The presentation provides an introduction to the emulation world, in particular to the mythical Commodore 64 and its peripherals, like disk drive, printer, cartridges. To truly emulate the software written for this 8-bit home computer it is mandatory to be much accurate as possible and reproduce every single aspect of the real machine, starting from the chips that compose the hardware architecture. Beside the emulation topics the presentation faces some Scala performance issues that come up when you have to optimize low level operations. At the end I'll show you a demo where we'll see the emulator running a game and a demo-scene, one of the hardest software to emulate.
The Ultimate Commodore 64 with Stereo sound, four joystick ports, joystick/mouse switcher, four selectable Kernals, reset switch, IDE, Compact Flash, 20GB hard drive, CD-ROM, USB, Ethernet, and uses a Commodore 128 power supply. But still runs at 1 MHz and has 64K RAM!
http://www.youtube.com/watch?v=VRmkvi4hoic&list=UUENtvIcXeW0GERUrR2j8Lqw
Modified Commodore VIC-20: Built-in uIEC with Compact Flash, JiffyDOS, 64C Keyboard, Blue LED, and Reset Button. But still runs at 1 MHz and has 3.5K RAM!
Kernel Recipes 2017 - What's inside the input stack? - Benjamain TissoiresAnne Nicolas
Everybody uses at least one input device when dealing with a computer. And hopefully, this input device “just” works. However, when dealing with the brand-new latest laptop model, it’s common enough that the input devices are not working, or are not working as expected by the users. The reasons are manifold: OEMs want to have more power efficient laptops and are generally refusing to use well-tested PS/2 ball mice from 15 years ago. So they are introducing new touchpads using weird communication protocols. Or they simply want to introduce brand new types of interaction with their laptops (think the latest Macbook Pro and their function bar, but Lenovo had something equivalent 3 years ago on their X1 Carbon). Alongside new devices came the development of Wayland. The end result is that the input stack has evolved a lot in the past few years, and it’s a good thing to give an update of it.
In this talk, we will present what work has been conducted throughout the whole input stack, from the kernel to toolkits (with an emphasize on the kernel). We will explain the choices we made, and why the plans don’t always work. After an overview of the full input stack in current distributions, we will outline the development efforts to support the various device types (mice, touchpads, touchscreens, etc.). Of course, we will tell you the most crusty problems we had to face because who doesn’t like a nice anecdote about hardware oddities.
We hope to make a pleasant talk where no requirements is necessary. We also hope attendees will learn how the input stack is structured. And of course, we hope the attendees will have a more compassionate eye regarding their preferred mouse, touchpad, keyboard or any other device, thinking of the dedication we put in to make their life easier (one can always hope).
Benjamin Tissoire, Red Hat
The presentation provides an introduction to the emulation world, in particular to the mythical Commodore 64 and its peripherals, like disk drive, printer, cartridges. To truly emulate the software written for this 8-bit home computer it is mandatory to be much accurate as possible and reproduce every single aspect of the real machine, starting from the chips that compose the hardware architecture. Beside the emulation topics the presentation faces some Scala performance issues that come up when you have to optimize low level operations. At the end I'll show you a demo where we'll see the emulator running a game and a demo-scene, one of the hardest software to emulate.
The Ultimate Commodore 64 with Stereo sound, four joystick ports, joystick/mouse switcher, four selectable Kernals, reset switch, IDE, Compact Flash, 20GB hard drive, CD-ROM, USB, Ethernet, and uses a Commodore 128 power supply. But still runs at 1 MHz and has 64K RAM!
http://www.youtube.com/watch?v=VRmkvi4hoic&list=UUENtvIcXeW0GERUrR2j8Lqw
Modified Commodore VIC-20: Built-in uIEC with Compact Flash, JiffyDOS, 64C Keyboard, Blue LED, and Reset Button. But still runs at 1 MHz and has 3.5K RAM!
