INSPIDE Presentation during UIC Conference on Level Crossing protection systems. It shows the actual system implemented in Spain DGT Singularity and Comobity Big Data platform designed by INSPIDE to protect vehicles at level crossing nearby
eMARINE Global (OTCQB: EMRN) is a leading provider of information and communications technology (ICT) solutions for the global maritime industry. Founded in 2001 and based in South Korea, e-MARINE is working with a growing base of marquee customers to achieve maritime ICT convergence through fully integrated products and services, offering state-of-the-art e-navigation, marine Internet of Things (IoT), and marine big-data solutions. Learn more at EMRNinfo.com
This presentation is dedicated to a concept of a smart city where vehicles communicate with each other and with city infrastructure objects. This presentation is based on a PoC developed by GlobalLogic experts.
The respective talk was held by Viktoriia Taraniuk (Associate Manager, Consultant, GlobalLogic) at GlobalLogic Embedded TechTalk #5 on June 21, 2018.
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...Leonardo
Leonardo attended at European Rotors the Police Aviation Conference illustrating its Mission Management System’s capabilities for Law Enforcement Operators
eMARINE Global (OTCQB: EMRN) is a leading provider of information and communications technology (ICT) solutions for the global maritime industry. Founded in 2001 and based in South Korea, e-MARINE is working with a growing base of marquee customers to achieve maritime ICT convergence through fully integrated products and services, offering state-of-the-art e-navigation, marine Internet of Things (IoT), and marine big-data solutions. Learn more at EMRNinfo.com
This presentation is dedicated to a concept of a smart city where vehicles communicate with each other and with city infrastructure objects. This presentation is based on a PoC developed by GlobalLogic experts.
The respective talk was held by Viktoriia Taraniuk (Associate Manager, Consultant, GlobalLogic) at GlobalLogic Embedded TechTalk #5 on June 21, 2018.
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...Leonardo
Leonardo attended at European Rotors the Police Aviation Conference illustrating its Mission Management System’s capabilities for Law Enforcement Operators
Vehicle-2-Vehicle Communication Based on Wireless Sensor NetworkjournalBEEI
Truck Platooning is a car innovation that permits gathering various trucks into a single element where one truck intently takes after the other that outcomes in an expanded street limit. This kind of detachment allows to a significant degree tight separations and synchronous driving between the vehicles. Our point is to plan and exhibit a self-ruling truck platooning framework given vehicle-to-vehicle (V2V) correspondence innovation. The structure utilises IEEE 802.15.4 remote convention joined with separation going sensors to enable vehicles inside the company to safely trade data progressively and naturally break and quicken in light of the lead truck. The rapid of remote correspondence permits to a significant degree tight separations and synchronous driving between the platooning vehicles.
UK Spectrum Policy Forum - John Mettrop, CAA - Riding the Airwaves: AviationtechUK
UK Spectrum Policy Forum
Cluster 1: Transportation - 11 December 2014
John Mettrop, Policy Specialist Spectrum, Civil Aviation Authority
Riding the Airwaves: Aviation the evolving requirement
More information at: http://www.techuk.org/about/uk-spectrum-policy-forum
All rights reserved
Experience Mazda Zoom Zoom Lifestyle and Culture by Visiting and joining the Official Mazda Community at http://www.MazdaCommunity.org for additional insight into the Zoom Zoom Lifestyle and special offers for Mazda Community Members. If you live in Arizona, check out CardinaleWay Mazda's eCommerce website at http://www.Cardinale-Way-Mazda.com
(Slides) A Method for Pedestrian Position Estimation using Inter-Vehicle Comm...Naoki Shibata
http://ito-lab.naist.jp/themes/ITS/pdfs/2-1/1.pdf
Sawa, Y., Kitani, T., Shibata, N., Yasumoto, K., Ito, M.:
A Method for Pedestrian Position Estimation using Inter-Vehicle Communication, Proc. of the 3rd IEEE Workshop on Automotive Networking and Applications (AutoNet 2008), pp. 1 - 6, DOI:10.1109/GLOCOMW.2008.ECP.57 (Dec 2008).
