This presentation highlighted topics that we discussed during "minisummit" like, DRTM/TrencBoot, fwupd, Qubes OS HCL, Qubes OS commercial deployment and others.
The presentation discusses the possible synergy between open-source firmware consultants and Qubes OS in light of hardware certification. It also analyses possible further support in Qubes OS for alternative computer architectures like OpenPOWER, ARM, and RISC-V. What problems have to be solved and how.
Static Root of Trust for Measurement is essential for establishing trust at boot time. There are many implementations from different vendors (Secure Boot, Intel Boot Guard, Hardware Validated Boot, Hardware Assured Boot etc.). S-RTM proved its use for hardware, but what about virtual machines? This presentation discuss S-RTM for VMs in context of Qubes OS.
Dynamic Root of Trust for Measurement is a Trusted Computing technique to establish or reestablish trust without a reboot. In this presentation, the author discusses the use of D-RTM, especially its open-source implementation called TrenchBoot, for a virtual machine environment based on Xen hypervisor.
Greg Royal is the CTO and EVP of Cistera Networks, a software company that builds platforms connecting enterprise applications to phone systems using voice over IP. The company extensively uses Linux due to its robustness, scalability, and flexibility. Linux forms the basis of Cistera's IT strategy along with Cisco infrastructure. Linux allows the company to do more with less by reducing licensing costs and increasing capabilities. While some proprietary solutions will remain, open source software allows for lower costs, more flexibility, and better informed decisions through testing and trials.
Llilum 161108 at MVP Global Summit 2016Atomu Hidaka
This document summarizes LLILUM, a .NET based development environment for ultra small embedded systems. It runs on ARM Cortex-M microcontrollers with as little as 256KB of ROM and 32KB of RAM. LLILUM uses Visual Studio and the .NET framework to build and debug applications, which are then compiled to machine code using LLVM and run on supported mbed-compatible boards. It allows developing embedded applications in C# and VB with a smaller memory footprint than other .NET solutions like NETMF. The document outlines LLILUM's architecture, development workflow, supported boards and how it compares to NETMF.
complete seminar report on simputer technology Suchitra goudar
The document discusses the Simputer, a low-cost portable computer designed to bridge the digital divide. Key points include:
- The Simputer runs Linux, has a touchscreen interface, smartcard reader, and is powered by batteries to make it affordable and accessible in developing areas.
- It was launched in 2001 to provide a simple, inexpensive computer for those in rural areas or who cannot read to access information technology.
- While initial goals were not met, several thousand units were sold and the Simputer was used in applications like land records, banking, and by the military. However, issues like lack of government support hindered larger adoption.
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsHannes Tschofenig
Position paper for the NIST Lightweight Cryptography Workshop, 20th and 21st July 2015, Gaithersburg, US.
The link to the workshop is available at: http://www.nist.gov/itl/csd/ct/lwc_workshop2015.cfm
The presentation discusses the possible synergy between open-source firmware consultants and Qubes OS in light of hardware certification. It also analyses possible further support in Qubes OS for alternative computer architectures like OpenPOWER, ARM, and RISC-V. What problems have to be solved and how.
Static Root of Trust for Measurement is essential for establishing trust at boot time. There are many implementations from different vendors (Secure Boot, Intel Boot Guard, Hardware Validated Boot, Hardware Assured Boot etc.). S-RTM proved its use for hardware, but what about virtual machines? This presentation discuss S-RTM for VMs in context of Qubes OS.
Dynamic Root of Trust for Measurement is a Trusted Computing technique to establish or reestablish trust without a reboot. In this presentation, the author discusses the use of D-RTM, especially its open-source implementation called TrenchBoot, for a virtual machine environment based on Xen hypervisor.
Greg Royal is the CTO and EVP of Cistera Networks, a software company that builds platforms connecting enterprise applications to phone systems using voice over IP. The company extensively uses Linux due to its robustness, scalability, and flexibility. Linux forms the basis of Cistera's IT strategy along with Cisco infrastructure. Linux allows the company to do more with less by reducing licensing costs and increasing capabilities. While some proprietary solutions will remain, open source software allows for lower costs, more flexibility, and better informed decisions through testing and trials.