Kernel Recipes 2017 - What's inside the input stack? - Benjamain TissoiresAnne Nicolas
Everybody uses at least one input device when dealing with a computer. And hopefully, this input device “just” works. However, when dealing with the brand-new latest laptop model, it’s common enough that the input devices are not working, or are not working as expected by the users. The reasons are manifold: OEMs want to have more power efficient laptops and are generally refusing to use well-tested PS/2 ball mice from 15 years ago. So they are introducing new touchpads using weird communication protocols. Or they simply want to introduce brand new types of interaction with their laptops (think the latest Macbook Pro and their function bar, but Lenovo had something equivalent 3 years ago on their X1 Carbon). Alongside new devices came the development of Wayland. The end result is that the input stack has evolved a lot in the past few years, and it’s a good thing to give an update of it.
In this talk, we will present what work has been conducted throughout the whole input stack, from the kernel to toolkits (with an emphasize on the kernel). We will explain the choices we made, and why the plans don’t always work. After an overview of the full input stack in current distributions, we will outline the development efforts to support the various device types (mice, touchpads, touchscreens, etc.). Of course, we will tell you the most crusty problems we had to face because who doesn’t like a nice anecdote about hardware oddities.
We hope to make a pleasant talk where no requirements is necessary. We also hope attendees will learn how the input stack is structured. And of course, we hope the attendees will have a more compassionate eye regarding their preferred mouse, touchpad, keyboard or any other device, thinking of the dedication we put in to make their life easier (one can always hope).
Benjamin Tissoire, Red Hat
Kernel Recipes 2017 - The Serial Device Bus - Johan HovoldAnne Nicolas
UARTs and RS-232 have been around since the 1960s, and despite the advent of technologies like USB and PCIe, it seems UART-attached devices are not going away anytime soon. In embedded systems, UARTs are a
commonly used peripheral interface (e.g. for Bluetooth, NFC, and GPS) even if the kernel infrastructure for dealing with such devices has been both limited in what it can provide (e.g. in terms of power management) and cumbersome to use (e.g. requiring user-space daemons).
This presentation will give an introduction to the recently merged Serial Device Bus, which aims to overcome some of these limitations by making UART-attached devices fit better into the Linux device model. After providing some historical background, the design and interfaces of the new bus will be reviewed, and some known limitations and possibilities for future enhancements will be discussed.
Johan Hovold
OzKFest 2015 - (Solid) State of the Nationapple2europlus
My presentation at OzKFest 2015 was an overview of solid state storage options for the Apple ][, ][+, //e, IIgs and //c line of retrocomputers (with occasional mention of other machines such as early Macs and Lisas). This included both modifications/add-ons to existing interfaces and via new storage solutions. The OzKFest 2015 conference was held in Keysborough, Victoria, Australia from 17-19 April 2015.
Alex's presentation from OzKFest 2015 covers the output of serial video data from Apple IIe and IIc computers and presents hardware and software to convert that data into a USB stream that can be displayed within a window on a laptop or other device.
Find out more on Alex's blog:
http://lukazi.blogspot.com.au/search?q=A2VideoStreamer
In this presentation from OzKFest 2015, I contemplate various methods to connect an Apple II host running a BBS to the internet for others to 'call' without the need for a modem.
I describe the Lantronix UDS100 serial server device and how I configured it to connect a physical Apple IIgs to the internet and show how to connect to it from an emulated Apple IIgs.
ELC North America 2021 Introduction to pin muxing and gpio control under linuxNeil Armstrong
In the last 10 years, the GPIO and PINCTRL subsystem matured to support almost every possible handling of Programmable Input/Outputs and more generally multiplexing of multiple functions on single "Pins" or group of "Pins". However, what is a "Pin"? What is a multiplexed "Function"? How programmable I/Os and pin functions are designed on the majority of System-On-Chips? Neil will describe this from the Hardware design Point-Of-View, the constraints and the requirements. Then Neil will explain how this particular subject was handled over the years in the Linux kernel, to finally get to the current GPIO & PINCTRL subsystems, and how it articulates with the Device Tree and other Firmware based protocols.
Interacting with Intel Edison
with Esther Jun Kim
Presented at FITC Toronto 2015
More info at www.fitc.ca
OVERVIEW
This talk will introduce the audience to Intel Edison, Intel’s newest maker platform. It will show how Edison can be transformed into a smart, natural device by teaching it to see and hear while retaining its small form factor.
The talk will also briefly describe how to interface Edison with simple supplementary hardware to create a programmable, voice-controlled system.
OBJECTIVE
Highlight the possibilities of Speech Interaction with Maker Devices.
