LAS16-112: mbed OS Technical Overview
Speakers: Sam Grove
Date: September 26, 2016
★ Session Description ★
ARM mbed OS is an open source embedded operating system designed
specifically for the “things” in the Internet of Things. It includes all the features you need to develop a connected product based on very small memory footprint ARM Cortex-M microcontrollers, including security,connectivity, an RTOS, and drivers for sensors and I/O devices. You can start developing with mbed OS 5.1.0 today using a choice of 40 different development boards from 11 different providers and a wide choice of toolchains including a complete command line build management and configuration tool mbed CLI, industry standard desktop IDEs or ARM’s free online IDE.
★ Resources ★
Etherpad: pad.linaro.org/p/las16-112
Presentations & Videos: http://connect.linaro.org/resource/las16/las16-112/
★ Event Details ★
Linaro Connect Las Vegas 2016 – #LAS16
September 26-30, 2016
http://www.linaro.org
http://connect.linaro.org
LAS16-112: mbed OS Technical Overview
Speakers: Sam Grove
Date: September 26, 2016
★ Session Description ★
ARM mbed OS is an open source embedded operating system designed
specifically for the “things” in the Internet of Things. It includes all the features you need to develop a connected product based on very small memory footprint ARM Cortex-M microcontrollers, including security,connectivity, an RTOS, and drivers for sensors and I/O devices. You can start developing with mbed OS 5.1.0 today using a choice of 40 different development boards from 11 different providers and a wide choice of toolchains including a complete command line build management and configuration tool mbed CLI, industry standard desktop IDEs or ARM’s free online IDE.
★ Resources ★
Etherpad: pad.linaro.org/p/las16-112
Presentations & Videos: http://connect.linaro.org/resource/las16/las16-112/
★ Event Details ★
Linaro Connect Las Vegas 2016 – #LAS16
September 26-30, 2016
http://www.linaro.org
http://connect.linaro.org
A practical approach to securing embedded and io t platformsArm
A practical approach to securing embedded & IoT platforms
What can we learn from mobile security and apply to IoT?
Building on proven security principles & Secure Partitioning Manager
What can be done to make the IoT developer’s job easier?
Summary
Importance of security
End node security is important in the Internet of Things
mbed provides a platform for IoT with security baked into the core
Entropy is a corner stone for security
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 WorkshopOpen Mobile Alliance
OMA hosted a Workshop in Edinburgh on Friday, May 06, where field engineer Hannes Tschofenig, Senior Principal Engineer at ARM, showed attendees how to use the LwM2M protocol on FRMDM-K64F boards, designed by NXP in collaboration with mbed, to connect to the mbed cloud service (formally known mbed Connector) and to the Leshan server.
This presentation is a part of the Workshop Agenda:
9:15-9:30 Opening Remarks and Brief Overview of LWM2M
9:30-10:30 Demo of the Arduino Yun by HOP Ubiquitous
10:30-10:45 Demo of the LwM2M Editor Tool and DevKit
11:00-15:00 NXP FRDM-K64F Platform with ARM mbed demo
See more here: https://github.com/OpenMobileAlliance/OMA_LwM2M_for_Developers/wiki/2016-May-IoT-Platform-Training-%28Workshop%29
Introduction to Mbed - Etteplan seminar - August 2018Jan Jongboom
What is Arm Mbed, what is Arm Pelion, and how can it help me create IoT devices faster? Introductionary talk during the Etteplan seminars in Oulu and Espoo 21-22 August 2018 about LoRa in Mbed.
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...Cohesive Networks
Secure Your Azure Cloud Deployments with VNS3 Overlay Networks
Cohesive Networks CEO Patrick Kerpan and CTO Chris Swan present VNS3 overlay networking to help Microsoft Azure customers and partners better secure cloud deployments in this webinar from Microsoft Azure.
Learn how adding an overlay network to your Microsoft Azure cloud environment can boost security and connectivity. As your cloud environment grows with your business, your network becomes more important and complex.
An overlay network, a software-only network over the top of existing Azure cloud resources, can add controls for enhanced encryption, monitoring, interoperability, and connectivity.
