This document discusses an Android Wear and iBeacon development presentation given by Kseniia Shumelchyk on November 20-21, 2015 in Milan. The presentation covered iBeacon protocols, implementing iBeacon detection on Android 4.3+, improvements in Android 5+, creating an Android iBeacon emitter, and example Android Wear apps using iBeacons for running tracking, indoor navigation, and retail applications.
Lehendakaritzaren hitzaldia - 2015eko René Cassin Saria Irekia - EJGV
El documento habla sobre la entrega anual del Premio René Cassin de Derechos Humanos por parte del Gobierno Vasco el 10 de diciembre. René Cassin fue uno de los inspiradores y redactores de la Declaración Universal de los Derechos Humanos. Este año, el premio se otorga a la Plataforma Vasca para la Querella contra los crímenes del franquismo. El Lehendakari encuentra razones democráticas, éticas y políticas para apoyar esta decisión, ya que el premio es un mensaje contra
Bluetooth Beacons - Bluetooth 5, iBeacon, Eddystone, Arduino, Windows 10 & MoreAndreas Jakl
iBeacons (Apple) and Eddystone (Google) have conquered the Bluetooth Beacon market. Both specifications allow to trigger specific actions on a smartphone at a well defined area. How do these formats work, what can you do with Bluetooth Beacons, what's changed for Beacons with Bluetooth 5 and what new possibilities does the Windows 10 Creators Update offer for Bluetooth developers?
More information:
Blog: https://www.andreasjakl.com/
Open Source Bluetooth Beacon Library & Example App: https://github.com/andijakl/universal-beacon/
This is a 25-slides presentation developed for didactic purposes: making an overview about the AltBeacon technology, focusing on how it can be exploited in an IoT environment.
It's an assignment of "Pervasive System" course at "Sapienza, University of Rome", master degree in "Computer Science", faculty of "Information Enegineering, Informatics and Statistics", A.Y. 2017-2018.
The presentation is divided in 3 main parts:
- Beacon - brief excursus concerning the overall beacon technology.
- AltBeacon - main topic
- Hands-on examples - deals with describing what you can realize with AltBeacon technology in practice and which tools are available to support you in the implementing process.
It's also present a GitHub link to an Android application, developed as main example of the topic, which handles a simple ranging activity with AltBeacon.
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)Sunghun Kim
This document provides an overview and assessment of vulnerabilities in 802.11 wireless LAN (WLAN) technology. It describes the WLAN standards and security mechanisms such as Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA/WPA2). While WPA2 provides strong security, vulnerabilities still exist if security features are not properly enabled. The document recommends mandatory use of WPA2 with 802.1X authentication for all government WLANs and additional security measures like encryption for especially sensitive networks.
This document describes setting up an Internet of Things (IoT) system using Amazon Web Services (AWS) to simulate jet engine and environmental sensor data. It involves:
1. Registering devices ("things") in the AWS IoT registry and attaching security policies to allow communication.
2. Creating rules to publish device data to a DynamoDB database and send email alerts using Simple Notification Service (SNS).
3. Simulating device data from a laptop and Raspberry Pi, including jet engine readings and rainfall data downloaded from a government site. The Raspberry Pi also self-monitors temperature and triggers alerts.
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...PROIDEA
The document discusses the results of analyzing 32 mobile SCADA and industrial control system applications for security issues. Several common issues were found:
- Over 60% of apps had insecure data storage issues like storing passwords and configuration files in unencrypted formats on external storage.
- Around 30-35% of apps had insecure communication issues like transferring credentials in clear text or not properly implementing SSL certificate pinning.
- Other frequent issues included insecure authorization, client code quality problems, and potential for code tampering on rooted devices.
Reverse engineering of the app code found additional logic and implementation flaws. The document concludes mobile app security in industrial control systems still needs significant improvements.
Lehendakaritzaren hitzaldia - 2015eko René Cassin Saria Irekia - EJGV
El documento habla sobre la entrega anual del Premio René Cassin de Derechos Humanos por parte del Gobierno Vasco el 10 de diciembre. René Cassin fue uno de los inspiradores y redactores de la Declaración Universal de los Derechos Humanos. Este año, el premio se otorga a la Plataforma Vasca para la Querella contra los crímenes del franquismo. El Lehendakari encuentra razones democráticas, éticas y políticas para apoyar esta decisión, ya que el premio es un mensaje contra
Bluetooth Beacons - Bluetooth 5, iBeacon, Eddystone, Arduino, Windows 10 & MoreAndreas Jakl
iBeacons (Apple) and Eddystone (Google) have conquered the Bluetooth Beacon market. Both specifications allow to trigger specific actions on a smartphone at a well defined area. How do these formats work, what can you do with Bluetooth Beacons, what's changed for Beacons with Bluetooth 5 and what new possibilities does the Windows 10 Creators Update offer for Bluetooth developers?
