(LinuxCon Japan 2016)
Linux has become one of the most important software to run the Civil Infrastructure Systems such as power plants, water distribution, traffic control and healthcare. However, existing software platforms are not yet industrial grade (in addressing safety, reliability and other requirements for infrastructure). At the same time, rapid advances in machine-to-machine connectivity are driving change in industrial system architectures.
The Linux Foundation establishes "Civil Infrastructure Platform(CIP)" as a new collaborative project. CIP aims to develop a super long-term supported open source "base layer" of industrial grade software. This base layer enables the use of software building blocks that meet requirements of industrial and civil infrastructure projects. In this talk, we will explain the technical details and focuses of this project.
Linux has become one of the most important software to run the civil infrastructure systems such as power plants, water distribution, traffic control and healthcare. From computer system viewpoint, the systems require a very high level of quality on real-time performance, reliability and security to avoid serious failure. To overcome the issues to apply Linux on such systems, as the first step, we need to gather the actual requirements. Past few months, some companies who are interested in this area actually got together and discussed to put those requirements together. In this talk, we would like to share the current status of this requirement discussion and our future collaboration plan. Please join us to improve Linux together and make the world better place!
The Civil Infrastructure Platform (CIP) - launched in April - CIP defined and started to realize a super long-term supported open source "base layer" for industrial grade software. This base layer aims to be used for current and future industrial systems which supports machine-to-machine connectivity for digital future. This kind of systems, being the field for decades, should have long-term support for security and robustness reasons. In this talk, we will show the first steps on CIP development. This includes initial set of components for the base layer and its maintainers. Are you ready? It’s time to start your development with and for the CIP.
Using open source software to build an industrial grade embedded linux platfo...SZ Lin
Building an embedded Linux platform is like a puzzle; placing the suitable software components in the right positions will constitute an optimal platform. However, selecting suitable components is difficult since it depends on different application scenarios. The essential components of an embedded Linux platform include the bootloader, Linux kernel, toolchain, root filesystem; it also needs the tools for image generation, upgrades, and testing. There are abundant resources in the Linux ecosystem with these components and tools; however, selecting the suitable modules and tools is still a key challenge for system designers.
It's a pivotal challenge to update the software in embedded systems due to many restrictions such as unreliable network and power supply, limited bandwidth, harsh environment, etc. This slide aims to provide the background knowledge and the open source tool to achieve the software update in embedded systems.
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
Safety certification is one of the essential requirements for software to be used in highly regulated industries. The Xen Project, a secure and stable hypervisor that is used in many different markets, has been exploring the feasibility of building safety certified products on top of Xen for a year, looking at key aspects of its code base and development practices.
In this session, we will lay out the motivation and challenges of making safety certification achievable in open source and the Xen Project. We will outline the process the project has followed thus far and highlight lessons learned along the way. The talk will cover technical enablers, necessary process and tooling changes and community challenges offering an in-depth review of how Xen Project is approaching this exciting and and challenging goal.
Linux has become one of the most important software to run the civil infrastructure systems such as power plants, water distribution, traffic control and healthcare. From computer system viewpoint, the systems require a very high level of quality on real-time performance, reliability and security to avoid serious failure. To overcome the issues to apply Linux on such systems, as the first step, we need to gather the actual requirements. Past few months, some companies who are interested in this area actually got together and discussed to put those requirements together. In this talk, we would like to share the current status of this requirement discussion and our future collaboration plan. Please join us to improve Linux together and make the world better place!
The Civil Infrastructure Platform (CIP) - launched in April - CIP defined and started to realize a super long-term supported open source "base layer" for industrial grade software. This base layer aims to be used for current and future industrial systems which supports machine-to-machine connectivity for digital future. This kind of systems, being the field for decades, should have long-term support for security and robustness reasons. In this talk, we will show the first steps on CIP development. This includes initial set of components for the base layer and its maintainers. Are you ready? It’s time to start your development with and for the CIP.
Using open source software to build an industrial grade embedded linux platfo...SZ Lin
Building an embedded Linux platform is like a puzzle; placing the suitable software components in the right positions will constitute an optimal platform. However, selecting suitable components is difficult since it depends on different application scenarios. The essential components of an embedded Linux platform include the bootloader, Linux kernel, toolchain, root filesystem; it also needs the tools for image generation, upgrades, and testing. There are abundant resources in the Linux ecosystem with these components and tools; however, selecting the suitable modules and tools is still a key challenge for system designers.