You can create and manage your overlay network using VNS3 from Cohesive Networks. VNS3 is a customizable, layer 4 - 7 virtual networking device you can control to better manage and secure your Azure networks. Connect regions into one logical network, connect directly to customers or partners using secure IPsec tunnels, and ensure encryption for your network components to meeting industry regulations like HIPAA, PCI, or FIPS.
VNS3 even lets you connect your Azure subnets into other cloud providers’ availability zones for truly hybrird cloud flexibility. Join Cohesive Networks CEO and CTO for an in-depth look at overlay networks in Azure, along with real-life demos of our most popular use cases.
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...Hans Andersson
A workshop by Acal BFi Nordic on project mangOH industrial open hardware running Linux/Legato open source software. Tight integration with cloud and connectivity services.
Faster Device Development - GSMA @ CES 2019Jan Jongboom
Presentation about interesting open source developments that can be used in conjunction with LTE Cat-M1 and NB-IoT. Presentation from the GSMA IoT workshop at CES 2019.
Global Trends / Industry 4.0
How PROFINET provides increased flexibility, efficiency, and performance
Merging of automation and IT
OT Vs IT:
Location – Rough environment
Installation – Plant maintenance
Topology – Plant specific, varied
Availability – Network downtimes <300mS
Device density – Low, switches with few ports
Network monitoring – Part of plant monitoring
Design Summary:
§ Zoning and Security are essential
§ VLANs
§ Layer 3 switches
§ ACL
§ Bandwidth reservation
§ Network redundancy
§ Protection of safety-related systems
§ OT team & IT Team cooperation
PROFINET Security Concept:
§ Network Architecture – Security Zones
§ Trust Concept – within Zones
§ Perimeter Defence – Firewall/VPN
§ Provision of Confidentiality and Integrity
§ Transparent Integration of Firewalls
Mikael Falkvidd IoT - Stena AB Faster ForwardMikael Falkvidd
Tech afternoon - IoT, Mikael Falkvidd, Independent IoT consultant
The challenge is no longer technology or economy- it´s for us to imagine useful scenarios
Everything that can be connected will be connected and Gartner predicts that 2020 we will have 20 Billion connected devices, others say 50. We need to learn and explore the future business value.
Mikael has a MsC in computer communications. He has experience from Ericsson and OP5 but has also been a freelancer writer for a Swedish computer magazine where he had to stay relevant and learn about the latest and most exciting technologies.
Facilities for health checking and fault finding on PROFIBUS
systems are essential.
Access points must be provided on every segment of every
network. (Piggy-back sockets).
Tools and accompanying training are essential.
Network layout should allow devices to be replaced without
shutting down the network or disturbing other devices on the
network.
Replacement of devices should, if possible, not require reconfiguration of the system.
Health checking should be carried out at regular intervals to
detect degradation of performance, deteriorating
communications and developing problems.
Protection, Automation and Monitoring: SIPROTEC 5 v7.9/v8.0Ryan O'Mara
Highlights of SIPROTEC 5 family of multi-functional protection relays with control.
- SIPROTEC DigitalTwin
- Compatibility of SIPROTEC 4 and SIPROTEC 5 for 87L and 21
- IEC 61850-9-2 Process bus for digital substations (Server/Client)
- SIPROTEC 6MU85 Merging Unit
- Time synchronization with IEEE 1588 for High Precision applications
- SIPROTEC 7SS85 distributed busbar protection based on process bus
- Point-on-wave switching
- Conformal coating of SIPROTEC 5 devices as standard
- Cyber Security
- ATEX certification for 7SK85 and 7UM85
- New overcurrent and feeder protection SIPROTEC 7SJ81
- Web Browser
There are government initiatives, research projects, publications and PowerPoint slides, which can be freely downloaded. I have downloaded some and I am not an expert on the topic. With experience in the automation industry and academia, I see the trends from the recent enthusiasm and investment in our industry.
A report of the World Economic Forum states (Jan. 2015): IIoT is the “IoT’s industrial applications.
Industrial Internet of Things: Unleashing the Potential of Connected Products and Services
In collaboration with Accenture, January 2015
Consumer commodities like wristband activity trackers and Nest Thermostat.