Llilum 161108 at MVP Global Summit 2016Atomu Hidaka
This document summarizes LLILUM, a .NET based development environment for ultra small embedded systems. It runs on ARM Cortex-M microcontrollers with as little as 256KB of ROM and 32KB of RAM. LLILUM uses Visual Studio and the .NET framework to build and debug applications, which are then compiled to machine code using LLVM and run on supported mbed-compatible boards. It allows developing embedded applications in C# and VB with a smaller memory footprint than other .NET solutions like NETMF. The document outlines LLILUM's architecture, development workflow, supported boards and how it compares to NETMF.
complete seminar report on simputer technology Suchitra goudar
The document discusses the Simputer, a low-cost portable computer designed to bridge the digital divide. Key points include:
- The Simputer runs Linux, has a touchscreen interface, smartcard reader, and is powered by batteries to make it affordable and accessible in developing areas.
- It was launched in 2001 to provide a simple, inexpensive computer for those in rural areas or who cannot read to access information technology.
- While initial goals were not met, several thousand units were sold and the Simputer was used in applications like land records, banking, and by the military. However, issues like lack of government support hindered larger adoption.
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsHannes Tschofenig
Position paper for the NIST Lightweight Cryptography Workshop, 20th and 21st July 2015, Gaithersburg, US.
The link to the workshop is available at: http://www.nist.gov/itl/csd/ct/lwc_workshop2015.cfm
The document proposes an idea for developing a personal robot (PR) industry by utilizing cloud computing. It suggests that a standard robot hardware platform like the PR2 could access different software algorithms stored on cloud servers to perform a variety of tasks, without needing to reprogram the robot each time. This could make the robots more affordable and capable by distributing computing power. The document outlines how a company could operate a cloud server offering algorithms to robots for various uses like housework or industrial tasks. It also discusses potential benefits, obstacles, and an industrial structure for this proposed PR industry model.
Presentation given at HostingCon 2008 in Chicago for the Marketing tract. Designed to explain the differences between various Cloud Computing models as well as dispel myths and illustrate the features and benefits of Clouds.
The document discusses deploying business analytics applications on IBM's zEnterprise system. It notes that mainframes are increasingly being used to consolidate various workloads due to their superior economics and system design strengths compared to distributed systems. Running business analytics workloads on the mainframe can improve business process flows and help streamline activities in areas like financial analysis, call centers, sales, and strategic investment management. Deploying business analytics solutions on a departmental basis across distributed systems is seen as inefficient compared to a consolidated approach using the mainframe.
In this presentation, we would like to present how BITS and CHIPSEC can be utilized on top of coreboot enabled platform to verify the quality of underlying firmware.
Firmware security is mostly about validation and formal development processes. To achieve some level of confidence about firmware implementation quality various tools were developed, of which most notable are CHIPSEC and BITS.
BITS (BIOS Implementation Test Suite) consist of a GRUB2 bootloader extended with runtime Python support.
CHIPSEC is a Platform Security Assessment Framework which mostly focuses on platform configuration but can also be used for other purposes (e.g. verification of Spectre mitigation presence).
We would like to present what issues firmware developers may face and what we were able to achieve at this ground using BITS and CHIPSEC for validation of PC Engines apu2 and MinnowBoard Turbot platform. We want to present what modifications are required to integrated Python code along with CHIPSEC and BITS scripts. We also would like to demonstrate practical usage of mentioned frameworks by showing short demo.
Executive SummaryThis report addresses four major concerns that .docxrhetttrevannion
This report provides recommendations to address four concerns of the New York City Council regarding its aging IT infrastructure located at City Hall. The concerns are: having over 1000 personal computers needing reduction to save on energy costs; whether the current PCs meet Windows 10 requirements; security of the operating system; and securely backing up documents. The report recommends upgrading to Windows 10, replacing 550 PCs that do not meet requirements, increasing RAM on 300 PCs, and using 200 PCs for three more years. It also recommends a 64-bit server operating system and cloud-based document sharing.
How to estimate the cost of a Maximo migration project with a high level of c...Mariano Zelaya Feijoo
This document discusses how to estimate the cost of a high customization Maximo migration project from an older version to 7.5+. It involves:
1) Analyzing areas like architecture, new functionality, data model changes, reporting and integrations.
