Learn the latest about the DASH7 open source firmware project, OpenTag, with support for new DASH7 capabilities like RTLS, better sensor and security support, and bitrates of up to 200kbps.
JP Norair hosted an office hours session on OpenTag and DASH7 technology. The document provided an overview of DASH7 features, how to obtain the OpenTag code, the current beta release roadmap, and ways for the community to get involved through testing, development and documentation. Questions from the community were answered regarding location services, multi-hop networking and event processing capabilities.
This document discusses proposed revisions to ISO 18000-7 referred to as Mode 2. Key proposed changes include improvements to the physical layer to improve performance and reduce costs, improvements to the medium access control layer for better channel efficiency, and additions to allow for peer-to-peer communications and unsolicited packet transmissions. The revised standard would support features like decreased device size, external communication events, amorphous networks, and longer reading ranges.
Code Composer Studio
Total Code Size: Less than 20KB DASH7 Radio CC430 Radio
Cost: ~$25 Memory CC430 Memory
http://www.ti.com/tool/cc430f6137kit Processor CC430 Processor
Simple, low-cost kit for basic DASH7
development. No other features.
DASH7 Confidential www.dash7.org
DASH7 SOFTWARE
OpenTag: Open source DASH7 stack for
microcontrollers. C, portable, small footprint.
dash7-stack: C++ stack for Linux/Windows.
Full featured, command line tools.
dash7
An overview of Haystack's security features for low power IoT networks. Unlike most IoT stacks, when Haystack invented DASH7, security was an a priori principle and led to the most secure networking stack available in the low power, wide area networking (LPWAN) space today.
Haystack is introducing a new mode called DASH7 XR Mode that can triple the range of LoRa networks. It utilizes advanced error correction techniques as well as automated receipt responses. Testing shows it can achieve 2-3x the range of LoRaWAN networks while preserving multi-year battery life. Private beta testing of XR Mode is now underway.
Wireless IoT connections fall into two low-power camps: local area and wide area. Historically the two have not overlapped but advances in networking technologies make it possible for wide area technologies to perform the same functions as local area technologies with no additional cost or feature "sacrifice".
JP Norair hosted an office hours session on OpenTag and DASH7 technology. The document provided an overview of DASH7 features, how to obtain the OpenTag code, the current beta release roadmap, and ways for the community to get involved through testing, development and documentation. Questions from the community were answered regarding location services, multi-hop networking and event processing capabilities.
This document discusses proposed revisions to ISO 18000-7 referred to as Mode 2. Key proposed changes include improvements to the physical layer to improve performance and reduce costs, improvements to the medium access control layer for better channel efficiency, and additions to allow for peer-to-peer communications and unsolicited packet transmissions. The revised standard would support features like decreased device size, external communication events, amorphous networks, and longer reading ranges.
Code Composer Studio
Total Code Size: Less than 20KB DASH7 Radio CC430 Radio
Cost: ~$25 Memory CC430 Memory
http://www.ti.com/tool/cc430f6137kit Processor CC430 Processor
Simple, low-cost kit for basic DASH7
development. No other features.
DASH7 Confidential www.dash7.org
DASH7 SOFTWARE
OpenTag: Open source DASH7 stack for
microcontrollers. C, portable, small footprint.
dash7-stack: C++ stack for Linux/Windows.
Full featured, command line tools.
dash7
An overview of Haystack's security features for low power IoT networks. Unlike most IoT stacks, when Haystack invented DASH7, security was an a priori principle and led to the most secure networking stack available in the low power, wide area networking (LPWAN) space today.
Haystack is introducing a new mode called DASH7 XR Mode that can triple the range of LoRa networks. It utilizes advanced error correction techniques as well as automated receipt responses. Testing shows it can achieve 2-3x the range of LoRaWAN networks while preserving multi-year battery life. Private beta testing of XR Mode is now underway.
Wireless IoT connections fall into two low-power camps: local area and wide area. Historically the two have not overlapped but advances in networking technologies make it possible for wide area technologies to perform the same functions as local area technologies with no additional cost or feature "sacrifice".
Update on current state of 3G and IPv6 deployment .
"The State of 3G/GPRS IPv6 Deployment", North American IPv6 Technology Conference, September 20th, 2005.
This document discusses IPv6 support in 2G and 3G networks. It notes that IPv6 addresses some key limitations of IPv4, including limited address space and complexity from practices like NAT. It outlines IPv6 status in various standards bodies and vendor support. It describes how IPv6 enables important applications in 3G networks like IMS and peer-to-peer applications. It also discusses transition challenges, including the need to avoid NATs between PoC clients and servers due to UDP port timeouts.