In this paper, we propose a method for detecting the positions of pedestrians by cooperation of multiple cars with directional antennas to support drivers for pedestrian safety. In the method, each pedestrian carries a device which periodically transmits a beacon with a unique ID, and each car passing near the pedestrian receives the beacon by a directional antenna and measures the distance and the angle of arrival.
We assume the distribution of the measurement errors to be a normal distribution, and the system calculates the existence probabilities of each pedestrian at each point. By exchanging information of the probabilities between cars, the area with high existence probability is narrowed down. In this paper, we first describe the situations where detecting positions of pedestrians greatly contribute to pedestrian safety, and then we describe the probability model used in our method, the method for calculating existence probabilities from information from multiple cars, and the protocol for exchanging the probability information between cars. We evaluated our method on QualNet simulator, and confirmed that the positions can be detected accurately enough for practical uses.
European Rotors - Certification by SimulationLeonardo
During European Rotors we presented our view and experience on certification by simulation with a look at the RoCS (Rotorcraft Certification by Simulation) project
Protection system for level crossings by geospatial analysis in real timeJose Gomez Castaño
In this work a system has been developed to improve the safety of level crossings. These facilities are located on railways without supervision, in most cases, and they are a source of accidents and deaths every year. The safety system works in two ways in real time.
On the one hand identifies the position of a vehicle on the level crossing, taken into account the vehicle location and the level crossing. If a user declares that is immobilized, by pressing a button in the app on board, this send the location and incident event to the central server, and an alert message, through different channels, are sent to the infrastructure manager.
Furthermore, it can alert vehicles approaching a level crossing indicating the distance that is, through text, icons and audio. The vehicle location is computed with a frequency depending on its speed.
The system exploits the Comobity system, developed for the Traffic Department (Dirección General de Tráfico, DGT). It consists of an app for Android and iOS devices, which communicates in real time with the central platform
The result is a system that improves the protection of intercepting vehicles left the road in the level crossing for breakdowns, plus improved information to vehicles approaching such facilities. The system can reduce material costs as much in human lives due to such accidents
FDOT Transportation Symposium presentation for connected and autonomous technology in highway work zones. Presented by Acey Roberts and Glenn Havinoviski, Wantman Group 1/19/21
Vehicle-2-Vehicle Communication Based on Wireless Sensor NetworkjournalBEEI
Truck Platooning is a car innovation that permits gathering various trucks into a single element where one truck intently takes after the other that outcomes in an expanded street limit. This kind of detachment allows to a significant degree tight separations and synchronous driving between the vehicles. Our point is to plan and exhibit a self-ruling truck platooning framework given vehicle-to-vehicle (V2V) correspondence innovation. The structure utilises IEEE 802.15.4 remote convention joined with separation going sensors to enable vehicles inside the company to safely trade data progressively and naturally break and quicken in light of the lead truck. The rapid of remote correspondence permits to a significant degree tight separations and synchronous driving between the platooning vehicles.
UK Spectrum Policy Forum - John Mettrop, CAA - Riding the Airwaves: AviationtechUK
UK Spectrum Policy Forum
Cluster 1: Transportation - 11 December 2014
John Mettrop, Policy Specialist Spectrum, Civil Aviation Authority
Riding the Airwaves: Aviation the evolving requirement
More information at: http://www.techuk.org/about/uk-spectrum-policy-forum
All rights reserved
Experience Mazda Zoom Zoom Lifestyle and Culture by Visiting and joining the Official Mazda Community at http://www.MazdaCommunity.org for additional insight into the Zoom Zoom Lifestyle and special offers for Mazda Community Members. If you live in Arizona, check out CardinaleWay Mazda's eCommerce website at http://www.Cardinale-Way-Mazda.com
(Slides) A Method for Pedestrian Position Estimation using Inter-Vehicle Comm...Naoki Shibata
http://ito-lab.naist.jp/themes/ITS/pdfs/2-1/1.pdf
Sawa, Y., Kitani, T., Shibata, N., Yasumoto, K., Ito, M.:
A Method for Pedestrian Position Estimation using Inter-Vehicle Communication, Proc. of the 3rd IEEE Workshop on Automotive Networking and Applications (AutoNet 2008), pp. 1 - 6, DOI:10.1109/GLOCOMW.2008.ECP.57 (Dec 2008).