2) Assessing customization level using IBM's Customization Detection Tool or comparisons to out-of-box versions.
3) Categorizing customizations into components like UI, reports, APIs.
4) Using tools like SLOC counters to measure custom code lines to estimate effort.
5) Collecting metrics on customizations to input into estimation models like SLIM QSM for time/cost figures.
Benefits of Knowledge Graphs and AI For Enterprise PLM PlatformsOleg Shilovitsky
To Harness The Potential Of Product Data
Accelerating Enterprise Digital Transformation: Benefits of Knowledge Graphs and AI For Enterprise PLM Platforms
Oleg Shilovitsky's presentation at PI DX 2023 Conference, Atlanta GA.
Building a reliable and scalable IoT platform with MongoDB and HiveMQDominik Obermaier
Today’s Internet of Things (IoT) is enabling companies to blend together the physical and digital worlds, creating new business models and generating insights that increase productivity at once unimaginable levels. However, managing the ever growing volume of heterogeneous IoT data from disparate devices, systems and applications both on premise and in the cloud can be a challenging endeavour without a scalable and reliable IoT platform.
In this webinar, we will explore why and how companies are leveraging HiveMQ and MongoDB to build exactly that: a scalable and reliable IoT platform. Based upon a sample fleet management scenario, we will explain how telematics data can be routed via MQTT and efficiently stored to provide analytics and insights into the data.
Key Learnings
- Common challenges and pitfalls of IoT projects
- Required components for effectively handling data with an IoT platform
- HiveMQ for MQTT to enable bi-directional device communication over unstable networks
- MongoDB as the flexible and scalable modern data platform combining data from different sources and powering your applications
- Why MongoDB and HiveMQ is such a great combination
The idea for this talk born from fascination about the philosophy behind QubesOS, OpenXT and ViryaOS. The underlying technology for those OSes is Xen. Xen is a well-known project under the Linux Foundation umbrella, but what is most interesting in it from open source firmware perspective are high-end virtualization features
like:
* DMA protection
* PCI pass-through
* Interrupt remapping
* SR-IOV
* TPM and vTPM
* others
With automotive market hypervisors slowly move into embedded space, what means underlying firmware will have to expose right infrastructure to provide initial configuration and security.
Most features have to be configured and exposed in a well-defined way by firmware. IOMMU is the system component that some of the mentioned features rely on.
As maintainers of PC Engines apuX platforms, we decided to work on AMD IOMMU enabling to create right infrastructure for hypervisors and operating systems.
In this presentation we want to:
* explain features of AMD IOMMU
* present recommended methods of AMD IOMMU enabling
* demonstrate current status of our work
* discuss future user needs and implementation plans
PI DX 2020 Atlanta - Data Management Strategy. _ How Do You Establish a Commo...Oleg Shilovitsky
The rise of data and the new economy has led to a paradigm shift that is redefining our world. In today's digital age, information reigns supreme as currency for businesses looking towards an accelerated productivity level with advanced technologies in place; this will allow you to be more competitive by boosting efficiency across all departments at once!
The most common data challenges faced by businesses are talked about in detail during this session. You will learn how to overcome them and get practical tips that can help your company succeed.
You will gain new insights into the following topics:
1. Avoiding breakdowns in information flows throughout the organization
2. Optimization processes and connecting data silos
3. Making the technology work for your data flow
4. Giving people the right tools to communicate and collaborate
5. Designing effective education of your users to support data sharing across the business
You're going to see the technological stack and the strategy I used to develop OpenBOM platform.
Interconnection Automation For All - Extended - MPS 2023Chris Grundemann
Matt "Grizz" Griswold and Chris Grundemann are both IX founders, internetworking experts, and automation proponents. With over 4 decades of combined experience they are now turning to sharing what they've learned about automating BGP and interconnection through a set of open source tools, along with support and services for those that need it.
This talk will share what they have learned both from personal experience as well as through dozens of recent interviews with IX operators and interconnection engineers over the past several months. Including common challenges, productive methodologies, and best practices.
