LAS16-112: mbed OS Technical Overview
Speakers: Sam Grove
Date: September 26, 2016
★ Session Description ★
ARM mbed OS is an open source embedded operating system designed
specifically for the “things” in the Internet of Things. It includes all the features you need to develop a connected product based on very small memory footprint ARM Cortex-M microcontrollers, including security,connectivity, an RTOS, and drivers for sensors and I/O devices. You can start developing with mbed OS 5.1.0 today using a choice of 40 different development boards from 11 different providers and a wide choice of toolchains including a complete command line build management and configuration tool mbed CLI, industry standard desktop IDEs or ARM’s free online IDE.
★ Resources ★
Etherpad: pad.linaro.org/p/las16-112
Presentations & Videos: http://connect.linaro.org/resource/las16/las16-112/
★ Event Details ★
Linaro Connect Las Vegas 2016 – #LAS16
September 26-30, 2016
http://www.linaro.org
http://connect.linaro.org
LAS16-112: mbed OS Technical Overview
Speakers: Sam Grove
Date: September 26, 2016
★ Session Description ★
ARM mbed OS is an open source embedded operating system designed
specifically for the “things” in the Internet of Things. It includes all the features you need to develop a connected product based on very small memory footprint ARM Cortex-M microcontrollers, including security,connectivity, an RTOS, and drivers for sensors and I/O devices. You can start developing with mbed OS 5.1.0 today using a choice of 40 different development boards from 11 different providers and a wide choice of toolchains including a complete command line build management and configuration tool mbed CLI, industry standard desktop IDEs or ARM’s free online IDE.
★ Resources ★
Etherpad: pad.linaro.org/p/las16-112
Presentations & Videos: http://connect.linaro.org/resource/las16/las16-112/
★ Event Details ★
Linaro Connect Las Vegas 2016 – #LAS16
September 26-30, 2016
http://www.linaro.org
http://connect.linaro.org
Importance of security
End node security is important in the Internet of Things
mbed provides a platform for IoT with security baked into the core
Entropy is a corner stone for security
A practical approach to securing embedded and io t platformsArm
A practical approach to securing embedded & IoT platforms
What can we learn from mobile security and apply to IoT?
Building on proven security principles & Secure Partitioning Manager
What can be done to make the IoT developer’s job easier?
Summary
BKK16-200 Designing Security into low cost IO T SystemsLinaro
….Trust and security are essential for the Internet of Things (IoT) to scale. As your product becomes successful, attraction will be high for it to be hacked and, as a consumer, you'll suffer with consequences if security is not baked into the system, at every level. With IoT, we now need to enable an appropriate level of security for low cost IoT designs done by people with little or no security expertise. In this presentation, you will learn how ARM, Linaro and the ARM partnership are securing these low cost IoT endpoints by providing device security, lifecycle security and communication security, without the need for in-depth security experts…
Practical real-time operating system security for the massesMilosch Meriac
Although real-time operating systems are ubiquitous in the industry, OS-level security features are silently absent in most microcontroller systems. As a result, securing these systems against active attackers becomes impractical due to the missing foundations.
We believe security does not need to cost an ARM and a leg in memory resources or device performance. Operating systems for MMU-less low-end microcontrollers should be on par with established security models. High end embedded systems security does not need to be exclusive to Cortex-A/x86 Linux systems.
uVisor is available under Apache License on Github : https://github.com/ARMmbed/uvisor
We will show how spatial isolation of process memories using the ARM v7M Memory Protection Unit (MPU) works - and how it effects interprocess-communication, memory management, thread synchronisation and internal protection of key-material.
We will then introduce temporal isolation for guaranteed operation and device safety even under local attack. To make our point we integrated an advanced security foundation into the vendor-independent RTOS abstraction layer CMSIS-RTOS. Our example implementation - the ARMmbed uVisor for CMSIS-RTOS - is available under the Apache License.
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...Cohesive Networks
Secure Your Azure Cloud Deployments with VNS3 Overlay Networks
Cohesive Networks CEO Patrick Kerpan and CTO Chris Swan present VNS3 overlay networking to help Microsoft Azure customers and partners better secure cloud deployments in this webinar from Microsoft Azure.
