Drones can be relevant to Cisco by enabling the digitization of various sensors using technologies like the Internet of Things (IoT) and collaboration. There are many disparate sensors (IoE) and developers need a platform to make sensors accessible via APIs, provide data transport and routing, processing capabilities like fog computing, and a collaborative environment. Cisco's IoT, collaboration, connectivity, security, processing and storage capabilities combined with analytics APIs and algorithms can provide such a platform as the "IoT of everything". Drones equipped with specialized sensors and using targeted algorithms can help with applications in areas like precision agriculture, site surveys, 3D modeling, and more when integrated into this platform.
Building Robotics Application at Scale using OpenSource from Zero to HeroAlex Barbosa Coqueiro
Today, organizations are using robotics to address a host of business challenges, from the self-driving car to autonomous walkers to assist older adults, exploring various environments from deep oceans to other planets like Mars. In the past, the integration of these robots took a significant amount of time and effort, and it required specialized expertise in this field. Still, this scenario has dramatically changed thanks to adopting a real-time production system with Linux and the Robot Operating System (ROS). ROS is an open-source software framework for robot development, including middleware, drivers, libraries, tools, and commonly used algorithms for robotics. In this session, we walk the audience through the steps from design to deployment robots using ROS2 Foxy (new version of ROS) from zero to hero using live demo using Python 3 (rclpy) with DDS (Data Distribution Service) simulating real-world environments with Gazebo (open-source 3D robotics simulator). In a nutshell, I will cover designing, developing, testing, and deploying intelligent robotics applications at scale, including integration with critical components, and discuss models that allow for optimized large fleet management.
This slide was for CLOUDEXPO 2017 in NYC. Consists of two part, One is for introducing existing WebRTC - IoT use cases. Another is conceptual consideration of Edge Computing scenario which leveraging WebRTC technology.
Open Source Edge Computing Platforms - OverviewKrishna-Kumar
IEEE 11th International Conference - COMSNETS 2019 - Last MilesTalk - Jan 2019. This talk is for Beginner or intermediate levels only. Kubernetes and related edge platforms are discussed.
cncf overview and building edge computing using kubernetesKrishna-Kumar
Open Source India Conference 2018 Presentation to the general audience - not a deep technical talk. Narrated like a story for make it interesting......
Building Robotics Application at Scale using OpenSource from Zero to HeroAlex Barbosa Coqueiro
Today, organizations are using robotics to address a host of business challenges, from the self-driving car to autonomous walkers to assist older adults, exploring various environments from deep oceans to other planets like Mars. In the past, the integration of these robots took a significant amount of time and effort, and it required specialized expertise in this field. Still, this scenario has dramatically changed thanks to adopting a real-time production system with Linux and the Robot Operating System (ROS). ROS is an open-source software framework for robot development, including middleware, drivers, libraries, tools, and commonly used algorithms for robotics. In this session, we walk the audience through the steps from design to deployment robots using ROS2 Foxy (new version of ROS) from zero to hero using live demo using Python 3 (rclpy) with DDS (Data Distribution Service) simulating real-world environments with Gazebo (open-source 3D robotics simulator). In a nutshell, I will cover designing, developing, testing, and deploying intelligent robotics applications at scale, including integration with critical components, and discuss models that allow for optimized large fleet management.
This slide was for CLOUDEXPO 2017 in NYC. Consists of two part, One is for introducing existing WebRTC - IoT use cases. Another is conceptual consideration of Edge Computing scenario which leveraging WebRTC technology.
Open Source Edge Computing Platforms - OverviewKrishna-Kumar
IEEE 11th International Conference - COMSNETS 2019 - Last MilesTalk - Jan 2019. This talk is for Beginner or intermediate levels only. Kubernetes and related edge platforms are discussed.
cncf overview and building edge computing using kubernetesKrishna-Kumar
Open Source India Conference 2018 Presentation to the general audience - not a deep technical talk. Narrated like a story for make it interesting......
JVM-Con 2017 – Java and IoT, will it blend?Benjamin Cabé
Whether you’re looking at the constrained devices that make for the „things“ of the IoT, gateways that connect them to the Internet, or backend servers, there’s a lot that one needs to build for creating end-to-end IoT solutions. We will look at the typical software features that are specific to IoT, and see what’s available in the Java and open source ecosystem to implement them.