Eric Vyncke - Layer-2 security, ipv6 norwayIKT-Norge
The document discusses IPv6 first hop security features like DHCP snooping and dynamic ARP inspection for IPv6. It provides an overview of the security issues with IPv6 neighbor discovery such as router advertisements being sent without authentication, allowing for man-in-the-middle attacks and denial of service. It then describes various IPv6 first hop security features that can help mitigate these issues, such as RA guard, DHCP guard, and IPv6 neighbor discovery inspection.
Jan Zorz - IPv6 and mobile emergency response teamsIKT-Norge
Jan Žorž presented on his work with IPv6 and emergency response systems. He discussed the GEN6 project which is developing IPv6-enabled self-organizing systems for emergency teams. As part of this, Jan Žorž is leading a Slovenian pilot project that will deploy an IPv6 network for a fire department to demonstrate seamless connectivity, automatic configuration, mobility, and secure transmission of data, voice, and video across different network technologies. Jan Žorž also discussed his role in updating the RIPE-501 IPv6 procurement document and demonstrated the DSMIPv6-TLS technology for secure mobile IPv6 communications.
DPDK Summit 2015 - NTT - Yoshihiro NakajimaJim St. Leger
DPDK Summit 2015 in San Francisco.
NTT presentation by Yoshihiro Nakajima.
For additional details and the video recording please visit www.dpdksummit.com.
DPDK Summit 2015 - Sprint - Arun RajagopalJim St. Leger
DPDK Summit 2015 in San Francisco.
Presentation by Arun Rajagopal, Sprint, and Sameh Gobriel, Intel.
For additional details and the video recording please visit www.dpdksummit.com.
This document discusses security considerations for IPv6. It notes that default IPv6 subnets have 264 addresses, making network scanning impractical. ICMPv6 limits ping responses to limit reconnaissance. IPv6 uses multicast for functionality replaced by broadcast in IPv4, preventing amplification attacks. Privacy extensions for IPv6 addresses inhibit device tracking but complicate internal network management. Overall, best practices for securing IPv4 against worms, sniffing and other attacks also apply to IPv6.
The document discusses the upcoming introduction of IPv6. [1] IPv6 is a new standard for IP numbering that will provide more IP addresses as the current IPv4 addresses are running out. [2] It will help overcome limitations in the old IPv4 system and ensure there are enough addresses available into the next century. [3] The document outlines some of the key features and improvements IPv6 will provide, such as larger packet sizes, better security features, quality of service support, and mobility support.
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?Mark Smith
The document discusses network virtualization and various methods used to encapsulate virtual network traffic over a physical network. It identifies several opportunities to enhance existing encapsulation methods by leveraging IPv6 features. These include using the IPv6 flow label field or interface identifier fields to carry virtual network context identifiers in order to facilitate load balancing. It also proposes using IPv6 multicast scoping and address allocation to simplify virtual network multicast configurations. In total, the document outlines nine potential opportunities to improve virtual network encapsulation through the use of IPv6.
Yoshihiro Nakajima presented on software stacks that enable software-defined networking (SDN) and network functions virtualization (NFV). He discussed trends in SDN and NFV, introduced the Lagopus SDN software switch project, and described how Data Plane Development Kit (DPDK) helps optimize packet processing performance. The goal of his talk was to provide an NFV/SDN-aware software stack capable of 100Gbps switching through high-performance packet processing.
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
Henrik Strøm discusses IPv6 security from an attacker's perspective. He outlines 6 points on how attackers can exploit IPv6 vulnerabilities, including using IPv6 to bypass IPv4 access controls when on a local network, spoofing router advertisements to hijack traffic, using tunneling to enable inbound and outbound connectivity, and launching denial of service attacks. He recommends network administrators decide how to implement IPv6 security, monitor for IPv6 traffic, harden clients and servers, and filter all types of IPv6 tunneling. Further reading suggests there is still significant work needed on IPv6 firewalling and many IPv4 issues have been transferred to IPv6.
BGP Flowspec (RFC5575) Case study and DiscussionAPNIC
BGP Flowspec is a technique for distributing flow specification rules via BGP. It allows an ISP to dynamically distribute filtering and redirection rules to mitigate DDoS attacks. The document discusses several real-world use cases where BGP Flowspec was deployed to successfully block large DDoS attacks in a targeted manner without affecting legitimate traffic. However, interoperability between vendors and scalability challenges remain open issues requiring further work and testing.