The highlight of the talk will be announcing and describing two open source automation tools built to make interconnection and BGP easier for everyone. One is ixCtl, which is built to automate the most common and problematic tasks involved in running an internet exchange point, particularly configuring and managing secure route servers. The other is PeerCtl, which is built to automate the most common and problematic tasks involved in interconnecting an AS; from bilateral and multilateral peering to PNI and also transit connections.
Code for both (along with several other tools) is available on GitHub: https://github.com/fullctl.
Speaker: Chris Grundemann
Speaker: Matt Griswold
The Architecture Of Software Defined Radios EssayDivya Watson
This project aims to build a smart assistant to help users purchase books online by integrating
multiple sources of information about books and the purchasing process into a single system. By
consolidating data from sources about books, reviews, prices and retailers, the assistant can provide
users all the necessary information to make an informed purchase decision in one place. The goal is
to streamline the online book buying experience for users by eliminating the need to search across
multiple websites during the purchase process.
This document provides an overview of Red Hat products and technologies for IBM Power Systems and IBM zSystems platforms. It discusses Red Hat Enterprise Linux offerings that are optimized for these platforms, including features like support for big-endian mode, Linux containers, multipath I/O, and more. It also summarizes Red Hat's overall approach including their open source development model and enterprise Linux lifecycles.
The document discusses the transition from proprietary computing systems dominated by single firms like IBM to open systems defined by open standards. It describes how technological changes like the microprocessor lowered costs, allowing new entrants. This increased pressure for open and compatible systems. Early "open" systems like Unix gained adoption through large developer communities and compatibility. Competition then occurred between different open systems through strategies like proprietary extensions, alliance shifting, and achieving full interoperability between hardware and software.
The document discusses the transition from proprietary computing systems dominated by single firms like IBM to open systems defined by open standards. It describes how technological changes like the microprocessor lowered costs, allowing new entrants. This increased pressure for open and compatible systems. Early "open" systems like Unix gained adoption through large software markets. Later, "super-compatibility" strategies and shifting alliances led to competition between open systems, with Microsoft/Intel eventually dominating the personal computer market.
The document discusses the transition from proprietary computing systems dominated by single firms like IBM to open systems defined by open standards. It describes how technological changes like the microprocessor lowered costs, allowing new entrants. This increased pressure for open and compatible systems. Early "open" systems like Unix gained adoption through large developer communities and compatibility. Competition then occurred between different open systems through strategies like proprietary extensions, alliance shifting, and achieving full interoperability between hardware and software.
This document provides an overview of MQ (Message Queue) implementation on z/OS systems. It discusses MQplex configuration where MQ is implemented across multiple z/OS LPARs in a sysplex. It also discusses naming conventions and examples of MQplex configuration. The document then covers specific MQ objects like queues, channels, and dead letter queues. It introduces the presenter Vincent Coulonnier and his background as a z/OS system engineer with experience in DB2, CICS, IMS, and MQ. Finally, it outlines the roles and responsibilities of IBM GTS IS which include MQ installation, migration, maintenance, implementation of new functionality, and support for business teams.
Chris Boos - No Cloud Without Automation! (Key Note)CloudCamp Hamburg
The document discusses how automation is essential for the success of cloud computing. Without automation, operational costs will increase due to the complexity of dynamically scaling and distributing cloud resources. The document argues that most legacy systems cannot currently be migrated to the cloud and that automation is needed to manage cloud infrastructure and applications. Specifically, an "autopilot system" is needed to make automated decisions and recombine existing technical knowledge to perform tasks like provisioning, configuration management, and root cause analysis. With such automation in place, the document claims that cloud computing can deliver on its promised benefits of reduced costs, increased innovation, and environmental sustainability.
See what's new in IBM mainframe technology through August 2018. This is the newest of the new software mainframe technology. This presentation is a teaser for additional topics presented at SHARE in St. Louis.
This document discusses strategic dimensions for network and IT service providers entering the cloud computing market. It conducted a survey of experts on both the demand and supply sides of the industry. The survey found that cloud computing is seen as a good opportunity for both network and IT service providers to expand into. Experts said the top benefits of cloud computing are flexibility, scalability, cost savings, and business continuity. However, security and data confidentiality were cited as major concerns. The document provides recommendations on strategic positioning in areas like value proposition, branding, and customization to differentiate in the cloud computing market.
