This session will explain how everything comes together under i4Trust using a reference example and then explain that example in detail. It will bringing the pieces together: Detailed technical review of a reference example: the prerequisites, creating an offering, acquiring rights / activation , & consumption. And setup of components of the i4Trust experimentation framework. Technical session for Local Experts in Data Sharing (LEBDs)
Session 3 - i4Trust components for Identity Management and Access Control i4T...FIWARE
This session consists of two parts. The first part of the session will introduce you to i4Trust IAM components in detail while the second will introduce i4Trust Marketplace Services. Technical session for Local Experts in Data Sharing (LEBDs)
Session 1 - Introduction to i4Trust Data Spaces, building blocks, and roles |...FIWARE
This session will elaborate on the i4Trust overall mission and vision and introduce you to data spaces: how they enable the development of innovative services and what building blocks are required to build data spaces. It will elaborate on what i4Trust is aiming at beyond building blocks which is the creation of a vibrant community. In addition, there will be an introduction to the role of DIHs and to i4Trust open calls. The session for Local Experts in Data Sharing (LEBDs) & Ambassadors
Session 8 - Creating Data Processing Services | Train the Trainers ProgramFIWARE
This technical session for Local Experts in Data Sharing (LEBDs), this session will explain how to create data processing services that are key to i4Trust.
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
FIWARE Wednesday Webinars - How to Design DataModelsFIWARE
How to Design DataModels - 8th May 2019
Corresponding webinar recording: https://youtu.be/T_1DpKf6C_c
Understanding and applying Standard Data Models.
Chapter: Core
Difficulty: 3
Audience: Technical Domain Specific
Presenter: José Manuel Cantera (Senior Standardization Expert, FIWARE Foundation)
FIWARE Wednesday Webinars - Introduction to NGSI-LDFIWARE
Introduction to NGSI-LD Webinar - 27th May 2020
Corresponding webinar recording: https://youtu.be/rZ13IyLpAtA
A data-model driven and linked data first introduction for developers to NGSI-LD and JSON-LD.
Chapter: Core
Difficulty: 3
Audience: Any Technical
Presenter: Jason Fox (Senior Technical Evangelist, FIWARE Foundation)
Session 3 - i4Trust components for Identity Management and Access Control i4T...FIWARE
This session consists of two parts. The first part of the session will introduce you to i4Trust IAM components in detail while the second will introduce i4Trust Marketplace Services. Technical session for Local Experts in Data Sharing (LEBDs)
Session 1 - Introduction to i4Trust Data Spaces, building blocks, and roles |...FIWARE
This session will elaborate on the i4Trust overall mission and vision and introduce you to data spaces: how they enable the development of innovative services and what building blocks are required to build data spaces. It will elaborate on what i4Trust is aiming at beyond building blocks which is the creation of a vibrant community. In addition, there will be an introduction to the role of DIHs and to i4Trust open calls. The session for Local Experts in Data Sharing (LEBDs) & Ambassadors
Session 8 - Creating Data Processing Services | Train the Trainers ProgramFIWARE
This technical session for Local Experts in Data Sharing (LEBDs), this session will explain how to create data processing services that are key to i4Trust.
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
FIWARE Wednesday Webinars - How to Design DataModelsFIWARE
How to Design DataModels - 8th May 2019
Corresponding webinar recording: https://youtu.be/T_1DpKf6C_c
Understanding and applying Standard Data Models.
Chapter: Core
Difficulty: 3
Audience: Technical Domain Specific
Presenter: José Manuel Cantera (Senior Standardization Expert, FIWARE Foundation)
FIWARE Wednesday Webinars - Introduction to NGSI-LDFIWARE
Introduction to NGSI-LD Webinar - 27th May 2020
Corresponding webinar recording: https://youtu.be/rZ13IyLpAtA
A data-model driven and linked data first introduction for developers to NGSI-LD and JSON-LD.
Chapter: Core
Difficulty: 3
Audience: Any Technical
Presenter: Jason Fox (Senior Technical Evangelist, FIWARE Foundation)
Introduction to Information Model. Which types of representation of Information Model are used in FIWARE. What are the differences between NGSIv2 and NGSI-LD. Where can I get details about Data Models in use?
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
Tutorial describing how to protect Fiware Orion Context Broker with Fiware Keyrock IdM and Wilma PEP Proxy. The Keyrock is used to manage the identities and to provide OAuth2 tokens. The Wilma is used to intercept the requests to Orion and verify the user credentials through the sent token. With this token is possible to verify the authenticity of the user, checking her identity, and verify if the user is authorized to access Orion.
FIWARE Global Summit - NGSI-LD - NGSI with Linked DataFIWARE
Presentation by Martin Bauer
Senior Researcher, NEC Labs Europe
José Manuel Cantera
Senior Standardization Expert, FIWARE Foundation
FIWARE Global Summit
27-28 November 2018
Malaga, Spain
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project and IShare Foundation. The core part of this virtual training camp (27 Jun - 01 Jul 2022) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using NGSI-LD (the simple yet powerful open standard API enabling to publish and access digital twin data) combined with common smart data models
In addition, it covers the supplementary FIWARE technologies used to implement the rest of functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data, and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historic big data.
Extending this core part, the training camp also cover how you can easily integrate FIWARE systems with blockchain networks to create audit-proof logs of processes and ensure transparency.
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
FIWARE Overview Webinar - 27th March 2019
Corresponding webinar recording: https://youtu.be/97JsnnpPLrA
Chapter: Fundamentals
Difficulty: 0
Audience: Anyone
Basic introduction describing what FIWARE is, why you need it and how the elements of the FIWARE Catalogue can help accelerate the development of your Smart Solution.
FIWARE Training: Identity Management and Access ControlFIWARE
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project and IShare Foundation. The core part of this virtual training camp (27 Jun - 01 Jul 2022) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using NGSI-LD (the simple yet powerful open standard API enabling to publish and access digital twin data) combined with common smart data models
In addition, it covers the supplementary FIWARE technologies used to implement the rest of functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data, and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historic big data.
Extending this core part, the training camp also cover how you can easily integrate FIWARE systems with blockchain networks to create audit-proof logs of processes and ensure transparency.
Core Context Management Webinar - 20th March 2019
Corresponding webinar recording: https://youtu.be/pK4GgYjlmdY
Introduction to Core Context Management. Learn about the NGSI DataModel and the NSGI interface, registrations, subscription etc.
Chapter: Core
Difficulty: 1
Audience: Anyone
Presenter: Jason Fox (Senior Technical Evangelist, FIWARE Foundation)
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project and IShare Foundation. The core part of this virtual training camp (27 Jun - 01 Jul 2022) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using NGSI-LD (the simple yet powerful open standard API enabling to publish and access digital twin data) combined with common smart data models
In addition, it covers the supplementary FIWARE technologies used to implement the rest of functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data, and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historic big data.