TARGET AUDIENCE
Developers, designers, programmers.
FIVE THINGS AUDIENCE MEMBERS WILL LEARN
What’s Intel Edison.
How Language Models Work.
Simple Circuits.
About LEDs.
Voice Interaction.
Since the switch of the ARM Linux support from the stable PowerPC Device Tree support, it became an important piece of software used to describe all sorts of devices based on very different hardware architectures.
Currently, BSD* Unixes and even the Zephyr RTOS has switched to Device Tree to describe the hardware. U-boot has also a file format using the Device Tree blob format.
Neil will present you the history of Device Tree from its origins, how it has been used for ARM and now RISC-V from the PowerPC codebase, all the very different current usage and an overview of its future application and evolutions.
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...Neil Armstrong
Porting and maintaining Linux for a Multimedia SoC is one thing (already very complex), but without a proper Bootloader, how would we do ? For the last 4 Years, we were pushing Upstream Linux support for the Amlogic Multimedia SoCs with very well-known Single Board Computers like Odroid-C2, Libre Computer Le Potato, Khadas VIMs... but a key point was missing until 2 years ago: a clean Bootloader. We only relied on the Vendor Bootloader, but it quickly became an issue for various reasons: - was complex to rebuild - even more complex to enhance and fix - did some weird and quirkly hardware enablement before linux - was confusing because the vendor Bootloader behavior changed over time So we implemented an all-most complete U-Boot support for these Amlogic SoCs, including HDMI video support and support Android AOSP boot. And a big bonus appeared: we got UEFI support for free ! Neil will go through all the development process, what we achieved, the remaining work and how U-Boot maintenance and code quality evolved over time.
Linux Conference Australia 2018 : Device Tree, past, present, futureNeil Armstrong
Since the switch of the ARM Linux support from the stable PowerPC Device Tree support, it became an important piece of software used to describe all sorts of devices based on very different hardware architectures.
Currently, BSD* Unixes and even the Zephyr RTOS has switched to Device Tree to describe the hardware. U-boot has also a file format using the Device Tree blob format.
Neil will present you the history of Device Tree from its origins, how it has been used for ARM from the PowerPC codebase, all the very different current usage and an overview of its future application and evolutions.
A talk I gave at Hackware v1.9 about my experience in using an Intel Edison in my company's product.
The video of my talk can be found here: https://engineers.sg/v/828
Talk given in Hackware about the details behind my PCB business card. More detailed information can be found in my blog post:
http://yeokhengmeng.com/2015/09/pcb-businessname-card/
or Github repo
https://github.com/yeokm1/pcb-name-card
A Quick Introduction to Programmable LogicOmer Kilic
Slides from my talk on Programmable Logic at the Open Source Hardware Users Group Meeting #9 in London on the 21st of April 2011.
More details about the event at: http://oshug.org/event/9
An overview of the slides at:
http://omer.me/2011/05/a-quick-introduction-to-programmable-logic
Kernel Recipes 2017 - The Serial Device Bus - Johan HovoldAnne Nicolas
UARTs and RS-232 have been around since the 1960s, and despite the advent of technologies like USB and PCIe, it seems UART-attached devices are not going away anytime soon. In embedded systems, UARTs are a
commonly used peripheral interface (e.g. for Bluetooth, NFC, and GPS) even if the kernel infrastructure for dealing with such devices has been both limited in what it can provide (e.g. in terms of power management) and cumbersome to use (e.g. requiring user-space daemons).
This presentation will give an introduction to the recently merged Serial Device Bus, which aims to overcome some of these limitations by making UART-attached devices fit better into the Linux device model. After providing some historical background, the design and interfaces of the new bus will be reviewed, and some known limitations and possibilities for future enhancements will be discussed.
Johan Hovold
OzKFest 2015 - (Solid) State of the Nationapple2europlus
My presentation at OzKFest 2015 was an overview of solid state storage options for the Apple ][, ][+, //e, IIgs and //c line of retrocomputers (with occasional mention of other machines such as early Macs and Lisas). This included both modifications/add-ons to existing interfaces and via new storage solutions. The OzKFest 2015 conference was held in Keysborough, Victoria, Australia from 17-19 April 2015.