More information:
Blog: https://www.andreasjakl.com/
Open Source Bluetooth Beacon Library & Example App: https://github.com/andijakl/universal-beacon/
This is a 25-slides presentation developed for didactic purposes: making an overview about the AltBeacon technology, focusing on how it can be exploited in an IoT environment.
It's an assignment of "Pervasive System" course at "Sapienza, University of Rome", master degree in "Computer Science", faculty of "Information Enegineering, Informatics and Statistics", A.Y. 2017-2018.
The presentation is divided in 3 main parts:
- Beacon - brief excursus concerning the overall beacon technology.
- AltBeacon - main topic
- Hands-on examples - deals with describing what you can realize with AltBeacon technology in practice and which tools are available to support you in the implementing process.
It's also present a GitHub link to an Android application, developed as main example of the topic, which handles a simple ranging activity with AltBeacon.
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)Sunghun Kim
This document provides an overview and assessment of vulnerabilities in 802.11 wireless LAN (WLAN) technology. It describes the WLAN standards and security mechanisms such as Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA/WPA2). While WPA2 provides strong security, vulnerabilities still exist if security features are not properly enabled. The document recommends mandatory use of WPA2 with 802.1X authentication for all government WLANs and additional security measures like encryption for especially sensitive networks.
This document describes setting up an Internet of Things (IoT) system using Amazon Web Services (AWS) to simulate jet engine and environmental sensor data. It involves:
1. Registering devices ("things") in the AWS IoT registry and attaching security policies to allow communication.
2. Creating rules to publish device data to a DynamoDB database and send email alerts using Simple Notification Service (SNS).
3. Simulating device data from a laptop and Raspberry Pi, including jet engine readings and rainfall data downloaded from a government site. The Raspberry Pi also self-monitors temperature and triggers alerts.
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...PROIDEA
The document discusses the results of analyzing 32 mobile SCADA and industrial control system applications for security issues. Several common issues were found:
- Over 60% of apps had insecure data storage issues like storing passwords and configuration files in unencrypted formats on external storage.
- Around 30-35% of apps had insecure communication issues like transferring credentials in clear text or not properly implementing SSL certificate pinning.
- Other frequent issues included insecure authorization, client code quality problems, and potential for code tampering on rooted devices.
Reverse engineering of the app code found additional logic and implementation flaws. The document concludes mobile app security in industrial control systems still needs significant improvements.
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...Philippe Lin
This document discusses building automation and control (BACnet) networks in Taiwan. It begins by introducing BACnet and describing how the protocol works. It then details the results of scanning Taiwan for exposed BACnet devices, finding 48 devices from vendors like Advantech, Automated Logic, and Carel. Many of these devices had weak or default credentials, exposing their internal data and controls. The document cautions that some critical infrastructure in Taiwan, like university buildings, are connected to BACnet and have similarly weak security. It concludes by providing suggestions to better secure these important control systems.
This is the presentation I use as a support to my 9 hour-long talk to postgraduate students of a French Telecom and Electronics Master. The idea is to provide them with a broad view, including some non-technical domains.
The document provides an implementation plan for a new network at WWTC's New York office. It details tasks for installing LAN equipment, security technologies like firewalls and intrusion prevention, Active Directory, configurations for routers, switches and VLANs, and a project timeline. The network will use Cisco equipment and include 87 workstations, file and application servers, firewalls, switches, routers, and connections to two ISPs for redundancy. Active Directory, group policies, and security measures like antivirus and access control will be configured.
1. The document discusses S2C, a company that provides FPGA prototyping platforms for system-on-chip (SoC) verification. One of their customers, Analog Circuit Technology Inc. (ACTT), used S2C's prototyping platform to develop a Bluetooth Low Energy (BLE) Audio SoC.
2. ACTT selected S2C's VU440 Prodigy Logic System prototyping hardware and software to enable system-level verification, hardware/software co-design, and stability testing of their BLE Audio SoC.
3. Through the use of S2C's prototyping platform, ACTT was able to complete software development 2-3 months ahead
Integrating Ansible Tower with security orchestration and cloud managementJoel W. King
Ansible Durham Meetup, 13 July 2017.
Our guest speaker will be Joel W. King, Principal Architect at World Wide Technology. His focused is on enterprise Software-Defined Networking and network programmability.
He will talk about how Ansible Tower, through the northbound APIs, is integrated into the security orchestration platform Phantom Cyber, and using the same code base, extends infrastructure provisioning to Cisco CloudCenter (formerly CliQr), an application-centric public and private cloud management solution.