Extending this core part, the training camp also cover how you can easily integrate FIWARE systems with blockchain networks to create audit-proof logs of processes and ensure transparency.
FIWARE Wednesday Webinars - How to Secure FIWARE ArchitecturesFIWARE
How to Secure FIWARE Architectures - 10th April 2019
Corresponding webinar recording: http://bit.ly/2UsvtzZ
Introduction to basic Identity Management and Security within the FIWARE Catalogue. How to secure your microservices within a Smart Solution.
Chapter: Security
Difficulty: 1
Audience: Any Technical
Presenter: Jason Fox (Senior Technical Evangelist, FIWARE Foundation)
Creating a Context-Aware solution, Complex Event Processing with FIWARE PerseoFernando Lopez Aguilar
Introduction to Complex Event Processing (CEP). How FIWARE deals with CEP through FIWARE Perseo. How to connect FIWARE Perseo with FIWARE Orion Context Broker. How can we define an event with Event Processing Language (EPL) and what are the predefined actions to include in FIWARE Perseo.
Kong, Keyrock, Keycloak, i4Trust - Options to Secure FIWARE in ProductionFIWARE
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
Bringing the Pieces Together - Detailed Walkthrough of the Reference ExampleFIWARE
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
i4Trust's objective is to boost the development of innovative services around new data value chains in multiple sectors providing the right tools, training, mentoring, and initial funding for the creation of Data Spaces, enabling trustworthy and effective Data Sharing.
Info-Sessions is series of events introducing the initiative. In this first session, we focused on presenting the i4Trust initiative and the technology foundation. This also includes a brief overview of how to join the i4Trust Programme.
Introduction to Information Model. Which types of representation of Information Model are used in FIWARE. What are the differences between NGSIv2 and NGSI-LD. Where can I get details about Data Models in use?
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
Tutorial describing how to protect Fiware Orion Context Broker with Fiware Keyrock IdM and Wilma PEP Proxy. The Keyrock is used to manage the identities and to provide OAuth2 tokens. The Wilma is used to intercept the requests to Orion and verify the user credentials through the sent token. With this token is possible to verify the authenticity of the user, checking her identity, and verify if the user is authorized to access Orion.
FIWARE Global Summit - NGSI-LD - NGSI with Linked DataFIWARE
Presentation by Martin Bauer
Senior Researcher, NEC Labs Europe
José Manuel Cantera
Senior Standardization Expert, FIWARE Foundation
FIWARE Global Summit
27-28 November 2018
Malaga, Spain
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project and IShare Foundation. The core part of this virtual training camp (27 Jun - 01 Jul 2022) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using NGSI-LD (the simple yet powerful open standard API enabling to publish and access digital twin data) combined with common smart data models
In addition, it covers the supplementary FIWARE technologies used to implement the rest of functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data, and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historic big data.
Extending this core part, the training camp also cover how you can easily integrate FIWARE systems with blockchain networks to create audit-proof logs of processes and ensure transparency.
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
FIWARE Overview Webinar - 27th March 2019
Corresponding webinar recording: https://youtu.be/97JsnnpPLrA
Chapter: Fundamentals
Difficulty: 0
Audience: Anyone
Basic introduction describing what FIWARE is, why you need it and how the elements of the FIWARE Catalogue can help accelerate the development of your Smart Solution.
FIWARE Training: Identity Management and Access ControlFIWARE
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project and IShare Foundation. The core part of this virtual training camp (27 Jun - 01 Jul 2022) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using NGSI-LD (the simple yet powerful open standard API enabling to publish and access digital twin data) combined with common smart data models
In addition, it covers the supplementary FIWARE technologies used to implement the rest of functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data, and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historic big data.
Extending this core part, the training camp also cover how you can easily integrate FIWARE systems with blockchain networks to create audit-proof logs of processes and ensure transparency.
Core Context Management Webinar - 20th March 2019
Corresponding webinar recording: https://youtu.be/pK4GgYjlmdY
Introduction to Core Context Management. Learn about the NGSI DataModel and the NSGI interface, registrations, subscription etc.
Chapter: Core
Difficulty: 1
Audience: Anyone
Presenter: Jason Fox (Senior Technical Evangelist, FIWARE Foundation)
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project and IShare Foundation. The core part of this virtual training camp (27 Jun - 01 Jul 2022) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using NGSI-LD (the simple yet powerful open standard API enabling to publish and access digital twin data) combined with common smart data models
In addition, it covers the supplementary FIWARE technologies used to implement the rest of functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data, and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historic big data.
Extending this core part, the training camp also cover how you can easily integrate FIWARE systems with blockchain networks to create audit-proof logs of processes and ensure transparency.
FIWARE Wednesday Webinars - How to Secure FIWARE ArchitecturesFIWARE
How to Secure FIWARE Architectures - 10th April 2019
Corresponding webinar recording: http://bit.ly/2UsvtzZ
Introduction to basic Identity Management and Security within the FIWARE Catalogue. How to secure your microservices within a Smart Solution.
Chapter: Security
Difficulty: 1
Audience: Any Technical
Presenter: Jason Fox (Senior Technical Evangelist, FIWARE Foundation)
Creating a Context-Aware solution, Complex Event Processing with FIWARE PerseoFernando Lopez Aguilar
Introduction to Complex Event Processing (CEP). How FIWARE deals with CEP through FIWARE Perseo. How to connect FIWARE Perseo with FIWARE Orion Context Broker. How can we define an event with Event Processing Language (EPL) and what are the predefined actions to include in FIWARE Perseo.
Kong, Keyrock, Keycloak, i4Trust - Options to Secure FIWARE in ProductionFIWARE
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
Bringing the Pieces Together - Detailed Walkthrough of the Reference ExampleFIWARE
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
i4Trust's objective is to boost the development of innovative services around new data value chains in multiple sectors providing the right tools, training, mentoring, and initial funding for the creation of Data Spaces, enabling trustworthy and effective Data Sharing.
Info-Sessions is series of events introducing the initiative. In this first session, we focused on presenting the i4Trust initiative and the technology foundation. This also includes a brief overview of how to join the i4Trust Programme.
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
Presentation about "Trust Your Supplier", a Chainyard solution to enable supplier qualification on a permissioned shared ledger. TYS is implemented on Hyperledger Fabric and works on a permissioned blockchain. It is one of largest consortium evolving in the supply chain space. If you need more info on TYS, SSI, BITA Party Object or just more info on Chainyard, email me at mohan@chainyard.com
10 things to consider when choosing a hosted desktop providerLouisaHDUK
Having taken the decision to move to a hosted platform how do you go about finding the best hosting services provider? We guide you through 10 of the most important questions you should ask any potential partner.