Alex's presentation from OzKFest 2015 covers the output of serial video data from Apple IIe and IIc computers and presents hardware and software to convert that data into a USB stream that can be displayed within a window on a laptop or other device.
Find out more on Alex's blog:
http://lukazi.blogspot.com.au/search?q=A2VideoStreamer
In this presentation from OzKFest 2015, I contemplate various methods to connect an Apple II host running a BBS to the internet for others to 'call' without the need for a modem.
I describe the Lantronix UDS100 serial server device and how I configured it to connect a physical Apple IIgs to the internet and show how to connect to it from an emulated Apple IIgs.
ELC North America 2021 Introduction to pin muxing and gpio control under linuxNeil Armstrong
In the last 10 years, the GPIO and PINCTRL subsystem matured to support almost every possible handling of Programmable Input/Outputs and more generally multiplexing of multiple functions on single "Pins" or group of "Pins". However, what is a "Pin"? What is a multiplexed "Function"? How programmable I/Os and pin functions are designed on the majority of System-On-Chips? Neil will describe this from the Hardware design Point-Of-View, the constraints and the requirements. Then Neil will explain how this particular subject was handled over the years in the Linux kernel, to finally get to the current GPIO & PINCTRL subsystems, and how it articulates with the Device Tree and other Firmware based protocols.
Interacting with Intel Edison
with Esther Jun Kim
Presented at FITC Toronto 2015
More info at www.fitc.ca
OVERVIEW
This talk will introduce the audience to Intel Edison, Intel’s newest maker platform. It will show how Edison can be transformed into a smart, natural device by teaching it to see and hear while retaining its small form factor.
The talk will also briefly describe how to interface Edison with simple supplementary hardware to create a programmable, voice-controlled system.
OBJECTIVE
Highlight the possibilities of Speech Interaction with Maker Devices.
TARGET AUDIENCE
Developers, designers, programmers.
FIVE THINGS AUDIENCE MEMBERS WILL LEARN
What’s Intel Edison.
How Language Models Work.
Simple Circuits.
About LEDs.
Voice Interaction.
Since the switch of the ARM Linux support from the stable PowerPC Device Tree support, it became an important piece of software used to describe all sorts of devices based on very different hardware architectures.
Currently, BSD* Unixes and even the Zephyr RTOS has switched to Device Tree to describe the hardware. U-boot has also a file format using the Device Tree blob format.
Neil will present you the history of Device Tree from its origins, how it has been used for ARM and now RISC-V from the PowerPC codebase, all the very different current usage and an overview of its future application and evolutions.
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...Neil Armstrong
Porting and maintaining Linux for a Multimedia SoC is one thing (already very complex), but without a proper Bootloader, how would we do ? For the last 4 Years, we were pushing Upstream Linux support for the Amlogic Multimedia SoCs with very well-known Single Board Computers like Odroid-C2, Libre Computer Le Potato, Khadas VIMs... but a key point was missing until 2 years ago: a clean Bootloader. We only relied on the Vendor Bootloader, but it quickly became an issue for various reasons: - was complex to rebuild - even more complex to enhance and fix - did some weird and quirkly hardware enablement before linux - was confusing because the vendor Bootloader behavior changed over time So we implemented an all-most complete U-Boot support for these Amlogic SoCs, including HDMI video support and support Android AOSP boot. And a big bonus appeared: we got UEFI support for free ! Neil will go through all the development process, what we achieved, the remaining work and how U-Boot maintenance and code quality evolved over time.
Linux Conference Australia 2018 : Device Tree, past, present, futureNeil Armstrong
Since the switch of the ARM Linux support from the stable PowerPC Device Tree support, it became an important piece of software used to describe all sorts of devices based on very different hardware architectures.
Currently, BSD* Unixes and even the Zephyr RTOS has switched to Device Tree to describe the hardware. U-boot has also a file format using the Device Tree blob format.
Neil will present you the history of Device Tree from its origins, how it has been used for ARM from the PowerPC codebase, all the very different current usage and an overview of its future application and evolutions.
A talk I gave at Hackware v1.9 about my experience in using an Intel Edison in my company's product.