Simple Internet of Things (IoT) game with Bluemix and Node-RedMarkus Van Kempen
Simple Internet of Things ( IOT ) Demo Game The goal of the multiuser game is to send as many MQTT messages to IOTF as possible by moving your mobile device. You can send additional message by clicking the moving circle or shaking your device. In order to start register with a unique name via the button.After all participants are register a chosen Gamemaster can start the game for everybody. #IOTF #IBM #Bluemix #MQTT #Internet of Things
iBeacons / Beacons and Presence use cases and examples (part 1)Markus Van Kempen
The document discusses using beacons and Bluetooth Low Energy (BLE) devices with a Raspberry Pi to collect nearby device data and send notifications. Specifically, it describes setting up a Raspberry Pi with BLE to detect beacons and other devices within range, sending notifications when a beacon is detected, using the Raspberry Pi as a beacon itself, and allowing beacons to roam between two gateways while still being detected.
Enabling policy migration in the Data Center with AnsibleJoel W. King
This document discusses using Ansible to automate the migration of network policies from Cisco Tetration Analytics to a new Application Centric Infrastructure (ACI) fabric at World Wide Technology (WWT). Tetration provides visibility into application communication and generates network policies that can be extracted as variables for Ansible playbooks. This allows Ansible to programmatically configure the new ACI fabric with the migrated policies rather than manually creating them in the ACI GUI.
Azure Sphere is a solution from Microsoft for creating highly secured, connected microcontroller (MCU) devices. It includes an Azure Sphere microcontroller chip with built-in security features, an Azure Sphere IoT operating system, and Azure Sphere Security Services in the cloud. The solution aims to address security risks for internet-connected devices by implementing the "seven properties of highly secured devices" through its hardware, software and cloud components. It offers device manufacturers tools for streamlined and secure development of connected products through Visual Studio and the Azure Sphere developer experience. The presentation demonstrated an Azure Sphere development kit and some example sensors connected to it.
The document lists 20 resources from Voler Systems related to engineering design. Some of the topics covered include PCB layout checklists, avoiding errors when using accelerometers, key points to include in a product development proposal, basics of data acquisition, signal conditioning, wireless standards for applications, developing requirements for medical devices, and reducing noise in test systems. Each resource provides a brief description and a link to more information on Voler Systems' website.
Using Ansible Tower to implement security policies and telemetry streaming fo...Joel W. King
Network analytics provides insight to the traffic flow between applications and endpoints. Telemetry data is streamed in real-time from software sensors and network devices to big-data clusters. Implementing the policy to create a whitelist-based segmentation and zero-trust model requires automation when dealing with tens of thousands of workloads and complex rules.
This session examines how Cisco Tetration Analytics provides an accurate inventory of devices, software packages and version information to detect software vulnerabilities and implement a zero-trust policy model on network fabrics, firewalls and application delivery controllers.
MQTC 2016 - IBM MQ Security: Overview & recapRobert Parker
Security features are important in any modern day application and MQ is no exception. In order to
ensure user data is protected to the user's requirements applications must supply a variety of
configurable security features. In this session we will be providing an introduction to all of IBM MQ's
security features and a high level overview of why you would use them.
IBC2022 IPShowcase: Tips for Media-over-IP Network DesignKoji Oyama
This presentation provides you the design flow and some common pitfalls when broadcast network engineers consider their Media-over IP (MoIP) network architecture and configure its network switches. In addition to the essential technology such as VLAN, VRF, IGMP, PIM, and OSPF I introduced at the NAB 2022 IPShowcase, you can also know how to verity the network design, some issues that have happened in the design so far, and some key points you should be careful about your logical design.
This document discusses connecting IoT devices and systems to the FIWARE Lab ecosystem. It provides an overview of the FIWARE IoT proposal and community. It then describes the most common scenarios for connecting IoT providers and consumers to the FIWARE Context Broker using the IDAS/SBC Ultralight 2.0 protocol. Step-by-step instructions are provided for registering models and devices and sending measurements and commands. Additional options for connecting IoT systems like MQTT and LWM2M are also mentioned.
Cisco provides Internet of Things (IoT) solutions to help organizations achieve business outcomes. Cisco Validated Designs (CVDs) provide comprehensive and tested designs for IoT use cases that align connectivity with business outcomes through increased revenues, reduced costs, and improved security. CVDs incorporate Cisco and third party technologies to meet specific use case needs and provide reliability, security, simplicity and scalability.
NSA advisory about state sponsored cybersecurity threatsRonald Bartels
Chinese state-sponsored cyber actors exploit publicly known vulnerabilities in popular software to gain access to networks. The document lists vulnerabilities in products like Pulse Secure VPNs, F5 BIG-IP, Citrix ADC and Gateway, Microsoft Windows, and others that are being actively exploited. It is critical for network defenders to prioritize patching known vulnerabilities and implementing mitigations like disabling unnecessary services and enabling robust logging.
Presentation data center virtualization –setting the foundationxKinAnx
This document discusses data center virtualization and setting the foundation. It summarizes that data center virtualization has seen a 10-year transition from being oblivious to virtualization to becoming fully aware of and optimized for virtualization. It also discusses how Cisco Nexus 1000V provides virtual switching capabilities within virtualized data centers for improved network visibility, control, security and troubleshooting.