M2M, Sensor Web, Observations and MeasurementsWerner Keil
M4M or Measure 4 Measure, ever since Shakespeare's play with the same name we know, people can be mistaken for one another. A Duke (like the beloved Java mascot) claims to be a monk, the head of a dead pirate is presented to be that of the young hero. So can important information like Units of Measurement be misinterpreted. While humans reading 10°C, 10 C or 10 Degree Celsius, each of those could be interpreted and understood well enough. For M2M communication, unless a program is provided with a large glossary of alternate terms, only ONE of these would be acceptable.
Slides of the JCP EC F2F in January 2014 proposing the idea of a Units of Measurement JSR, recently approved as JSR 363: https://jcp.org/en/jsr/detail?id=363
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2021/08/senspro2-highly-scalable-sensor-hub-dsp-for-computer-vision-ai-and-multi-sensor-fusion-for-contextually-aware-devices-a-presentation-from-ceva/
Gil Abraham, Director of Business Development in the Vision and AI Business Unit at CEVA, presents the “SensPro2 Highly Scalable Sensor Hub DSP for Computer Vision, AI and Multi-sensor Fusion for Contextually Aware Devices” tutorial at the May 2021 Embedded Vision Summit.
Contextual awareness is the ability of a system to gather information about its environment and adapt behaviors accordingly. Contextual awareness is enabling enriched user experiences in applications like XR, robotics and automotive. It requires the processing of data from multiple sensors—such as cameras, radar, lidar and motion sensors—using various computer vision and neural network workloads.
In this presentation, Abraham covers CEVA’s latest SensPro2 sensor hub DSP family for contextual awareness processing, including its scalable architecture (combining parallel signal processing and AI inferencing) as well as the unique CEVA neural network optimizing compiler that supports it.
Kicking off the first in a series of global GPU Technology Conferences, NVIDIA co-founder and CEO Jen-Hsun Huang today at GTC China unveiled technology that will accelerate the deep learning revolution that is sweeping across industries. Huang spoke in front of a crowd of more than 2,500 scientists, engineers, entrepreneurs and press, gathered in Beijing for a day devoted to deep learning and AI. On stage he announced the Tesla P4 and P40 GPU accelerators for inferencing production workloads for AI services and, a small, energy-efficient AI supercomputer for highway driving — the NVIDIA DRIVE PX 2 for AutoCruise.
This presentation (and its companion whitepaper) discuss the technology requirements for modern Emergency Operations Centers (EOCs) to enable greater situational awareness and a more agile response to emergencies.
Drones and the Internet of Things: realising the potential of airborne comput...Prayukth K V
This paper focuses on services and applications provided to mobile users using airborne computing infrastructure. Concepts such as drones-as-a-service and flyin,fly-out
infrastructure, and note data management and system
design issues that arise in these scenarios are discussed. Issues of Big Data arising from such applications, optimising the configuration of airborne and ground infrastructure to provide the best QoS and QoE, situation-awareness, scalability, reliability, scheduling for efficiency, interaction with users and drones using physical annotations are outlined.
Machine Intelligence Applications for IoT Slam Dec 1st 2016Sudha Jamthe
IoT makes things smart while AI makes them intelligent. Come hear about Machine Intelligence, the power behind AI that drives business applications in all realms of life and industry. It ranges from looking for pathogens in human cells, to making Robots and Drones autonomous to drive prediction of demand or parts failure in factories. Machine Intelligence applications can drive business impact based on harnessing the underlying technologies of Machine Learning, Computer Vision, Facial Recognition and Speech to Text. Come find out how to take Machine Intelligence from the realm of quants and Data Scientists to build business applications for your business.
This presentation gives several examples of how commercial drones are used in industry. Originally presented at the Day of Drones, Hiller Museum of Aviation, San Carlos, California, August 27, 2016
Unmanned Aircraft (a.k.a. drones) are finding their way into IoT implementations. This presentation explains what’s driving the adoption and how drones relate to IoT and cloud data.
JVM-Con 2017 – Java and IoT, will it blend?Benjamin Cabé
Whether you’re looking at the constrained devices that make for the „things“ of the IoT, gateways that connect them to the Internet, or backend servers, there’s a lot that one needs to build for creating end-to-end IoT solutions. We will look at the typical software features that are specific to IoT, and see what’s available in the Java and open source ecosystem to implement them.