The video of my talk can be found here: https://engineers.sg/v/828
Talk given in Hackware about the details behind my PCB business card. More detailed information can be found in my blog post:
http://yeokhengmeng.com/2015/09/pcb-businessname-card/
or Github repo
https://github.com/yeokm1/pcb-name-card
A Quick Introduction to Programmable LogicOmer Kilic
Slides from my talk on Programmable Logic at the Open Source Hardware Users Group Meeting #9 in London on the 21st of April 2011.
More details about the event at: http://oshug.org/event/9
An overview of the slides at:
http://omer.me/2011/05/a-quick-introduction-to-programmable-logic
NetFlow Monitoring for Cyber Threat DefenseCisco Canada
Recent trends have led to the erosion of the security perimeter and increasingly attackers are gaining operational footprints on the network interior. For more information, please visit our website: http://www.cisco.com/web/CA/index.html
Internet Of Things: Hands on: YOW! nightAndy Gelme
Introduction to the Internet Of Things ... using the MeshThing hardware running Contiki mesh-networking software for IPv6 / 6LoWPAN. Also, Daryl Wilding McBride (@darylwmcb) covers building a quadcopter for the Outback Joe competition.
Preparing to program Aurora at Exascale - Early experiences and future direct...inside-BigData.com
In this deck from IWOCL / SYCLcon 2020, Hal Finkel from Argonne National Laboratory presents: Preparing to program Aurora at Exascale - Early experiences and future directions.
"Argonne National Laboratory’s Leadership Computing Facility will be home to Aurora, our first exascale supercomputer. Aurora promises to take scientific computing to a whole new level, and scientists and engineers from many different fields will take advantage of Aurora’s unprecedented computational capabilities to push the boundaries of human knowledge. In addition, Aurora’s support for advanced machine-learning and big-data computations will enable scientific workflows incorporating these techniques along with traditional HPC algorithms. Programming the state-of-the-art hardware in Aurora will be accomplished using state-of-the-art programming models. Some of these models, such as OpenMP, are long-established in the HPC ecosystem. Other models, such as Intel’s oneAPI, based on SYCL, are relatively-new models constructed with the benefit of significant experience. Many applications will not use these models directly, but rather, will use C++ abstraction libraries such as Kokkos or RAJA. Python will also be a common entry point to high-performance capabilities. As we look toward the future, features in the C++ standard itself will become increasingly relevant for accessing the extreme parallelism of exascale platforms.
This presentation will summarize the experiences of our team as we prepare for Aurora, exploring how to port applications to Aurora’s architecture and programming models, and distilling the challenges and best practices we’ve developed to date. oneAPI/SYCL and OpenMP are both critical models in these efforts, and while the ecosystem for Aurora has yet to mature, we’ve already had a great deal of success. Importantly, we are not passive recipients of programming models developed by others. Our team works not only with vendor-provided compilers and tools, but also develops improved open-source LLVM-based technologies that feed both open-source and vendor-provided capabilities. In addition, we actively participate in the standardization of OpenMP, SYCL, and C++. To conclude, I’ll share our thoughts on how these models can best develop in the future to support exascale-class systems."
Watch the video: https://wp.me/p3RLHQ-lPT
Learn more: https://www.iwocl.org/iwocl-2020/conference-program/
and
https://www.anl.gov/topic/aurora
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
I was asked to talk in front of Computer science students at the Bar-Ilan university about "what happens" when you don't care about writing "secured" or "safe" code. A perfect example for that, in my opinion, was the world of embedded computing AKA the IoT. I talked about the history of consumer embedded devices and showed a live demo of an 0day I found in one of the most popular routers in the country.
A presentation about UCS and usNIC to the Math & Computer Science and Leadership Computing Facility divisions at Argonne National Laboratory (ANL). Presented to ANL by Dave Goodell (Cisco) on 2014-09-02.
How to Use GSM/3G/4G in Embedded Linux SystemsToradex
The number of embedded devices that are connected to the internet is growing each day. Nowadays, they are installed majorly using a wireless connection. They need mobile network coverage to be connected to the internet. Read our next blog which tells you about the various configurations to connect a device such as Colibri iMX6S with the Colibri Evaluation Board running Linux to the internet through the PPP (Point-to-Point Protocol) link. Read More: https://www.toradex.com/blog/how-to-use-gsm-3g-4g-in-embedded-linux-systems
Similar to Internet Technology for the Commodore 64 (20)
The one that started it all! My presentation at SWRAP 2003 on my Telnetable Commodore BBS, which is still running today (2013) and has spawned many successors.