It's a pivotal challenge to update the software in embedded systems due to many restrictions such as unreliable network and power supply, limited bandwidth, harsh environment, etc. This slide aims to provide the background knowledge and the open source tool to achieve the software update in embedded systems.
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
Safety certification is one of the essential requirements for software to be used in highly regulated industries. The Xen Project, a secure and stable hypervisor that is used in many different markets, has been exploring the feasibility of building safety certified products on top of Xen for a year, looking at key aspects of its code base and development practices.
In this session, we will lay out the motivation and challenges of making safety certification achievable in open source and the Xen Project. We will outline the process the project has followed thus far and highlight lessons learned along the way. The talk will cover technical enablers, necessary process and tooling changes and community challenges offering an in-depth review of how Xen Project is approaching this exciting and and challenging goal.
This is daily increasing. More relevant
http://publications.computer.org/software-magazine/2017/11/16/automotive-engineering-software-and-agile-development/
Chapter 7 of the famous saga "the DO-254 for Dummies" from James BEZAMAT director of DMAP
subject : IP and verification process
More : dmap.fr
contact : contact@dmap.fr
MILS is a component-based approach to secure and dependable systems design and implementation that encourages a marketplace of general-purpose commercial components, leading to lower development cost
MILS is a two phase approach (John Rushby’s “Modern MILS”):
Design a Policy Architecture
Abstract architecture diagram represented by “boxes and arrows”
Operational components and architecture achieve system purpose
Assumes the architecture (components and connectors) will be strictly enforced in the implementation
Implement the policy architecture on a robust resource-sharing platform
MILS foundational components (FCs) enable sharing of physical resources, creating strongly separated “exported resources”
FCs should be individually developed and assured according to standardized specifications
FCs compose “additively” to form a distributed trusted sharing substrate, the MILS Platform
MILS provides a compositional approach to construction, assurance, and system certification
Forrester On Using Subversion to Optimize Globally Distributed DevelopmentWANdisco Plc
This webinar discusses the findings of a recently commissioned Forrester Consulting Total Economic ImpactTM (TEI) study of WANdisco's SVN MultiSite. Forrester's TEI methodology measures costs and cost reduction and weighs the enabling value of a technology in increasing the effectiveness of overall business processes. The subject of the study was a Fortune 500 company with annual revenues of over $5 billion, with SVN MultiSite in production in the US, UK, and India. Forrester concluded that SVN MultiSite generated a return on investment (ROI) of 357% with a payback period of less than 2 months.
Many large organizations recognize the value of open source solutions such as Subversion, but require the security provided by a commercial software vendor's support contract. With core developers from the project on staff and solutions that support the world's largest Subversion implementations, WANdisco is uniquely qualified to deliver the enterprise-class support services that these organizations expect to eliminate the risks of implementing an open source solution such as Subversion from both a business continuity as well as a legal perspective. We offer indemnification coverage that protects our customers from intellectual property claims that can arise from the use of open source software.
WANdisco offers four levels of Subversion support: Silver, Gold, Platinum and Platinum Plus. See the table below and read why you should choose WANdisco for your Subversion support.
This is daily increasing. More relevant
http://publications.computer.org/software-magazine/2017/11/16/automotive-engineering-software-and-agile-development/
Chapter 7 of the famous saga "the DO-254 for Dummies" from James BEZAMAT director of DMAP
subject : IP and verification process
More : dmap.fr
contact : contact@dmap.fr
MILS is a component-based approach to secure and dependable systems design and implementation that encourages a marketplace of general-purpose commercial components, leading to lower development cost
MILS is a two phase approach (John Rushby’s “Modern MILS”):
Design a Policy Architecture
Abstract architecture diagram represented by “boxes and arrows”
Operational components and architecture achieve system purpose
Assumes the architecture (components and connectors) will be strictly enforced in the implementation
Implement the policy architecture on a robust resource-sharing platform
MILS foundational components (FCs) enable sharing of physical resources, creating strongly separated “exported resources”
FCs should be individually developed and assured according to standardized specifications
FCs compose “additively” to form a distributed trusted sharing substrate, the MILS Platform
MILS provides a compositional approach to construction, assurance, and system certification
Forrester On Using Subversion to Optimize Globally Distributed DevelopmentWANdisco Plc
This webinar discusses the findings of a recently commissioned Forrester Consulting Total Economic ImpactTM (TEI) study of WANdisco's SVN MultiSite. Forrester's TEI methodology measures costs and cost reduction and weighs the enabling value of a technology in increasing the effectiveness of overall business processes. The subject of the study was a Fortune 500 company with annual revenues of over $5 billion, with SVN MultiSite in production in the US, UK, and India. Forrester concluded that SVN MultiSite generated a return on investment (ROI) of 357% with a payback period of less than 2 months.
