This document provides an overview of the MCELLBLOCK platform for automated mobile network testing using real devices. Some key points:
- MCELLBLOCK allows running thousands of automated tests on hundreds of real mobile devices to validate 3G, 4G/LTE, 5G and WiFi networks and services.
- It supports most Android and iOS devices and enables both automated and manual testing at scale. Tests can validate various aspects of the mobile network including voice, data, applications and more.
- The platform includes hardware racks that can hold up to 320 devices organized into modular cell blocks as well as automation software and a library of test scripts for common functions and applications.
Srikanth Pilli has over 6 years of experience in embedded software development. He has expertise in C/C++, Python, Linux kernel driver development, video streaming, and networking. He has worked on projects involving home automation, surveillance systems, and embedded device development. His skills include embedded Linux systems, microcontroller programming, real-time protocols, and tools like Git. He holds an M.Tech in embedded systems and postgraduate diplomas in embedded systems and electronics.
Getting started with RISC-V verification what's next after compliance testingRISC-V International
The document discusses the CPU design verification (DV) process for RISC-V processors and the challenges presented by RISC-V's open standard nature. It covers developing a verification plan, obtaining tests and models, running simulations, and verifying until coverage metrics are met. Key aspects include using a reference model for configuration and comparison, techniques like self-check, signature comparison, trace logging and step-and-compare, and test suites like riscv-compliance. The presenter demonstrates step-and-compare verification between an Imperas reference model and RISC-V RTL using open source tools and models.
R&D LAB «GTS» provides full-cycle engineering and development services for electronic equipment of any complexity. Their team uses advanced technical solutions and technologies to develop reliable and easy-to-use products that are tested by specialists. They offer services including embedded software development, research and development tasks, industrial design, and more. Their goal is to create market-successful products according to requirements through stages including concept generation, prototyping, and 3D modeling. They have experience with projects including navigation systems, data transmission systems, testing equipment, and security systems.
This is a further continuation or my Selenium Conference lightning talk. In this talk I provide examples of capturing video and logcat data for every test run and attaching to Allure. I also discuss how to leverage cloud test service (Sauce Labs) into your automation framework.
This document provides an overview of the Internet of Things (IoT) communication model used by IzoT. It discusses how IzoT uses a distributed peer-to-peer model rather than a client-server model to facilitate communication between diverse IoT devices. Devices in the IzoT network communicate using datapoints and can publish sensor data or subscribe to actuator data. The document also describes how IzoT handles tasks like device enrollment and network organization to enable reliable interoperable communication among IoT devices. Code examples in Python are provided to implement sensors and web pages to display IoT data.
Mobile QA Metrics Risks and Automation Presentation By Yuval GolanYuval Golan
This document discusses the challenges of mobile testing and automation. It outlines the complexity of mobile testing due to the large number of devices, operating systems, carriers and resolutions. It also discusses the scope of mobile testing including functionality, usability, load, security and localization. The document recommends automating testing using tools like Perfecto and Jenkins for continuous integration and looping feedback from testing back into the development process. Metrics on app crashes and store ranks are presented and the document concludes with what more can be done, such as increasing test coverage and using tools like Appium.
Velocity building a performance lab for mobile apps in a day - finalAshray Mathur
This document discusses building a mobile app performance lab in a day. It covers three essential steps: 1) instrumenting apps to collect key performance metrics, 2) setting up mobile infrastructure to run automated tests on real devices, and 3) establishing a continuous integration process to repeatedly test, measure, analyze, fix, and retest performance. Specific techniques covered include using boomerang.js for app instrumentation, WebDriver for automation, and collecting metrics on both iOS and Android platforms. The document emphasizes establishing an automated testing process to iteratively improve mobile app performance.
Srikanth Pilli has over 6 years of experience in embedded software development. He has expertise in C/C++, Python, Linux kernel driver development, video streaming, and networking. He has worked on projects involving home automation, surveillance systems, and embedded device development. His skills include embedded Linux systems, microcontroller programming, real-time protocols, and tools like Git. He holds an M.Tech in embedded systems and postgraduate diplomas in embedded systems and electronics.
Getting started with RISC-V verification what's next after compliance testingRISC-V International
The document discusses the CPU design verification (DV) process for RISC-V processors and the challenges presented by RISC-V's open standard nature. It covers developing a verification plan, obtaining tests and models, running simulations, and verifying until coverage metrics are met. Key aspects include using a reference model for configuration and comparison, techniques like self-check, signature comparison, trace logging and step-and-compare, and test suites like riscv-compliance. The presenter demonstrates step-and-compare verification between an Imperas reference model and RISC-V RTL using open source tools and models.