Short overview on the evolution of NFC to accommodate broader IoT use cases including security, two-factor authentication and other applications of long range, low power wireless networking.
This document summarizes an article about SDN, OpenFlow, and the ONF. It discusses how OpenFlow and SDN are emerging technologies that have the potential to enable network innovation and optimize costs. It also introduces the Open Networking Foundation (ONF) and how the community around SDN and OpenFlow has grown rapidly.
This document provides an overview of Vector Packet Processing (VPP), an open source packet processing platform developed as part of the FD.io project. VPP is based on DPDK for high performance packet processing in userspace. It includes a full networking stack and can perform L2/L3 forwarding and routing at speeds of over 14 million packets per second on a single core. VPP processing is divided into individual nodes connected by a graph. Packets are passed between nodes as vectors to support batch processing. VPP supports both single and multicore modes using different threading models. It can be used to implement routers, switches, and other network functions and topologies.
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other ObservationsMark Smith
The document discusses issues encountered when testing and evaluating residential customer premise equipment (CPE) implementations of IPv6. Some key issues included CPE sending unsolicited router advertisements too frequently, not properly decrementing prefix lifetimes, setting an incorrect current hop limit value, using non-unique local IPv6 addresses, and not supporting newer transport protocols like SCTP. The document emphasizes the importance of thorough testing and RFC compliance for CPE in order to ensure stable and interoperable IPv6 connectivity and services.
Openflow allows for external control of networking devices through the separation of the control plane and forwarding plane. It defines a standardized protocol and API for an external controller to program the forwarding tables of Openflow-enabled switches. The controller installs flow entries into flow tables on switches to determine how packets should be matched and processed. This provides programmability of the network and flexibility in how traffic is routed.
This document discusses various topics related to high-performance packet processing, including software and hardware switches/routers, ASICs, kernel bypass techniques like DPDK and netmap, and frameworks like pf_ring and FD.IO. It compares x86 CPUs to ASICs, discusses challenges of packet processing on general-purpose OSes, and explains how techniques like zero-copy, RDMA, and TCP offloading can improve performance.
Martin J Levy - Hurricane Electric - The IPv6 global view - norway ipv6 - apr...IKT-Norge
The document discusses Hurricane Electric's IPv6 network and services. It notes that Hurricane Electric has over a decade of experience with IPv6 and currently operates one of the largest IPv6 backbones globally. The presentation examines questions around IPv6 deployment worldwide and the readiness of the IPv6 routing table for real-world use. Tools for checking global IPv6 routing and statistics, such as Hurricane Electric's BGP monitoring site, are demonstrated.
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...gogo6
gogo6 IPv6 Video Series. Event, presentation and speaker details below:
EVENT
gogoNET LIVE! 3: Enterprise wide Migration. http://gogonetlive.com
November 12 – 14, 2012 at San Jose State University, California
Agenda: http://gogonetlive.com/4105/gogonetlive3-agenda.asp
PRESENTATION
Deploying IPv6 in Cisco's Labs
Presentation video: http://www.gogo6.com/video/deploying-ipv6-in-cisco-s-labs-by-robert-beckett-at-gogonet-live
Interview video: http://www.gogo6.com/video/interview-with-robert-beckett-at-gogonet-live-3-ipv6-conference
SPEAKER
Robert Beckett - Services Technical Leader, Cisco Systems
Bio/Profile: http://www.gogo6.com/profile/RobertBeckett
MORE
Learn more about IPv6 on the gogoNET social network
http://www.gogo6.com
Get free IPv6 connectivity with Freenet6
http://www.gogo6.com/Freenet6
Subscribe to the gogo6 IPv6 Channel on YouTube
http://www.youtube.com/subscription_center?add_user=gogo6videos
Follow gogo6 on Twitter
http://twitter.com/gogo6inc
Like gogo6 on Facebook
http://www.facebook.com/pages/IPv6-products-community-and-services-gogo6/161626696777
This is an overview of OpenFlow Networking. Derived from a talk presented at the Open Networking Summit, it talks about the motivations for OpenFlow, the details of the protocol, and the current state of hardware and software.
This document provides an overview and comparison of various source control systems, including Subversion (SVN), Git, Bazaar (Bzr), and Mercurial (Hg). It discusses features of centralized and distributed version control systems. Key centralized systems include SVN, while distributed systems include Git, Bzr, and Hg. The document compares aspects like creators, users, licenses, and documentation quality. It also covers concepts like local repositories, snapshots vs changesets, and branching in distributed version control. Hosted code solutions and social coding aspects are briefly outlined.