Much of this hype centres on consumer applications, such as smart homes, connected cars and consumer wearables like wristband activity trackers. However, it is the IoT’s industrial applications, or the Industrial Internet”, which may ultimately dwarf the consumer side in potential business and socioeconomic impacts. The Industrial Internet will transform many industries, including manufacturing, oil and gas, agriculture, mining, transportation and healthcare. Collectively, these account for nearly two-thirds of the world economy. As society evolves towards an integrated digital-human workforce, the Industrial Internet will redefine the new types of new jobs to be created, and will reshape the very nature of work. Given the greater significance, this report focuses exclusively on the Industrial Internet.
The presentation to introduce the Hands-on workshop we ran at Elektor Live! A chance for everyone to experiment with all sorts of interesting hardware.
A practical approach to securing embedded and io t platformsArm
A practical approach to securing embedded & IoT platforms
What can we learn from mobile security and apply to IoT?
Building on proven security principles & Secure Partitioning Manager
What can be done to make the IoT developer’s job easier?
Summary
Importance of security
End node security is important in the Internet of Things
mbed provides a platform for IoT with security baked into the core
Entropy is a corner stone for security
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 WorkshopOpen Mobile Alliance
OMA hosted a Workshop in Edinburgh on Friday, May 06, where field engineer Hannes Tschofenig, Senior Principal Engineer at ARM, showed attendees how to use the LwM2M protocol on FRMDM-K64F boards, designed by NXP in collaboration with mbed, to connect to the mbed cloud service (formally known mbed Connector) and to the Leshan server.
This presentation is a part of the Workshop Agenda:
9:15-9:30 Opening Remarks and Brief Overview of LWM2M
9:30-10:30 Demo of the Arduino Yun by HOP Ubiquitous
10:30-10:45 Demo of the LwM2M Editor Tool and DevKit
11:00-15:00 NXP FRDM-K64F Platform with ARM mbed demo
See more here: https://github.com/OpenMobileAlliance/OMA_LwM2M_for_Developers/wiki/2016-May-IoT-Platform-Training-%28Workshop%29
Introduction to Mbed - Etteplan seminar - August 2018Jan Jongboom
What is Arm Mbed, what is Arm Pelion, and how can it help me create IoT devices faster? Introductionary talk during the Etteplan seminars in Oulu and Espoo 21-22 August 2018 about LoRa in Mbed.
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...Cohesive Networks
Secure Your Azure Cloud Deployments with VNS3 Overlay Networks
Cohesive Networks CEO Patrick Kerpan and CTO Chris Swan present VNS3 overlay networking to help Microsoft Azure customers and partners better secure cloud deployments in this webinar from Microsoft Azure.
Learn how adding an overlay network to your Microsoft Azure cloud environment can boost security and connectivity. As your cloud environment grows with your business, your network becomes more important and complex.
An overlay network, a software-only network over the top of existing Azure cloud resources, can add controls for enhanced encryption, monitoring, interoperability, and connectivity.
You can create and manage your overlay network using VNS3 from Cohesive Networks. VNS3 is a customizable, layer 4 - 7 virtual networking device you can control to better manage and secure your Azure networks. Connect regions into one logical network, connect directly to customers or partners using secure IPsec tunnels, and ensure encryption for your network components to meeting industry regulations like HIPAA, PCI, or FIPS.
VNS3 even lets you connect your Azure subnets into other cloud providers’ availability zones for truly hybrird cloud flexibility. Join Cohesive Networks CEO and CTO for an in-depth look at overlay networks in Azure, along with real-life demos of our most popular use cases.
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...Hans Andersson
A workshop by Acal BFi Nordic on project mangOH industrial open hardware running Linux/Legato open source software. Tight integration with cloud and connectivity services.
Faster Device Development - GSMA @ CES 2019Jan Jongboom
Presentation about interesting open source developments that can be used in conjunction with LTE Cat-M1 and NB-IoT. Presentation from the GSMA IoT workshop at CES 2019.