Learn how adding an overlay network to your Microsoft Azure cloud environment can boost security and connectivity. As your cloud environment grows with your business, your network becomes more important and complex.
An overlay network, a software-only network over the top of existing Azure cloud resources, can add controls for enhanced encryption, monitoring, interoperability, and connectivity.
You can create and manage your overlay network using VNS3 from Cohesive Networks. VNS3 is a customizable, layer 4 - 7 virtual networking device you can control to better manage and secure your Azure networks. Connect regions into one logical network, connect directly to customers or partners using secure IPsec tunnels, and ensure encryption for your network components to meeting industry regulations like HIPAA, PCI, or FIPS.
VNS3 even lets you connect your Azure subnets into other cloud providers’ availability zones for truly hybrird cloud flexibility. Join Cohesive Networks CEO and CTO for an in-depth look at overlay networks in Azure, along with real-life demos of our most popular use cases.
Introduction to Mbed - Etteplan seminar - August 2018Jan Jongboom
What is Arm Mbed, what is Arm Pelion, and how can it help me create IoT devices faster? Introductionary talk during the Etteplan seminars in Oulu and Espoo 21-22 August 2018 about LoRa in Mbed.
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...Hans Andersson
A workshop by Acal BFi Nordic on project mangOH industrial open hardware running Linux/Legato open source software. Tight integration with cloud and connectivity services.
Advancing IoT Communication Security with TLS and DTLS v1.3Hannes Tschofenig
Missing communication security is a common vulnerability in Internet of Things deployments. Addressing this vulnerability is, in theory, relatively easy: with TLS and DTLS, two widely used security protocols are available. They are used to secure web and smart phone apps.
In this talk Hannes Tschofenig explains how the TLS/DTLS 1.3 protocols work and how they differ from previous versions. Hannes also speaks about the performance improvements and how they help in IoT deployments.
How do you manage Internet of Things (IoT) devices at scaleDuncan Purves
How do you manage Internet of Things (IoT) devices at scale without scaling costs? Standards based Device Management. Presentation by Connect2 Systems at IoT Tech Expo in London on 23 January 2017.
Working on standards can be slow and tedious but there are also rewards: interoperability, open source implementations and high-quality specifications. Based on two examples of ongoing standardization efforts that aim to improve IoT security in the Internet Engineering Task Force (IETF), namely "Authentication and Authorization for Constrained Environments" (ACE) and "Software Updates for Internet of Things" (SUIT), Hannes explains the process and how to get involved.
Does your system run the risk of being attacked?
There is an increasing risk world-wide of sophisticated cyber-attacks being targeted towards critical infrastructure. A successful attack on these networks could have a substantial impact on our society, causing great economic loss or worse. Regardless of if you are upgrading an existing network or building a new one, the security of it should be a major consideration.
Micro-segmentation is a combination of firewalls, subnetting, and using VPNs to create an extremely secure network by locking down each individual device. A system which has implemented micro-segmentation enjoy benefits such as maintaining application security, reduce the attack surface and complying with regulations.
"Applications, programming languages, and libraries that leverage sophisticated network hardware capabilities have a natural advantage when used in today’s and tomorrow’s high-performance and data center computer environments. Modern RDMA based network interconnects provides incredibly rich functionality (RDMA, Atomics, OS-bypass, etc.) that enable low-latency and high-bandwidth communication services. The functionality is supported by a variety of interconnect technologies such as InfiniBand, RoCE, iWARP, Intel OPA, Cray’s Aries/Gemini, and others. OFA organization and LinuxRDMA community have been playing a predominant role in the enablement efficient and vendor agnostic software stack for those interconnects. Over the last decade, the community has developed variety user/kernel level protocols and libraries that enable a variety of applications over RDMA including MPI, SHMEM, NFS over RDMA, IPoIB, and many others."