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
The VIP networking lunch will feature a presentation by Keith Junius, Solution Architect, from Veda on ‘Implementing an API Management Platform’. Attendees will hear about how Veda has modernized their B2B API platform by deploying SOA Gateways. Join Layer 7 at this lunch to learn about:
• Design considerations for API management platforms
• Technical and business challenges faced across the whole system lifecycle
• The soft skills required to achieve a successful outcome
• Lessons learned during and after the project
• Benefits realized by the new platform
The Pensions Dashboard project is an important and exciting initiative for the UK consumer with an immense social purpose. It has the potential to significantly improve retirement planning, financial inclusion and consumer engagement with the pensions industry. Origo is working with ForgeRock and the wider industry to bring an enabling infrastructure to market. The solution will securely identify the consumer before orchestrating a search of pensions across the industry. Today we will provide a tour of the project to date. We’ll cover the architecture for identity, attribute exchange and resource sharing; bringing this to life with a demonstration.
Data Works Summit Munich 2017 - Worldpay - Multi Tenancy ClustersDavid Walker
A presentation from the Data Works Summit conference in 2017 that looks how Worldpay, a major payments provider, deployed a secure Hadoop cluster to support multiple business cases in a multi-tenancy cluster.
In 2015/16 Worldpay deployed it's Enterprise Data Platform - a highly secure cluster used for analysis of over 65 Billion card transactions and the subject of last years Hadoop Summit Keynote in Dublin. A year on and we are now rapidly expanding our platform with true multi-tenancy. For our first tenant we have build and deployed the analytics and reporting for our central platforms. Our second tenant is to deploy 'decision engines' into our core business systems. These allow Worldpay to make decisions derived from machine learning on how we authorise and route payments traffic and how these affect the consumer, merchant and other business partners. We are also developing other tenant for systems management and security. This talk will look at what it means to have truly have a single enterprise data lake and multiple tenants that share that data and look forward to how we will extend the platform in 2017 with Hadoop 3.
Internet, Intranet and Extranet
The vast collection of computer networks which form and act as a single huge network for transport of data and messages across distances which can be anywhere from the same office to anywhere in the world.
i4Trust's objective is to boost the development of innovative services around new data value chains in multiple sectors providing the right tools, training, mentoring, and initial funding for the creation of Data Spaces, enabling trustworthy and effective Data Sharing.
Amy Devenney (JISC), Beth Harris (JISC)
This session will detail the process implemented with 13 publishers to collect article-level metadata on open access publications for Jisc transitional agreements throughout 2020 and discuss the challenges encountered. It will also demonstrate how the data collected has allowed Jisc to effectively monitor and evaluate transitional agreements and conclude by outlining recommendations to improve the transparency of the transition to open access.
Big Data LDN 2018: REALISING THE PROMISE OF SELF-SERVICE ANALYTICS WITH DATA ...Matt Stubbs
Date: 13th November 2018
Location: Governance and MDM Theatre
Time: 11:50 - 12:20
Speaker: Mark Pritchard
Organisation: Denodo
About: Self-service analytics promises to liberate business users to perform analytics without the assistance of IT, and this in turn promises to free IT to focus on enhancing the infrastructure.
Join us to learn how data virtualization will allow you to gain real-time access to enterprise-wide data and deliver self-service analytics. We will explore how you can seamlessly unify fragmented data, replace your high-maintenance and high cost data integrations with a single, low-maintenance data virtualization layer; and how you can preserve your data integrity and ensure data lineage is fully traceable.
Driving Business Value with Address Validation at LexisNexisPrecisely
LexisNexis markets legal and news research materials for their customers, and valid, verified addresses are central to customer engagement. Maintaining accurate addresses is also a requirement to properly apply the correct and true sales tax rates, meet statutory obligations, and avoid fines and penalties. Syncsort Trillium underpins the address standardization and geographic validation necessary to enhance customer relationships and manage customer accounts correctly. The LexisNexis eCommerce business also leverages address validation and matching to link customers to account, further protecting the integrity of their data. This webinar looks at how LexisNexis has approached and addressed these critical business needs with Syncsort Trillium.
Similar to Session 4 - Bringing the pieces together - Detailed review of a reference example | Train the Trainers Program (20)
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist. Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist. Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Christoph Mertens_IDSA_Introduction to Data Spaces.pptxFIWARE
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Lukas Künzel Smart City Operating System.pptxFIWARE
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Pierre Golz Der Transformationsprozess im Konzern Stadt.pptxFIWARE
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Dennis Wendland_The i4Trust Collaboration Programme.pptxFIWARE
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das FIWARE Netzwerktreffen für den deutschsprachigen Raum finden nun bereits das dritte Mal statt. Das nächste Treffen wird in Wien stattfinden - einer der lebenswertesten und resilientesten Städte der Welt. Diese Veranstaltung ist Teil des FIWARE Global Summit After Program, das von der Stadt Wien und der Wirtschaftsagentur Wien ausgerichtet wird.
Ziel der Netzwerkveranstaltung ist es, Schlüsselakteure des deutschsprachigen Marktes zu versammeln und zu vernetzen, um dann eine selbsttragende, wachsende und wirkungsvolle Gemeinschaft von FIWARE-Anwendern und interessierten Gleichgesinnten aufzubauen. An diesen Veranstaltungen teilen Sie Ihr Fachwissen, lernen Sie voneinander und erhalten Impulse und Neuigkeiten von den Keynote-Speakern.
Wir werden aktuelle Themen mit höchster Relevanz für die deutschsprachige Community wie Open Source, digitale Zwillinge, Smart Cities Index, nachhaltige Entwicklung, anstehende Förderprojekte usw. behandeln.
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Boris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptxFIWARE
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....FIWARE
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
FGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdfFIWARE
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Das FIWARE Netzwerktreffen für den deutschsprachigen Raum finden nun bereits das dritte Mal statt. Das nächste Treffen wird in Wien stattfinden - einer der lebenswertesten und resilientesten Städte der Welt. Diese Veranstaltung ist Teil des FIWARE Global Summit After Program, das von der Stadt Wien und der Wirtschaftsagentur Wien ausgerichtet wird.