M2M, Sensor Web, Observations and MeasurementsWerner Keil
M4M or Measure 4 Measure, ever since Shakespeare's play with the same name we know, people can be mistaken for one another. A Duke (like the beloved Java mascot) claims to be a monk, the head of a dead pirate is presented to be that of the young hero. So can important information like Units of Measurement be misinterpreted. While humans reading 10°C, 10 C or 10 Degree Celsius, each of those could be interpreted and understood well enough. For M2M communication, unless a program is provided with a large glossary of alternate terms, only ONE of these would be acceptable.
Slides of the JCP EC F2F in January 2014 proposing the idea of a Units of Measurement JSR, recently approved as JSR 363: https://jcp.org/en/jsr/detail?id=363
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2021/08/senspro2-highly-scalable-sensor-hub-dsp-for-computer-vision-ai-and-multi-sensor-fusion-for-contextually-aware-devices-a-presentation-from-ceva/
Gil Abraham, Director of Business Development in the Vision and AI Business Unit at CEVA, presents the “SensPro2 Highly Scalable Sensor Hub DSP for Computer Vision, AI and Multi-sensor Fusion for Contextually Aware Devices” tutorial at the May 2021 Embedded Vision Summit.
Contextual awareness is the ability of a system to gather information about its environment and adapt behaviors accordingly. Contextual awareness is enabling enriched user experiences in applications like XR, robotics and automotive. It requires the processing of data from multiple sensors—such as cameras, radar, lidar and motion sensors—using various computer vision and neural network workloads.
In this presentation, Abraham covers CEVA’s latest SensPro2 sensor hub DSP family for contextual awareness processing, including its scalable architecture (combining parallel signal processing and AI inferencing) as well as the unique CEVA neural network optimizing compiler that supports it.
Kicking off the first in a series of global GPU Technology Conferences, NVIDIA co-founder and CEO Jen-Hsun Huang today at GTC China unveiled technology that will accelerate the deep learning revolution that is sweeping across industries. Huang spoke in front of a crowd of more than 2,500 scientists, engineers, entrepreneurs and press, gathered in Beijing for a day devoted to deep learning and AI. On stage he announced the Tesla P4 and P40 GPU accelerators for inferencing production workloads for AI services and, a small, energy-efficient AI supercomputer for highway driving — the NVIDIA DRIVE PX 2 for AutoCruise.
This presentation (and its companion whitepaper) discuss the technology requirements for modern Emergency Operations Centers (EOCs) to enable greater situational awareness and a more agile response to emergencies.
Drones and the Internet of Things: realising the potential of airborne comput...Prayukth K V
This paper focuses on services and applications provided to mobile users using airborne computing infrastructure. Concepts such as drones-as-a-service and flyin,fly-out
infrastructure, and note data management and system
design issues that arise in these scenarios are discussed. Issues of Big Data arising from such applications, optimising the configuration of airborne and ground infrastructure to provide the best QoS and QoE, situation-awareness, scalability, reliability, scheduling for efficiency, interaction with users and drones using physical annotations are outlined.
Machine Intelligence Applications for IoT Slam Dec 1st 2016Sudha Jamthe
IoT makes things smart while AI makes them intelligent. Come hear about Machine Intelligence, the power behind AI that drives business applications in all realms of life and industry. It ranges from looking for pathogens in human cells, to making Robots and Drones autonomous to drive prediction of demand or parts failure in factories. Machine Intelligence applications can drive business impact based on harnessing the underlying technologies of Machine Learning, Computer Vision, Facial Recognition and Speech to Text. Come find out how to take Machine Intelligence from the realm of quants and Data Scientists to build business applications for your business.
This presentation gives several examples of how commercial drones are used in industry. Originally presented at the Day of Drones, Hiller Museum of Aviation, San Carlos, California, August 27, 2016
Unmanned Aircraft (a.k.a. drones) are finding their way into IoT implementations. This presentation explains what’s driving the adoption and how drones relate to IoT and cloud data.
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...Marc Lijour, OCT, BSc, MBA
Sheridan students are involved in hackathons, working with the Toronto 2015 Pan Am and Parapan Am Games, and they learn actively with the latest video and collaboration techniques. Their students are career-ready, some of them launching their own business while in school. This presentation will explore the main technology infrastructure based on Cisco which makes all that possible, as well as the involvement of Sheridan in leading programs such as VROC and Connected North. Developers won’t want to miss hearing about cool technologies like CMX, Jabber Guest, and other technologies available on DevNet.