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Codemotion
Increased complexity makes it very hard and time-consuming to keep your software bug-free and secure. We introduce fuzz-testing as a method for automatically and continuously discovering vulnerabilities hidden in your code. The talk will explain how fuzzing works and how to integrate fuzz-testing into your Software Development Life Cycle to increase your code’s security.
Pompili - From hero to_zero: The FatalNoise neverending storyCodemotion
It was 1993 when we decided to venture in a beat'em up game for Amiga. The Catalypse's success story pushed me and my comrade to create something astonishing for this incredible game machine... but things went harder, assumptions were slightly different, and italian competitors appeared out of nowhere... the project died in 1996. Story ended? Probably not...
More Related Content
Similar to Kseniia Shumelchyk - Android iBeacon development
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...Philippe Lin
This document discusses building automation and control (BACnet) networks in Taiwan. It begins by introducing BACnet and describing how the protocol works. It then details the results of scanning Taiwan for exposed BACnet devices, finding 48 devices from vendors like Advantech, Automated Logic, and Carel. Many of these devices had weak or default credentials, exposing their internal data and controls. The document cautions that some critical infrastructure in Taiwan, like university buildings, are connected to BACnet and have similarly weak security. It concludes by providing suggestions to better secure these important control systems.
This is the presentation I use as a support to my 9 hour-long talk to postgraduate students of a French Telecom and Electronics Master. The idea is to provide them with a broad view, including some non-technical domains.
The document provides an implementation plan for a new network at WWTC's New York office. It details tasks for installing LAN equipment, security technologies like firewalls and intrusion prevention, Active Directory, configurations for routers, switches and VLANs, and a project timeline. The network will use Cisco equipment and include 87 workstations, file and application servers, firewalls, switches, routers, and connections to two ISPs for redundancy. Active Directory, group policies, and security measures like antivirus and access control will be configured.
1. The document discusses S2C, a company that provides FPGA prototyping platforms for system-on-chip (SoC) verification. One of their customers, Analog Circuit Technology Inc. (ACTT), used S2C's prototyping platform to develop a Bluetooth Low Energy (BLE) Audio SoC.
2. ACTT selected S2C's VU440 Prodigy Logic System prototyping hardware and software to enable system-level verification, hardware/software co-design, and stability testing of their BLE Audio SoC.
3. Through the use of S2C's prototyping platform, ACTT was able to complete software development 2-3 months ahead
Integrating Ansible Tower with security orchestration and cloud managementJoel W. King
Ansible Durham Meetup, 13 July 2017.
Our guest speaker will be Joel W. King, Principal Architect at World Wide Technology. His focused is on enterprise Software-Defined Networking and network programmability.
He will talk about how Ansible Tower, through the northbound APIs, is integrated into the security orchestration platform Phantom Cyber, and using the same code base, extends infrastructure provisioning to Cisco CloudCenter (formerly CliQr), an application-centric public and private cloud management solution.
Simple Internet of Things (IoT) game with Bluemix and Node-RedMarkus Van Kempen
Simple Internet of Things ( IOT ) Demo Game The goal of the multiuser game is to send as many MQTT messages to IOTF as possible by moving your mobile device. You can send additional message by clicking the moving circle or shaking your device. In order to start register with a unique name via the button.After all participants are register a chosen Gamemaster can start the game for everybody. #IOTF #IBM #Bluemix #MQTT #Internet of Things
iBeacons / Beacons and Presence use cases and examples (part 1)Markus Van Kempen
The document discusses using beacons and Bluetooth Low Energy (BLE) devices with a Raspberry Pi to collect nearby device data and send notifications. Specifically, it describes setting up a Raspberry Pi with BLE to detect beacons and other devices within range, sending notifications when a beacon is detected, using the Raspberry Pi as a beacon itself, and allowing beacons to roam between two gateways while still being detected.
Enabling policy migration in the Data Center with AnsibleJoel W. King
This document discusses using Ansible to automate the migration of network policies from Cisco Tetration Analytics to a new Application Centric Infrastructure (ACI) fabric at World Wide Technology (WWT). Tetration provides visibility into application communication and generates network policies that can be extracted as variables for Ansible playbooks. This allows Ansible to programmatically configure the new ACI fabric with the migrated policies rather than manually creating them in the ACI GUI.
Azure Sphere is a solution from Microsoft for creating highly secured, connected microcontroller (MCU) devices. It includes an Azure Sphere microcontroller chip with built-in security features, an Azure Sphere IoT operating system, and Azure Sphere Security Services in the cloud. The solution aims to address security risks for internet-connected devices by implementing the "seven properties of highly secured devices" through its hardware, software and cloud components. It offers device manufacturers tools for streamlined and secure development of connected products through Visual Studio and the Azure Sphere developer experience. The presentation demonstrated an Azure Sphere development kit and some example sensors connected to it.