Ziel der Netzwerkveranstaltung ist es, Schlüsselakteure des deutschsprachigen Marktes zu versammeln und zu vernetzen, um dann eine selbsttragende, wachsende und wirkungsvolle Gemeinschaft von FIWARE-Anwendern und interessierten Gleichgesinnten aufzubauen. An diesen Veranstaltungen teilen Sie Ihr Fachwissen, lernen Sie voneinander und erhalten Impulse und Neuigkeiten von den Keynote-Speakern.
Wir werden aktuelle Themen mit höchster Relevanz für die deutschsprachige Community wie Open Source, digitale Zwillinge, Smart Cities Index, nachhaltige Entwicklung, anstehende Förderprojekte usw. behandeln.
Das FIWARE Netzwerktreffen für den deutschsprachigen Raum finden nun bereits das dritte Mal statt. Das nächste Treffen wird in Wien stattfinden - einer der lebenswertesten und resilientesten Städte der Welt. Diese Veranstaltung ist Teil des FIWARE Global Summit After Program, das von der Stadt Wien und der Wirtschaftsagentur Wien ausgerichtet wird.
Ziel der Netzwerkveranstaltung ist es, Schlüsselakteure des deutschsprachigen Marktes zu versammeln und zu vernetzen, um dann eine selbsttragende, wachsende und wirkungsvolle Gemeinschaft von FIWARE-Anwendern und interessierten Gleichgesinnten aufzubauen. An diesen Veranstaltungen teilen Sie Ihr Fachwissen, lernen Sie voneinander und erhalten Impulse und Neuigkeiten von den Keynote-Speakern.
Wir werden aktuelle Themen mit höchster Relevanz für die deutschsprachige Community wie Open Source, digitale Zwillinge, Smart Cities Index, nachhaltige Entwicklung, anstehende Förderprojekte usw. behandeln.
Das FIWARE Netzwerktreffen für den deutschsprachigen Raum finden nun bereits das dritte Mal statt. Das nächste Treffen wird in Wien stattfinden - einer der lebenswertesten und resilientesten Städte der Welt. Diese Veranstaltung ist Teil des FIWARE Global Summit After Program, das von der Stadt Wien und der Wirtschaftsagentur Wien ausgerichtet wird.
Ziel der Netzwerkveranstaltung ist es, Schlüsselakteure des deutschsprachigen Marktes zu versammeln und zu vernetzen, um dann eine selbsttragende, wachsende und wirkungsvolle Gemeinschaft von FIWARE-Anwendern und interessierten Gleichgesinnten aufzubauen. An diesen Veranstaltungen teilen Sie Ihr Fachwissen, lernen Sie voneinander und erhalten Impulse und Neuigkeiten von den Keynote-Speakern.
Wir werden aktuelle Themen mit höchster Relevanz für die deutschsprachige Community wie Open Source, digitale Zwillinge, Smart Cities Index, nachhaltige Entwicklung, anstehende Förderprojekte usw. behandeln.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 6
Session 4 - Bringing the pieces together - Detailed review of a reference example | Train the Trainers Program
1. i4Trust Website
i4Trust Community
Bringing the pieces together
Speakers:
Rajiv Rajani - CTO - iSHARE Foundation
Dr. Dennis Wendland - Technical Lead & Architect -
FIWARE Foundation
2. Bringing the pieces together
■ About:
■ This session will explain how everything comes together under i4Trust using a reference example
■ This session will:
■ Recap roles in i4Trust and how they can function together
■ Introduce to a reference example for i4Trust
■ Explain the architecture of the reference example
■ Make a demo of the reference example
■ Goals:
■ After this session you will be able to showcase the provided reference example for i4Trust
■ After this session you will be able to help SMEs in designing their use cases
■ Target Audience:
■ All (LEBDS, Ambassadors)
3. Recap: A data space is an decentralized data ecosystem
built by the parties with common purpose
■ Further, it can be defined as a decentralized data
ecosystem built around commonly agreed
building blocks enabling an effective and trusted
sharing of data among participants.
■ Data consumers, data providers and identity and
authorisation service providers form an
ecosystem with a governance structure in place
to create a basic data space
■ Additionally, service providers like Marketplaces,
Brokers, Billing and Clearing etc. can be part of
data space to support variety of use cases
■ In i4Trust iSHARE and FIWARE bring the
necessary components along with basic
governance structure to create the i4Trust data
space
Data Space
Data Consumers Data Providers
Data Space Governance
Identity and
Authorisation
service providers
Marketplace and
other service
providers
2
4. Data Space
Recap: Roles in a Data Space
Data
Consumer
Data
Provider
Data Owner
Identity Provider Authorisations
Provider
Marketplace
Trust Provider
3
5. Data Space
Recap: Roles in i4Trust complies to iSHARE and FIWARE
Data Consumer Data Provider
Context Broker
Data Owner
Identity Provider
(Keyrock)
Authorisations Provider
(Keyrock)
Marketplace
FIWARE Marketplace
Trust Provider
iSHARE Satellite
4
6. Use case
■ A packet delivery company wishes to offer its various services electronically for enhanced
customer experience
■ It wants to automate the process of acquiring of its services via its customers
■ eCommerce site would like to choose delivery services offerings that fits it requirements and
can enhance the shopping experience of their customers
■ It wants to offer its paying loyal customers with flexible delivery services
■ It also wants to enable its employees to better manage customers delivery preferences
■ Another eCommerce site is just looking to provide standard delivery services in a cost
effective manner
■ It wants to offer delivery services at a bargain price that matches it business
5
8. Packet Delivery Co. - Packet Delivery company is a parcel
service provider delivering packets all over the world
■ i4Trust Role: Data Provider/Data Owner
■ Offers its services electronically to different retailers, in order to
allow them to issue packet delivery orders, trace location of
orders and allow their customers to perform requests for
adjustments on address, date and time of planned delivery
when their clients are entitled to
■ It offers two kind of Packet Delivery services:
■ Standard Packet Delivery
■ Gold Packet Delivery
■ Identifier: EU.EORI.NLPACKETDEL
■ Components:
■ Context Broker
■ Identity Provider
■ PEP Proxy/PDP
■ Authorisation Registry (AR) + Activation Service (AS)
■ Portal application
■ Orders map to Digital Twin entities
■ Gold users can change Destinee, Delivery Address, Planned
Day of Arrival, Planned Time of Arrival
7
9. Packet Delivery Co - offerings
8
Gold Packet Delivery
Service for which the customer enjoys all the
benefits of the “Standard Packet Delivery” but
also is allowed to adjust the concrete address of
delivery, date of delivery within an offered period,
as well as concrete time of delivery within the
selected date of delivery, provided such
adjustments are feasible (e.g., are requested
enough time in advance and do not imply
additional costs).
Standard Packet
Delivery
When Packet Delivery Company
receives a packet delivery order
from a given customer, it returns
the target date at which the
packet is planned to be delivered.