The document discusses adding support for TPM 2.0 chips in Qubes OS. Currently, Qubes only supports TPM 1.2 chips and cannot detect TPM 2.0 chips. The Linux kernels used in Qubes (4.14 and 4.19) are missing some TPM 2.0 configuration options. Testing on real hardware with a TPM 2.0 chip showed the chip is detected but Qubes reports "Device not found". Integrating TPM 2.0 support would allow using newer TPM standard chips but may require changes to tools like Anti-Evil Maid that currently only support TPM 1.2.
In this presentation, we discuss the current state of Anti-Evil Maid mitigation.
Protection by ensuring the state of the platform. If we can trust the hardware and software we use, can we feel safe?
How to determine if the state of the platform is trusted and
hardware/firmware/software has not tampered?
Trusted Execution / Trusted Computing:
- TPM module by TCG
- Intel TXT
- AMD Secure Launch with SKINIT
More Related Content
Similar to Lightning talks - Qubes OS and 3mdeb "minisummit" 2019
The document proposes an idea for developing a personal robot (PR) industry by utilizing cloud computing. It suggests that a standard robot hardware platform like the PR2 could access different software algorithms stored on cloud servers to perform a variety of tasks, without needing to reprogram the robot each time. This could make the robots more affordable and capable by distributing computing power. The document outlines how a company could operate a cloud server offering algorithms to robots for various uses like housework or industrial tasks. It also discusses potential benefits, obstacles, and an industrial structure for this proposed PR industry model.
Presentation given at HostingCon 2008 in Chicago for the Marketing tract. Designed to explain the differences between various Cloud Computing models as well as dispel myths and illustrate the features and benefits of Clouds.
The document discusses deploying business analytics applications on IBM's zEnterprise system. It notes that mainframes are increasingly being used to consolidate various workloads due to their superior economics and system design strengths compared to distributed systems. Running business analytics workloads on the mainframe can improve business process flows and help streamline activities in areas like financial analysis, call centers, sales, and strategic investment management. Deploying business analytics solutions on a departmental basis across distributed systems is seen as inefficient compared to a consolidated approach using the mainframe.
In this presentation, we would like to present how BITS and CHIPSEC can be utilized on top of coreboot enabled platform to verify the quality of underlying firmware.
Firmware security is mostly about validation and formal development processes. To achieve some level of confidence about firmware implementation quality various tools were developed, of which most notable are CHIPSEC and BITS.
BITS (BIOS Implementation Test Suite) consist of a GRUB2 bootloader extended with runtime Python support.
CHIPSEC is a Platform Security Assessment Framework which mostly focuses on platform configuration but can also be used for other purposes (e.g. verification of Spectre mitigation presence).
We would like to present what issues firmware developers may face and what we were able to achieve at this ground using BITS and CHIPSEC for validation of PC Engines apu2 and MinnowBoard Turbot platform. We want to present what modifications are required to integrated Python code along with CHIPSEC and BITS scripts. We also would like to demonstrate practical usage of mentioned frameworks by showing short demo.
Executive SummaryThis report addresses four major concerns that .docxrhetttrevannion
This report provides recommendations to address four concerns of the New York City Council regarding its aging IT infrastructure located at City Hall. The concerns are: having over 1000 personal computers needing reduction to save on energy costs; whether the current PCs meet Windows 10 requirements; security of the operating system; and securely backing up documents. The report recommends upgrading to Windows 10, replacing 550 PCs that do not meet requirements, increasing RAM on 300 PCs, and using 200 PCs for three more years. It also recommends a 64-bit server operating system and cloud-based document sharing.
How to estimate the cost of a Maximo migration project with a high level of c...Mariano Zelaya Feijoo
This document discusses how to estimate the cost of a high customization Maximo migration project from an older version to 7.5+. It involves:
1) Analyzing areas like architecture, new functionality, data model changes, reporting and integrations.
2) Assessing customization level using IBM's Customization Detection Tool or comparisons to out-of-box versions.
3) Categorizing customizations into components like UI, reports, APIs.
4) Using tools like SLOC counters to measure custom code lines to estimate effort.