Sheridan students are involved in hackathons, working with the Toronto 2015 Pan Am and Parapan Am Games, and they learn actively with the latest video and collaboration techniques. Their students are career-ready, some of them launching their own business while in school. This presentation will explore the main technology infrastructure based on Cisco which makes all that possible, as well as the involvement of Sheridan in leading programs such as VROC and Connected North. Developers won’t want to miss hearing about cool technologies like CMX, Jabber Guest, and other technologies available on DevNet.
Alors que chaque personne possède en moyenne plus de 3 objets connectés (smartphone, tablette, ordinateur,
bracelet…), et que le déploiement des usages privés avance, cet atelier propose d'analyser l’impact de ces développement sur la gestion de l’espace public.
Les objets connectés concernent également les capteurs déployés par les services métier pour la gestion de la ville. Comment éviter des déploiements anarchiques de capteurs et répartiteurs ? Quelle(s) technologie(s) de raccordement ? Quelle architecture mettre en oeuvre pour assurer la sécurité des données et la résilience des
infrastructures et des services urbains ?
Comment simplifier utilement le puzzle ?
Learn more about how today's service provider's networks are built to deliver yesterday's services and how the Next generation service require a new approach with our Evolved Programmable Network's offerings will enable business transformation for new service deliveries.
Unmanned aerial vehicles and manned aircrafts are increasingly being used as vehicles to capture intelligence data for defense, state and civil applications. The aerial vehicles are equipped with technology to collect both video and sensor data which are communicated to a mission control center for further processing. When outside the reach of direct data relays due to distance or environment (e.g. mountainous regions) satellite communications is used for Beyond-Line-of-Sight (BLoS)
communication.
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsHarshitParkar6677
The Internet of Things (IoT) speeds up awareness and
response to events. It’s transforming whole industries, including
manufacturing, oil and gas, utilities, transportation, public safety,
and local government.
But the IoT requires a new kind of infrastructure. The cloud by
itself can’t connect and analyze data from thousands and millions
of different kinds of things spread out over large areas. Capturing
the power of the IoT requires a solution that can:
● Connect new kinds of things to your network. Some of them
might be in harsh environments. Others might communicate
using industrial protocols, not IP.
● Secure the things that produce data. And secure the data as it
travels from the network edge to the cloud. This requires a
combination of physical security and cybersecurity.
● Handle an unprecedented volume, variety, and velocity of data.
Billions of previously unconnected devices are generating more
than two exabytes of data each day. Sending all of it to the cloud
for analysis and storage is not practical. Plus, in the time it takes
to send data to the cloud for analysis, the opportunity to act on it
might be gone.
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Codemotion
Increased complexity makes it very hard and time-consuming to keep your software bug-free and secure. We introduce fuzz-testing as a method for automatically and continuously discovering vulnerabilities hidden in your code. The talk will explain how fuzzing works and how to integrate fuzz-testing into your Software Development Life Cycle to increase your code’s security.
Pompili - From hero to_zero: The FatalNoise neverending storyCodemotion
It was 1993 when we decided to venture in a beat'em up game for Amiga. The Catalypse's success story pushed me and my comrade to create something astonishing for this incredible game machine... but things went harder, assumptions were slightly different, and italian competitors appeared out of nowhere... the project died in 1996. Story ended? Probably not...
Il Commodore 65 è un prototipo di personal computer che Commodore avrebbe dovuto mettere in commercio quale successore del Commodore 64. Purtroppo la sua realizzazione si fermò appunto allo stadio prototipale. Racconterò l'affascinante storia del suo sviluppo ed il perchè della soppressione del progetto ormai ad un passo dalla immissione in commercio.
Rivivere l'ebbrezza di progettare un vecchio computer o una consolle da bar è oggi possibile sfruttando le FPGA, ovvero logiche programmabili che consentono a chiunque di progettare il proprio hardware o di ricrearne uno del passato. In questa sessione si racconta come dal reverse engineering dell'hardware di vecchie glorie come il Commodore 64 e lo ZX Spectrum sia stato possibile farle rivivere attraverso tecnologie oggi alla portata di tutti.
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Codemotion
There's a lot of talk about blockchain, but how does the technology behind it actually work? For developers, getting some hands-on experience is the fastest way to get familiair with new technologies. So let's build a blockchain, then! In this session, we're going to build one in plain old Java, and have it working in 40 minutes. We'll cover key concepts of a blockchain: transactions, blocks, mining, proof-of-work, and reaching consensus in the blockchain network. After this session, you'll have a better understanding of core aspects of blockchain technology.