In this paper, we propose a method for detecting the positions of pedestrians by cooperation of multiple cars with directional antennas to support drivers for pedestrian safety. In the method, each pedestrian carries a device which periodically transmits a beacon with a unique ID, and each car passing near the pedestrian receives the beacon by a directional antenna and measures the distance and the angle of arrival.
We assume the distribution of the measurement errors to be a normal distribution, and the system calculates the existence probabilities of each pedestrian at each point. By exchanging information of the probabilities between cars, the area with high existence probability is narrowed down. In this paper, we first describe the situations where detecting positions of pedestrians greatly contribute to pedestrian safety, and then we describe the probability model used in our method, the method for calculating existence probabilities from information from multiple cars, and the protocol for exchanging the probability information between cars. We evaluated our method on QualNet simulator, and confirmed that the positions can be detected accurately enough for practical uses.
European Rotors - Certification by SimulationLeonardo
During European Rotors we presented our view and experience on certification by simulation with a look at the RoCS (Rotorcraft Certification by Simulation) project
Protection system for level crossings by geospatial analysis in real timeJose Gomez Castaño
In this work a system has been developed to improve the safety of level crossings. These facilities are located on railways without supervision, in most cases, and they are a source of accidents and deaths every year. The safety system works in two ways in real time.
On the one hand identifies the position of a vehicle on the level crossing, taken into account the vehicle location and the level crossing. If a user declares that is immobilized, by pressing a button in the app on board, this send the location and incident event to the central server, and an alert message, through different channels, are sent to the infrastructure manager.
Furthermore, it can alert vehicles approaching a level crossing indicating the distance that is, through text, icons and audio. The vehicle location is computed with a frequency depending on its speed.
The system exploits the Comobity system, developed for the Traffic Department (Dirección General de Tráfico, DGT). It consists of an app for Android and iOS devices, which communicates in real time with the central platform
The result is a system that improves the protection of intercepting vehicles left the road in the level crossing for breakdowns, plus improved information to vehicles approaching such facilities. The system can reduce material costs as much in human lives due to such accidents
FDOT Transportation Symposium presentation for connected and autonomous technology in highway work zones. Presented by Acey Roberts and Glenn Havinoviski, Wantman Group 1/19/21
Embedded Fest 2019. Антон Волошин. Connected Mobility: from Vehicle to CloudEmbeddedFest
Vehicle connection with the outside world is one of the modern trends of automotive industry development. The key element of connected vehicle is telematics control unit (TCU). From the one hand telematics unit interacts with electronic control units (ECUs) in vehicle, such as Head Unit, Board Control Module, etc. over CAN or Automotive Ethernet, from the other hand – with the cloud services via modem and CDMA\GSM\LTE networks. TCU provides a wide range of useful features: remote commands, remote diagnostics, Wi-Fi hotspot, car positioning, online traffic and hazard information besides the basic emergency call functionality. Telematics essentials and architecture, as well as features implementation in detail, will be presented. Integration and homologation testing specifics will also be discussed.
Smart infrastructure for autonomous vehicles Jeffrey Funk
These slides use concepts from my (Jeff Funk) course entitled analyzing hi-tech opportunities to analyze how autonomous vehicles are becoming economic feasible. They are becoming economically feasible because the cost of lasers, ICs, MEMS, and other electronic components are falling at 25 to 40% per year. If the cost of autonomous vehicles fall 25% a year, the cost of the electronics associated with autonomous vehicles will fall 90% in 10 years. Dedicating roads to autonomous vehicles is necessary to achieve the most benefits from autonomous vehicles. While using autonomous vehicles in combination with conventional vehicles can free drivers for other activities, dedicating roads to autonomous vehicles can dramatically reduce congestion, increase speeds, and thus increase the number of cars per area of the road. They can also reduce accidents, insurance, and the number of traffic police. These slide discuss the use of wireless technologies for the control and coordination of autonomous vehicles. Improvements in bandwidth, speed, and latency (delays) along with improvements in computer processing are occurring and these improvements are making dedicated roads for autonomous vehicles economically feasible.