R&D LAB «GTS» provides full-cycle engineering and development services for electronic equipment of any complexity. Their team uses advanced technical solutions and technologies to develop reliable and easy-to-use products that are tested by specialists. They offer services including embedded software development, research and development tasks, industrial design, and more. Their goal is to create market-successful products according to requirements through stages including concept generation, prototyping, and 3D modeling. They have experience with projects including navigation systems, data transmission systems, testing equipment, and security systems.
This is a further continuation or my Selenium Conference lightning talk. In this talk I provide examples of capturing video and logcat data for every test run and attaching to Allure. I also discuss how to leverage cloud test service (Sauce Labs) into your automation framework.
This document provides an overview of the Internet of Things (IoT) communication model used by IzoT. It discusses how IzoT uses a distributed peer-to-peer model rather than a client-server model to facilitate communication between diverse IoT devices. Devices in the IzoT network communicate using datapoints and can publish sensor data or subscribe to actuator data. The document also describes how IzoT handles tasks like device enrollment and network organization to enable reliable interoperable communication among IoT devices. Code examples in Python are provided to implement sensors and web pages to display IoT data.
Mobile QA Metrics Risks and Automation Presentation By Yuval GolanYuval Golan
This document discusses the challenges of mobile testing and automation. It outlines the complexity of mobile testing due to the large number of devices, operating systems, carriers and resolutions. It also discusses the scope of mobile testing including functionality, usability, load, security and localization. The document recommends automating testing using tools like Perfecto and Jenkins for continuous integration and looping feedback from testing back into the development process. Metrics on app crashes and store ranks are presented and the document concludes with what more can be done, such as increasing test coverage and using tools like Appium.
Velocity building a performance lab for mobile apps in a day - finalAshray Mathur
This document discusses building a mobile app performance lab in a day. It covers three essential steps: 1) instrumenting apps to collect key performance metrics, 2) setting up mobile infrastructure to run automated tests on real devices, and 3) establishing a continuous integration process to repeatedly test, measure, analyze, fix, and retest performance. Specific techniques covered include using boomerang.js for app instrumentation, WebDriver for automation, and collecting metrics on both iOS and Android platforms. The document emphasizes establishing an automated testing process to iteratively improve mobile app performance.
This document discusses Android services for background execution in mobile applications. It defines services and how they differ from threads, describes the various types of services and how to create them using the Android service wizard in RAD Studio. It also demonstrates services and discusses restrictions and workarounds. Resources for learning more about services are provided.
This document discusses the development of test tools and RealFlow testing at a third-party testing lab. It describes various self-designed test tools developed to automate testing of devices like routers, switches, and wireless products. It also outlines how RealFlow testing uses real network traffic replay techniques to test products under realistic conditions captured from a beta testing site. Finally, it mentions some experiments conducted with Software Defined Networking and OpenFlow technologies.
The summary provides an overview of the candidate's career objective, skills, and professional experience:
[1] The candidate has over 10 years of experience in WLAN technology testing and seeks a role where he can apply his skills and expertise to help achieve organizational goals. [2] He has extensive experience testing WLAN protocols, VOIP, and enterprise solutions using various automation tools and scripting languages. [3] The candidate's professional experience includes roles at Motorola Solutions and RelQ Software where he performed various testing projects involving wireless networks, mobile devices, and embedded systems.
Performance Tuning Oracle Weblogic Server 12cAjith Narayanan
The document summarizes techniques for monitoring and tuning Oracle WebLogic server performance. It discusses monitoring operating system metrics like CPU, memory, network and I/O usage. It also covers monitoring and tuning the Java Virtual Machine, including garbage collection. Specific tools are outlined for monitoring servers like the WebLogic admin console, and command line JVM tools. The document provides tips for configuring domain and server parameters to optimize performance, including enabling just-in-time starting of internal applications, configuring stuck thread handling, and setting connection backlog buffers.
More info http://bit.ly/IOLtestsen -- Test Sentinel software runs automated testing in-house for DSL, Gfast, and Wireless including Broadband Forum’s ID337, ID337i2, TR-114, TR-100, and TR-067 test plans before applying for the Broadband Forum Gfast Certification Program.
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedFelipe Prado
This document summarizes vulnerabilities found by researchers in 4G modules. It introduces the researchers and their backgrounds in security. It then provides an overview of 4G module components and architecture. Several vulnerabilities are listed, including RCE in baseband chips and authentication risks in V2X modules. Motivations for the research are discussed. Methods for attacking 4G modules are presented, such as using fake base stations, exploiting misconfigurations, and abusing private APNs. Preparations for attacks including obtaining firmware, shells, and network traffic are also covered.
[old] Network Performance Monitoring for DevOps and ITSite24x7
Take a look at our updated Network Monitoring presentation in the link given below:
https://www.slideshare.net/Site24x7/network-final
Get comprehensive performance insights by monitoring critical network devices such as routers, switches and firewalls with Site24x7.