"With the emerging availability server platforms based on ARM CPU architecture, it is important to understand ARM integrates with RDMA hardware and software eco-system. In this talk, we will overview ARM architecture and system software stack. We will discuss how ARM CPU interacts with network devices and accelerators. In addition, we will share our experience in enabling RDMA software stack (OFED/MOFED Verbs) and one-sided communication libraries (Open UCX, OpenSHMEM/SHMEM) on ARM and share preliminary evaluation results."
Watch the video presentation: http://wp.me/p3RLHQ-gyO
Learn more: https://www.openfabrics.org/index.php/abstracts-agenda.html
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Importance of security
End node security is important in the Internet of Things
mbed provides a platform for IoT with security baked into the core
Entropy is a corner stone for security
A practical approach to securing embedded and io t platformsArm
A practical approach to securing embedded & IoT platforms
What can we learn from mobile security and apply to IoT?
Building on proven security principles & Secure Partitioning Manager
What can be done to make the IoT developer’s job easier?
Summary
BKK16-200 Designing Security into low cost IO T SystemsLinaro
….Trust and security are essential for the Internet of Things (IoT) to scale. As your product becomes successful, attraction will be high for it to be hacked and, as a consumer, you'll suffer with consequences if security is not baked into the system, at every level. With IoT, we now need to enable an appropriate level of security for low cost IoT designs done by people with little or no security expertise. In this presentation, you will learn how ARM, Linaro and the ARM partnership are securing these low cost IoT endpoints by providing device security, lifecycle security and communication security, without the need for in-depth security experts…
Practical real-time operating system security for the massesMilosch Meriac
Although real-time operating systems are ubiquitous in the industry, OS-level security features are silently absent in most microcontroller systems. As a result, securing these systems against active attackers becomes impractical due to the missing foundations.
We believe security does not need to cost an ARM and a leg in memory resources or device performance. Operating systems for MMU-less low-end microcontrollers should be on par with established security models. High end embedded systems security does not need to be exclusive to Cortex-A/x86 Linux systems.
uVisor is available under Apache License on Github : https://github.com/ARMmbed/uvisor
We will show how spatial isolation of process memories using the ARM v7M Memory Protection Unit (MPU) works - and how it effects interprocess-communication, memory management, thread synchronisation and internal protection of key-material.
We will then introduce temporal isolation for guaranteed operation and device safety even under local attack. To make our point we integrated an advanced security foundation into the vendor-independent RTOS abstraction layer CMSIS-RTOS. Our example implementation - the ARMmbed uVisor for CMSIS-RTOS - is available under the Apache License.
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...Cohesive Networks
Secure Your Azure Cloud Deployments with VNS3 Overlay Networks
Cohesive Networks CEO Patrick Kerpan and CTO Chris Swan present VNS3 overlay networking to help Microsoft Azure customers and partners better secure cloud deployments in this webinar from Microsoft Azure.
Learn how adding an overlay network to your Microsoft Azure cloud environment can boost security and connectivity. As your cloud environment grows with your business, your network becomes more important and complex.
An overlay network, a software-only network over the top of existing Azure cloud resources, can add controls for enhanced encryption, monitoring, interoperability, and connectivity.
You can create and manage your overlay network using VNS3 from Cohesive Networks. VNS3 is a customizable, layer 4 - 7 virtual networking device you can control to better manage and secure your Azure networks. Connect regions into one logical network, connect directly to customers or partners using secure IPsec tunnels, and ensure encryption for your network components to meeting industry regulations like HIPAA, PCI, or FIPS.
VNS3 even lets you connect your Azure subnets into other cloud providers’ availability zones for truly hybrird cloud flexibility. Join Cohesive Networks CEO and CTO for an in-depth look at overlay networks in Azure, along with real-life demos of our most popular use cases.
Introduction to Mbed - Etteplan seminar - August 2018Jan Jongboom
What is Arm Mbed, what is Arm Pelion, and how can it help me create IoT devices faster? Introductionary talk during the Etteplan seminars in Oulu and Espoo 21-22 August 2018 about LoRa in Mbed.