Check out http://cbbsoutpost.servebbs.com/ for the current list!
The Dancer From The Dance: Mapping Motion With Sound Via Radio TransmissionLeif Bloomquist
We present our work on the development of a device by which a dancer may wirelessly transmit bodily motion to a MIDI-capable device or computer in order to produce or alter sound, creating music that is immediately integrated with and inseparable from the dance.
To begin we briefly consider the history of movement mapping and dance notation. Moving into more recent history, we then present the technology employed (Arduino).
An accelerometer measures the motion. The x/y/z components are scaled and inserted into a MIDI message, which is then transmitted to a receiver and can be interpreted by any MIDI device. The motions can be mapped to parameters such as filters, pitch, etc., allowing the dancer to affect any sound that can be created electronically.
Several short vignettes will be used to demonstrate the device, followed by a three-minute piece showing the techniques working together as a whole.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
1. Internet Technology for theInternet Technology for the
Commodore 64Commodore 64
Leif BloomquistLeif Bloomquist
World of Commodore 2007World of Commodore 2007
2. Why TCP/IP (and Ethernet)?Why TCP/IP (and Ethernet)?
Novelty! (“Chindogu” in Japanese)Novelty! (“Chindogu” in Japanese)
Useful for data transfer between C64 and PC/MacUseful for data transfer between C64 and PC/Mac
Useful tools (terminal programs, crossdev, etc.)Useful tools (terminal programs, crossdev, etc.)
Games (coming slooowly)Games (coming slooowly)
This talk only addresses “true” Ethernet solutions, butThis talk only addresses “true” Ethernet solutions, but
other approaches (dialup, PPP, gateways) exist.other approaches (dialup, PPP, gateways) exist.
4. The TCP/IP Stack ModelThe TCP/IP Stack Model
Email, WWW, FTP, etc. (Data)Email, WWW, FTP, etc. (Data)
TCP,UDP (Connections or Paths)TCP,UDP (Connections or Paths)
IP (Packets)IP (Packets)
Ethernet (Frames)Ethernet (Frames)
CAT5 (Bits / Voltages)CAT5 (Bits / Voltages)Physical
Data Link
Network
Transport
Application
5. Layers “talk” to their equivalent on either endLayers “talk” to their equivalent on either end
Physical
Data Link
Network
Transport
Application
Physical
Data Link
Network
Transport
Application
Virtual
Connection
Physical
Connection
Computer AComputer A Computer BComputer B
6. Who Provides Which Parts?Who Provides Which Parts?
Physical
Data Link
Network
Transport
Application
Your program!
Operating System
Network Card
Physical Cable
7. A Simple Ethernet NetworkA Simple Ethernet Network
Computer #1
192.168.1.101
MAC: 00-90-4B-1F-13-17
Gateway
Private IP: 192.168.1.1
MAC: 00-40-41-14-20-61
Public IP: 216.3.6.99
MAC: 00-30-44-17-95-45Computer #3
192.168.1.103
MAC: 00-80-1B-34-55-16
Other
Segment
s
(Internet)
Computer #2
192.168.1.102
MAC: 00-90-4B-14-23-65
9. Transport Control Protocol (TCP)Transport Control Protocol (TCP)
““Phone call”Phone call”
Guarantees delivery and packet order.Guarantees delivery and packet order.
Heartbeats, ACKs and timeouts built-in.Heartbeats, ACKs and timeouts built-in.
More background “stuff” on network.More background “stuff” on network.
Use when the data must arrive, but timing isUse when the data must arrive, but timing is
not important.not important.
10. User Datagram Protocol (UDP)User Datagram Protocol (UDP)
““Postcard”Postcard”
No guarantees.No guarantees.
Heartbeats, checksums, ACKs and timeoutsHeartbeats, checksums, ACKs and timeouts
provided by...you! (if needed)provided by...you! (if needed)
Use when fast/predictable delivery is need,Use when fast/predictable delivery is need,
but can tolerate lost or out-of order of data.but can tolerate lost or out-of order of data.