User-Driven Cloud Transportation System for Smart Drivingamg93
A user-driven pattern of ITS based on cloud computing technology named user-driven cloud transportation system (CTS) foe smarter user of transportation network.
Dedicated roads for autonomous vehicles Jeffrey Funk
These slides use concepts from my (Jeff Funk) course entitled analyzing hi-tech opportunities to analyze how autonomous vehicles are becoming economic feasible. They are becoming economically feasible because the cost of lasers, ICs, MEMS, and other electronic components are falling at 25 to 40% per year. If the cost of autonomous vehicles fall 25% a year, the cost of the electronics associated with autonomous vehicles will fall 90% in 10 years. Dedicating roads to autonomous vehicles is necessary to achieve the most benefits from autonomous vehicles. While using autonomous vehicles in combination with conventional vehicles can free drivers for other activities, dedicating roads to autonomous vehicles can dramatically reduce congestion, increase speeds, and thus increase the number of cars per area of the road. They can also reduce accidents, insurance, and the number of traffic police. These slide discuss a number of technologies that can be used for the dedicated roads including wireless communication, magnetic stripes and RFIDs that together can coordinate vehicles on roads. The slides end by summarizing efforts in Singapore.
Worldsensing: A Real World Use Case for Flux by Albert Zaragoza, CTO & Head o...InfluxData
Albert Zaragoza, Fuad Mimoun and Daniel Lázaro from Worldsensing will be sharing how their team built an end-to-end IoT solution for cities — from traffic flow management and smart parking to emergency & security response and critical infrastructure monitoring. They will focus this talk on how they used Flux to pull together lots of data sources into their real-time platform to provide alerts to the many constituents of the data.
Arqueoastronomía de eclipses de sol: Generación de la geometría de la sombra ...Jose Gomez Castaño
El uso del contexto espacial en la resolución de problemas se puede traducir en herramientas de gran utilidad. Todos los hechos suceden en un lugar y un instante determinado, y estos dos parámetros aportan gran información a cualquier evento.
Los eclipses de sol han sido ampliamente utilizados por historiadores y arqueólogos como herramienta para la datación de hechos históricos. Su narración en historias o su representación en pinturas, han permitido correlacionar el contexto donde se producen, con un instante concreto. Sin embargo, no es fácil para un arqueólogo manejar efemérides astronómicas, y a menudo solo dispone de herramientas de visualización que no les permite llevar a cabo consultas complejas. Estas fuentes están además, fuera del ámbito habitual de trabajo de estos profesionales.
El problema es por tanto, crear una herramienta que permita a los arqueólogos realizar búsquedas precisas, dentro de los entornos en los que están habituados a trabajar.
En este trabajo se han utilizado los elementos Besselianos de los eclipses de sol publicados por el Jet Propulsion Laboratory, para generar las curvas de visibilidad de todos los eclipses de sol producidos desde el 2000 a.c. hasta el 3000 d.c. El algoritmo se ha implementado sobre un programa que permite el cálculo de las geometrías de la trayectoria de la sombra de la luna sobre la tierra, y cada una de ellas se ha almacenado en una base de datos PostGIS en proyección EPSG 4326. Esto permite ejecutar consultas espaciales de forma instantánea para conocer las circunstancias locales de todos los eclipses, para cualquier localización a lo largo de la historia, tanto totales como parciales.
Como resultado se ha creado una base de datos espacial y un servicio fácil de incorporar a cualquier herramienta GIS utilizada habitualmente por los Arqueólogos. De esta manera se encapsula la complejidad de los cálculos astronómicos en estos servicios, ofreciendo un resultado que sirva como herramienta arqueométrica en la datación de hechos históricos.
Geolocalización de 911 pasos a nivel mediante Ortofotografía y BTN100, para e...Jose Gomez Castaño
Los Pasos a Nivel son instalaciones en las que intersectan las líneas ferroviarias con las vías de circulación de vehículos. Estas intersecciones afectan tanto a las líneas de ferrocarril, como a las metro ligero u otro tipo de líneas metropolitanas. Se trata de instalaciones con diferentes niveles de automatización, que van desde las compuestas por un simple entarimado servido con cadenas, hasta las protegidas mediante señales luminosas y acústicas para informar a los vehículos, y un sistema de protección correlacionado con la lógica de seguridad de un enclavamiento, para su protección relacionado con los trenes.
