Bluetooth mesh is a new Bluetooth technology which allows secure networks of thousands of devices to be formed and one of the primary applications that Bluetooth mesh was created for is the truly smart, connected building. It was designed from the outset with reliability, security and scalability as key goals and with the ability to meet the sophisticated and technically challenging engineering requirements of the smart building and smart industry. This session will explore the concepts, technicalities and uses of Bluetooth mesh networking.
Extending Bluetooth with Mesh NetworkingSilicon Labs
Mesh networking is a new topology available for Bluetooth Low Energy (LE) devices that enables many-to-many (m:m) communications. It's optimized for creating large-scale node networks and ideally suited for lighting, home automation, and asset tracking. Bluetooth mesh benefits many IoT systems with its ability to reduce system power consumption, extend communication range, increase scalability, improve network reliability, and optimize device-to-device communication responsiveness.
Watch this webinar to learn more about Bluetooth LE mesh networking and how to get started with development.
Watch on-demand webinar: http://bit.ly/2xiactW
Everything You Need to Know Abut Bluetooth Mesh for Industrial IoTJessica Califano
Bluetooth 5 + Mesh addresses many of the issues that the fragmented IoT wireless communication space is experiencing. In this deck, we'll take a look at why this specification could become standard in industrial operations.
Slides are mainly on the major security flaws that existed in the Bluetooth 4.0/4.1 (released 2010) specifically Bluetooth Low Energy(BLE) (a.k.a Bluetooth Smart) specification. BLE was introduced as part of Bluetooth 4.0 targeting low power devices which is quite different from classic Bluetooth. Later part contains major security enhancements that are introduced in BLE 4.2
Bluetooth Low Energy (BLE) or Bluetooth Smart is the low energy version of Bluetooth and integrated into the Bluetooth standard v4.0. The presentation briefs about the BLE and its architecture.
Presented at Robert Bosch Centre for Cyber Physical Systems at Indian Institute of Science, Bengaluru
A talk I gave to Hackware v0.7, v0.8, Hackers & Painters, NUS Hackers, One Maker Group and iOS Dev Scout to introduce the audience to basic Bluetooth Low Energy concepts followed by code explanations.
Part 1 of my presentation at Hackware v0.7 (Arduino and Android only) can be seen here. https://www.youtube.com/watch?v=pNnwXPatzjc
Part 2 (Raspberry Pi, iOS and BLE Sniffer) can be seen here. https://www.youtube.com/watch?v=UDNkrlfW9Sg
The code is available here. https://github.com/yeokm1/intro-to-ble
Extending Bluetooth with Mesh NetworkingSilicon Labs
Mesh networking is a new topology available for Bluetooth Low Energy (LE) devices that enables many-to-many (m:m) communications. It's optimized for creating large-scale node networks and ideally suited for lighting, home automation, and asset tracking. Bluetooth mesh benefits many IoT systems with its ability to reduce system power consumption, extend communication range, increase scalability, improve network reliability, and optimize device-to-device communication responsiveness.
Watch this webinar to learn more about Bluetooth LE mesh networking and how to get started with development.
Watch on-demand webinar: http://bit.ly/2xiactW
Everything You Need to Know Abut Bluetooth Mesh for Industrial IoTJessica Califano
Bluetooth 5 + Mesh addresses many of the issues that the fragmented IoT wireless communication space is experiencing. In this deck, we'll take a look at why this specification could become standard in industrial operations.
Slides are mainly on the major security flaws that existed in the Bluetooth 4.0/4.1 (released 2010) specifically Bluetooth Low Energy(BLE) (a.k.a Bluetooth Smart) specification. BLE was introduced as part of Bluetooth 4.0 targeting low power devices which is quite different from classic Bluetooth. Later part contains major security enhancements that are introduced in BLE 4.2
Bluetooth Low Energy (BLE) or Bluetooth Smart is the low energy version of Bluetooth and integrated into the Bluetooth standard v4.0. The presentation briefs about the BLE and its architecture.
Presented at Robert Bosch Centre for Cyber Physical Systems at Indian Institute of Science, Bengaluru
A talk I gave to Hackware v0.7, v0.8, Hackers & Painters, NUS Hackers, One Maker Group and iOS Dev Scout to introduce the audience to basic Bluetooth Low Energy concepts followed by code explanations.