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Codemotion
When was the last time you were truly lost? Thanks to the maps and location technology in our phones, a whole generation has now grown up in a world where getting lost is truly a thing of the past. Location technology goes far beyond maps in the palm of our hand, however. In this talk, we will explore how a ridesharing app works. How do we discover our destination?How do we find the closest driver? How do we display this information on a map? How do we find the best route?To answer these questions,we will be learning about a variety of location APIs, including Maps, Positioning, Geocoding etc.
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Codemotion
Eward Driehuis, SecureLink's research chief, will guide you through the bumpy ride we call the cyber threat landscape. As the industry has over a decade of experience of dealing with increasingly sophisticated attacks, you might be surprised to hear more attacks slip through the cracks than ever. From analyzing 20.000 of them in 2018, backed by a quarter of a million security events and over ten trillion data points, Eward will outline why this happens, how attacks are changing, and why it doesn't matter how neatly or securely you code.
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 - Codemotion
IoT revolution is ended. Thanks to hardware improvement, building an intelligent ecosystem is easier than never before for both startups and large-scale enterprises. The real challenge is now to connect, process, store and analyze data: in the cloud, but also, at the edge. We’ll give a quick look on frameworks that aggregate dispersed devices data into a single global optimized system allowing to improve operational efficiency, to predict maintenance, to track asset in real-time, to secure cloud-connected devices and much more.
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Codemotion
What if Virtual Reality glasses could transform your environment into a three-dimensional work of art in realtime in the style of a painting from Van Gogh? One of the many interesting developments in the field of Deep Learning is the so called "Style Transfer". It describes a possibility to create a patchwork (or pastiche) from two images. While one of these images defines the the artistic style of the result picture, the other one is used for extracting the image content. A team from TNG Technology Consulting managed to build an AI showcase using OpenCV and Tensorflow to realize such goggles.
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Codemotion
Blockchain (and Cryptocurrency) is an evolution of 20-year old research from scientists like Chaum, Lamport, and Castro & Liskov. Due to the current hype, it's hard to distinguish beneficial aspects of the technology from a desire for a "silver bullet" for device security, verifiable logistics, or "saving democracy". The problem: blockchain introduces new security challenges - and blind adoption without understanding reduces overall security. In this talk, Melanie Rieback and Klaus Kursawe explain the pitfalls and limits of blockchain, so you can avoid making your applications LESS secure.
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Codemotion
Networking is a core part of computing in the digital world we inhabit. But, how well do you know how it works? Do you understand all the moving parts of the OSI stack inside your computer, and how the network is actually put together? How can this ever work? This guided safari of layers, standards, protocols, and happenstance will bring us close to the copper wire, and up through the layers of CDMA/CD, ARP, routing and HTTP. We will make a few excursions through patchworks that still work forty years later, and cleverly designed mechanisms that show that simplicity is the only way to last.
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Codemotion
Performance tests are not only an important instrument for understanding a system and its runtime environment. It is also essential in order to check stability and scalability – non-functional requirements that might be decisive for success. But won't my cloud hosting service scale for me as long as I can afford it? Yes, but… It only operates and scales resources. It won't automatically make your system fast, stable and scalable. This talk shows how such and comparable questions can be clarified with performance tests and how DevOps teams benefit from regular test practise.
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Codemotion
Sascha will demonstrate the opportunities and challenges of Conversational AI learned from the practice. Both Technology and User Experience will be covered introducing a process finding micro-moments, writing happy paths, gathering intents, designing the conversational flow, and finally publishing on almost all channels including Voice Services and Chatbots. Valuable for enterprises, developers, and designers. All live on stage in just minutes and with almost no code.
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Codemotion
A key challenge we face at Pacmed is quickly calibrating and deploying our tools for clinical decision support in different hospitals, where data formats may vary greatly. Using Intensive Care Units as a case study, I’ll delve into our scalable Python pipeline, which leverages Pandas’ split-apply-combine approach to perform complex feature engineering and automatic quality checks on large time-varying data, e.g. vital signs. I’ll show how we use the resulting flexible and interpretable dataframes to quickly (re)train our models to predict mortality, discharge, and medical complications.
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Codemotion
Coolblue is a proud Dutch company, with a large internal development department; one that truly takes CI/CD to heart. Empowerment through automation is at the heart of these development teams, and with more than 1000 deployments a day, we think it's working out quite well. In this session, Pat Hermens (a Development Managers) will step you through what enables us to move so quickly, which tools we use, and most importantly, the mindset that is required to enable development teams to deliver at such a rapid pace.