5) Collecting metrics on customizations to input into estimation models like SLIM QSM for time/cost figures.
Benefits of Knowledge Graphs and AI For Enterprise PLM PlatformsOleg Shilovitsky
To Harness The Potential Of Product Data
Accelerating Enterprise Digital Transformation: Benefits of Knowledge Graphs and AI For Enterprise PLM Platforms
Oleg Shilovitsky's presentation at PI DX 2023 Conference, Atlanta GA.
Building a reliable and scalable IoT platform with MongoDB and HiveMQDominik Obermaier
Today’s Internet of Things (IoT) is enabling companies to blend together the physical and digital worlds, creating new business models and generating insights that increase productivity at once unimaginable levels. However, managing the ever growing volume of heterogeneous IoT data from disparate devices, systems and applications both on premise and in the cloud can be a challenging endeavour without a scalable and reliable IoT platform.
In this webinar, we will explore why and how companies are leveraging HiveMQ and MongoDB to build exactly that: a scalable and reliable IoT platform. Based upon a sample fleet management scenario, we will explain how telematics data can be routed via MQTT and efficiently stored to provide analytics and insights into the data.
Key Learnings
- Common challenges and pitfalls of IoT projects
- Required components for effectively handling data with an IoT platform
- HiveMQ for MQTT to enable bi-directional device communication over unstable networks
- MongoDB as the flexible and scalable modern data platform combining data from different sources and powering your applications
- Why MongoDB and HiveMQ is such a great combination
The idea for this talk born from fascination about the philosophy behind QubesOS, OpenXT and ViryaOS. The underlying technology for those OSes is Xen. Xen is a well-known project under the Linux Foundation umbrella, but what is most interesting in it from open source firmware perspective are high-end virtualization features
like:
* DMA protection
* PCI pass-through
* Interrupt remapping
* SR-IOV
* TPM and vTPM
* others
With automotive market hypervisors slowly move into embedded space, what means underlying firmware will have to expose right infrastructure to provide initial configuration and security.
Most features have to be configured and exposed in a well-defined way by firmware. IOMMU is the system component that some of the mentioned features rely on.
As maintainers of PC Engines apuX platforms, we decided to work on AMD IOMMU enabling to create right infrastructure for hypervisors and operating systems.
In this presentation we want to:
* explain features of AMD IOMMU
* present recommended methods of AMD IOMMU enabling
* demonstrate current status of our work
* discuss future user needs and implementation plans
PI DX 2020 Atlanta - Data Management Strategy. _ How Do You Establish a Commo...Oleg Shilovitsky
The rise of data and the new economy has led to a paradigm shift that is redefining our world. In today's digital age, information reigns supreme as currency for businesses looking towards an accelerated productivity level with advanced technologies in place; this will allow you to be more competitive by boosting efficiency across all departments at once!
The most common data challenges faced by businesses are talked about in detail during this session. You will learn how to overcome them and get practical tips that can help your company succeed.
You will gain new insights into the following topics:
1. Avoiding breakdowns in information flows throughout the organization
2. Optimization processes and connecting data silos
3. Making the technology work for your data flow
4. Giving people the right tools to communicate and collaborate
5. Designing effective education of your users to support data sharing across the business
You're going to see the technological stack and the strategy I used to develop OpenBOM platform.
Interconnection Automation For All - Extended - MPS 2023Chris Grundemann
Matt "Grizz" Griswold and Chris Grundemann are both IX founders, internetworking experts, and automation proponents. With over 4 decades of combined experience they are now turning to sharing what they've learned about automating BGP and interconnection through a set of open source tools, along with support and services for those that need it.
This talk will share what they have learned both from personal experience as well as through dozens of recent interviews with IX operators and interconnection engineers over the past several months. Including common challenges, productive methodologies, and best practices.
The highlight of the talk will be announcing and describing two open source automation tools built to make interconnection and BGP easier for everyone. One is ixCtl, which is built to automate the most common and problematic tasks involved in running an internet exchange point, particularly configuring and managing secure route servers. The other is PeerCtl, which is built to automate the most common and problematic tasks involved in interconnecting an AS; from bilateral and multilateral peering to PNI and also transit connections.