Many large organizations recognize the value of open source solutions such as Subversion, but require the security provided by a commercial software vendor's support contract. With core developers from the project on staff and solutions that support the world's largest Subversion implementations, WANdisco is uniquely qualified to deliver the enterprise-class support services that these organizations expect to eliminate the risks of implementing an open source solution such as Subversion from both a business continuity as well as a legal perspective. We offer indemnification coverage that protects our customers from intellectual property claims that can arise from the use of open source software.
WANdisco offers four levels of Subversion support: Silver, Gold, Platinum and Platinum Plus. See the table below and read why you should choose WANdisco for your Subversion support.
Creating Great Dashboards - Beyond the Colors & FontsLogi Analytics
Walk through the fundamentals of effective dashboard design and learn how to customize them to fit specific user requirements. This presentation was created in partnership with Alchemy50.
SLTS kernel and base-layer development in the Civil Infrastructure PlatformYoshitake Kobayashi
The Civil Infrastructure Platform (CIP) is creating a super long-term supported (SLTS) open source "base layer" for industrial grade software. We have been working on security fixes and some backported features since the moment we decided that Linux kernel v4.4 would be the first SLTS version. In this talk, we will describe the current development status of the SLTS kernel and testing environment. First, we'll explain our kernel development policy. Then, we'll describe the functionality that has been backported. Second, we'll talk about testing before using our base-layer on real products. We have been developing a test framework to collect and share test results. To build it, we don't want to duplicate existing work such as KernelCI, Fuego and others. For that reason, we are trying to collaborate and contribute to such projects. And finally, we'll discuss the future roadmap.
The Civil Infrastructure Platform (CIP) is creating a super long-term supported (SLTS) open source "base layer" for industrial grade software. We have been working on security fixes and some backported features since the moment we decided that Linux kernel v4.4 would be the first SLTS version. In this talk, we will describe the current development
status of the SLTS kernel and testing environment. First, we'll explain our kernel development policy. Then, we'll describe the functionality that has been backported. Second, we'll talk about testing before using our base-layer on real products. We have been developing a test framework to collect and share test results. To build it, we don't want to duplicate existing work such as KernelCI, Fuego and others. For that reason, we are trying to collaborate and contribute to such projects.
Introduction to Civil Infrastructure PlatformSZ Lin
CIP is target to establish an open source base layer of industrial grade software to enable the use and implementation of software. This slide will introduce the current status and road map in CIP
"OpenHPC is a collaborative, community effort that initiated from a desire to aggregate a number of common ingredients required to deploy and manage High Performance Computing (HPC) Linux clusters including provisioning tools, resource management, I/O clients, development tools, and a variety of scientific libraries. Packages provided by OpenHPC have been pre-built with HPC integration in mind with a goal to provide re-usable building blocks for the HPC community. Over time, the community also plans to identify and develop abstraction interfaces between key components to further enhance modularity and interchangeability. The community includes representation from a variety of sources including software vendors, equipment manufacturers, research institutions, supercomputing sites, and others."
Watch the video: http://wp.me/p3RLHQ-gKz
Learn more: http://openhpc.community/
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Enabling Fast IT using Containers, Microservices and DAVROS models: an overviewCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. As IT strives to become Fast IT, application architectures are undergoing fundamental disruption to enable faster development to deployment lifecycles. As part of this trend, the number of applications being created using microservices architectures and container technologies like Docker is exploding. This new "cloud native" framework makes deployments on-prem or public cloud seamless. In this session, we will look at these evolving trends and how several open source technologies have converged to provide enterprises the ability to innovate at unprecedented levels.