En la red actual de ferrocarriles, existen numerosos Pasos a Nivel, y constituyen un punto de riesgo tanto para la circulación de vehículos como para las circulación de trenes. En la Unión Internacional de Ferrocarriles (UIC) existe una especial sensibilidad hacia este tipo de instalaciones, ya que son una fuente continua de accidentes intermodales, que producen elevados costes administrativos, sociales y sobre todo humanos.
En España no existe un catálogo de acceso público sobre estas instalaciones, más allá de la información que aparece en las fuentes cartográficas. Dentro de la política de datos abiertos y del Esquema Nacional de reutilización de datos del Estado [http://administracionelectronica.gob.es/es/ctt/eni#.VvL689zhCao] se hace cada vez es más necesario disponer de esta información y que esta sea de calidad.
El objetivo de este trabajo ha sido recopilar las fuentes de información relacionadas con los Pasos a Nivel y confeccionar un catálogo preciso de sus ubicaciones. Aunque es sabido que existen muchos más, solo se ha atendido a los 911 existentes en la BTN100. Esta información se utiliza dentro del Sistema de Seguridad Vial Comobity, desarrollado para el aviso a conductores dentro del proyecto ‘DGT 3.0 Hacia una movilidad inteligente’ de la Dirección General de Tráfico.
Applying INSPIRE to quantify a detail cost of restrictions in road and rail i...Jose Gomez Castaño
We define an infrastructure restriction as any event in the infrastructure that makes decrease the number of circulations that can pass through a point or section, or impose a speed reduction. These restrictions are caused by works, incidences, speed limits, and it can be temporary or permanent.
To carry out efficient management of operations, it is important to anticipate the effects of these restrictions and to know how the trains and other type of circulations are affected. This affectation may by speed reductions or even elimination of its circulation, and it introduces an additional cost in the operation of Railway or Road Companies.
Right now calculations to quantify the impact of these restrictions are based on relational databases, or even hierarchical ones, and they use only alphanumeric attributes. They do not take into account the geometry of the lines on which the restriction occurs and is not considered the micro-level topology.
In other studies, we have demonstrated the use of INSPIRE and RINF regulations, with RailTopomodel topological models as a means to model a valid topology for the European railway network.
This paper describes a method to use the topological basis described above to create train and road routes from scheduled circulations from a spatiotemporal point of view. A temporary component within the coordinate Z has been added to the traditional route with longitude and latitude coordinates (X, Y), to define a TrainRailwayLink feature. This allows us to perform geospatial analysis including time as a variable.
As a result, the set of circulations affected by the restrictions and the lost time is computed. This results in an economic cost. Computations are made in real time and can be run in batch mode for further statistical analysis.
With this knowledge we can know the most costly restrictions and the Railway or Road Companies, or even the Infrastructure Manager can take them into account to solve those with more prioriy.
Cálculo del coste de restricciones en la capacidad de la infraestructura ferr...Jose Gomez Castaño
Con la llegada al entorno ferroviario de más Emrpesas Ferroviarias, tanto nacionales como Comunitarias, la adopción de normas Europeas y la aplicación del nuevo Reglamento de Circulación Ferroviaria, se hace necesario, más que nunca, adoptar procedimientos que aseguren la interoperabilidad en las operaciones ferroviaras.
Un punto donde esto es importante, es a la hora de cuantificar de forma precisa, qué retraso afectará a cada circulación debido a los trabajos, limitaciones de velocidad, y demás actuaciones que se llevan a cabo en la vía.
En este trabajo se introduce el tratamiento del recorrido de los trenes como un objeto espacial, con lo que se pueden aplicar geogrocesos y análisis geoespacial, directamente al mismo. En su geometrías se ha añadido la componente temporal al propio objeto, construyendo un fenómeno 3D usando atributos INSPIRE.
El objetivo es poder cuantificar cuánto tiempo retrasarán los eventos que aparecen en la infraestructura ferroviaria, y conocer de forma detallada el coste que estos implican, teniendo en cuenta cada tipo de tren y la infraestructura por la que circulan. Al hacerse de una forma global para todo el ámbito de actuación del Administrador de la Infraestructura, este puede tomar decisiones sobre la prioridad a la hora de acometer obras o solucionar problemas en función de su coste.