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...Hans Andersson
A workshop by Acal BFi Nordic on project mangOH industrial open hardware running Linux/Legato open source software. Tight integration with cloud and connectivity services.
Advancing IoT Communication Security with TLS and DTLS v1.3Hannes Tschofenig
Missing communication security is a common vulnerability in Internet of Things deployments. Addressing this vulnerability is, in theory, relatively easy: with TLS and DTLS, two widely used security protocols are available. They are used to secure web and smart phone apps.
In this talk Hannes Tschofenig explains how the TLS/DTLS 1.3 protocols work and how they differ from previous versions. Hannes also speaks about the performance improvements and how they help in IoT deployments.
How do you manage Internet of Things (IoT) devices at scaleDuncan Purves
How do you manage Internet of Things (IoT) devices at scale without scaling costs? Standards based Device Management. Presentation by Connect2 Systems at IoT Tech Expo in London on 23 January 2017.
Working on standards can be slow and tedious but there are also rewards: interoperability, open source implementations and high-quality specifications. Based on two examples of ongoing standardization efforts that aim to improve IoT security in the Internet Engineering Task Force (IETF), namely "Authentication and Authorization for Constrained Environments" (ACE) and "Software Updates for Internet of Things" (SUIT), Hannes explains the process and how to get involved.
Does your system run the risk of being attacked?
There is an increasing risk world-wide of sophisticated cyber-attacks being targeted towards critical infrastructure. A successful attack on these networks could have a substantial impact on our society, causing great economic loss or worse. Regardless of if you are upgrading an existing network or building a new one, the security of it should be a major consideration.
Micro-segmentation is a combination of firewalls, subnetting, and using VPNs to create an extremely secure network by locking down each individual device. A system which has implemented micro-segmentation enjoy benefits such as maintaining application security, reduce the attack surface and complying with regulations.
"Applications, programming languages, and libraries that leverage sophisticated network hardware capabilities have a natural advantage when used in today’s and tomorrow’s high-performance and data center computer environments. Modern RDMA based network interconnects provides incredibly rich functionality (RDMA, Atomics, OS-bypass, etc.) that enable low-latency and high-bandwidth communication services. The functionality is supported by a variety of interconnect technologies such as InfiniBand, RoCE, iWARP, Intel OPA, Cray’s Aries/Gemini, and others. OFA organization and LinuxRDMA community have been playing a predominant role in the enablement efficient and vendor agnostic software stack for those interconnects. Over the last decade, the community has developed variety user/kernel level protocols and libraries that enable a variety of applications over RDMA including MPI, SHMEM, NFS over RDMA, IPoIB, and many others."
"With the emerging availability server platforms based on ARM CPU architecture, it is important to understand ARM integrates with RDMA hardware and software eco-system. In this talk, we will overview ARM architecture and system software stack. We will discuss how ARM CPU interacts with network devices and accelerators. In addition, we will share our experience in enabling RDMA software stack (OFED/MOFED Verbs) and one-sided communication libraries (Open UCX, OpenSHMEM/SHMEM) on ARM and share preliminary evaluation results."
Watch the video presentation: http://wp.me/p3RLHQ-gyO
Learn more: https://www.openfabrics.org/index.php/abstracts-agenda.html
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
The IoT is becoming extremely popular keyword in the industries while there are many different interpretations or various definitions. However, one common requirement is that it requires many Sensor devices connected to Linux devices. The user space drivers for GPIO, I2C/SPI and UART sensors in the past were implemented separately from scratch delicately for each product. This will cause significant challenge of software engineering overhead while GPIO, I2C/SPI and UART sensors are dramatically increasing which have to be supported. The IoTDK is one of the library to provide portability of sensors' driver to solve the situation.
The talk will includes guide of IoTDK and 96Boards and tutorial of programing I2C and GPIO devices. Targeted audiences are who are interested in IoT sensors or who would like to move from Arduino and Raspberry Pi to modern ARM CPU effectively.
This presentation was delivered at LinuxCon Japan 2016 by Akira Tsukamoto.