Global Trends / Industry 4.0
How PROFINET provides increased flexibility, efficiency, and performance
Merging of automation and IT
OT Vs IT:
Location – Rough environment
Installation – Plant maintenance
Topology – Plant specific, varied
Availability – Network downtimes <300mS
Device density – Low, switches with few ports
Network monitoring – Part of plant monitoring
Design Summary:
§ Zoning and Security are essential
§ VLANs
§ Layer 3 switches
§ ACL
§ Bandwidth reservation
§ Network redundancy
§ Protection of safety-related systems
§ OT team & IT Team cooperation
PROFINET Security Concept:
§ Network Architecture – Security Zones
§ Trust Concept – within Zones
§ Perimeter Defence – Firewall/VPN
§ Provision of Confidentiality and Integrity
§ Transparent Integration of Firewalls
Mikael Falkvidd IoT - Stena AB Faster ForwardMikael Falkvidd
Tech afternoon - IoT, Mikael Falkvidd, Independent IoT consultant
The challenge is no longer technology or economy- it´s for us to imagine useful scenarios
Everything that can be connected will be connected and Gartner predicts that 2020 we will have 20 Billion connected devices, others say 50. We need to learn and explore the future business value.
Mikael has a MsC in computer communications. He has experience from Ericsson and OP5 but has also been a freelancer writer for a Swedish computer magazine where he had to stay relevant and learn about the latest and most exciting technologies.
Facilities for health checking and fault finding on PROFIBUS
systems are essential.
Access points must be provided on every segment of every
network. (Piggy-back sockets).
Tools and accompanying training are essential.
Network layout should allow devices to be replaced without
shutting down the network or disturbing other devices on the
network.
Replacement of devices should, if possible, not require reconfiguration of the system.
Health checking should be carried out at regular intervals to
detect degradation of performance, deteriorating
communications and developing problems.
Protection, Automation and Monitoring: SIPROTEC 5 v7.9/v8.0Ryan O'Mara
Highlights of SIPROTEC 5 family of multi-functional protection relays with control.
- SIPROTEC DigitalTwin
- Compatibility of SIPROTEC 4 and SIPROTEC 5 for 87L and 21
- IEC 61850-9-2 Process bus for digital substations (Server/Client)
- SIPROTEC 6MU85 Merging Unit
- Time synchronization with IEEE 1588 for High Precision applications
- SIPROTEC 7SS85 distributed busbar protection based on process bus
- Point-on-wave switching
- Conformal coating of SIPROTEC 5 devices as standard
- Cyber Security
- ATEX certification for 7SK85 and 7UM85
- New overcurrent and feeder protection SIPROTEC 7SJ81
- Web Browser
There are government initiatives, research projects, publications and PowerPoint slides, which can be freely downloaded. I have downloaded some and I am not an expert on the topic. With experience in the automation industry and academia, I see the trends from the recent enthusiasm and investment in our industry.
A report of the World Economic Forum states (Jan. 2015): IIoT is the “IoT’s industrial applications.
Industrial Internet of Things: Unleashing the Potential of Connected Products and Services
In collaboration with Accenture, January 2015
Consumer commodities like wristband activity trackers and Nest Thermostat.
Much of this hype centres on consumer applications, such as smart homes, connected cars and consumer wearables like wristband activity trackers. However, it is the IoT’s industrial applications, or the Industrial Internet”, which may ultimately dwarf the consumer side in potential business and socioeconomic impacts. The Industrial Internet will transform many industries, including manufacturing, oil and gas, agriculture, mining, transportation and healthcare. Collectively, these account for nearly two-thirds of the world economy. As society evolves towards an integrated digital-human workforce, the Industrial Internet will redefine the new types of new jobs to be created, and will reshape the very nature of work. Given the greater significance, this report focuses exclusively on the Industrial Internet.
The presentation to introduce the Hands-on workshop we ran at Elektor Live! A chance for everyone to experiment with all sorts of interesting hardware.