The document lists 20 resources from Voler Systems related to engineering design. Some of the topics covered include PCB layout checklists, avoiding errors when using accelerometers, key points to include in a product development proposal, basics of data acquisition, signal conditioning, wireless standards for applications, developing requirements for medical devices, and reducing noise in test systems. Each resource provides a brief description and a link to more information on Voler Systems' website.
Using Ansible Tower to implement security policies and telemetry streaming fo...Joel W. King
Network analytics provides insight to the traffic flow between applications and endpoints. Telemetry data is streamed in real-time from software sensors and network devices to big-data clusters. Implementing the policy to create a whitelist-based segmentation and zero-trust model requires automation when dealing with tens of thousands of workloads and complex rules.
This session examines how Cisco Tetration Analytics provides an accurate inventory of devices, software packages and version information to detect software vulnerabilities and implement a zero-trust policy model on network fabrics, firewalls and application delivery controllers.
MQTC 2016 - IBM MQ Security: Overview & recapRobert Parker
Security features are important in any modern day application and MQ is no exception. In order to
ensure user data is protected to the user's requirements applications must supply a variety of
configurable security features. In this session we will be providing an introduction to all of IBM MQ's
security features and a high level overview of why you would use them.
IBC2022 IPShowcase: Tips for Media-over-IP Network DesignKoji Oyama
This presentation provides you the design flow and some common pitfalls when broadcast network engineers consider their Media-over IP (MoIP) network architecture and configure its network switches. In addition to the essential technology such as VLAN, VRF, IGMP, PIM, and OSPF I introduced at the NAB 2022 IPShowcase, you can also know how to verity the network design, some issues that have happened in the design so far, and some key points you should be careful about your logical design.
This document discusses connecting IoT devices and systems to the FIWARE Lab ecosystem. It provides an overview of the FIWARE IoT proposal and community. It then describes the most common scenarios for connecting IoT providers and consumers to the FIWARE Context Broker using the IDAS/SBC Ultralight 2.0 protocol. Step-by-step instructions are provided for registering models and devices and sending measurements and commands. Additional options for connecting IoT systems like MQTT and LWM2M are also mentioned.
Cisco provides Internet of Things (IoT) solutions to help organizations achieve business outcomes. Cisco Validated Designs (CVDs) provide comprehensive and tested designs for IoT use cases that align connectivity with business outcomes through increased revenues, reduced costs, and improved security. CVDs incorporate Cisco and third party technologies to meet specific use case needs and provide reliability, security, simplicity and scalability.
NSA advisory about state sponsored cybersecurity threatsRonald Bartels
Chinese state-sponsored cyber actors exploit publicly known vulnerabilities in popular software to gain access to networks. The document lists vulnerabilities in products like Pulse Secure VPNs, F5 BIG-IP, Citrix ADC and Gateway, Microsoft Windows, and others that are being actively exploited. It is critical for network defenders to prioritize patching known vulnerabilities and implementing mitigations like disabling unnecessary services and enabling robust logging.
Presentation data center virtualization –setting the foundationxKinAnx
This document discusses data center virtualization and setting the foundation. It summarizes that data center virtualization has seen a 10-year transition from being oblivious to virtualization to becoming fully aware of and optimized for virtualization. It also discusses how Cisco Nexus 1000V provides virtual switching capabilities within virtualized data centers for improved network visibility, control, security and troubleshooting.
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Codemotion
Increased complexity makes it very hard and time-consuming to keep your software bug-free and secure. We introduce fuzz-testing as a method for automatically and continuously discovering vulnerabilities hidden in your code. The talk will explain how fuzzing works and how to integrate fuzz-testing into your Software Development Life Cycle to increase your code’s security.
Pompili - From hero to_zero: The FatalNoise neverending storyCodemotion
It was 1993 when we decided to venture in a beat'em up game for Amiga. The Catalypse's success story pushed me and my comrade to create something astonishing for this incredible game machine... but things went harder, assumptions were slightly different, and italian competitors appeared out of nowhere... the project died in 1996. Story ended? Probably not...
Il Commodore 65 è un prototipo di personal computer che Commodore avrebbe dovuto mettere in commercio quale successore del Commodore 64. Purtroppo la sua realizzazione si fermò appunto allo stadio prototipale. Racconterò l'affascinante storia del suo sviluppo ed il perchè della soppressione del progetto ormai ad un passo dalla immissione in commercio.
Rivivere l'ebbrezza di progettare un vecchio computer o una consolle da bar è oggi possibile sfruttando le FPGA, ovvero logiche programmabili che consentono a chiunque di progettare il proprio hardware o di ricrearne uno del passato. In questa sessione si racconta come dal reverse engineering dell'hardware di vecchie glorie come il Commodore 64 e lo ZX Spectrum sia stato possibile farle rivivere attraverso tecnologie oggi alla portata di tutti.