Enabling Production Grade Containerized Applications through Policy Based Inf...Docker, Inc.
This session covers the solution addressing the needs of enabling product-grade containerized applications. You will learn how operations teams running containerized applications in a shared infrastructure can define and enforce policies to provide security, monitoring, and performance for network, storage, and computing. You will learn about Contiv and Mantl, open source projects that create a framework for cloud native application development and infrastructure with application intent and operational policies. Contiv integrates Cisco infrastructure (UCS, Nexus, and ACI) with Docker Datacenter to help enterprises adopt containers at a larger scale.
Intro to GitOps with Weave GitOps, Flagger and LinkerdWeaveworks
You may not think of "GitOps" and "service mesh" together – but maybe you should! These two wildly different technologies are each enormously capable independently, and combined they deliver far more than the sum of their parts: a single Git commit can control workflows customized for your exact situation by taking advantage of the service mesh's ability to measure and manipulate traffic anywhere in your application's call graph, and you can rest easy knowing that Git is preserving the complete configuration for your entire application every step of the way.
See how these technologies can work together to tackle complex problems in cloud-native applications.
What you’ll get out of this:
* Understand what GitOps and service meshes can - and can't - do for you.
* Understand basic operations with GitOps and Linkerd.
* Understand the basics of continuous deployment with Weave GitOps and Linkerd.
Manage kernel vulnerabilities in the software development lifecycleSZ Lin
This slide deck aims to introduce the methodology in managing the Linux kernel vulnerabilities in the software development lifecycle (SLDC) to reduce the maintenance effort.
Long-term Maintenance Model of Embedded Industrial Linux DistributionSZ Lin
To introduce a robust, secure and reliable platform for the industrial environments is a key challenge; moreover, the platform needs to survive for a long time (more than 10+ years). There are many good solutions aiming to meet these requirements, such as LTSI (Long Term Support Initiative) and CIP (Civil Infrastructure Platform). However, it still needs a high amount of maintenance and development costs in handling SoC/ hardware board in-house patch, non-upstream driver and keep source code consistent with different SoC and platform afterwards.
In this presentation, SZ Lin will introduce how to operate long-term maintenance model of embedded industrial Linux distribution. In addition, he will also address the building, deploying and testing architecture and workflow for producing a robust, secure and reliable platform.
2016 Federal User Group Conference - DevOps Product StrategyCollabNet
Presented by Eric Robertson, General Manager of the DevOps Product Line at CollabNet, at the Federal User Group Conference on April 28th, 2016 in Washington DC.
Primeros pasos del Software Libre en infraestructura civil Civil Infrastructu...Agustin Benito Bethencourt
Introducción a la iniciativa de la Linux Foundation llamada Civil Infrastructure Platform CIP. Descripción del problema que pretende resolver este grupo y sus primeros pasos Transparencias de la charla impartida en el OpenSOuthCode de Málaga, España.
Presentation delivered at LinuxCon China 2017.
Zephyr is an upstream open source project for places where Linux is too big to fit. This talk will overview the progress we've made in the first year towards the projects goals around incorporating best of breed technologies into the code base, and building up the community to support multiple architectures and development environments. We will share our roadmap, plans and the challenges ahead of the us and give an overview of the major technical challenges we want to tackle in 2017.
Deploying more technology to shift from agility to anti-fragilitySpyros Lambrinidis
This talk focusses on the technologies that can be adopted in order to enhance agility and speed of development through advances in system stability. We will span over techniques such as containerization, server-less architectures, logging technologies and application architectures that can have an immediate effect in an organisations' agility.
Similar to Introducing the Civil Infrastructure Platform Project (20)
The Latest Status of CE Workgroup Shared Embedded Linux Distribution ProjectYoshitake Kobayashi
The CE workgroup of Linux Foundation has started a project to share the work of maintaining long-term support for an embedded distribution, by leveraging the work of the Debian and Debian LTS project. Debian gives you pre-compiled binary packages but the meta-debian layer enables to install customized packages to create similar or smaller images. If both usecases are able to share the source code, it is good to share the maintenance effort.
In this talk, Yoshitake will describe the details of meta-debian which provides a meta layer for the Poky build system. This talk will to gives the latest status, technical details and lessons learned from its development.