Part 1 of my presentation at Hackware v0.7 (Arduino and Android only) can be seen here. https://www.youtube.com/watch?v=pNnwXPatzjc
Part 2 (Raspberry Pi, iOS and BLE Sniffer) can be seen here. https://www.youtube.com/watch?v=UDNkrlfW9Sg
The code is available here. https://github.com/yeokm1/intro-to-ble
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
This Presentation is prepared by the higher authority of polite group
under the supervision of Syed Mubashair Abid and other members are Ch.Junaid Arshad and Muhammad Aftab Mustafa
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
Wireless Personal area networks (Wpan)Biplob Orton
A wireless personal area network (WPAN) is a personal, short distance area wireless network for interconnecting devices centered around an individual person's workspace
This Presentation Covers the basic Introductions of Computer Network. It covers several topics such as Mode of Transmission, Types of Network, Data Rate, Components, etc. This would be very helpful for engineering students as well as those who are interested in Networking.
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
This Presentation is prepared by the higher authority of polite group
under the supervision of Syed Mubashair Abid and other members are Ch.Junaid Arshad and Muhammad Aftab Mustafa
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
Wireless Personal area networks (Wpan)Biplob Orton
A wireless personal area network (WPAN) is a personal, short distance area wireless network for interconnecting devices centered around an individual person's workspace
This Presentation Covers the basic Introductions of Computer Network. It covers several topics such as Mode of Transmission, Types of Network, Data Rate, Components, etc. This would be very helpful for engineering students as well as those who are interested in Networking.
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Codemotion
Increased complexity makes it very hard and time-consuming to keep your software bug-free and secure. We introduce fuzz-testing as a method for automatically and continuously discovering vulnerabilities hidden in your code. The talk will explain how fuzzing works and how to integrate fuzz-testing into your Software Development Life Cycle to increase your code’s security.
Pompili - From hero to_zero: The FatalNoise neverending storyCodemotion
It was 1993 when we decided to venture in a beat'em up game for Amiga. The Catalypse's success story pushed me and my comrade to create something astonishing for this incredible game machine... but things went harder, assumptions were slightly different, and italian competitors appeared out of nowhere... the project died in 1996. Story ended? Probably not...
Il Commodore 65 è un prototipo di personal computer che Commodore avrebbe dovuto mettere in commercio quale successore del Commodore 64. Purtroppo la sua realizzazione si fermò appunto allo stadio prototipale. Racconterò l'affascinante storia del suo sviluppo ed il perchè della soppressione del progetto ormai ad un passo dalla immissione in commercio.
Rivivere l'ebbrezza di progettare un vecchio computer o una consolle da bar è oggi possibile sfruttando le FPGA, ovvero logiche programmabili che consentono a chiunque di progettare il proprio hardware o di ricrearne uno del passato. In questa sessione si racconta come dal reverse engineering dell'hardware di vecchie glorie come il Commodore 64 e lo ZX Spectrum sia stato possibile farle rivivere attraverso tecnologie oggi alla portata di tutti.
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Codemotion
There's a lot of talk about blockchain, but how does the technology behind it actually work? For developers, getting some hands-on experience is the fastest way to get familiair with new technologies. So let's build a blockchain, then! In this session, we're going to build one in plain old Java, and have it working in 40 minutes. We'll cover key concepts of a blockchain: transactions, blocks, mining, proof-of-work, and reaching consensus in the blockchain network. After this session, you'll have a better understanding of core aspects of blockchain technology.
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Codemotion
When was the last time you were truly lost? Thanks to the maps and location technology in our phones, a whole generation has now grown up in a world where getting lost is truly a thing of the past. Location technology goes far beyond maps in the palm of our hand, however. In this talk, we will explore how a ridesharing app works. How do we discover our destination?How do we find the closest driver? How do we display this information on a map? How do we find the best route?To answer these questions,we will be learning about a variety of location APIs, including Maps, Positioning, Geocoding etc.