Update on current state of 3G and IPv6 deployment .
"The State of 3G/GPRS IPv6 Deployment", North American IPv6 Technology Conference, September 20th, 2005.
This document discusses IPv6 support in 2G and 3G networks. It notes that IPv6 addresses some key limitations of IPv4, including limited address space and complexity from practices like NAT. It outlines IPv6 status in various standards bodies and vendor support. It describes how IPv6 enables important applications in 3G networks like IMS and peer-to-peer applications. It also discusses transition challenges, including the need to avoid NATs between PoC clients and servers due to UDP port timeouts.
Eric Vyncke - Layer-2 security, ipv6 norwayIKT-Norge
The document discusses IPv6 first hop security features like DHCP snooping and dynamic ARP inspection for IPv6. It provides an overview of the security issues with IPv6 neighbor discovery such as router advertisements being sent without authentication, allowing for man-in-the-middle attacks and denial of service. It then describes various IPv6 first hop security features that can help mitigate these issues, such as RA guard, DHCP guard, and IPv6 neighbor discovery inspection.
Jan Zorz - IPv6 and mobile emergency response teamsIKT-Norge
Jan Žorž presented on his work with IPv6 and emergency response systems. He discussed the GEN6 project which is developing IPv6-enabled self-organizing systems for emergency teams. As part of this, Jan Žorž is leading a Slovenian pilot project that will deploy an IPv6 network for a fire department to demonstrate seamless connectivity, automatic configuration, mobility, and secure transmission of data, voice, and video across different network technologies. Jan Žorž also discussed his role in updating the RIPE-501 IPv6 procurement document and demonstrated the DSMIPv6-TLS technology for secure mobile IPv6 communications.
DPDK Summit 2015 - NTT - Yoshihiro NakajimaJim St. Leger
DPDK Summit 2015 in San Francisco.
NTT presentation by Yoshihiro Nakajima.
For additional details and the video recording please visit www.dpdksummit.com.
DPDK Summit 2015 - Sprint - Arun RajagopalJim St. Leger
DPDK Summit 2015 in San Francisco.
Presentation by Arun Rajagopal, Sprint, and Sameh Gobriel, Intel.
For additional details and the video recording please visit www.dpdksummit.com.
This document discusses security considerations for IPv6. It notes that default IPv6 subnets have 264 addresses, making network scanning impractical. ICMPv6 limits ping responses to limit reconnaissance. IPv6 uses multicast for functionality replaced by broadcast in IPv4, preventing amplification attacks. Privacy extensions for IPv6 addresses inhibit device tracking but complicate internal network management. Overall, best practices for securing IPv4 against worms, sniffing and other attacks also apply to IPv6.
The document discusses the upcoming introduction of IPv6. [1] IPv6 is a new standard for IP numbering that will provide more IP addresses as the current IPv4 addresses are running out. [2] It will help overcome limitations in the old IPv4 system and ensure there are enough addresses available into the next century. [3] The document outlines some of the key features and improvements IPv6 will provide, such as larger packet sizes, better security features, quality of service support, and mobility support.
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?Mark Smith
The document discusses network virtualization and various methods used to encapsulate virtual network traffic over a physical network. It identifies several opportunities to enhance existing encapsulation methods by leveraging IPv6 features. These include using the IPv6 flow label field or interface identifier fields to carry virtual network context identifiers in order to facilitate load balancing. It also proposes using IPv6 multicast scoping and address allocation to simplify virtual network multicast configurations. In total, the document outlines nine potential opportunities to improve virtual network encapsulation through the use of IPv6.
Yoshihiro Nakajima presented on software stacks that enable software-defined networking (SDN) and network functions virtualization (NFV). He discussed trends in SDN and NFV, introduced the Lagopus SDN software switch project, and described how Data Plane Development Kit (DPDK) helps optimize packet processing performance. The goal of his talk was to provide an NFV/SDN-aware software stack capable of 100Gbps switching through high-performance packet processing.
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
Henrik Strøm discusses IPv6 security from an attacker's perspective. He outlines 6 points on how attackers can exploit IPv6 vulnerabilities, including using IPv6 to bypass IPv4 access controls when on a local network, spoofing router advertisements to hijack traffic, using tunneling to enable inbound and outbound connectivity, and launching denial of service attacks. He recommends network administrators decide how to implement IPv6 security, monitor for IPv6 traffic, harden clients and servers, and filter all types of IPv6 tunneling. Further reading suggests there is still significant work needed on IPv6 firewalling and many IPv4 issues have been transferred to IPv6.