Threat Intelligence is by far one of the most over-used buzz words in the security industry. Many professionals have very mixed feelings about Threat Intelligence feeds as well. This discussion is around how LogRhythm’s internal security team utilizes Threat Intelligence to operationalize efficiently and streamline Security Operations processes and help improve an organization’s defenses. We will show how you can generate your own Threat Intelligence and create information sharing loops within like industries to fully realize the team's defensive capabilities. On top of the technical aspects around building out a good Threat Intel program, we will discuss how to manage this from a leadership perspective and get buy-in from the top. Most importantly, once these systems are in place, how we can show value to leadership using key performance indicators and leverage this to improve the overall security program.
How to Hunt for Lateral Movement on Your NetworkSqrrl
Once inside your network, most cyber-attacks go sideways. They progressively move deeper into the network, laterally compromising other systems as they search for key assets and data. Would you spot this lateral movement on your enterprise network?
In this training session, we review the various techniques attackers use to spread through a network, which data sets you can use to reliably find them, and how data science techniques can be used to help automate the detection of lateral movement.
From Linux kernel livepatches to encryption to ASLR to compiler optimizations and configuration hardening, we strive to ensure that Ubuntu 16.04 LTS is the most secure Linux distribution out of the box.
These slides try to briefly explain:
- what we do to secure Ubuntu
- how the underlying technology works
- when the features took effect in Ubuntu
Slide show of the presentation given at Austrochip 2014.
Abstract:
Physically unclonable constants (PUC) are circuits used to embed unique secret bit-words in chips. We propose a simple PUC, with a complexity comparable with an SRAM cell. The proposed scheme is studied both theoretically and by means of simulations and it is shown that the proposed PUC is both unbiased and very stable. In particular, its intra-distance is predicted to be from 10 to 100 times smaller than competitor schemes. Simulations allow to conclude that the advantages of the proposed scheme are relevant enough to make it competitive even if the actual performance of a real implementation, not considered in this paper, will turn out to be an order of magnitude worse than predicted.
See also
http://ieeexplore.ieee.org/document/7539631/
https://doi.org/10.1109/TIFS.2016.2599008
Terra Bruciata: an open source initiative for software correctnessRiccardo Bernardini
Terra Bruciata is an initiative aiming to creating an open source community placing very strong emphasis on software correctness. Our wild dream is to make the third digit of version number useless because patches for bug correction should not be necessary anymore.
This is a slide show (with a peculiar graphical format :-) ) describing the main idea of this initiative.
PHDays '14 Cracking java pseudo random sequences by egorov & soldatovSergey Soldatov
This presentation was delivered at Positive Hack Days '14 in Moscow along with the following demos available on Youtube:
Demo#1: http://www.youtube.com/watch?v=mdOfZMsj4hA
Demo#2: http://www.youtube.com/watch?v=BwXhpjiCTyA
Demo#3: http://www.youtube.com/watch?v=B3EkrmNWeJs
Demo#4: http://www.youtube.com/watch?v=--ZuBUc2F2Y
Physically Unclonable Constants (PUC) are circuits used to embed unique secret bit-words in chips. We propose a simple PUC, employing two Schottkydiodes in reverse. The difference of the reverse currents of the two diodes is used to charge a capacitance. The charge stops when the two currents become equal. It is shown that this scheme has a single equilibrium point that depends discontinuously from the difference of the two saturation currents. The proposed scheme is studied both theoretically and by means of simulations (0.18 μm technology). It is shown that the proposed PUC is unbiased (inter distance %), very stable (intra distance from 2.8% to 1.5%) and temperature insensitive (only 0.3% of the cells changes output over a military temperature range). Energy required is predicted to be as small as 0.6 pJ/bit.
Slide show of the presentation given at Austrochip 2014 about a simple and very reliable PUF.
Physically unclonable constants (PUC) are circuits used to embed unique secret bit-words in chips. We propose a simple PUC, with a complexity comparable with an SRAM cell. The proposed scheme is studied both theoretically and by means of simulations and it is shown that the proposed PUC is both unbiased and very stable. In particular, its intra-distance is predicted to be from 10 to 100 times smaller than competitor schemes. Simulations allow to conclude that the advantages of the proposed scheme are relevant enough to make it competitive even if the actual performance of a real implementation, not considered in this paper, will turn out to be an order of magnitude worse than predicted.