Standard Packet
Delivery
The customer simply is given the
opportunity to specify the issuer
(sender) of the packet, the
address, date and time at which
the packet to be delivered is
ready for collection, and the name
and address of the destinee to
whom the package has to be
delivered.
Standard Packet
Delivery
Under defined terms and
conditions (e.g., there are no
problems with customs,
addresses are valid, etc), it
commits to deliver the packet in
48 hours within the same country
and 5-6 days if it requires
international shipping.
Standard Packet
Delivery
However, customers are not
allowed to adjust the concrete
date of delivery (e.g., delaying it
to a more suitable date) nor fine-
tune the concrete time of delivery
within the selected date of
delivery.
10. Happy Pets Inc. - Online e-commerce for pet products
■ i4Trust Role: Data Consumer/Data Owner
■ Identifier: EU.EORI.NLHAPPYPETS
■ Components:
■ Identity Provider(s)
■ Authorisation Registry (AR)
■ Shop system application
■ Acquires Gold offering from Packet Delivery Co so it
can offer Standard delivery service to it Regular
customers and Gold delivery service to its Prime
customers
■ Prime customers are allowed to adjust
■ the concrete address of delivery
■ date of delivery within an offered period
■ concrete time of delivery within the selected date
of delivery,
■ provided such adjustments are feasible (e.g., are
requested enough time in advance and do not
imply additional costs)
9
11. No Cheaper Inc. - Online e-commerce for bargain products
■ i4Trust Role: Data Consumer/Data Owner
■ Identifier: EU.EORI.NLNOCHEAPER
■ Components:
■ Identity Provider(s)
■ Authorisation Registry (AR)
■ Shop system application
■ Acquires standard offering so it can offer only standard
delivery service to its customers
10
12. iSHARE Satellite - ensures trust among different
organisations
■ i4Trust Role: Trust Provider
■ Identifier: EU.EORI.NL000000000 (iSHARE Satellite
test)
■ Onboard and maintain list of participants and its statues
■ Provide APIs for participants to get detailed information
along with statues of other participants with whom they
want to interact or are interacting
■ Enables multilateral trust when participants signup
■ Plays the facilitator role for common agreements like,
but not limited to business agreements, operational
agreements, etc.
■ Is federated part of the governing body of data spaces
that interoperate
11
13. i4Trust Marketplace. - Marketplace where data providers
and owner publishes their offerings
■ i4Trust Role: Marketplace
■ Identifier: EU.EORI.NLMARKETPLA
■ Components:
■ Business API Ecosystem
■ Packet Delivery Co. publishes its offering on i4Trust
Marketplace for acquisition by organisations (e.g.
retailers/shops)
■ Basic: Organisations can offer Standard service
level to its customers
■ Premium: Organisations can offer Gold service
level to its customers
■ Supports various business models for service offerings
12
14. Data Space
Plotting participants into i4Trust roles
Data Consumer Data Provider Data Owner
Identity Provider Authorisations
Provider
Marketplace
Trust Provider
13
16. Example Overview
Showcase:
■ Delegation of data service access rights within trusted data space
■ Delegated from an organizational level to an user level
■ Service provider does not need knowledge about users which
finally access the service
Parties:
■ Packet Delivery Co. offers delivery order service on i4Trust
Marketplace
■ Different retailers (shops) acquire access to service offering
■ Retailers delegate service access to their customers
■ Trust Authority ensures trust among different organisations
Steps:
1. Creating an offering (by Packet Delivery Co.)
2. Acquiring an offering (by retailers)
3. Accessing packet delivery order service (by retailer customers)
15
18. Practical exercise
17
■ Come up with your own use case - it can be something you are already working on with
SMEs or create one of your own
■ Alternatively, refer to the practical exercises presentation for some use cases
■ Try solving it similar to what was just explained using i4Trust and create an architecture and
flow chart explaining the solution
■ Use open Q&A sessions and DIH Working Group Space to ask questions to us
19. i4Trust Website
i4Trust Community
Detailed walkthrough of the
reference example
Dr. Dennis Wendland
Technical Lead & Architect
FIWARE Foundation
dennis.wendland@fiware.org
20. Outline
1. Example overview
2. Prerequisites
3. Detailed steps of the example
a. Creating an offering
b. Acquisition of offerings
c. Accessing the service
4. Setup of components
19
22. Example Overview
Showcase:
■ Delegation of data service access rights within trusted data space
■ Delegated from an organizational level to an user level
■ Service provider does not need knowledge about users which
finally access the service
Parties:
■ Packet Delivery Co. offers delivery order service on i4Trust
Marketplace
■ Different retailers (shops) acquire access to service offering
■ Retailers delegate service access to their customers
■ Trust Authority ensures trust among different organisations
Steps:
1. Creating an offering (by Packet Delivery Co.)
2. Acquiring an offering (by retailers)
3. Accessing packet delivery order service (by retailer customers)
21
23. Example Overview
Packet Delivery Company + Marketplace
■ Packet Delivery Co. provides digital service about its packet
delivery orders
■ Delivery orders map to Digital Twin entities characterized by
■ issuer, destinee
■ originAddress, deliveryAddress
■ pda/pta (planned date/time of arrival)
■ eda/eta (estimated date/time of arrival)
■ Different service levels offered for users accessing the service:
■ Standard: Read access to delivery orders (HTTP GET)
■ Gold: Allowed to change destinee, deliveryAddress,
pta, pda of delivery orders (HTTP PATCH)
■ Packet Delivery Co. publishes its offering on i4Trust Marketplace
for acquisition by organisations (e.g. retailers/shops)
■ Basic: Organisations can offer Standard service level to its
customers
■ Premium: Organisations can offer Gold service level to its
customers
22
24. Example Overview
Shops
Happy Pets Inc.:
■ Shop of premium products of pets
■ Acquires Premium packet delivery offering on Marketplace
■ Can offer Standard and Gold service to its customers
No Cheaper Inc.:
■ Shop of bargain clothes at big discounts
■ Acquires Basic packet delivery offering on Marketplace
■ Can offer only Standard service to its customers
23
25. Example Overview
Customers
Customers:
■ Both shops have (human) customers
■ After checkout at the shop, delivery orders at Packet Delivery Co.
are generated
■ Customers might want to view and/or change their delivery orders
at the Packet Delivery Co. portal
■ Change of delivery orders only allowed for customers of
Happy Pets Inc.
24
27. Prerequisites
Architectural overview
Marketplace
■ Business API Ecosystem
Packet Delivery Co.
■ Context Broker
■ Identity Provider
■ PEP Proxy/PDP
■ Authorisation Registry (AR) +
Activation Service (AS)
■ Portal application
26
Happy Pets Inc.