BGP Flowspec (RFC5575) Case study and DiscussionAPNIC
BGP Flowspec is a technique for distributing flow specification rules via BGP. It allows an ISP to dynamically distribute filtering and redirection rules to mitigate DDoS attacks. The document discusses several real-world use cases where BGP Flowspec was deployed to successfully block large DDoS attacks in a targeted manner without affecting legitimate traffic. However, interoperability between vendors and scalability challenges remain open issues requiring further work and testing.
Short overview on the evolution of NFC to accommodate broader IoT use cases including security, two-factor authentication and other applications of long range, low power wireless networking.
This document summarizes an article about SDN, OpenFlow, and the ONF. It discusses how OpenFlow and SDN are emerging technologies that have the potential to enable network innovation and optimize costs. It also introduces the Open Networking Foundation (ONF) and how the community around SDN and OpenFlow has grown rapidly.
This document provides an overview of Vector Packet Processing (VPP), an open source packet processing platform developed as part of the FD.io project. VPP is based on DPDK for high performance packet processing in userspace. It includes a full networking stack and can perform L2/L3 forwarding and routing at speeds of over 14 million packets per second on a single core. VPP processing is divided into individual nodes connected by a graph. Packets are passed between nodes as vectors to support batch processing. VPP supports both single and multicore modes using different threading models. It can be used to implement routers, switches, and other network functions and topologies.
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other ObservationsMark Smith
The document discusses issues encountered when testing and evaluating residential customer premise equipment (CPE) implementations of IPv6. Some key issues included CPE sending unsolicited router advertisements too frequently, not properly decrementing prefix lifetimes, setting an incorrect current hop limit value, using non-unique local IPv6 addresses, and not supporting newer transport protocols like SCTP. The document emphasizes the importance of thorough testing and RFC compliance for CPE in order to ensure stable and interoperable IPv6 connectivity and services.
Openflow allows for external control of networking devices through the separation of the control plane and forwarding plane. It defines a standardized protocol and API for an external controller to program the forwarding tables of Openflow-enabled switches. The controller installs flow entries into flow tables on switches to determine how packets should be matched and processed. This provides programmability of the network and flexibility in how traffic is routed.
This document discusses various topics related to high-performance packet processing, including software and hardware switches/routers, ASICs, kernel bypass techniques like DPDK and netmap, and frameworks like pf_ring and FD.IO. It compares x86 CPUs to ASICs, discusses challenges of packet processing on general-purpose OSes, and explains how techniques like zero-copy, RDMA, and TCP offloading can improve performance.
Martin J Levy - Hurricane Electric - The IPv6 global view - norway ipv6 - apr...IKT-Norge
The document discusses Hurricane Electric's IPv6 network and services. It notes that Hurricane Electric has over a decade of experience with IPv6 and currently operates one of the largest IPv6 backbones globally. The presentation examines questions around IPv6 deployment worldwide and the readiness of the IPv6 routing table for real-world use. Tools for checking global IPv6 routing and statistics, such as Hurricane Electric's BGP monitoring site, are demonstrated.
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...gogo6
gogo6 IPv6 Video Series. Event, presentation and speaker details below:
EVENT
gogoNET LIVE! 3: Enterprise wide Migration. http://gogonetlive.com
November 12 – 14, 2012 at San Jose State University, California
Agenda: http://gogonetlive.com/4105/gogonetlive3-agenda.asp
PRESENTATION
Deploying IPv6 in Cisco's Labs
Presentation video: http://www.gogo6.com/video/deploying-ipv6-in-cisco-s-labs-by-robert-beckett-at-gogonet-live
Interview video: http://www.gogo6.com/video/interview-with-robert-beckett-at-gogonet-live-3-ipv6-conference
SPEAKER
Robert Beckett - Services Technical Leader, Cisco Systems
Bio/Profile: http://www.gogo6.com/profile/RobertBeckett
MORE
Learn more about IPv6 on the gogoNET social network
http://www.gogo6.com
Get free IPv6 connectivity with Freenet6
http://www.gogo6.com/Freenet6
Subscribe to the gogo6 IPv6 Channel on YouTube
http://www.youtube.com/subscription_center?add_user=gogo6videos
Follow gogo6 on Twitter
http://twitter.com/gogo6inc
Like gogo6 on Facebook
http://www.facebook.com/pages/IPv6-products-community-and-services-gogo6/161626696777
This is an overview of OpenFlow Networking. Derived from a talk presented at the Open Networking Summit, it talks about the motivations for OpenFlow, the details of the protocol, and the current state of hardware and software.