All source code are available on GitHub and related document also available on Github and elinux wiki.
Poky meets Debian: Understanding how to make an embedded Linux by using an ex...Yoshitake Kobayashi
Embedded Linux Conference 2015
Poky has already become one of the most popular build system to make an embedded Linux environment. Poky refers to OpenEmbedded originally. However if you want to use other source code, how to do it? We have some experience we would like to share with you. For this study, We choose Debian source and already tried two ways to use it. The first try was probably an incorrect way and the second try may be a correct way.
In this talk, we will show both of them and also describe why we choose Debian. If you are interested in this implementation, you can download the source code from GitHub. There are some implementations available for development boards such as pandaboard, minnowboard and etc. Let's enjoy Bitbake!
(Embedded Linux Conference Europe 2014)
Linux uses many kind of embedded products. The products include not only consumer electronics but also control systems such as programmable logic controllers. There are many type of infrastructure systems and each system has different technical requirements. The requirements include not only real-time performance but also reliability-related functions. The infrastructure systems have to meet all the requirements. This presentation gives a summary of our study and development to adapt the Linux to infrastructure systems. Then we discuss the direction of future development. Please note, this presentation doesn't focus on a specific product.
ELC 2014
The LTSI kernel has a high degree of usability for embedded systems. However lack of real-time extension makes it difficult to adapt LTSI to control systems. We made LTSI kernel with RT patch (LTSI-RT) to follow the LTS kernel and are evaluating it on several boards. This presentation shows requirement and issues to make LTSI-RT. LTSI-RT is available on GitHub
https://github.com/ystk/linux-ltsi-work/tree/ltsi-3.10.y-rt
An Essential Relationship between Real-time and Resource PartitioningYoshitake Kobayashi
(ELC Europe 2013)
Running real-time and general purpose applications on a same hardware is normally a crazy idea in most case. However, we strongly focus to run both applications on a hardware without virtualization. Resource Partitioning enables the assignment of hardware resource (e.g.: core, execution time, memory bandwidth or device access) to processes with special requirements (e.g: real-time performance or safety requirements).
In this talk, we would like to discuss current limitation on Linux kernel and describe how to solve it.
Embedded Linux Conference 2013
https://github.com/ystk/sched-deadline/tree/dlmiss-detection-dev
Real-time system need to meet deadline. In this point of view, the system is required two functions to have determinism. One is interrupt latency stabilization and the other one is processing time reservation. SCHED_DEADLINE has a feature to reserve CPU time in advance to ensure predictable behavior. However there is a lack of feature to control deadline missed processes.
In this presentation, we would like to discuss the requirement for the feature and also show a sample implementation to control deadline missed processes.
Improvement of Scheduling Granularity for Deadline Scheduler Yoshitake Kobayashi
(Embedded Linux Conference Europe 2012)
https://github.com/ystk/sched-deadline/tree/dlmiss-detection-dev
Real-time system need to meet deadline. In this point of view, the system is required two functions to have determinism. One is interruptlatency stabilization and the other one is processing time reservation. The SCHED_DEADLINE has a feature to reserve CPU time in advance to ensure predictable behavior. In our evaluation, the granularity of CPU reservation is millisecond order.In this presentation, we show the evaluation results of current implementation to make clear the issue. Then we explain how to overcome this issue and its results.
Real-time system need to meet deadline. In this point of view, the system is required two functions to have determinism. One is interruptlatency stabilization and the other one is processing time reservation. The SCHED_DEADLINE has a feature to reserve CPU time in advance to ensure predictable behavior. In our evaluation, the granularity of CPU reservation is millisecond order.In this presentation, we show the evaluation results of current implementation to make clear the issue. Then we explain how to overcome this issue and its results.
Some data written on data storage are very important for users. The data needs to ensure consistency when the application received a result from a file write functions even if the system crashed.
In this talk, we will show the evaluation results on data consistency for SYNC mode write on a number of Linux file systems. The evaluation is also conducted on more than one kernel version and disk types, and we will show all the results from different perspectives.