Code for both (along with several other tools) is available on GitHub: https://github.com/fullctl.
Speaker: Chris Grundemann
Speaker: Matt Griswold
The Architecture Of Software Defined Radios EssayDivya Watson
This project aims to build a smart assistant to help users purchase books online by integrating
multiple sources of information about books and the purchasing process into a single system. By
consolidating data from sources about books, reviews, prices and retailers, the assistant can provide
users all the necessary information to make an informed purchase decision in one place. The goal is
to streamline the online book buying experience for users by eliminating the need to search across
multiple websites during the purchase process.
This document provides an overview of Red Hat products and technologies for IBM Power Systems and IBM zSystems platforms. It discusses Red Hat Enterprise Linux offerings that are optimized for these platforms, including features like support for big-endian mode, Linux containers, multipath I/O, and more. It also summarizes Red Hat's overall approach including their open source development model and enterprise Linux lifecycles.
The document discusses the transition from proprietary computing systems dominated by single firms like IBM to open systems defined by open standards. It describes how technological changes like the microprocessor lowered costs, allowing new entrants. This increased pressure for open and compatible systems. Early "open" systems like Unix gained adoption through large developer communities and compatibility. Competition then occurred between different open systems through strategies like proprietary extensions, alliance shifting, and achieving full interoperability between hardware and software.
The document discusses the transition from proprietary computing systems dominated by single firms like IBM to open systems defined by open standards. It describes how technological changes like the microprocessor lowered costs, allowing new entrants. This increased pressure for open and compatible systems. Early "open" systems like Unix gained adoption through large software markets. Later, "super-compatibility" strategies and shifting alliances led to competition between open systems, with Microsoft/Intel eventually dominating the personal computer market.
The document discusses the transition from proprietary computing systems dominated by single firms like IBM to open systems defined by open standards. It describes how technological changes like the microprocessor lowered costs, allowing new entrants. This increased pressure for open and compatible systems. Early "open" systems like Unix gained adoption through large developer communities and compatibility. Competition then occurred between different open systems through strategies like proprietary extensions, alliance shifting, and achieving full interoperability between hardware and software.
This document provides an overview of MQ (Message Queue) implementation on z/OS systems. It discusses MQplex configuration where MQ is implemented across multiple z/OS LPARs in a sysplex. It also discusses naming conventions and examples of MQplex configuration. The document then covers specific MQ objects like queues, channels, and dead letter queues. It introduces the presenter Vincent Coulonnier and his background as a z/OS system engineer with experience in DB2, CICS, IMS, and MQ. Finally, it outlines the roles and responsibilities of IBM GTS IS which include MQ installation, migration, maintenance, implementation of new functionality, and support for business teams.
Chris Boos - No Cloud Without Automation! (Key Note)CloudCamp Hamburg
The document discusses how automation is essential for the success of cloud computing. Without automation, operational costs will increase due to the complexity of dynamically scaling and distributing cloud resources. The document argues that most legacy systems cannot currently be migrated to the cloud and that automation is needed to manage cloud infrastructure and applications. Specifically, an "autopilot system" is needed to make automated decisions and recombine existing technical knowledge to perform tasks like provisioning, configuration management, and root cause analysis. With such automation in place, the document claims that cloud computing can deliver on its promised benefits of reduced costs, increased innovation, and environmental sustainability.
See what's new in IBM mainframe technology through August 2018. This is the newest of the new software mainframe technology. This presentation is a teaser for additional topics presented at SHARE in St. Louis.
This document discusses strategic dimensions for network and IT service providers entering the cloud computing market. It conducted a survey of experts on both the demand and supply sides of the industry. The survey found that cloud computing is seen as a good opportunity for both network and IT service providers to expand into. Experts said the top benefits of cloud computing are flexibility, scalability, cost savings, and business continuity. However, security and data confidentiality were cited as major concerns. The document provides recommendations on strategic positioning in areas like value proposition, branding, and customization to differentiate in the cloud computing market.