This document provides an overview and comparison of various source control systems, including Subversion (SVN), Git, Bazaar (Bzr), and Mercurial (Hg). It discusses features of centralized and distributed version control systems. Key centralized systems include SVN, while distributed systems include Git, Bzr, and Hg. The document compares aspects like creators, users, licenses, and documentation quality. It also covers concepts like local repositories, snapshots vs changesets, and branching in distributed version control. Hosted code solutions and social coding aspects are briefly outlined.
This document summarizes Patrick McGarry's presentation on Ceph in the ecosystem. The presentation introduced Ceph's role in various communities and open source projects, how to get involved in the Ceph community through code contributions and mailing lists, and Ceph's integrations with Linux distributions, orchestration tools, and cloud platforms like OpenStack and CloudStack. The presentation concluded by thanking attendees and inviting any questions or comments.
Apache hadoop 3.x state of the union and upgrade guidance - Strata 2019 NYWangda Tan
The document discusses Apache Hadoop 3.x updates and provides guidance for upgrading to Hadoop 3. It covers community updates, features in YARN, Submarine, HDFS, and Ozone. Release plans are outlined for Hadoop, Submarine, and upgrades from Hadoop 2 to 3. Express upgrades are recommended over rolling upgrades for the major version change. The session summarizes that Hadoop 3 is an eagerly awaited release with many successful production uses, and that now is a good time for those not yet upgraded.
Toward a Methodology to turn Smalltak code into FPGAESUG
This document proposes a methodology to use Smalltalk for hardware/software co-design of FPGA applications. Smalltalk would be used as a high-level language to describe and test FPGA hardware designs. Critical parts of a Smalltalk robotic application are identified and projected onto an FPGA to gain performance. An experiment projects image processing from a camera onto an FPGA, achieving a processing time of 2.5ms compared to 73ms in Smalltalk. Future work includes developing the modeling methodology for hardware design using Smalltalk and integrating Pharo and FPGA interaction for software/hardware co-design.
Hadoop Summit San Jose 2013: Compression Options in Hadoop - A Tale of Tradeo...Sumeet Singh
Yahoo! is one of the most-visited web sites in the world. It runs one of the largest private cloud infrastructures, one that operates on petabytes of data every day. Being able to store and manage that data well is essential to the efficient functioning of Yahoo's Hadoop clusters. A key component that enables this efficient operation is data compression.
With regard to compression algorithms, there is an underlying tension between compression ratio and compression performance. Consequently, Hadoop provides support for several compression algorithms, including gzip, bzip2, Snappy, LZ4 and others. This plethora of options can make it difficult for users to select appropriate codecs for their MapReduce jobs. This paper attempts to provide guidance in that regard. Performance results with Gridmix and with several corpuses of data are presented.
The paper also describes enhancements we have made to the bzip2 codec that improve its performance. This will be of particular interest to the increasing number of users operating on "Big Data" who require the best possible ratios. The impact of using the Intel IPP libraries is also investigated; these have the potential to improve performance significantly. Finally, a few proposals for future enhancements to Hadoop in this area are outlined.
West is a command line tool that manages Zephyr projects. It initializes workspaces, updates repositories, and provides commands for common development tasks like building, flashing, and debugging. West separates the core tool functionality from Zephyr-specific extensions, allowing it to manage multiple projects. When initializing a workspace, West clones the main Zephyr repository and any dependencies, creating a reproducible development environment.
libdash is a library that provides an object orient (OO) interface to the MPEG-DASH standard.
Features
- Cross platform build system based on cmake that includes Windows, Linux and Mac.
- Open source available and licensed under the LGPL.
- Implements the full MPEG-DASH standard according to ISO/IEC 23009-1, Information Technology Dynamic Adaptive Streaming over HTTP (DASH) Part 1: Media Presentation Description and Segment Formats
- Handles the download and xml parsing of the MPD. Based on that it provides an OO based interface to the MPD.
Media elements, e.g., SegmentURL, SegmentTemplate, etc., are downloadable in that OO based structure and can be downloaded through libdash, which internally uses libcurl.
- Therefore basically all protocols that libcurl supports, e.g., HTTP, FTP, etc. are supported by libdash.
- However it also provides a configurable download interface, which enables the use of external connections that can be implemented by the user of the library for the download of media segments.
- The use of such external connections will be shown in the libdash_networkpart_test project which is part of libdash solution and also part of the cross platform cmake system and therefore usable on Windows, Linux and Mac.