Embedded Webinar #12 “GloDroid or Boosting True Open Source Android Stack Dev...GlobalLogic Ukraine
This webinar by Roman Stratiienko (Architect, Technology, GlobalLogic) was delivered at Embedded Community Webinar #12 on May 26, 2021.
Imagine that you have the latest version of Android, a single-board computer and a whole year of free time to experiment. What would you do? Would you try to run Android on it? And now imagine that this has already been done: we present to your attention GloDroid! This is a safe (no backdoor) and inexpensive open source solution that works right out of the box without any additional manipulation. GloDroid is a project to port and adapt open source Android applications to work on widely available single-board computer platforms.
More details and presentation: https://www.globallogic.com/ua/about/events/embedded-community-webinar-12/
Webinar gravado: Programando Microcontroladores ARM da Microchip usando MPLAB...Embarcados
Cada vez mais é cobrado dos desenvolvedores rapidez na execução de um firmware e a cada dia as aplicações se tornam mais complexas, com intuito de facilitar o desenvolvimento e consequentemente diminuir o tempo de desenvolvimento a Microchip deseja mostrar a mais nova ferramenta Microchip Harmony 3.0, onde é possível configurar os periféricos dos microcontroladores ARM, assim como adicionar RTOS e middlewares de maneira simples aos projetos.
mais detalhes em: https://www.embarcados.com.br/webinars/webinar-arm-da-microchip-usando-mplabx-e-harmony/
In this video from the Rice Oil & Gas Conference, Brent Gorda from ARM presents: ARM in HPC.
"With the recent Astra system at Sandia Lab (#203 on the Top500) and HPE Catalyst project in the UK, Arm-based architectures are arriving in HPC environments. Several partners have announced or will soon announce new silicon and projects, each of which offers something different and compelling for our community. Brent will describe the driving factors and how these solutions are changing the landscape for HPC."
Watch the video: https://wp.me/p3RLHQ-jXS
Learn more: https://developer.arm.com/hpc
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
A design methodology and a language framework which contributes to providing a solid, scalable framework for developing next-generation silicon-based systems.
First Steps Developing Embedded Applications using Heterogeneous Multi-core P...Toradex
Read our blog for the latest on demystifying the development of embedded systems using Heterogeneous Multicore Processing architecture powered SoCs! This might provide you with the jump start you need for your development. https://www.toradex.com/blog/first-steps-developing-embedded-applications-using-heterogeneous-multicore-processors
EMC World 2016 - code.05 Automating your Physical Data Center with RackHD{code}
RackHD is an open source project started with the goal of providing a consistent and clear mechanism to perform hardware inventory and firmware upgrades to commodity white-box servers. With an event-based workflow engine that interacts with existing protocols and mechanisms such as PXE, BMC, and IPMI it can create workflows of tasks, boot scripts, and interactions to achieve full system automation. Come see it in action in this session showing useful workflows integrating with Docker, OpenStack, and Cloud Foundry.
Similar to mbed Connect Asia 2016 mbed HDK From prototype to production (20)
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Default bus-clock, stack size
Great portability across Cortex-M devices
Easy to use for developer, difficult to design by silicon or board vendor (but we provide the HDK)
DAPLink – interface chip firmware (CMSIS-DAP compatible)
Inter-linking problems – target and interface device had tight dependency
It was ARM proprietary license
Not only silicon vender, but also OEM, board vender can re-use the design resource
No firmware source code
Interface chip – NXP devices (LPC11U35, Kinetis K20DX), Atmel (SAM3U2C) for reference
No need SWD/JTAG debug adapter
Library – chunk of component and schematics for eagle
Design – actual board layout, ready to production
We will check acceptance criteria, and them merge your pull request.
OSH Park is a community printed circuit board (PCB) order.
Octopart – common parts library
App shield – Expansion board, accelerometer, temperature sensor, graphics LCD, potentiometers, push buttons
CI test shield – for target board test purpose, I2C connected sensor, loop-backed digital and analog I./O
DAPLink reference hardware
6LoWPAN BR HAT for Pi
MCU subsystem – nRF51822 has critical board design include BLE antenna – Nordic recommended PCB playout