Yoshitake Kobayashi joined Corporate Software Engineering Center, Toshiba Corporation in 2008. Before that he received his Ph.D. degree in computer science at University of Electro-Communications in 2002 and worked as an assistant professor. His research interests include operating systems, distributed systems and dynamically reconfigurable systems.
https://github.com/ystk/fs-test
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
2. Civil Infrastructure Systems are technical systems responsible for
supervision, control, and management of infrastructure supporting
human activities, including, for example,
Electric power generation
Energy distribution
Oil and gas
Water and wastewater
Healthcare
Communications
Transportation
Collections of buildings that make up urban & rural
communities.
These networks deliver essential services, provide shelter, and support
social interactions and economic development. They are society's
lifelines.1)
2
Definition
1) adapted from https://www.ce.udel.edu/current/graduate_program/civil.html
3. The evolution of civil infrastructure systems
Core characteristics
Industrial gradeness
Reliability
Functional Safety
Security
Real-time capabilities
Sustainability
Product life-cycles of
10 – 60 years
Conservative update
strategy
Firmware updates only if
industrial gradeness is
jeopardized
Minimize risk of regression
Keeping regression test and
certification efforts low
Connected systems
Interoperability due to
advances in machine-to-
machine connectivity
Standardization of
communication
Plug and play based
system designs
Stand-alone systems
Limited vulnerability
Updates can only applied
with physical access to the
systems
High commissioning
efforts
Proprietary nature
Systems are built from the
ground up for each
product
little re-use of existing
software building blocks
Closed systems
Commoditization
Increased utilization of
commodity (open source)
components, e.g.,
operating system,
virtualization
Extensibility, e.g., for
analytics
Technology changes
Development time
Shorter development times
for more complex systems
Maintenance costs
Low maintenance costs for
commonly uses software
components
Low commissioning and
update costs
Business needs
Development costs
Don‘t re-invent the wheel
3
4. Things to be done
• Join forces for commodity components
• Ensure industrial gradeness for the operating system
platform focusing on reliability, security, and functional
safety.
• Increase upstream work in order to increase quality
and to avoid maintenance of patches
• Share maintenance costs
• Long-term availability and long-term support are
crucial
• Innovate for future technology
• Support industrial IoT architectures and
state-of-the art machine-to-machine connectivity
4
5. Comparison with existing Alliances
Other domains already benefit from collaborative development: drive instead of follow!
5
In many domains
competing companies collaborate
in alliances already.
(GENIVI, for example)
• Development speed
for shorter product cycles
• High Software quality due to intense
reviews and high test coverage
(Linus’s law)
• Standard platforms enable ecosystems
(e.g. for development tools, system extensions,
new business models)
Consumer Industry
PlatformCommunication
hosted by
6. Civil Infrastructure Platform to provide software building blocks that support
reliable transportation, power, oil and gas, and healthcare infrastructure
Establish an open source “base layer” of industrial grade software to enable the use
and implementation in infrastructure projects of software building blocks that meet
the safety, reliability, security and maintainability requirements.
• Share development effort for development of industrial grade bases systems.
• Fill the gap between capabilities of the existing OSS and industrial requirements.
• Reference-implementation consisting of
• Specification of on-device software stack and tools infrastructure
• Linux kernel, file system, etc. selected reference hardware
• Build environment and tools for companies to build their own distribution.
• Test framework and test cases
• SDK and APIs
• Trigger development of an emerging ecosystem including tools and domain
specific extensions.
Initial focus will be on establishing a long term maintenance infrastructure for
selected Open Source components, funded by participating membership fees.
6
CIP Reference Hardware
CIP Reference
Filesystem
image with SDK
CIP Kernel
UserspaceKernel
Non-CIP packages
Any Linux distribution (e.g. Yocto
Project, Debian, openSUSE, etc.)
may extend/include CIP packages.
Hardware
Specifications Documentation
Implement
7. 7
Scope of activitiesUserspaceKernelspace
Linux Kernel
App container
infrastructure (mid-term)
App Framework
(optionally, mid-term)
Middleware/Libraries
Safe & Secure
Update
Monitoring
Domain Specific communication
(e.g. OPC UA)
Shared config. & logging
Real-time support
Real-time /
safe virtualization
Tools Concepts
Build environment
(e.g. yocto recipes)
Test automation
Tracing & reporting
tools
Configuration
management
Device management
(update, download)
Functional safety
architecture/strategy,
including compliance
w/ standards (e.g.,
NERC CIP, IEC61508)
Long-term support
Strategy:
security patch
management
Standardization
collaborative effort with
others
License clearing
Export Control
Classification
On device software stack Product development
and maintenance
Application life-
cycle management
Security
8. 8
Target Systems
Out of scope:
• Enterprise IT and cloud system platforms.