- The project contains a sample multimedia player that is based on ffmpeg which uses libdash for the playback of one of our dataset MPDs.
- The development is based on Windows, therefore the code contains a VS10 solution with additional tests and the sample multimedia player.
Yahoo! is one of the most-visited web sites in the world. It runs one of the largest private cloud infrastructures, one that operates on petabytes of data every day. Being able to store and manage that data well is essential to the efficient functioning of Yahoo!`s Hadoop clusters. A key component that enables this efficient operation is data compression. With regard to compression algorithms, there is an underlying tension between compression ratio and compression performance. Consequently, Hadoop provides support for several compression algorithms, including gzip, bzip2, Snappy, LZ4 and others. This plethora of options can make it difficult for users to select appropriate codecs for their MapReduce jobs. This talk attempts to provide guidance in that regard. Performance results with Gridmix and with several corpuses of data are presented. The talk also describes enhancements we have made to the bzip2 codec that improve its performance. This will be of particular interest to the increasing number of users operating on “Big Data” who require the best possible ratios. The impact of using the Intel IPP libraries is also investigated; these have the potential to improve performance significantly. Finally, a few proposals for future enhancements to Hadoop in this area are outlined.
Speaker: Govind Kamat, Member of Technical Staff, Yahoo!
This presentation summarizes Logic Fruit Technologies' expertise in protocol development, DSP, and FPGA design. It focuses on their work implementing high-speed serial protocols like HDMI, CPRI, and PCIe. They have experience developing wireless PHY layers for protocols like WiMAX and LTE. They also specialize in FPGA design running at high speeds, handling multiple clock domains and protocols up to 8Gbps. Their software expertise includes protocol stack development, compliance testing, and protocol analysis tools.
This document summarizes Patrick McGarry's presentation on Ceph and its role in the ecosystem. The presentation covered Ceph's involvement in various Linux distributions, open source projects, orchestration tools, cloud platforms, and upcoming Ceph Days sessions. It highlighted how Ceph provides storage solutions for projects like OpenStack, CloudStack, XenServer, and Hadoop. It also discussed tools for deploying and managing Ceph clusters, such as Chef, Puppet, Ansible, Salt, Juju, and ceph-deploy.
The document describes Collabograte, an integration platform for collaboration components. It aims to provide an open platform for integrating components like wikis, blogs, mailing lists, and chat while maximizing user freedom and flexibility. It uses Puppet for configuration management and integrates components like OpenLDAP, MediaWiki, WordPress, Postfix, Cyrus, and ejabberd. Collabograte provides virtual machine images and Puppet modules to configure the integrated stack on a Linux host.
Distributed Erlang systems aim to be decentralized, distributed, homogeneous, and fault tolerant. Nodes use only local data and there is no global state or reliance on physical time. Cluster membership is handled through a configuration file or gossip protocol. Load balancing uses techniques like consistent hashing. Liveness is checked through Erlang tools and custom mechanisms. Soft state through gossip protocols can provide an alternative to global state. Shipping code embedded in a runtime and upgrading through reboots helps manage distributed systems.
For the full video of this presentation, please visit:
http://www.embedded-vision.com/platinum-members/luxoft/embedded-vision-training/videos/pages/may-2016-embedded-vision-summit
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Alexey Rybakov, Senior Director at LUXOFT, presents the "Making Computer Vision Software Run Fast on Your Embedded Platform" tutorial at the May 2016 Embedded Vision Summit.
Many computer vision algorithms perform well on desktop class systems, but struggle on resource constrained embedded platforms. This how-to talk provides a comprehensive overview of various optimization methods that make vision software run fast on low power, small footprint hardware that is widely used in automotive, surveillance, and mobile devices. The presentation explores practical aspects of deep algorithm and software optimization such as thinning of input data, using dynamic regions of interest, mastering data pipelines and memory access, overcoming compiler inefficiencies, and more.
High availability (HA) aims to ensure a prearranged level of operational performance by increasing the mean time between failures (MTBF) and decreasing the mean time to repair (MTTR). When implementing HA for a DMF system, considerations include redundant hardware, limiting single points of failure, minimizing downtime during repairs and upgrades, and having mechanisms to quickly address failures like STONITH (shoot the other node). Real-world HA often involves initially setting up a single DMF server and testing it before converting to an active-passive HA configuration with mechanisms to monitor the system and quickly transition services between nodes if needed.
Linux Distribution Collaboration …on a Mainframe!All Things Open
Presented at All Things Open 2023
Presented by Elizabeth K. Joseph - IBM
Title: Linux Distribution Collaboration …on a Mainframe!