■ Identity Provider(s)
■ Authorisation Registry (AR)
■ Shop system application
No Cheaper Inc.
■ Identity Provider(s)
■ Authorisation Registry (AR)
■ Shop system application
Trust Authority
28. Prerequisites
Marketplace
■ Databases used by different marketplace components
■ MongoDB
■ MySQL
■ TM Forum APIs
■ Reference implementation
■ Charging Backend
■ Rating, charging and billing
■ RSS
■ Revenue settlement and sharing
■ Logic Proxy
■ UI portal, authentication and API orchestrator
No further prerequisites needed
27
29. Prerequisites
Trust Authority
■ Installed centrally
■ Using iSHARE Satellite central test instance
■ https://scheme.isharetest.net/swagger/index.html
■ For each participating organisation, certificates/private
keys and EORI IDs need to be generated
■ Marketplace: EU.EORI.NLMARKETPLA
■ Packet Delivery: EU.EORI.PACKETDEL
■ Happy Pets: EU.EORI.NLHAPPYPETS
■ No Cheaper: EU.EORI.NLNOCHEAPER
■ iSHARE Satellite: EU.EORI.NL000000000
■ This information must be known to trust authority
■ Allows all participants to verify status of each
organisation
28
30. Prerequisites
Shop: Happy Pets Inc.
2 Identity providers to be deployed with pre-registered users
■ Company (login @ marketplace)
■ Employee user
■ Customer (login @ shop and packet delivery portal)
■ Standard customer user
■ Gold customer user
Authorisation Registry instance
■ Holds customer access policies
■ Using central iSHARE AR:
https://ar.isharetest.net/swagger/index.html
Shop system
■ Skipped for simplicity
■ In the following assume:
■ Customer users already registered
■ Pre-existing delivery orders for each customer
■ Standard/Gold policies already assigned
■ Initial delivery orders to be created manually (next slides)
■ Customer policies (Standard/Gold) to be created manually
29
Happy Pets Ltd.
Customer
{
"policyIssuer": "EU.EORI.NLHAPPYPETS",
"accessSubject": "<CUSTOMER-USER-ID>",
"policies": [
{
"target": {
"resource": {
"type": "DELIVERYORDER",
"identifiers":
["<DELIVERY-ORDER-ID>"],
"attributes":
["pta","pda"]
},
"actions": ["PATCH", "GET"]
}
]
}
Gold
31. Prerequisites
Shop: No Cheaper Inc.
2 Identity providers to be deployed with pre-registered users
■ Company (login @ marketplace)
■ Employee user
■ Customer (login @ shop and packet delivery portal)
■ Standard customer user
■ Gold customer user could also be created to
demonstrate denied access with PATCH request
Authorisation Registry instance
■ Holds customer access policies
■ Using central iSHARE AR test instance:
https://ar.isharetest.net/swagger/index.html
Shop system
■ Skipped for simplicity
■ In the following assume:
■ Customer users already registered
■ Pre-existing delivery orders for each customer
■ Standard policies already assigned
■ Initial delivery orders to be created manually (next slides)
■ Customer policies (Standard) to be created manually
30
No Cheaper Ltd.
Customer
{
"policyIssuer": "EU.EORI.NLNOCHEAPER",
"accessSubject": "<CUSTOMER-USER-ID>",
"policies": [
{
"target": {
"resource": {
"type": "DELIVERYORDER",
"identifiers":
["<DELIVERY-ORDER-ID>"],
"attributes":
["*"]
},
"actions": ["GET"]
}
]
} Standard
32. Prerequisites
Packet Delivery Co.
Packet Delivery Portal application
■ Demo application available
Identity Provider to be deployed with pre-registered user
■ Employee user
Context Broker as Service provider
■ Provides NGSI-LD API for
■ Reading delivery order entities (HTTP GET)
■ Changing delivery order entities (HTTP PATCH)
■ Initial delivery order entities to be created manually
31
{
"id": "urn:ngsi-ld:DELIVERYORDER:HAPPYPETS001",
"type": "DELIVERYORDER",
"issuer": {
"type": "Property",
"value": "Happy Pets"
},
"destinee": {
"type": "Property",
"value": "Happy Pets customer"
},
....
"pda": {
"type": "Property",
"value": "2021-10-02"
},
"pta": {
"type": "Property",
"value": "14:00:00"
},
"eda": {
"type": "Property",
"value": "2021-10-02"
},
"eta": {
"type": "Property",
"value": "14:00:00"
},
"@context": [
"https://schema.lab.fiware.org/ld/context",
"https://uri.etsi.org/ngsi-ld/v1/ngsi-ld-core-context.jsonld"
]
}
33. Prerequisites
Packet Delivery Co.
PEP Proxy / PDP
■ Using API Umbrella
■ API Backend (Context Broker) configured with attribute
based authorization mode
Authorisation Registry instance
■ Holds organisational access policies
■ Using central iSHARE AR test instance
Activation Service
■ Demo application available
■ Required for enabling Marketplace to create policies at
AR of Packet Delivery
■ Marketplace policy to be created initially
32
Packet Delivery Co.
Marketplace
{
"policyIssuer": "EU.EORI.NLPACKETDEL",
"accessSubject": "EU.EORI.NLMARKETPLA",
"policies": [
{
"target": {
"resource": {
"type": "delegationEvidence",
"identifiers":
["*"],
"attributes":
["*"]
},
"actions": ["POST"]
}
]
}
35. Creating an offering
Employee of Packet Delivery Co. creates offering
on Marketplace for its basic and premium services
■ Employee requests login on Marketplace using its
own IDP (1-2)
■ IDP validates against Trust Authority whether
Marketplace is a trusted party (3)
■ Employee performs login based on OIDC standard
(4-5)
■ Employee has logged in and creates offerings for
standard and premium services (6)
Provides information to offering description about:
■ Service endpoint (+ API specification)
■ Data model used
■ Security requirements (e.g. policies supported)
■ Other terms and Conditions: pricing
37. Acquisition of offerings
Employee of Happy Pets Ltd acquires access to
premium service offering
■ Employee requests login on Marketplace using its own IDP
(1-2)
■ IDP validates Marketplace as trusted party, login is
performed based on OIDC and Employee is presented
available offerings (3-4)
■ Employee selects the Packet Delivery premium service
and performs the checkout process incl. providing payment
details (5)
■ Marketplace requests at Packet Delivery AR to register
HappyPets as organization able to assign Packet Delivery
premium service policies to its customers (6)
■ AR validates Marketplace as trusted party (7)
■ Policy is created at AR, allowing Happy Pets to delegate
premium service access to its customers (8)
■ Policy allowing premium access needs to be assigned at
Happy Pets AR to its customers (9)
38. Acquisition of offerings
Employee of Happy Pets Ltd acquires access to
premium service offering
■ Employee requests login on Marketplace using its own IDP
(1-2)
■ IDP validates Marketplace as trusted party, login is
performed based on OIDC and Employee is presented
available offerings (3-4)
■ Employee selects the Packet Delivery premium service and
performs the checkout process incl. providing payment
details (5)
■ Marketplace requests at Packet Delivery AR to register
HappyPets as organization able to assign Packet Delivery
premium service policies to its customers (6)
■ AR validates Marketplace as trusted party (7)
■ Policy is created at AR, allowing Happy Pets to delegate
premium service access to its customers (8)
■ Policy allowing premium access needs to be assigned at
Happy Pets AR to its customers (9)
Packet Delivery Co.