… Device class no.
ARM M0/M0+/M3/M4
8/16/32-bit,< 100 MHz 32-bit, <1 GHz 32/64-bit, <2 GHz 64-bit, >2 GHz
n MiB flash n GiB flash n GiB flash n TiB flash/HDD
< 1 MiB < 1 GiB < 4 GiB > 4 GiB
Arduino class board Raspberry Pi class board SoC-FPGA, e.g.Zync industrial PC
ARM M4/7,A9,R4/5/7
Networked Node Embedded ServerEmbedded ComputerEmbedded Control Unit
special purpose & server based controllerscontrol systems
multi-purpose controllersPLC gateways
Sensor, field device
1 2 3 4
ARM A9/A35,R7,Intel Atom
Architecture, clock
non-volatile storage
HW ref. platform
ARM offerings1)
RAM
application examples
ARM A53/A72,Core,Xeon
Intel offerings1)
M0/M0+/M3/M4 M4/7,A9,R4/5/7 ARM A9/A35,R7 ARM A53/A72
ARM M0/M0+/M3/M4 ARM M4/7,A9,R4/5/7 ARM A9/A35,R7,Intel Atom ARM A53/A72,Core,XeonQuark MCU Quark SoC Atom Core, Xeon
Target systems
Reference hardware for common software platform:
Start from working the common HW platform (PC)
Later extend it to smaller/low power devices.
1 41) Typical configurations Q1/2016
9. Relationship between CIP and other projects
9
Civil Infrastructure Platform
Collaborative
Projects
(e.g. RTL, Yocto, CII)
Existing
project / distro
New CIP
sub-project
Developers
CIP FTE’s
Developers from
member companies
Budget
Member companies
…
Existing project
CIP
source code
repositories
Open source projects (Upstream work)
contribution
Optional: funding of
selected projects
CIP will do not only
development for CIP
but also fund or
contribute to related
upstream projects
Existing projects
(unchanged)
Open source projects
CIP Super Long
Term Support
Project
• Import source code from
open source project or
existing distribution to CIP
• Backport patches from
upstream to CIP version
10. Upstream first policy for implementation of new features
All delta from mainline should be treated as technical debt.
• No parallel source trees, directly discuss features in upstream projects.
• Upstream first implementation. Take this to declared stable.
• Then back-port to long-term support versions drive by CIP employee or
CIP members.
10
Upstream
Project 1
Upstream
Project 2
Project 1
(S)LTS versions
Project 2
(S)LTS versions
new features
new features
backport
new features
CIP members / CIP FTEs CIP members / CIP FTEs
…
11. Super Long Term Support - Motivation
11
Upstream
Kernel tree
Long-term support(LTS)
Backports bug fixes for 2 years
Long-term support
Initiative(LTSI)
Add extra functionality on LTS for
embedded systems and support it
for 2 years
About 3 months
Approx. 2-5 years
Approx. 2-5 years
Kernel.orgCEWG
Every company,
every project
10 years – 15 years
Backport of bug fixes and
hardware support: the same work
is done multiple times for different
versions.
Release / Maintenance release
12. CIP kernel super long term support (SLTS) overview
12
Long-term support(LTS)
Backports bug fixes for 2 years
Long-term support
Initiative(LTSI)
Add extra functionality on LTS for
embedded systems and support it
for 2 years
CIP super long-term
supported kernel
Approx. 3 months
Approx. 2-5 years
Approx. 2-5 years
Goal: 10 years – 15 years
Need to be maintained
more than 10 years
Kernel.orgCEWGCIP
Approx. every 3 years
Release / Maintenance release After 5 years merge window for new
features will be closed, CIP kernel changes
focus to security fixes.