Abstract: Linux has run on the mainframe architecture (s390x) for over 20 years now, and there’s even Linux-only mainframe hardware! But tight collaboration between the Linux distributions is rather new. Enter the Open Mainframe Project Linux Distributions Working Group, founded in late 2021.
Bringing together various Linux distributions, both corporate-backed and community-driven, representatives from openSUSE, Debian, Fedora, SUSE, and more immediately joined the effort to share bug reports and patches that impact all the distributions. Issues are often shared and discussed on the mailing list, and more complicated topics covered during the monthly meetings. The working group has a number of success stories that will be shared.
Future potential issues are also tackled, and notes shared about upstream changes that may soon impact the package processes. In the latest effort, the team has started thinking about actual upstream projects to invite to our group to be more pro-active about changes that may cause problems on the s390x architecture.
But more importantly, this is a story about community and collaboration. Many people view the various Linux distributions as a competitive space, but like so much of the open source software community, we are all more successful when we share knowledge about our core. The success of this working group, and growing enthusiasm for it from new Linux distributions who are joining, is a great example of this.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
2023 conference: https://2023.allthingsopen.org/
Eric Fesler discusses using open source software. He explains that open source ensures certain software freedoms like free redistribution and access to source code. Fesler recommends choosing open source by defining needs, identifying options from directories like SourceForge, and doing a detailed review of aspects like community support and licensing. He advises working with open source by selecting best of breed components, managing version compatibility, and standardizing libraries.
Python is gaining popularity as a scripting language, with its usage share growing from 4.7% to 5% between September 2007 and September 2008. There are multiple implementations of Python including CPython, Jython, and IronPython. Sun is working on tools like NBPython to improve the Python development experience in NetBeans, as well as modifying the JVM through projects like JSR-292 and invokedynamic to better support dynamic languages like Python. Challenges for Python's growth include migration, packaging, performance, concurrency, and marketing.
Similar to DASH7 Webinar: Working With Open Tag For Mode 2 (20)
An overview of DASH7 wireless technology in 2012 by Blackbird Technology. First half for non-technical audiences, second half more technical but hopefully readable by non-technical audiences.
The document summarizes information about joining the DASH7 team/alliance, which works on developing DASH7 technology standards for wireless sensor networking. Some key points:
- DASH7 allows long range and low power connectivity between devices, and has benefits over other technologies like WiFi and Bluetooth.
- The alliance aims to improve the DASH7 ISO standard, certify interoperability, and market DASH7 to open new markets.
- Companies involved in hardware, software, or deploying sensor networks could benefit from joining the alliance to influence standards, access early specifications, and network with others using DASH7.
This document proposes the need for a standardized "Check-in 2.0" system to improve upon current check-in technologies. It outlines some of the key limitations of current check-in methods like GPS, cellular location, Wi-Fi and ultrasound that make them inaccurate, battery inefficient, prone to fraud, and lacking a global standard. The document argues that a standardized approach is needed to drive adoption, ensure interoperability across devices, and fully realize the business opportunities of precise location-based mobile marketing. It proposes requirements for an ideal check-in standard including being automatic, precise, battery-friendly, low latency, cross-platform, inexpensive, easy to implement and secure.
The document discusses the benefits of DASH7 technology. It was developed in 2002 for military use and has a range of 10-2000 meters. DASH7 uses 433 MHz frequency, has a data rate of 28 kbps, and can be extended for additional features. It provides extremely low power, high performance, and low cost wireless communication compared to other technologies like WiFi, Bluetooth, and Zigbee. The document highlights various DASH7 tools and discusses its evolution and potential applications through 2010-2011 as it becomes more standardized and optimized.
This document provides an agenda for a briefing on DASH7 technology and standards. The agenda includes sections on the competition, applications of DASH7, the market opportunity, and the DASH7 ecosystem. Under applications, it discusses uses for supply chain management, measurement and control, and interactive media. It notes the large potential market size in 2018 and outlines the DASH7 Alliance working groups and the Container Security and Sensing Initiative.
The document compares DASH7 and ZigBee wireless technologies. It summarizes that DASH7 has longer range, lower power consumption, and is more cost effective than ZigBee over the long term. Specifically, DASH7 has 6x the range of ZigBee at 433MHz and uses wakeup signals to achieve lower latency and power usage compared to ZigBee's scheduling mechanism. The total cost of ownership over 10 years is estimated to be 10x lower for DASH7 devices. DASH7 is also described as more standardized and suitable for a wider range of applications due to its long battery life and low device costs.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.