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Codemotion
Eward Driehuis, SecureLink's research chief, will guide you through the bumpy ride we call the cyber threat landscape. As the industry has over a decade of experience of dealing with increasingly sophisticated attacks, you might be surprised to hear more attacks slip through the cracks than ever. From analyzing 20.000 of them in 2018, backed by a quarter of a million security events and over ten trillion data points, Eward will outline why this happens, how attacks are changing, and why it doesn't matter how neatly or securely you code.
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 - Codemotion
IoT revolution is ended. Thanks to hardware improvement, building an intelligent ecosystem is easier than never before for both startups and large-scale enterprises. The real challenge is now to connect, process, store and analyze data: in the cloud, but also, at the edge. We’ll give a quick look on frameworks that aggregate dispersed devices data into a single global optimized system allowing to improve operational efficiency, to predict maintenance, to track asset in real-time, to secure cloud-connected devices and much more.
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Codemotion
What if Virtual Reality glasses could transform your environment into a three-dimensional work of art in realtime in the style of a painting from Van Gogh? One of the many interesting developments in the field of Deep Learning is the so called "Style Transfer". It describes a possibility to create a patchwork (or pastiche) from two images. While one of these images defines the the artistic style of the result picture, the other one is used for extracting the image content. A team from TNG Technology Consulting managed to build an AI showcase using OpenCV and Tensorflow to realize such goggles.
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Codemotion
Blockchain (and Cryptocurrency) is an evolution of 20-year old research from scientists like Chaum, Lamport, and Castro & Liskov. Due to the current hype, it's hard to distinguish beneficial aspects of the technology from a desire for a "silver bullet" for device security, verifiable logistics, or "saving democracy". The problem: blockchain introduces new security challenges - and blind adoption without understanding reduces overall security. In this talk, Melanie Rieback and Klaus Kursawe explain the pitfalls and limits of blockchain, so you can avoid making your applications LESS secure.
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Codemotion
Networking is a core part of computing in the digital world we inhabit. But, how well do you know how it works? Do you understand all the moving parts of the OSI stack inside your computer, and how the network is actually put together? How can this ever work? This guided safari of layers, standards, protocols, and happenstance will bring us close to the copper wire, and up through the layers of CDMA/CD, ARP, routing and HTTP. We will make a few excursions through patchworks that still work forty years later, and cleverly designed mechanisms that show that simplicity is the only way to last.
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Codemotion
Performance tests are not only an important instrument for understanding a system and its runtime environment. It is also essential in order to check stability and scalability – non-functional requirements that might be decisive for success. But won't my cloud hosting service scale for me as long as I can afford it? Yes, but… It only operates and scales resources. It won't automatically make your system fast, stable and scalable. This talk shows how such and comparable questions can be clarified with performance tests and how DevOps teams benefit from regular test practise.
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Codemotion
Sascha will demonstrate the opportunities and challenges of Conversational AI learned from the practice. Both Technology and User Experience will be covered introducing a process finding micro-moments, writing happy paths, gathering intents, designing the conversational flow, and finally publishing on almost all channels including Voice Services and Chatbots. Valuable for enterprises, developers, and designers. All live on stage in just minutes and with almost no code.
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Codemotion
A key challenge we face at Pacmed is quickly calibrating and deploying our tools for clinical decision support in different hospitals, where data formats may vary greatly. Using Intensive Care Units as a case study, I’ll delve into our scalable Python pipeline, which leverages Pandas’ split-apply-combine approach to perform complex feature engineering and automatic quality checks on large time-varying data, e.g. vital signs. I’ll show how we use the resulting flexible and interpretable dataframes to quickly (re)train our models to predict mortality, discharge, and medical complications.
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Codemotion
Coolblue is a proud Dutch company, with a large internal development department; one that truly takes CI/CD to heart. Empowerment through automation is at the heart of these development teams, and with more than 1000 deployments a day, we think it's working out quite well. In this session, Pat Hermens (a Development Managers) will step you through what enables us to move so quickly, which tools we use, and most importantly, the mindset that is required to enable development teams to deliver at such a rapid pace.
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...Codemotion
Quantum computers can use all of the possible pathways generated by quantum decisions to solve problems that will forever remain intractable to classical compute power. As the mega players vie for quantum supremacy and Rigetti announces its $1M "quantum advantage" prize, we live in exciting times. IBM-Q and Microsoft Q# are two ways you can learn to program quantum computers so that you're ready when the quantum revolution comes. I'll demonstrate some quantum solutions to problems that will forever be out of reach of classical, including organic chemistry and large number factorisation.