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Codemotion
There's a lot of talk about blockchain, but how does the technology behind it actually work? For developers, getting some hands-on experience is the fastest way to get familiair with new technologies. So let's build a blockchain, then! In this session, we're going to build one in plain old Java, and have it working in 40 minutes. We'll cover key concepts of a blockchain: transactions, blocks, mining, proof-of-work, and reaching consensus in the blockchain network. After this session, you'll have a better understanding of core aspects of blockchain technology.
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Codemotion
When was the last time you were truly lost? Thanks to the maps and location technology in our phones, a whole generation has now grown up in a world where getting lost is truly a thing of the past. Location technology goes far beyond maps in the palm of our hand, however. In this talk, we will explore how a ridesharing app works. How do we discover our destination?How do we find the closest driver? How do we display this information on a map? How do we find the best route?To answer these questions,we will be learning about a variety of location APIs, including Maps, Positioning, Geocoding etc.
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Codemotion
Eward Driehuis, SecureLink's research chief, will guide you through the bumpy ride we call the cyber threat landscape. As the industry has over a decade of experience of dealing with increasingly sophisticated attacks, you might be surprised to hear more attacks slip through the cracks than ever. From analyzing 20.000 of them in 2018, backed by a quarter of a million security events and over ten trillion data points, Eward will outline why this happens, how attacks are changing, and why it doesn't matter how neatly or securely you code.
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 - Codemotion
IoT revolution is ended. Thanks to hardware improvement, building an intelligent ecosystem is easier than never before for both startups and large-scale enterprises. The real challenge is now to connect, process, store and analyze data: in the cloud, but also, at the edge. We’ll give a quick look on frameworks that aggregate dispersed devices data into a single global optimized system allowing to improve operational efficiency, to predict maintenance, to track asset in real-time, to secure cloud-connected devices and much more.
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Codemotion
What if Virtual Reality glasses could transform your environment into a three-dimensional work of art in realtime in the style of a painting from Van Gogh? One of the many interesting developments in the field of Deep Learning is the so called "Style Transfer". It describes a possibility to create a patchwork (or pastiche) from two images. While one of these images defines the the artistic style of the result picture, the other one is used for extracting the image content. A team from TNG Technology Consulting managed to build an AI showcase using OpenCV and Tensorflow to realize such goggles.
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Codemotion
The document summarizes some of the security issues with blockchain technology. It discusses how blockchain is not a "silver bullet" and does not inherently solve problems like privacy and security of smart devices. It outlines various application security issues with complex code, protocols, and difficulty of updates on blockchains. Concerns over data immutability and security of smart contracts are also covered. The document questions whether blockchain truly provides the level of decentralization and anonymity claimed, and outlines some impossibility results and limitations of existing approaches to achieving security and privacy in blockchain systems.
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Codemotion
The document provides an overview of the HTTP network protocol in its early stages of development. It summarizes the initial IMP (Interface Message Processor) software used to establish connections and transmit messages over the ARPANET. It outlines some early requirements for host-to-host software to enable simple and advanced use between computer systems. The document also describes the initial host software specifications, including establishing connections, transmitting data efficiently, and implementing error checking between connected systems. This was one of the first documents to define core aspects of the early HTTP network protocol to enable information exchange over the fledgling internet.
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Codemotion
Performance tests are not only an important instrument for understanding a system and its runtime environment. It is also essential in order to check stability and scalability – non-functional requirements that might be decisive for success. But won't my cloud hosting service scale for me as long as I can afford it? Yes, but… It only operates and scales resources. It won't automatically make your system fast, stable and scalable. This talk shows how such and comparable questions can be clarified with performance tests and how DevOps teams benefit from regular test practise.
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Codemotion
Sascha will demonstrate the opportunities and challenges of Conversational AI learned from the practice. Both Technology and User Experience will be covered introducing a process finding micro-moments, writing happy paths, gathering intents, designing the conversational flow, and finally publishing on almost all channels including Voice Services and Chatbots. Valuable for enterprises, developers, and designers. All live on stage in just minutes and with almost no code.
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Codemotion
A key challenge we face at Pacmed is quickly calibrating and deploying our tools for clinical decision support in different hospitals, where data formats may vary greatly. Using Intensive Care Units as a case study, I’ll delve into our scalable Python pipeline, which leverages Pandas’ split-apply-combine approach to perform complex feature engineering and automatic quality checks on large time-varying data, e.g. vital signs. I’ll show how we use the resulting flexible and interpretable dataframes to quickly (re)train our models to predict mortality, discharge, and medical complications.
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Codemotion
Coolblue is a proud Dutch company, with a large internal development department; one that truly takes CI/CD to heart. Empowerment through automation is at the heart of these development teams, and with more than 1000 deployments a day, we think it's working out quite well. In this session, Pat Hermens (a Development Managers) will step you through what enables us to move so quickly, which tools we use, and most importantly, the mindset that is required to enable development teams to deliver at such a rapid pace.