See also
https://doi.org/10.1109/TIFS.2016.2599008
http://ieeexplore.ieee.org/document/7539631/
Presenting on the Pro track at API World 2017, Soracom CTO and co-founder Kenta Yasukawa explains how the constrained devices of the Internet of Things can use APIs to access the power of the cloud.
Cloud connectivity as a service platform, SORACOM, helps various smart city projects around the world. Here is how we make cities smart by connecting things up to the cloud.
This slide was for CLOUDEXPO 2017 in NYC. Consists of two part, One is for introducing existing WebRTC - IoT use cases. Another is conceptual consideration of Edge Computing scenario which leveraging WebRTC technology.
How do you manage Internet of Things (IoT) devices at scaleDuncan Purves
How do you manage Internet of Things (IoT) devices at scale without scaling costs? Standards based Device Management. Presentation by Connect2 Systems at IoT Tech Expo in London on 23 January 2017.
There has been much made out of the far reaching impacts of the Internet of Things (IoT) across cities, healthcare, industry 4.0 and more. The first wave of IoT has led to strong experimentation, with now IoT being discussed in around 50% companies on a weekly basis. So, how can you grow and scale these pilots beyond R&D - what should you consider as you look to fast-track your IoT?
MQTT - The Key to Scalable Reliable Connected Car PlatformsHiveMQ
The connected car has been around for over two decades. However, unreliable cellular networks, the limitation of HTTP for bi-directional communication and now the requirement for handling spikes in connectivity traffic have created growing challenges.
Increasingly the automotive industry is focused on the need to deliver better user experience, create new revenue streams and improve vehicle performance. To do this the industry is turning to MQTT, a lightweight publish/subscribe protocol, to create a reliable and scalable connected car platform to reach millions of cars.
Join this webinar to understand:
The reliability challenges of connected cars
The benefits of MQTT versus HTTP
Real world lessons from projects with Audi & BMW
How to build a MQTT scalable connected car platform
About the Speakers.
Christian Götz is Co-Founder and CEO at HiveMQ
To watch the webinar recording:
https://www.hivemq.com/webinars/mqtt-the-key-to-scalable-reliable-connected-car-platforms/
The Open Network Automation Platform (ONAP) is a leading Linux Foundation Networking open source project that provides fully automated orchestration and lifecycle management of NFV, SDN, analytics and edge computing services. While ONAP can be used for any network service, it is particularly beneficial for 5G and edge computing use cases. In this talk you will learn:
* What is ONAP
* What use cases does ONAP support
* What are the 5G/edge computing workload automation requirements
* How does ONAP support these requirements
* How can you get involved
API WORLD 2017: Workshop - APIs for Cloud Connectivity and Device Management Soracom Global, Inc.
Presenting at API World 2017, Soracom CTO and co-founder Kenta Yasukawa gets hands-on to demonstrate leading practices and APIs for connecting and controlling remote devices in the Internet of Things.
Developers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivitymCloud
Developers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivity
Developers’ mDay konferencija okuplja inspirativne ljude iz oblasti web developmenta. U pitanju je događaj stručnog karaktera, namenjen web developerima sa ciljem da se upoznaju sa aktuelnim tehnologijama u projektovanju web sistema, iskustvima u korišćenju najnovijih tehnika i tehnologija, kao i u rešavanju problema sa kojima se svakodnevno suočavaju.
A revolution is going on at the Edge of the Network.
Why Edge is important?
How Edge Computing is shaping the way we do IoT, AR/VR, Big Data, Machine Learning and Analytics applications.
What are the important problems and who’s problem is this?
What solutions Industry is looking into right now?
This review of the "Industry report by SDxCentral" summarizes what is going on in the Industry.
Similar to mbed Connect Asia 2016 Overview of mbed Device Connector (20)
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
From Cambridge we have Haoli Qu, from Amsterdam Jan Jongboom.
* Who is making decisions when it comes to IoT? You might think... well dev conference, probably..
Developers? (This is actually how developers look like according to a stock website)
* Business is driving IoT
IoT is means to reduce cost - make business run more effectively
So: we need to forget about the things we think about the funny consumer pictures, and start thinking about business needs...
Stop thinking about smart toasters
Or the smart diaper, as it's easier to check Twitter than to check your kid's diaper...