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Codemotion
Chinese food exploded across America in the early 20th century, rapidly adapting to local tastes while also spreading like wildfire. How was it able to spread so fast? The GY6 is a family of scooter engines that has achieved near total ubiquity in Europe. It is reliable and cheap to manufacture, and it's made in factories across China. How are these factories able to remain afloat? Chinese-American food and the GY6 are both riveting studies in product-market fit, and both are the product of a distributed open source-like development model. What lessons can we learn for open source software?
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Codemotion
The design space has exploded in size within the last few years and Sketch is one of the most important milestones to represent the phenomenon. But behind the scenes of this growing reality there is a remote team that revolutionizes the design space all without leaving the home office. This talk will present how Sketch has grown to become a modern, product designer's tool.
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Codemotion
Would you fly in a plane designed by a craftsman or would you prefer your aircraft to be designed by engineers? We are learning that science and empiricism works in software development, maybe now is the time to redefine what “Software Engineering” really means. Software isn't bridge-building, it is not car or aircraft development either, but then neither is Chemical Engineering. Engineering is different in different disciplines. Maybe it is time for us to begin thinking about retrieving the term "Software Engineering" maybe it is time to define what our "Engineering" discipline should be.
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Codemotion
What is the job of a CTO and how does it change as a startup grows in size and scale? As a CTO, where should you spend your focus? As an engineer aspiring to be a CTO, what skills should you pursue? In this inspiring and personal talk, I describe my journey from early Red Hat engineer to CTO at Bloomon. I will share my view on what it means to be a CTO, and ultimately answer the question: Should the CTO be coding?
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
7. relay nodes
R
RR
R = Relay function on
Relays retransmit messages so that they
can travel further, in a number of “hops”
Some nodes can act as “relays” however
Messages get sent to other nodes that are
in direct radio range of the publishing node
8. friend nodes and low power nodes
Low Power Node
(sensor)
Friend
Low power nodes (LPNs) are highly power
constrained
To avoid the need to operate at a high(er)
duty cycle to receive messages from the
mesh, an LPN works with a Friend
Friend nodes store messages addressed to
LPNs they are friends with and forward
them when the LPN occasionally polls
9. friend nodes and low power nodes
Low Power Node
(sensor)
Friend
To: Sensor
“set temperature thresholds”
Low power nodes (LPNs) are highly power
constrained
To avoid the need to operate at a high(er)
duty cycle to receive messages from the
mesh, an LPN works with a Friend
Friend nodes store messages addressed to
LPNs they are friends with and forward
them when the LPN occasionally polls
10. friend nodes and low power nodes
STORED
MESSAGE(S)
Low Power Node
(sensor)
Friend
To: Sensor
“set temperature thresholds”
Low power nodes (LPNs) are highly power
constrained
To avoid the need to operate at a high(er)
duty cycle to receive messages from the
mesh, an LPN works with a Friend
Friend nodes store messages addressed to
LPNs they are friends with and forward
them when the LPN occasionally polls
11. friend nodes and low power nodes
STORED
MESSAGE(S)
“do you have any
messages for me?”
Low Power Node
(sensor)
Friend
To: Sensor
“set temperature thresholds”
Low power nodes (LPNs) are highly power
constrained
To avoid the need to operate at a high(er)
duty cycle to receive messages from the
mesh, an LPN works with a Friend
Friend nodes store messages addressed to
LPNs they are friends with and forward
them when the LPN occasionally polls
12. friend nodes and low power nodes
STORED
MESSAGE(S)
“do you have any
messages for me?”
