda.asp
PRESENTATION
Troubleshooting Dual-Protocol Networks and Systems
Abstract: http://www.gogo6.com/profiles/blogs/my-presentation-at-gogonet-live-3-troubleshooting-in-a-dual-stack
Presentation video: http://www.gogo6.com/video/troubleshooting-dual-protocol-networks-and-systems-by-scott-hogg
Interview video: http://www.gogo6.com/video/interview-with-scott-hogg-at-gogonet-live-3-ipv6-conference
SPEAKER
Scott Hogg - Director of Advanced Technology Services, GTRI
Bio/Profile: http://www.gogo6.com/profile/ScottHogg986
MORE
Learn more about IPv6 on the gogoNET social network
http://www.gogo6.com
Get free IPv6 connectivity with Freenet6
http://www.gogo6.com/Freenet6
Subscribe to the gogo6 IPv6 Channel on YouTube
http://www.youtube.com/subscription_center?add_user=gogo6videos
Follow gogo6 on Twitter
http://twitter.com/gogo6inc
Like gogo6 on Facebook
http://www.facebook.com/pages/IPv6-products-community-and-services-gogo6/161626696777
DDS Advanced Tutorial - OMG June 2013 Berlin MeetingJaime Martin Losa
An extended, in-depth tutorial explaining how to fully exploit the standard's unique communication capabilities.Presented at the OMG June 2013 Berlin Meeting.
Users upgrading to DDS from a homegrown solution or a legacy-messaging infrastructure often limit themselves to using its most basic publish-subscribe features. This allows applications to take advantage of reliable multicast and other performance and scalability features of the DDS wire protocol, as well as the enhanced robustness of the DDS peer-to-peer architecture. However, applications that do not use DDS's data-centricity do not take advantage of many of its QoS-related, scalability and availability features, such as the KeepLast History Cache, Instance Ownership and Deadline Monitoring. As a consequence some developers duplicate these features in custom application code, resulting in increased costs, lower performance, and compromised portability and interoperability.
This tutorial will formally define the data-centric publish-subscribe model as specified in the OMG DDS specification and define a set of best-practice guidelines and patterns for the design and implementation of systems based on DDS.
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
Henrik Strøm discusses IPv6 security from an attacker's perspective. He outlines 6 points on how attackers can exploit IPv6 vulnerabilities, including using IPv6 to bypass IPv4 access controls when on a local network, spoofing router advertisements to hijack traffic, using tunneling to enable inbound and outbound connectivity, and launching denial of service attacks. He recommends network administrators decide how to implement IPv6 security, monitor for IPv6 traffic, harden clients and servers, and filter all types of IPv6 tunneling. Further reading suggests there is still significant work needed on IPv6 firewalling and many IPv4 issues have been transferred to IPv6.
DPDK Summit 2015 in San Francisco.
Intel's presentation by Keith Wiles.
For additional details and the video recording please visit www.dpdksummit.com.
Yoshihiro Nakajima presented on software stacks that enable software-defined networking (SDN) and network functions virtualization (NFV). He discussed trends in SDN and NFV, introduced the Lagopus SDN software switch project, and described how Data Plane Development Kit (DPDK) helps optimize packet processing performance. The goal of his talk was to provide an NFV/SDN-aware software stack capable of 100Gbps switching through high-performance packet processing.
Fiware - communicating with ROS robots using Fast RTPSJaime Martin Losa
How to connect FIWARE to Robots ? We discuss how the FIWARE enablers can connect to ROS2, a de facto standard for robotic frameworks, using Fast RTPS and KIARA.
How to connect FIWARE to Robots ? We discuss how the FIWARE enablers can connect to ROS2, a de facto standard for robotic frameworks, using Fast RTPS and KIARA.
Wireless IoT connections fall into two low-power camps: local area and wide area. Historically the two have not overlapped but advances in networking technologies make it possible for wide area technologies to perform the same functions as local area technologies with no additional cost or feature "sacrifice".
Martin J Levy - Hurricane Electric - The IPv6 global view - norway ipv6 - apr...IKT-Norge
The document discusses Hurricane Electric's IPv6 network and services. It notes that Hurricane Electric has over a decade of experience with IPv6 and currently operates one of the largest IPv6 backbones globally. The presentation examines questions around IPv6 deployment worldwide and the readiness of the IPv6 routing table for real-world use. Tools for checking global IPv6 routing and statistics, such as Hurricane Electric's BGP monitoring site, are demonstrated.