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...Codemotion
Quantum computers can use all of the possible pathways generated by quantum decisions to solve problems that will forever remain intractable to classical compute power. As the mega players vie for quantum supremacy and Rigetti announces its $1M "quantum advantage" prize, we live in exciting times. IBM-Q and Microsoft Q# are two ways you can learn to program quantum computers so that you're ready when the quantum revolution comes. I'll demonstrate some quantum solutions to problems that will forever be out of reach of classical, including organic chemistry and large number factorisation.
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Codemotion
Chinese food exploded across America in the early 20th century, rapidly adapting to local tastes while also spreading like wildfire. How was it able to spread so fast? The GY6 is a family of scooter engines that has achieved near total ubiquity in Europe. It is reliable and cheap to manufacture, and it's made in factories across China. How are these factories able to remain afloat? Chinese-American food and the GY6 are both riveting studies in product-market fit, and both are the product of a distributed open source-like development model. What lessons can we learn for open source software?
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Codemotion
The design space has exploded in size within the last few years and Sketch is one of the most important milestones to represent the phenomenon. But behind the scenes of this growing reality there is a remote team that revolutionizes the design space all without leaving the home office. This talk will present how Sketch has grown to become a modern, product designer's tool.
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Codemotion
Would you fly in a plane designed by a craftsman or would you prefer your aircraft to be designed by engineers? We are learning that science and empiricism works in software development, maybe now is the time to redefine what “Software Engineering” really means. Software isn't bridge-building, it is not car or aircraft development either, but then neither is Chemical Engineering. Engineering is different in different disciplines. Maybe it is time for us to begin thinking about retrieving the term "Software Engineering" maybe it is time to define what our "Engineering" discipline should be.
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Codemotion
What is the job of a CTO and how does it change as a startup grows in size and scale? As a CTO, where should you spend your focus? As an engineer aspiring to be a CTO, what skills should you pursue? In this inspiring and personal talk, I describe my journey from early Red Hat engineer to CTO at Bloomon. I will share my view on what it means to be a CTO, and ultimately answer the question: Should the CTO be coding?
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
What is an RPA CoE? Session 2 – CoE RolesDianaGray10
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
• What roles are essential?
• What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
3. MILAN 20/21.11.2015 - Kseniia Shumelchyk
iBeacon
- iBeacon is a protocol standardised by Apple and introduced at the WWDC in 2013
- Based on top of BLE
- BLE works starting from 4S on Apple
- BLE works starting from 4.3 on Android
6. MILAN 20/21.11.2015 - Kseniia Shumelchyk
What is BLE?
Bluetooth low energy (Bluetooth Smart) is a
wireless personal area network technology aimed
for novel applications in the healthcare, fitness,
beacons, security, and home entertainment
industries
7. MILAN 20/21.11.2015 - Kseniia Shumelchyk
What is BLE?
- Not backward-compatible (with classic Bluetooth protocol)
- Uses same radio frequencies - 2.4 GGZ
- 1 Mbps (1-3 Mbps with regular bluetooth)
- Embedded devices & wearables
8. MILAN 20/21.11.2015 - Kseniia Shumelchyk
Specification
Technical Specification
Classic Bluetooth
technology
Bluetooth Smart
technology
Distance/Range
(theoretical max.)
100 m (330 ft) >100 m (>330 ft)
Over the air data rate 1–3 Mbit/s 1 Mbit/s
Active slaves 7
Not defined;
implementation
dependent
Minimum total time to
send data
100 ms 3 ms
Power consumption 1 W as the reference
0.01 to 0.5 W
(depending on use case)
9. MILAN 20/21.11.2015 - Kseniia Shumelchyk
Generic Attribute Profile (GATT)
- Client - A device that initiates GATT commands and requests, and accepts
responses, for example a computer or smartphone
- Server - A device that receives GATT commands and requests, and returns
responses, for example a temperature sensor.
- Characteristic - A data value transferred between client and server, for
example the current battery voltage.
10. MILAN 20/21.11.2015 - Kseniia Shumelchyk
Generic Attribute Profile (GATT)
- Service - A collection of related characteristics, which operate together to
perform a particular function. For instance, the Health Thermometer service
includes characteristics for a temperature measurement value, and a time
interval between measurements.
- Descriptor - A descriptor provides additional information about a characteristic.
For instance, a temperature value characteristic may have an indication of its
units (e.g. Celsius), and the maximum and minimum values which the sensor
can measure.
11. MILAN 20/21.11.2015 - Kseniia Shumelchyk
GATT Operations
- Discover UUIDs for all primary services
- Find a service with a given UUID
- Find secondary services for a given primary service
- Discover all characteristics for a given service
- Find characteristics matching a given UUID
- Read all descriptors for a particular characteristic
13. MILAN 20/21.11.2015 - Kseniia Shumelchyk
Beacon’s Advertisement
- Beacon advertises a data package called the Scan Response Data
- This Data can be up to 31 bytes.