Happy Pets Ltd.
{
"policyIssuer": "EU.EORI.NLPACKETDEL",
"accessSubject": "EU.EORI.NLHAPPYPETS",
"policies": [
{
"target": {
"resource": {
"type": "DELIVERYORDER",
"identifiers":
["*"],
"attributes":
["pta","pda"]
},
"actions": ["PATCH", "GET"]
}
]
}
39. Acquisition of offerings
Scenario: No Cheaper
Employee of No Cheaper Ltd acquires access to
basic service offering
■ Employee signs in at marketplace and selects Packet
Delivery basic service offering (1)
■ Marketplace requests at Packet Delivery AR to register No
Cheaper as organization able to assign Packet Delivery
basic service policies to its customers (2)
■ AR validates Marketplace as trusted party
■ Policy is created at AR, allowing Happy Pets to
delegate premium service access to its customers
■ Policy allowing basic access needs to be assigned at No
Cheaper AR to its customers
Packet Delivery Co.
No Cheaper Ltd.
{
"policyIssuer": "EU.EORI.NLPACKETDEL",
"accessSubject": "EU.EORI.NLNOCHEAPER",
"policies": [
{
"target": {
"resource": {
"type": "DELIVERYORDER",
"identifiers":
["*"],
"attributes":
["*"]
},
"actions": ["GET"]
}
]
}
41. Usage of data service
Login at portal
Customer of Happy Pets Ltd. Performs login at
Packet Delivery portal
■ Customer requests login at portal using Happy Pets IDP (1-2)
■ IDP validates against Trust Authority whether portal is a
trusted party (3)
■ Login is performed based on OIDC standard, the issued
signed JWT contains info about Happy Pets AR where to
retrieve user policies from (4)
■ JWT could also directly contain user policies
■ Customer is presented details about its delivery order (5)
Happy Pets Ltd.
Customer
{
"policyIssuer": "EU.EORI.NLHAPPYPETS",
"accessSubject": "<CUSTOMER-USER-ID>",
"policies": [
{
"target": {
"resource": {
"type": "DELIVERYORDER",
"identifiers":
["<DELIVERY-ORDER-ID>"],
"attributes":
["pta","pda"]
},
"actions": ["PATCH", "GET"]
}
]
}
42. Usage of data service
Change Delivery Order
Customer of Happy Pets Ltd. changes PDA/PTA of
its delivery order
■ Customer triggers sending of request to change PDA/PTA
which includes the signed JWT (1-2)
■ Proxy validates JWT (3)
■ Proxy requests user policies at Happy Pets AR, and validates
if customer was assigned the necessary premium service
policy (4)
■ Alternatively JWT could already contain user policies
and this step could be skipped
■ Proxy checks at Packet Delivery AR if Happy Pets was able to
assign premium service policy to its customers (5)
■ Request is forwarded to Context Broker, attributes are
changed and confirmation is displayed at portal (6-8)
43. Usage of data service
Change Delivery Order
Customer of Happy Pets Ltd. changes PDA/PTA of
its delivery order
■ Customer triggers sending of request to change PDA/PTA
which includes the signed JWT (1-2)
■ Proxy validates JWT (3)
■ Proxy requests user policies at Happy Pets AR, and validates
if customer was assigned the necessary premium service
policy (4)
■ Alternatively JWT could already contain user policies
and this step could be skipped
■ Proxy checks at Packet Delivery AR if Happy Pets was able to
assign premium service policy to its customers (5)
■ Request is forwarded to Context Broker, attributes are
changed and confirmation is displayed at portal (6-8)
Packet Delivery Co.
Happy Pets Ltd.
{
"policyIssuer": "EU.EORI.NLPACKETDEL",
"accessSubject": "EU.EORI.NLHAPPYPETS",
"policies": [
{
"target": {
"resource": {
"type": "DELIVERYORDER",
"identifiers":
["*"],
"attributes":
["pta","pda"]
},
"actions": ["PATCH", "GET"]
}
]
}
Happy Pets Ltd.
Customer
{
"policyIssuer": "EU.EORI.NLHAPPYPETS",
"accessSubject": "<CUSTOMER-USER-ID>",
"policies": [
{
"target": {
"resource": {
"type": "DELIVERYORDER",
"identifiers":
["<DELIVERY-ORDER-ID>"],
"attributes":
["pta","pda"]
},
"actions": ["PATCH", "GET"]
}
]
}
44. Usage of Data Service
Scenario: No Cheaper
Additional scenario for No Cheaper organization
■ No Cheaper acquired basic service offering
■ Only read access allowed at Packet Delivery
service
■ No Cheaper is only allowed to assign
standard service policies to its customers
■ A request for changing PTA/PDA by No Cheaper
customer will get rejected at PEP Proxy / PDP
■ Request would also get rejected, even if No
Cheaper would assign premium service policy to its
customers
No Cheaper Ltd.
Customer
{
"policyIssuer": "EU.EORI.NLNOCHEAPER",
"accessSubject": "<CUSTOMER-USER-ID>",
"policies": [
{
"target": {
"resource": {
"type": "DELIVERYORDER",
"identifiers":
["<DELIVERY-ORDER-ID>"],
"attributes":
["*"]
},
"actions": ["GET"]
}
]
}
Packet Delivery Co.
No Cheaper Ltd.