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?Mark Smith
The document discusses network virtualization and various methods used to encapsulate virtual network traffic over a physical network. It identifies several opportunities to enhance existing encapsulation methods by leveraging IPv6 features. These include using the IPv6 flow label field or interface identifier fields to carry virtual network context identifiers in order to facilitate load balancing. It also proposes using IPv6 multicast scoping and address allocation to simplify virtual network multicast configurations. In total, the document outlines nine potential opportunities to improve virtual network encapsulation through the use of IPv6.
How new Low Power Wireless Area Networks (LPWAN's) are aggressively challenging the Internet of Things status quo and how industry can exploit this opportunity. Specifically, the ability to query IoT endpoints in real time, improve network capacity and data rates, and the ability to deploy a filesystem in order to create a "Hadoop"-like real-time query capability at the edge of the network is explored.
An overview of DASH7 wireless technology in 2012 by Blackbird Technology. First half for non-technical audiences, second half more technical but hopefully readable by non-technical audiences.
The document compares DASH7 and ZigBee wireless technologies. It summarizes that DASH7 has longer range, lower power consumption, and is more cost effective than ZigBee over the long term. Specifically, DASH7 has 6x the range of ZigBee at 433MHz and uses wakeup signals to achieve lower latency and power usage compared to ZigBee's scheduling mechanism. The total cost of ownership over 10 years is estimated to be 10x lower for DASH7 devices. DASH7 is also described as more standardized and suitable for a wider range of applications due to its long battery life and low device costs.
The Dash7 Alliance Protocol is based on ISO/IEC 18000-7, which describes parameters for active RFID communications at 433 MHz. It builds on an asynchronous wireless sensor network MAC protocol, with functionality optimized for RFID and support for fixed and mobile nodes to upload or retrieve small amounts of data. Dash7 uses GFSK modulation in the 433 MHz band and supports tag-to-tag communication through a simple routing protocol with a range that can be extended using subcontrollers.
El documento describe el proceso de urbanización en España, dividiéndolo en tres etapas: la preindustrial, la industrial y la posindustrial. La urbanización preindustrial comprende desde el origen de las ciudades hasta el siglo XIX e incluye factores como los estratégicos, políticos y económicos. La industrial abarca desde el siglo XIX hasta 1975, periodo en el que la población urbana creció más rápido que la rural debido a factores administrativos y económicos como la industria. Finalmente,
This document provides an overview and comparison of various source control systems, including Subversion (SVN), Git, Bazaar (Bzr), and Mercurial (Hg). It discusses features of centralized and distributed version control systems. Key centralized systems include SVN, while distributed systems include Git, Bzr, and Hg. The document compares aspects like creators, users, licenses, and documentation quality. It also covers concepts like local repositories, snapshots vs changesets, and branching in distributed version control. Hosted code solutions and social coding aspects are briefly outlined.
This webinar will provide an introduction to a new initiative being formed within the DASH7 Alliance around the standardization of the way software applications communicate with DASH7 readers or access points. While the DASH7 Alliance has focused primarily on the DASH7 air interface, providing developers with a way to write to any DASH7 device, regardless of vendor, is a logical and important next step in the evolution of DASH7.
The document describes Collabograte, an integration platform for collaboration components. It aims to provide an open platform for integrating components like wikis, blogs, mailing lists, and chat while maximizing user freedom and flexibility. It uses Puppet for configuration management and integrates components like OpenLDAP, MediaWiki, WordPress, Postfix, Cyrus, and ejabberd. Collabograte provides virtual machine images and Puppet modules to configure the integrated stack on a Linux host.
This document discusses the power of Git and distributed version control systems. It begins by explaining problems that can occur with finding and collaborating on code over time. It then introduces version control systems and how they address these problems by storing code revisions with metadata. A key advantage of Git is that it is a distributed version control system, allowing offline work and collaboration. GitHub is highlighted as a popular hosting service that has over 2.2 million active repositories, showing the power of Git for open source projects and collaboration at scale.
The document discusses various technologies and languages including PHP, Python, Ruby, Go, Scala, and Red. It mentions tools for mobile development like PhoneGap and frameworks like jQuery, Dojo, and Sencha. Other topics covered include Node.js, HTML5, cloud computing platforms, virtualization, and decoupled content management systems. Resources and links are provided for many of the languages and technologies discussed.
This document summarizes a presentation about the IzPack open source installation framework. It discusses IzPack's history and growth over time, from its initial creation in a student dorm room to becoming an industry-backed project. Key features of IzPack are highlighted, such as its cross-platform compatibility. The positioning of IzPack as complementing other installation technologies is described. Thoughts on open source software models and community management are also provided.
Managing software product versioning with Gitflow, VSTS and Atlassian SourceTreeBosnia Agile
The document summarizes key aspects of managing software product versioning using Gitflow, VSTS and SourceTree. It discusses defining a versioning strategy using semantic versioning, maintaining code in repositories, implementing the Gitflow branching model with master, develop, feature and release branches, and collaborating using real-time chat systems and integrations with tools like Jira.