12. RR-NetRR-Net
Also requires one of:Also requires one of:
Retro Replay CartridgeRetro Replay Cartridge
MMC64 CartridgeMMC64 Cartridge
IDE64 V4 (In development)IDE64 V4 (In development)
De facto StandardDe facto Standard
Approximate Cost: $75 for RR-Net onlyApproximate Cost: $75 for RR-Net only
13. ETH64ETH64
Also requires an IDE64Also requires an IDE64
Not RR-Net compatibleNot RR-Net compatible
Approximate Cost: $100 for ETH64 onlyApproximate Cost: $100 for ETH64 only
14. C64NICC64NIC
In developmentIn development
RR-Net compatibleRR-Net compatible
StandaloneStandalone
Based on original “The Final Ethernet” prototype by AdamBased on original “The Final Ethernet” prototype by Adam
Dunkels and Net64 by Till HarbaumDunkels and Net64 by Till Harbaum
Approximate Cost: $50?Approximate Cost: $50?
15. ““Super Snapshot Pro” (Tentative Name)Super Snapshot Pro” (Tentative Name)
In developmentIn development
95% RR-Net compatible95% RR-Net compatible
Compatible with Super Snapshot 5Compatible with Super Snapshot 5
Flash card reader (similar to MMC64)Flash card reader (similar to MMC64)
Approximate Cost:?Approximate Cost:?
16. More hardware to come?More hardware to come?
Enhanced TFE - in developmentEnhanced TFE - in development
Other products soon?Other products soon?
18. ContikiContiki
Multitasking O/S for C64 with Web Browser, Web Server, Telnet Client, Email,Multitasking O/S for C64 with Web Browser, Web Server, Telnet Client, Email,
IRC, and more!IRC, and more!
21. Warpcopy64Warpcopy64
Ultra-fast disk and program transferUltra-fast disk and program transfer
Turn a 1541 disk into a .D64 in 22 secondsTurn a 1541 disk into a .D64 in 22 seconds
Drag&drop files between C64 and PCDrag&drop files between C64 and PC
Only Supports RR-NetOnly Supports RR-Net
Network
23. UDPSlave and NetmonUDPSlave and Netmon
View/manipulate C64 memory from a PC over EthernetView/manipulate C64 memory from a PC over Ethernet
24. The Final Replay ROMThe Final Replay ROM
Optional ROM for theOptional ROM for the
Retro Replay CartridgeRetro Replay Cartridge
CodeNet:CodeNet:
Command-line tool for the PC for cross-developmentCommand-line tool for the PC for cross-development
Send code and data from PC to C64 over the networkSend code and data from PC to C64 over the network
Execute code remotelyExecute code remotely
NetDrive:NetDrive:
Use your PC’s hard drive as a virtual drive for C64Use your PC’s hard drive as a virtual drive for C64
25. Artillery Duel NetworkArtillery Duel Network
Proof-of-concept networked game between two C64s over the InternetProof-of-concept networked game between two C64s over the Internet
Uses the netlib64 stackUses the netlib64 stack
Internet
Commodore 64 #1 Commodore 64 #2
26. Libraries and StacksLibraries and Stacks
uIPuIP – The core of– The core of ContikiContiki. Written in C. Not tied to. Written in C. Not tied to
any particular hardware. All major protocols.any particular hardware. All major protocols.
netlib64netlib64 – A very lightweight all-ML library. Written– A very lightweight all-ML library. Written
in DASM assembler. Supportsin DASM assembler. Supports RR-NetRR-Net andand
ETH64ETH64. Supports UDP, but not TCP (yet).. Supports UDP, but not TCP (yet).
ip65ip65 – Written in ca65 assembler. Supports– Written in ca65 assembler. Supports RR-RR-
NetNet only. Supports UDP, but not TCP (yet).only. Supports UDP, but not TCP (yet).
27. VICE Emulator SupportVICE Emulator Support
Emulates RR-Net or TFEEmulates RR-Net or TFE
Emulation 95% accurateEmulation 95% accurate
28. The Future?The Future?
(What I’d like to see)(What I’d like to see)
A cheap, completely standalone EthernetA cheap, completely standalone Ethernet
cartridge.cartridge.
A standard interface to the all cartridgesA standard interface to the all cartridges
(similar to RR-Net)(similar to RR-Net)
More games!!More games!!