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...Codemotion
Quantum computers can use all of the possible pathways generated by quantum decisions to solve problems that will forever remain intractable to classical compute power. As the mega players vie for quantum supremacy and Rigetti announces its $1M "quantum advantage" prize, we live in exciting times. IBM-Q and Microsoft Q# are two ways you can learn to program quantum computers so that you're ready when the quantum revolution comes. I'll demonstrate some quantum solutions to problems that will forever be out of reach of classical, including organic chemistry and large number factorisation.
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Codemotion
Chinese food exploded across America in the early 20th century, rapidly adapting to local tastes while also spreading like wildfire. How was it able to spread so fast? The GY6 is a family of scooter engines that has achieved near total ubiquity in Europe. It is reliable and cheap to manufacture, and it's made in factories across China. How are these factories able to remain afloat? Chinese-American food and the GY6 are both riveting studies in product-market fit, and both are the product of a distributed open source-like development model. What lessons can we learn for open source software?
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Codemotion
The design space has exploded in size within the last few years and Sketch is one of the most important milestones to represent the phenomenon. But behind the scenes of this growing reality there is a remote team that revolutionizes the design space all without leaving the home office. This talk will present how Sketch has grown to become a modern, product designer's tool.
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Codemotion
Would you fly in a plane designed by a craftsman or would you prefer your aircraft to be designed by engineers? We are learning that science and empiricism works in software development, maybe now is the time to redefine what “Software Engineering” really means. Software isn't bridge-building, it is not car or aircraft development either, but then neither is Chemical Engineering. Engineering is different in different disciplines. Maybe it is time for us to begin thinking about retrieving the term "Software Engineering" maybe it is time to define what our "Engineering" discipline should be.
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Codemotion
What is the job of a CTO and how does it change as a startup grows in size and scale? As a CTO, where should you spend your focus? As an engineer aspiring to be a CTO, what skills should you pursue? In this inspiring and personal talk, I describe my journey from early Red Hat engineer to CTO at Bloomon. I will share my view on what it means to be a CTO, and ultimately answer the question: Should the CTO be coding?
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
4. DRONES…A SMART LIFT FOR SENSORS
Specialized drones
pilots and operations
Purpose targeted
sensors
Application of specific
algorithms and processing
Security and
Safety
Quality of Air
analysis
Antenna 3D
modelling
Site surveys and
modeling
Precision
Agriculture
5. POC HIGH LEVEL SYSTEM VIEW
Dubai city
Video, Thermal,
Sensors info collection
RTA Control Center
Partner analytics
Streaming in Cisco
Collab and RTA portal
• Traffic management
3.0
• Project status
analysis
• Road and
transportation
enhanced safety
6. Anatomy of a smart connected drone/sensor
Control Center
Fight Control center
Drone
Flight control
system
Photogram.
Camera
Thermal
Radio
(no 4g)
GAS Sensor
Other sensors
Security
Mission planner
IoT
Dhara
With 4G
DevIot
Camera GPS
Video Streaming
Spark
Analytics
Collaboration
7. Smart Drone demo @ Cisco Live, Berlin - Architecture
Video from the Drone
On the DX80
Video from the SX10
Shared in a CMR
DevIoT
Sensors connected
To Dhara Compute box
Triggered notifications
Spark/Tropo
Triggered SMSs
https://developer.cisco.com/site/iot/
8. REMOTE SURVEILLANCE AND ASSETS ANALYSIS
• Geo-referenced catalogue of assets
• Web access, easy to consume
• Analytics and post processing info
• Geo referenced information
• 3D model for change detection and analysis
• Further processing with specialized partners
(e.g. Vectorialization for CAD)
11. QUALITY OF AIR ANALYSIS
• Leverage drone flexibility to perform air analysis at multiple
altitudes and locations
• Real time with flexible sensors configurations
• Collecting air samples for further specific analysis in labs
• Possibility to create dispersion model based on multiple
parameters (weather, time, etc.)
• Reduced risks for people
• Extremely flexible and safe operations, based on professional
multi-rotors and highly qualified pilots
12. SENSORS AND DRONES – ENABLING DIGITIZATION
• It’s not (only) about the drone, It’s about the capability to create end
to end solutions combining drones, sensors and algorithms/APIS
• Collaboration and IoT are key enablers for drones enabled services
• A developer ecosystem is vital to address multiple verticals
• Cisco technologies combined with partner competencies to enable
innovative solutions and fit new use cases