{
"policyIssuer": "EU.EORI.NLPACKETDEL",
"accessSubject": "EU.EORI.NLNOCHEAPER",
"policies": [
{
"target": {
"resource": {
"type": "DELIVERYORDER",
"identifiers":
["*"],
"attributes":
["*"]
},
"actions": ["GET"]
}
]
}
45. Setup of components of the i4Trust experimentation
framework on Kubernetes
44
46. Deployment
Marketplace: Business API Ecosystem
■ Need to deploy databases, elasticsearch and BAE
■ Helm charts available
■ MongoDB: bitnami/mongodb (DB: v3.6.21)
■ MySQL: t3n/mysql (DB: v5.7)
■ elasticsearch: elastic/elasticsearch (v7.5.1)
■ BAE (specific branch until officially released):
https://github.com/FIWARE/helm-
charts/tree/i4trust/charts/business-api-ecosystem
■ Need to supply config parameters as values when deploying with helm
Resources:
■ https://github.com/FIWARE-TMForum/Business-API-Ecosystem
■ https://business-api-ecosystem.readthedocs.io/en/latest/
■ Specific branch of Logic Proxy until officially released:
https://github.com/fdelavega/business-ecosystem-logic-proxy/tree/feature/oidc
45
helm repo add elastic https://helm.elastic.co
helm repo add t3n https://storage.googleapis.com/t3n-helm-charts
helm repo add bitnami https://charts.bitnami.com/bitnami
helm repo add fiware https://fiware.github.io/helm-charts/
helm install -f ./values.yml elastic elastic/elasticsearch --version 7.5.1
helm install -f ./values.yml mysql t3n/mysql --version 0.1.0
helm install -f ./values.yml mongodb bitnami/mongodb --version 10.0.5
helm install -f ./values.yml business-api-ecosystem /path/to/chart --version 0.0.7
BAE Component Docker Image
BAE APIs fiware/biz-ecosystem-apis:v7.6.0
BAE RSS fiware/biz-ecosystem-rss:v7.8.0
BAE Charging Backend fiware/biz-ecosystem-charging-backend:v7.9.0-rc1
BAE Logic Proxy fiware/biz-ecosystem-logic-proxy:v7.9.0-rc2
■ Need to add service asset plugin to charging backend component
■ https://github.com/i4Trust/bae-i4trust-service
■ https://business-api-ecosystem.readthedocs.io/en/latest/plugins-
guide.html#installing-asset-plugins
47. Deployment
Identity Providers: Keyrock
■ Several IDP instances to be deployed for the different
organisations/environments
■ Helm chart available (specific branch until officially released):
https://github.com/FIWARE/helm-
charts/tree/i4trust/charts/keyrock
■ Need to supply config parameters as values when deploying with helm
■ Keyrock requires MySQL database, can use the one previously deployed
■ Need to specify separate database within MySQL
Resources:
■ https://github.com/ging/fiware-idm
■ https://fiware-idm.readthedocs.io/en/latest/
■ Specific branch until officially released:
https://github.com/i4Trust/fiware-idm/tree/i4trust
46
# To be performed for each Keyrock instance (change release name)
helm install -f ./values.yml keyrock /path/to/chart --version 0.0.3
Component Docker Image
Keyrock fiware/idm:i4trust-rc3
48. Deployment
Service provider: Context Broker
■ Deploy instance of orion context broker
■ Helm chart available: fiware/orion
■ Need to supply config parameters as values when deploying with helm
■ Orion requires MongoDB database, can use the one previously deployed
■ Need to specify separate database within MongoDB
Resources:
■ https://fiware-orion.readthedocs.io/en/master/
47
helm repo add fiware https://fiware.github.io/helm-charts/
helm install -f ./values.yml orion fiware/orion --version 0.0.7
Component Docker Image
Orion Context Broker fiware/orion-ld:0.7.0
49. Deployment
PEP/PDP: API Umbrella
■ Deploy instance of API Umbrella
■ Helm chart available (specific branch until officially released):
https://github.com/FIWARE/helm-charts/tree/i4trust/charts/api-umbrella
■ Need to supply config parameters as values when deploying with helm
■ API Umbrella requires MongoDB database and elasticsearch, can use the
ones previously deployed
■ Need to specify separate database within MongoDB
Resources:
■ https://api-umbrella.readthedocs.io/en/latest/
■ https://github.com/FIWARE/api-umbrella
■ Specific branch until officially released: https://github.com/FIWARE/api-
umbrella/tree/i4trust-attr-policies
48
helm install -f ./values.yml api-umbrella /path/to/chart --version 0.0.4
Component Docker Image
API Umbrella fiware/api-umbrella:i4trust-rc3
50. Deployment
PEP/PDP: API Umbrella
■ Configure API Backend for orion Context Broker instance in API Umbrella
49
■ Authorization Mode
■ Local orion endpoint
■ External host for publicly accessing the service
■ Prefix
■ Overwrite Authorization header, so that it is not
forwarded to orion
51. Deployment
Packet Delivery Co.: Portal + AS
■ Deploy portal and activation service demo applications
■ Helm charts available:
■ Portal: i4trust/pdc-portal
■ Activation Service: i4trust/activation-service
■ Need to supply config parameters as values when deploying with helm
Resources:
■ https://github.com/i4Trust/pdc-portal
■ https://github.com/i4Trust/activation-service
50
helm repo add i4trust https://i4trust.github.io/helm-charts
helm install -f ./values.yml pdc-portal i4trust/pdc-portal --version 0.0.5
helm install -f ./values.yml activation-service i4trust/activation-service --version 0.0.2
Component Docker Image
PDC Portal i4trust/pdc-portal:v0.1.0
Activation Service i4trust/activation-service:v0.1.0
52. Deployment
iSHARE AR + SO
Scheme Owner:
■ Currently using central iSHARE Satellite test instance
■ https://scheme.isharetest.net/
■ API documentation: https://dev.ishareworks.org/scheme-
owner/parties.html
■ iSHARE can be contacted in order to get registered at the iSHARE
Satellite and to retrieve certificates and EORIs
Authorisation Registry:
■ Currently using central iSHARE AR test instance
■ https://ar.isharetest.net/
■ Integration of AR functionality into Keyrock is planned
■ Alternative is to set up own AR
■ Reference implementation:
https://github.com/iSHAREScheme/AuthorizationRegistry
■ API documentation:
https://dev.ishareworks.org/delegation/endpoint.html
51
53. Deployment
Deployment instructions and example Helm configurations can also be found at
■ FIWARE production on K8s repository
■ https://github.com/FIWARE/production-on-k8s
■ i4Trust tutorials repository
■ https://github.com/i4Trust/tutorials
Practical exercise
■ Show a deployed setup of all required components for a NGSI-LD based data service provider within your own use case
■ Build up an environment for a data consumer organization and demonstrate how a user is accessing the data service
52
54. Thank you!
i4Trust has received funding from the European Union’s Horizon 2020
research and innovation programme under the Grant Agreement no 951975.
Dr. Dennis Wendland
FIWARE Foundation
dennis.wendland@fiware.org