Low Power Node
(sensor)
Friend
To: Sensor
“set temperature thresholds”
To: Sensor
“set temperature thresholds”
Low power nodes (LPNs) are highly power
constrained
To avoid the need to operate at a high(er)
duty cycle to receive messages from the
mesh, an LPN works with a Friend
Friend nodes store messages addressed to
LPNs they are friends with and forward
them when the LPN occasionally polls
13. proxy nodes
P
Bluetooth low energy devices like
smartphones can communicate with a mesh
network via a proxy node
LE GATT
MESH
14. proxy nodes
Proxy
Bluetooth low energy devices like
smartphones can communicate with a mesh
network via a proxy node
mesh monitoring and control applications
LE GAP and GATT
MESH
16. messages and state
State: OnOff = Off
State: OnOff = Off State: OnOff = Off
nodes communicate with each other by
sending messages
access messages operate on state values
SET - change of state
GET - retrieve state value
STATUS - notify current state
ACK vs UNACK
nodes have state values which reflect
their condition (e.g. ON or OFF)
17. messages and state
State: OnOff = Off
State: OnOff = Off State: OnOff = OffState: OnOff = On
State: OnOff = On
State: OnOff = On
nodes communicate with each other by
sending messages
access messages operate on state values
SET - change of state
GET - retrieve state value
STATUS - notify current state
ACK vs UNACK
nodes have state values which reflect
their condition (e.g. ON or OFF)
20. node composition
a node consists of an arrangement of
elements
models
states
each element has its own address
NODE
ELEMENT ELEMENT
MODEL
STATE
STATE
STATE
MODEL
STATE
MODEL
STATE
STATE
MODEL
STATE
note: a model is sometimes owned by multiple elements
21. models
ServerGeneric OnOff
Server
Generic OnOff
Client
define node functionality
define states, messages, state transitions
and behaviors
client, server and control types
generics such as onoff client and server
lighting, sensors, scenes & time
22. node composition
single node
3 elements
multiple models and states
0x0100 0x0101 0x0102
node
elements
models
states
generic onoff server
light lightness server
light lightness actual
light lightness last
light lightness range
generic onoff
24. devices and network membership
only members of the same network can
talk to each other
Bluetooth mesh networks are secure
a security process called provisioning
makes a device a member of a network
25. devices and network membership
Provisioner: converting
a device to a node
Device is now a
node on the network
only members of the same network can
talk to each other
Bluetooth mesh networks are secure
a security process called provisioning
makes a device a member of a network
26. Bluetooth mesh: Security
• Mandatory, cannot be reduced
• Encryption and authentication
• Separate security for network and each application
• Area isolation
• Message obfuscation
• Protection from replay and trashcan attacks
• Secure device provisioning
27. network key (netkey)
origin: provisioning
use: derivation of other keys
encryption key
origin: derived from netkey
using the k2 function
use: secures data
at the network
layer
privacy key
origin: derived from
netkey
using the k2 function
use: obfuscation
of network header
information
ref: mesh profile 1.0 section 2.3.9.1
application key
(appkey)
origin: created by
the config. client
and provided to nodes
after provisioning
use: secures
application data
at the upper transport
layer
Bound to one or more
models.
device key (devkey)
origin: established
during provisioning
use: secures communication
between the config. client
and individual node
appkey is bound to a netkey
devkey is bound to all
netkeys known to a node
33. Switch Models Light Models Sensor Models
Light Lightness Server
Light HSL Server
Generic On/Off Client Generic On/Off Server
34. Switch Models Light Models Sensor Models
Light Lightness Server
Light HSL Server
Generic On/Off Client Generic On/Off Server
Light LC Server
Sensor Server
35. Switch Models Light Models Sensor Models
Light Lightness Server
Light HSL Server
Generic On/Off Client Generic On/Off Server
Light LC Server
Sensor Server
State Binding
37. scalability
max 32,767 nodes per network
The fastest low power radio
small, highly optimised packets
hundreds of multicast messages per
second
multicast: 1 message can control many devices
point to point range hundreds of metres
38. scalability and the fundamentals of RF
radio is a shared medium
collisions are what limits scalability
39. scalability and the fundamentals of RF
an anonymous technology
(not Bluetooth)
e.g. 250 kb/s
40. scalability and the fundamentals of RF
Bluetooth mesh
using Bluetooth Low Energy
1000 kb/s
less air time per packet
so more capacity for work
41. scalability and the fundamentals of RF
Bluetooth mesh
much smaller packets
less airtime
fewer collisions
more “work”
29 octets payload
42. scalability and the fundamentals of RF
Bluetooth mesh
using Bluetooth Low Energy
3 x radio channels
3 x more capacity
used for enhanced reliability