The document discusses developing a community-based Android distribution and upstreaming experience. It describes building an enhanced Android distribution called 0xdroid to address performance and usability issues encountered in the Android Open Source Project (AOSP). The goals are to contribute improvements back to AOSP and other community projects like CyanogenMod and Android-x86. Key aspects covered include hardware enablement, usability fixes, performance optimizations, new features, and strategies for submitting changes upstream.
In April 2015, Apache Geode (incubating) was born from Pivotal’s GemFire, the distributed in-memory database. However, the donation of over 1M LOC was just the beginning of the journey. In this talk we discuss how the GemFire engineering team has adapted their development infrastructure, processes, and culture to embrace the “Apache Way". We present lessons learned and best practices for new and incubating open source projects in areas of initial code submission, IP clearance, governance policies, code review, and community building. We discuss the challenges the team faced and how we changed internal communication and software design processes to a community-driven model. In particular, we highlight effective strategies for growing a project community and embracing new members. Finally, we show how changing to the open source model has increased both productivity and quality.
Eric Fesler discusses using open source software. He explains that open source ensures certain software freedoms like free redistribution and access to source code. Fesler recommends choosing open source by defining needs, identifying options from directories like SourceForge, and doing a detailed review of aspects like community support and licensing. He advises working with open source by selecting best of breed components, managing version compatibility, and standardizing libraries.
This document summarizes a presentation about achieving visibility and insight across OpenStack projects using an integration pilot powered by Wikidsmart. It discusses current challenges with a lack of integration between project content and silos of information. The Wikidsmart demo shows faceted search and tracing a patch across tools. Next steps proposed include offering a public and private Wikidsmart portal to OpenStack members to bridge internal and community content.
Achieving Visibility and Insight across OpenStack Projects.pptOpenStack Foundation
This document discusses achieving visibility and insight across OpenStack projects through an integration pilot powered by Wikidsmart. It describes current challenges with a lack of integration between project content and silos of information. The Wikidsmart demo shows faceted search and tracing a patch across tools. Potential next steps include offering a public Wikidsmart portal for searching and dashboards, and a private portal for corporate members to bridge internal and community content.
This document summarizes Patrick McGarry's presentation on Ceph and its role in the ecosystem. The presentation covered Ceph's involvement in various Linux distributions, open source projects, orchestration tools, cloud platforms, and upcoming Ceph Days sessions. It highlighted how Ceph provides storage solutions for projects like OpenStack, CloudStack, XenServer, and Hadoop. It also discussed tools for deploying and managing Ceph clusters, such as Chef, Puppet, Ansible, Salt, Juju, and ceph-deploy.
This document summarizes a project management software called Cerebro designed for CG and VFX industries. Cerebro provides tools for project planning, task tracking, file storage, communication, and reporting. It aims to help teams avoid disorganization and wasted time by streamlining workflows and centralizing information. The software is available in free and paid versions for individual users, small studios, and large companies.
Introduction to metasploit framework
01.History of metasploit
02.Metasploit Design and architecture
03.Metasploit Editions
04.Metasploit Interface
05.Basic commands and foot-printing modules
Presentation delivered at LinuxCon China 2017.
Zephyr is an upstream open source project for places where Linux is too big to fit. This talk will overview the progress we've made in the first year towards the projects goals around incorporating best of breed technologies into the code base, and building up the community to support multiple architectures and development environments. We will share our roadmap, plans and the challenges ahead of the us and give an overview of the major technical challenges we want to tackle in 2017.
OSDC 2016 - Ingesting Logs with Style by Pere Urbon-BayesNETWAYS
The log shipping scene been between us for a long time: from syslog, rsyslog to nowadays Fluentd, Flume and Logstash. Logstash been pushing hard to introduce new features that make the experience better for everyone. At the end of the day, a healthy shipper means a happy sysadmin. The latest Logstash includes persistence to reduce the chance of data loss, monitoring to find how everything is going and configuration management to make your life a lot easier. But wait, there’s more! Offline support, improved shutdown semantics, etc … features that will make your logs shipped and you a rested sysadmin.
In this talk we’ll see this features in action thought a real live sensor monitoring example. By the end of the session, you will be able to use the full power of Logstash in your own deployments.
The document provides an overview of Linux usage statistics and the Linux ecosystem. It discusses major companies and sectors that use Linux, including Google, Amazon, financial institutions, and governments. It then summarizes the history of Linux and free/open source software movements. The rest of the document outlines the various components of the Linux ecosystem, common licenses and business models, and ways for individuals to get involved through contributing to projects or obtaining certifications.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.