Similar to Lightning talks - Qubes OS and 3mdeb "minisummit" 2019 (20)
The document discusses adding support for TPM 2.0 chips in Qubes OS. Currently, Qubes only supports TPM 1.2 chips and cannot detect TPM 2.0 chips. The Linux kernels used in Qubes (4.14 and 4.19) are missing some TPM 2.0 configuration options. Testing on real hardware with a TPM 2.0 chip showed the chip is detected but Qubes reports "Device not found". Integrating TPM 2.0 support would allow using newer TPM standard chips but may require changes to tools like Anti-Evil Maid that currently only support TPM 1.2.
In this presentation, we discuss the current state of Anti-Evil Maid mitigation.
Protection by ensuring the state of the platform. If we can trust the hardware and software we use, can we feel safe?
How to determine if the state of the platform is trusted and
hardware/firmware/software has not tampered?
Trusted Execution / Trusted Computing:
- TPM module by TCG
- Intel TXT
- AMD Secure Launch with SKINIT
The remote testing environment is a hat designed for Orange Pi Zero board which runs specially crafted Linux distribution using the Yocto Project.
We developed rte to enable programmers from around the world in low level firmware development without hassle of heavy KVM switch interface.
In result, we have a tool which makes easier work with firmware debugging tasks.
Enabling TPM 2.0 on coreboot based devicesPiotr Król
This talk was presented during European coreboot Conference 2017 in Bochum. In this talk we walk through procedures required for enabling TPM 2.0 using LPC interface. We implemented that support as part of our ongoing maintainances of PC Engines apu series (AMD G-series) platform.
Video is available here: https://youtu.be/Yjb9n5p3giI
Booting UEFI-aware OS on coreboot enabled platform - "In God's Name, Why?"Piotr Król
This talk was presented durign European coreboot Conference 2017 in Bochum. In this talk we described our experience during enabling Tianocore payload for PC Engines apu2 (AMD G-series) platform.
Video is available here: https://youtu.be/nt0BkqVUu3w
How to build IoT solution using cloud infrastructure?Piotr Król
This presentation introduce to use AWS IoT shadow from embedded and mobile perspective.This presentation was presented on Netvision 2016 conference. Example source code is available on GitHub links available inside.
Video with this presenattion at https://www.youtube.com/watch?v=owz4kcwXahE
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
2. We are moving slowly forward with TrenchBoot for PC Engines (AMD G-
series based firewall)
Krystian can tell more about status
it is worth to mention that we enabled AMD IOMMU for PC Engines
and tested that on Xen
Is there any interested from Qubes OS side about open DRTM?
What about potential of modern AMD based platform with open DRTM
implementation?
Any opinions about TrenchBoot effort are welcome
DRTM/TrenchBoot
2 / 8
Qubes OS and 3mdeb minisummit 2019
CC BY | Piotr Król
3. We see value in reporting as much PCs as possible from our company and
ecosystem
do you think it is acceptable to automate that?
can we do that under "3mdeb Embedded Systems Consulting"
name?
how name is selected? manual edit to HCL report?
Are there any plans to anonymize HCL reports?
as mentioned some reports may consider fragile information about
the system
What is your opinion about long term maintenance of such list?
we see some problems related to that in coreboot community
Can we leverage information from HCL in areas of firmware?
reporting about firmware quality
warn about out of date firmware
suggest better open alternative
HCL
3 / 8
Qubes OS and 3mdeb minisummit 2019
CC BY | Piotr Król
4. Do you know the project, if yes what is your take on that?
Richard improve features and want to add security checks as well as
robust explanation to particular firmware components
System76 conspiracy theory
fwupd
4 / 8
Qubes OS and 3mdeb minisummit 2019
CC BY | Piotr Król
5. Do you work on wider deployments for business?
Is there any value for regular company?
minimization of IT administration problems
less problems with malicious software
We see some potential customers and we would like to preform small beta
deployment (15-20 workstations)
Business deployments
5 / 8
Qubes OS and 3mdeb minisummit 2019
CC BY | Piotr Król
7. Any conferences that you prefer?
Any particular topics that you think are interesting recently, that we maybe
missing?
What are the best conferences to talk about Qubes OS and lower layers?
Suggested conferences
7 / 8
Qubes OS and 3mdeb minisummit 2019
CC BY | Piotr Król
8. Q&A
8 / 8
Qubes OS and 3mdeb minisummit 2019
CC BY | Piotr Król