Backports, e.g. for SoC support
reviewed by CIP
Upstream
Kernel tree
13. Package categorization
13
CIP development
packages
CIP core
packages
SuperLong-termsupport
Maintainfor
Reproduciblebuild
CIP Linux
Kernel
• Linux kernel itself which CIP will maintain
• CIP will provide super long-term support for this
category
• The "development packages" provide a reproducible
environment for building the CIP kernel and related
packages
• This category should include all build dependencies,
debug tools and test tools for CIP kernel and CIP core
components
• This category might not require to have security fixes
• CIP will provide super long-term support for this
category
Hardware (Development board / QEMU)
14. Candidates for Super Long-term Maintenance
• Flex
• Bison
• autoconf
• automake
• bc
• bison
• Bzip2
• Curl
• Db
• Dbus
• Expat
• Flex
• gawk
• Gdb
• Kernel
• Linux kernel (cooperation with LTSI)
• PREEMPT_RT patch
• Bootloader
• U-boot
• Shells / Utilities
• Busybox
• Base libraries
• Glibc
• Tool Chain
• Binutils
• GCC
• Security
• Openssl
• Openssh
14
• Git
• Glib
• Gmp
• Gzip
• gettext
• Kbd
• Libibverbs
• Libtool
• Libxml2
• Mpclib
• Mpfr4
• Ncurses
• Make
• M4
• pax-utils
• Pciutils
• Perl
• pkg-config
• Popt
• Procps
• Quilt
• Readline
• sysfsutils
• Tar
• Unifdef
• Zlib
An Example minimal set of “CIP kernel” and “CIP core” packages for initial scope
NOTE: The maintenance effort varies considerably for different packages.
Core
Packages
(SLTS)
Kernel
(SLTS)
Dev
packages
Super Long-term support Maintain for Reproducible build
15. Development plan
CIP will increase development effort to create industrial grade commin base-layer
15
Phase 1:
• Define supported kernel
subsystems, arch.
• Initial SLTS component
selection
• Select SLTS versions
• Set-up maintenance
infrastructure (build, test)
Phase 2:
• Patch collection, stabilization,
back port of patches for CIP
kernel packages
• Support more subsystems
• Additional core packages
Phase 3:
• Domain specific
enhancements,
e.g. communication protocols,
industrial IoT middleware
• Optionally: more subystems
• Optionally: more core
packages
Core
Packages
Kernel
(SLTS)
add. pkgs
Core
Packages
Kernel
(SLTS)
add. pkgs
Core
Packages
Kernel
(SLTS)
16. • 2016:
• Project launch announcement at Embedded Linux Conference 2016
• Requirements defined, base use cases defined, technical & non-
technical processes established (license clearing, long-term
support), maintenance plan
• Common software stack defined, related core projects agreed (e.g.
PREEMT_RT, Xenomai), maintenance infrastructure set up
• Domain specific extensions defined, tool chain defined, test
strategy defined
• Maintenance operational and running
• 2017:
• Realization phase of selected components
• 2018:
• Advancement, improvements, new features
16
Milestones
17. • Civil infrastructure systems are currently built from the ground up, with little re-use of
existing software building blocks. However, existing software platforms are not yet
industrial grade (in addressing safety, reliability, security and other requirements for
infrastructure). At the same time, rapid advances in machine-to-machine connectivity
are driving change in industrial system architectures.
• The Linux Foundation proposes the creation of the Civil Infrastructure Platform (“CIP”)
as a Linux Foundation Collaborative Project. The Civil Infrastructure Platform will
establish an open source “base layer” of industrial grade software to enable the use
and implementation in infrastructure projects of software building blocks that meet the
safety, reliability, security and other requirements of industrial and civil infrastructure.
• Initial focus will be on establishing a long term maintenance infrastructure for selected
Open Source components, funded by participating membership fees.
• Mid-term focus will be extended to filling gaps commonly agreed addressing civil
infrastructure systems’ requirements.
• The Civil Infrastructure Platform shall be hosted by the Linux Foundation as an internal
Linux Foundation project, leveraging the resources and infrastructure of the Linux
Foundation, including the Linux Foundation’s relationships with other open source
projects.
17
Civil Infrastructure Platform: Executive Summary
18. Contact Information and Resources
To get the latest information, please contact:
• Urs Gleim urs.gleim@siemens.com
• Yoshitake Kobayashi yoshitake.kobayashi@toshiba.co.jp
Other resources
• CIP Web site https://www.cip-project.org
• CIP Mailing list cip-dev@lists.cip-project.org
18