- The scan response is divided into AD structures
14. MILAN 20/21.11.2015 - Kseniia Shumelchyk
Packet structure (1)
Ad Structure 1
0x02 0x01 0x1A
Remaining length AD Type Data
2 Flags Flag
15. MILAN 20/21.11.2015 - Kseniia Shumelchyk
Packet structure (2)
Ad Structure 2
0x1B 0xFF 0xE0 0x00 0xBE 0xAC
Remaining length AD Type Manufacturer ID Beacon prefix
27
Manufacturer
specific
224 (Google)
16. MILAN 20/21.11.2015 - Kseniia Shumelchyk
Packet structure (2)
Ad Structure 2
0x0C […] 0xBB 0x00 0x09 0x00 0x06 0xBA
UUID (16 bytes) Major Minor TX Power
9 6 -70
17. MILAN 20/21.11.2015 - Kseniia Shumelchyk
Internals
02 01 06 1A FF 4C 00 02 15: prefix (fixed except for 3rd byte - flags)
B9 40 7F 30 F5 F8 46 6E AF F9 25 55 6B 57 FE 6D: UUID
00 49: major
00 0A: minor
C5: measured TX power!
19. MILAN 20/21.11.2015 - Kseniia Shumelchyk
Android
- Built in support for Android 4.3+
- Central & peripheral roles
- GATT server & GATT client
- android.hardware.bluetooth_le feature
25. MILAN 20/21.11.2015 - Kseniia Shumelchyk
Android 5.0+ for Beacons detection
- New api to work with BLE devices
- Background scanning
- Filtering possibility
- SCAN_MODE_LOW_POWER mode
- SCAN_MODE_LOW_LATENCY mode
26. MILAN 20/21.11.2015 - Kseniia Shumelchyk
LOW_POWER LOW_LATENCY
Test duration 134 minutes 152 minutes
Battery Level Change -13% -25%
Battery Drain Rate 268mA 454mA
Relative Battery Savings 41% --
Typical time between
detections
4400 ms 100 ms
http://developer.radiusnetworks.com/2014/10/28/android-5.0-scanning.html
32. MILAN 20/21.11.2015 - Kseniia Shumelchyk
Android Beacon emitter
- Works starting from 5.0
- Currently only Nexus 6, Nexus 9 and later models supported
- BluetoothLeAdvertiser & AdvertiseData & AdvertiseSettings support classes
- Different levels of transmitter power
33. MILAN 20/21.11.2015 - Kseniia Shumelchyk
• Android iBeacon emitter (1)
• ENTER
FILENAM
E/LANG
protected void setAdvertiseData() {
AdvertiseData.Builder mBuilder = new AdvertiseData.Builder()
ByteBuffer mManufacturerData = ByteBuffer.allocate(24);
byte[] uuid = getIdAsByte(UUID.fromString("0CF052C297CA407C84F8B62AAC4E9020"));
mManufacturerData.put(0, (byte)0xBE); // Beacon Identifier
mManufacturerData.put(1, (byte)0xAC); // Beacon Identifier
for (int i=2; i<=17; i++) {
mManufacturerData.put(i, uuid[i-2]); // adding the UUID
}
mManufacturerData.put(18, (byte)0x00); // first byte of Major
mManufacturerData.put(19, (byte)0x09); // second byte of Major
mManufacturerData.put(20, (byte)0x00); // first minor
mManufacturerData.put(21, (byte)0x06); // second minor
mManufacturerData.put(22, (byte)0xB5); // txPower
mBuilder.addManufacturerData(224, mManufacturerData.array());
mAdvertiseData = mBuilder.build();
}!
Setting emitter
34. MILAN 20/21.11.2015 - Kseniia Shumelchyk
• Android iBeacon emitter (2)
• ENTER
FILENAM
E/LANG
protected void setAdvertiseSettings() {
AdvertiseSettings.Builder mBuilder = new AdvertiseSettings.Builder();
mBuilder.setAdvertiseMode(AdvertiseSettings.ADVERTISE_MODE_LOW_POWER);
mBuilder.setConnectable(false);
mBuilder.setTimeout(0);
mBuilder.setTxPowerLevel(AdvertiseSettings.ADVERTISE_TX_POWER_MEDIUM);
mAdvertiseSettings = mBuilder.build();
}!
Setting up setting
35. MILAN 20/21.11.2015 - Kseniia Shumelchyk
Good to go, we can start advertising :)
Good to go, we can start advertising :-D
ENTER FILENAME/LANG
mBluetoothLeAdvertiser.startAdvertising(mAdvertiseSettings, mAdvertiseData,
mAdvertiseCallback);!
Start advertising