Se ha utilizado el esquema de Redes de Transporte Ferroviaria de INSPIRE y la especificación RINF para la implementación de los fenómenos involucrados. Se ha implementado una transformación de los puntos kilométricos nominales a fenómenos espaciales, y se ha definido de un nuevo fenómenos RailwayTrainPath.
Como resultado se ha desarrollado una aplicación que permite, a partir de los PK y duración de las restricciones, de toda la red ferroviaria, calcular el coste para todos los trenes que circulan por España, asegurando la interoperabilidad de los resultados y su cuantificación detallada. Esto permite a cualquier Empresa Ferroviaria o Administrador de la Infraestructura Europeo, poder anticiparse a los problemas creados por estas restricciones y mejorar en los procesos de gestión feorroviaria en cuanto a su resolución.
Tratamiento geoespacial del recorrido de trenes y de tramos ferroviarios: Mej...Jose Gomez Castaño
El recorrido de los trenes, su posición y la ubicación de los elementos de la infraestructura ferroviaria, se realiza utilizando bases de datos en las que los atributos alfanuméricos definen las características de estos. Realizar ciertos análisis sobre estos modelos se hace complejo y costoso. En este trabajo se aborda cada uno de estos elementos desde un punto de vista geoespacial, introduciendo algoritmos que permiten llevar a cabo análisis complejos con más
rapidez.
Los algoritmos creados se desarrollan para implementar un conjunto de geometrías que permitan definir tramos, líneas y recorridos sobre una base de datos geoespacial. Sobre ellas se llevan a cabo análisis que permiten cruzar los datos alfanuméricos tradicionales con las capacidades geoespaciales que aporta este nuevo enfoque. Para ladefinición de las geometrías se ha utilizado el Anexo I de la Directiva INSPIRE.
El primer resultado obtenido es poder tratar el recorrido completo de un tren como una entidad completa. Esto ha posibilitado desarrollar procedimientos para determinar la influencia de trabajos, limitaciones de velocidad, cambios de trazado y cualquier elemento de la infraestructura sobre el recorrido de los trenes, en tiempo real.
A partir de la metodología se muestra un ejemplo práctico de aplicación sobre situaciones
Uso de las Infraestructuras de Datos Espaciales en AstronomíaJose Gomez Castaño
Charla impartida en la Agrupación Astronómica de Madrid sobre aplicaciones prácticas de las Infraestructuras de Datos Espaciales en Astronomía. Cálculo de efemérides y su representación, análisis de observaciones, arqueoastronomía, ocultaciones por la luna y asteróides, eclipses y meteoros
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Level Crossing protection integration into connected car tecnologies
1. Jorge Ordás (1), José Gómez Castaño (2,3) Juan José Cabrera García (4)
1 Subdirector de Movilidad Dirección General de Tráfico , jordas@dgt.es
2 R&D INSPIDE jgcasta@inspide.com
3 GIS specialist GUAIX group UCM Astrophysics jgomez03@pdi.ucm.es
4 R&D INSPIDE jjcabrera@inspide.com
Level Crossing protection integration into connected car tecnologies
3. Outline
Problem definition
Types of LC
Distribution of accidents in LC
Focus on warning
Goals
System design
LC application
Data providers
Used tools
Final operational system
Future
Index
4. Problem definition
The goal is to solve the
problem of warning to
drivers in advance
to take precautions when
they are approaching a
level crossing
Avoid accidents due to
the occupancy level
crossing for vehicles that
have been stopped on
the railroad
5. CLASS A Protected level crossings exclusively with fixed signals.
CLASS B Protected level crossings with light and acoustic signals.
(S.L.A).
CLASS C Protected level crossings with half-barriers, double half-
barriers or barriers, Automatic or Nailed (S.B.E., S.B.A. or
S.B.E./S.B.A.).
CLASS D Protected level crossings in Luggage Regime (Chains
or Barriers or manual half-barriers).
CLASS E Protected level crossings daycare walk Paso.