* Example, used to work in Telenor, big telco. Got 4000 buildings in all of Norway.
* 4000 buildings == a lot of toilets
* Cleaning schedule is currently made by hand (clean every toilet every X time)
* Real(ish) time insight == automatic planning == less people needed
* $!
OK, really this is the last stock photo I have ;-)
* The automatic planning is the real IoT part. Simple sensors feeding data into a spreadsheet where a manager actually decides is not really IoT.
* Devices feed data into facility management system, FMS makes the decision on where to send people.
* IoT = sensors + data intelligence.
IBM has Watson, Microsoft has various BI platforms, Google hsa DeepMind, Amazon has QuickSight. Many more.
On Application level you have app specific vendors. We see facility management, energy management, waste management vendors on the right.
Depending on your data it might actually end up in many different clouds...
* Devices connect over many different connectivity methods...
* Cellular, WiFi, Low powered mesh, LoRa, BLE, Zigbee, proprietary
* Connectivity is boring. Bytes should go from A -> B.
* You can either add value on device side or intelligence side. Not in between.
Lot of edge cases: devices disappearing, sleep schedules on low powered devices, devices have different capabilities. Some have IP, some do not. Some are ultra-constrained devices with 16K mem, some are full computers.
* mbed Device Connector handles the boring part!
* Connectivity either directly via mbed Client on the device (on devices that are fast enough, have IP).
* Portable. Now on mbed OS 5, will come to other RTOS's soon... Can we name FreeRTOS?
* Or via gateways. mbed Client on a Linux box, then over non-IP to the device.
* Reference designs available for Bluetooth Low Energy (on Raspberry Pi) and LoRaWAN (in the cloud).
* Gateway code is small. Our BLE gateway is ~400 lines of code in node.js (+UI it comes to 1,500 LoC) - the mbed Client logic is in a C++ binary which is same for all gateways.
* Offers access to devices in exactly the same way regardless of connectivity method.
* LWM2M, device has objects and resources.
* Device A has an LED, LED has state ON/OFF.
* Through mbed Device Connector you can query the state, or write a new state.
* mDC will connect to device, request value, report back.
* Or on constrained-devices that sleep, will ask the gateway.
* Does not do caching, it's a proxy to talk to the device! Database not included!
* Through mbed Device Connector you can query the state, or write a new state.
* mDC will connect to device, request value, report back.
* Or on constrained-devices that sleep, will ask the gateway.
* Does not do caching, it's a proxy to talk to the device! Database not included!
* End-to-end encrypted, to device when connected directly, gateway's responsibility to handle non-IP part...
@todo, don't call it end-to-end
* Getting the data out of it
* Can deliver notifications over a web hook to any URL.
* Minimize traffic from your app -> device, bad for battery.
* Simplest use case: forwarding your data into application cloud of your choice.
* More advanced use cases can take advantage of device management APIs.
* F.e. In Watson IoT you can manage your devices even though they're connected through mDC.
Here we have IBM Watson IoT platform, which is a new mbed partner, in which you can activate Watson<>Connector bindings from their UI.
After that the device management APIs are used to show Connector managed devices alongside other devices in Watson. Perfect integration.
For all bindings to other clouds we developed 'Bridges'.
* Sending data over in a reliable manner requires things like watchdog process, isolation, logging, etc.
* Connector bridges are plug-n-play, Docker containers that connect Connector <-> App cloud, which handle all that for you.
* Currently available for Azure, IBM, AWS and generic MQTT bridge.
* Don't need the full suite of bridges? Simple one-offs or during development?
* Writing against the Python or node.js API and dump data that way.
* Jan wrote a script that forwarded data to Telit Cloud for an event in an hour and a half... Without knowing anything about Telit.
Later today we'll have the 'Building an internet connected lighting system' workshop, in which we'll be using Konekuta to build the user-facing part of the system.
We'll be showing two demo's. One is how to take a device running mbed OS 5 + WiFi, and show how easy it is to connect a new sensor to it, thanks to mbed ecosystem.
Second is how we can manage two devices straight from IBMs cloud using their workflow programming language with node-red.