CLASS F Step by exclusive level or Pedestrian and Livestock.
Types of LC protection
6. CLASS A Protected level crossings exclusively with fixed signals.
CLASS B Protected level crossings with light and acoustic signals.
(S.L.A).
CLASS C Protected level crossings with half-barriers, double half-
barriers or barriers, Automatic or Nailed (S.B.E., S.B.A. or
S.B.E./S.B.A.).
CLASS D Protected level crossings in Luggage Regime (Chains
or Barriers or manual half-barriers).
CLASS E Protected level crossings daycare walk Paso.
CLASS F Step by exclusive level or Pedestrian and Livestock.
Types of LC protection
7. Accidents at
LC
Num of fatalities % of all
accidents
% of all
fatalities
LC
accidents
per millon
train-km
LC fatalities per
millon train-km
Passengers Staff Third
parties
2013 479 1 280 26 26 0,12 0,07
2012 510 1 325 26 32 0,12 0,08
2011 447 6 1 277 22 26 0,11 0,07
2010 495 1 3 315 23 28 0,12 0,08
2009 493 2 1 374 22 28 0,12 0,09
2008 539 3 325 25 27 0,13 0,08
Distribution of accidents in LC
8. Focus on warning
Most effective is replace LC, but it is expensive, so
• Signaling its location on the road by traffic signals in a passive way.
• Closing by detecting the proximity of a train by an active way.
9. Goals
Notify drivers a nearby Level Crossing.
Notify to Infrastructure Managers about the interception of a
Level Crossing by a vehicle when the driver indicates incidents.
Notify to Infrastructure Managers about the interception of the track,
at any point, by a vehicle when the driver indicates incidents.
Improve road and railways safety,
reducing level crossing accident impact
10. System design
Solution based on geolocation in real time of all parts of the system
and notifications to drivers and infrastructure managers,
not to replace actual systems
● Level Crossing facilities, regardless of type.
● Vehicles.
● Trains.
● Infrastructure managers.
11. System design
Taken advantage that connected car concept begins to take shape
in all countries
Collects real-time information
Central intelligent cloud
Returns information and events
13. System design
Actual system developed for Dirección General de Tráfico
collects real time information about:
● Position
● Speed
● Vehicle type
Computes driver risk and return
Real time audio an text notifications
24. LC application
1024x500.jpg
Two kind of notifications
Vehicle
notifications are sent based
on the vehicle speed,
specifying the name of
the road and where KP
is located
26. LC application
1024x500.jpg
Two kind of notifications
Vehicle
notifications are sent based
on the vehicle speed,
specifying the name of
the road and where KP
is located
27. LC application
1024x500.jpg
Two kind of notifications
Infrastructure Manager
The position of vehicles is
computed in real time,
and if its driver declares an
incident, the system is able
to identify if he is located
within the Level Crossing
31. Used tools
1024x500.jpg
Linux operating system installed over the Amazon AWS cloud.
PostGIS database.
Python and Java.
Docker containers to deploy microservices
Desktop tools QGIS
32. Final operational system - Architecture
1024x500.jpg
MQTT/Rest Interfaces
Vehicle on board and user apps
Load balancers
& perimetral security
EC2 cluster & Microservices
Monitoring
DGT
VPN
34. Final operational system - Results
1024x500.jpg
● More than 30000 on board devices confirmed
● National road and railways coverage
● Availability to use European cartography
● National 911 Level Crossing
● System in production environment ready to send Singularity
to Car
● Ready to incorporate Infrastructure Managers
and Railway Undertakers into the system
35. Final operational system - Results
1024x500.jpg
https://play.google.com/store/apps/details?id=com.inspide.comobity&hl=es
https://itunes.apple.com/es/app/comobity/id1040076151?mt=8
37. Future
1024x500.jpg
Next steps
Improve LC location accuracy
Include train location in evaluation process
Involve Infrastructure Managers for a complete integration with their
Information Systems
Improve the publication of open data about railways
Spread out the system to vehicle on board
Spread out the system to other countries
Include the logic into DGT 3,0 platform to reach 2,5 M devices
38. Thank you and improve
railways and road safety
Level Crossing protection integration into connected car tecnologies