About Site24x7:
Site24x7 offers unified cloud monitoring for DevOps and IT operations. Monitor the experience of real users accessing websites and applications from desktop and mobile devices. In-depth monitoring capabilities enable DevOps teams to monitor and troubleshoot applications, servers and network infrastructure including private and public clouds. End user experience monitoring is done from 50+ locations across the world and various wireless carriers. For more information on Site24x7, please visit http://www.site24x7.com/.
Forums: https://forums.site24x7.com/
Facebook: http://www.facebook.com/Site24x7
Twitter: http://twitter.com/site24x7
Google+: https://plus.google.com/+Site24x7
LinkedIn: https://www.linkedin.com/company/site...
View Blogs: http://blogs.site24x7.com/
This document provides an overview of exploiting insecure IoT firmware. It begins with an introduction to IoT protocols like CoAP, MQTT, XMPP, and AMQP. It then discusses the OWASP top 10 security risks for IoT, focusing on insecure software/firmware. Common debugging interfaces for firmware like UART, JTAG, SPI, and I2C are explained. Operating systems and compilers used for IoT development are listed. Finally, the document outlines a methodology for exploiting insecure firmware, including getting the firmware, performing reconnaissance, unpacking, localizing points of interest, and then decompiling, compiling, tweaking, fuzzing, or pentesting the firmware. Tools mentioned include binwalk, firmwalk
Asia 14-garcia-illera-dude-wtf-in-my-caninjenerzntu
The document discusses vehicle electronic control units (ECUs) and techniques for interacting with a vehicle's CAN bus. It provides details on:
1) The ELM327 interface that is commonly used to communicate with the OBD-II port and protocols like CAN bus.
2) The CHT (CAN Hack Tool) hardware that was created to capture and inject CAN data at various speeds, beyond what the ELM327 supports.
3) How statistical analysis of CAN bus data can help determine common commands like unlocking doors based on identifying frequently transmitted packet IDs and payloads.
The document describes Polycom's test automation architecture which includes a .NET API layer called FANTA for performing actions on modules like MCUs and endpoints. Tests are created using FANTA and compiled as executables to be run by a TestShell. Results are stored in a database for reporting and analysis on test coverage. A resource manager is used to track device utilization and support test scheduling. The automation includes controls for MCUs, endpoints, and a web interface for executing and scheduling tests.
This document discusses attacks on wearable-mobile communication over Bluetooth Low Energy (BLE). It notes that while BLE uses encryption, any app on a device can subscribe to the same BLE channels and characteristics as legitimate apps to access sensitive data or send commands. This poses a risk as malware could obtain private data like heart rate or put devices into recovery mode. The document proposes mitigations like app-to-device pairing to restrict access to only registered apps and using application-specific keys to protect command integrity and data confidentiality. Future enhancements to mobile platforms and BLE specifications are needed to better support authentication and encryption between apps and devices.
This document discusses telemetry in applications. It defines telemetry as gathering data on application use and performance. Telemetry includes logs, metrics, and traces. Logs provide information for debugging, monitoring, and analysis. Metrics measure performance, health, errors and other indicators. Traces provide low-level debugging information. The document discusses how to implement logging, metrics and tracing in applications and what types of data each provides to various consumers like developers and security teams.
A modified version of my Desert Code Camp 2011.2 presentation on SignalR from November 5th, 2011.
It's modified since I'm more of a talker and rarely utilize bullet points and much text in my slides.
- The document discusses speeding up mobile development through continuous integration on real devices. It introduces Intuit's Virtual Device Lab (VDL), which allows running automated tests on real mobile devices through a browser.
- VDL addresses challenges developers face from the large number of device and OS combinations by running tests in parallel across many real devices. This reduces the development iteration cycle from days to minutes.
- The document highlights how VDL integrated with Intuit's test automation framework and tools like Cucumber and Calabash allows running tests remotely over WiFi. This provided significant time and cost savings compared to alternatives.
Firefox OS real-phone automation lab: goals, challenges, and successesStephen Donner
You might not find much information on the topic of large-scale, real-device (phone) test-automation labs, searching the Web. At least, Stephen and his team didn't, and, chartered with designing, building, and maintaining a Firefox OS phone-automation lab of over 40 devices, from the ground up, will share their goals, many challenges, successes, and lots of lessons learned along the way.
Auxenta Inc.'s Nuwan Dehigaspitiya looks into the diverse aspects of Mobile Testing, including QA challenges, testing aspects and strategies, performance testing and more in this presentation
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
The Internet of Fails - Where IoT (the Internet of Things) has gone wrong and how we’re making it right. By Mark Stanislav @mstanislav, Senior Security Consultant, Rapid7
DEVNET-1122 Integrating Cisco Collaboration into Web AppsCisco DevNet
The Cisco Jabber SDK for Web provides 3rd parties with the building blocks required to UC-enable Web-based applications. This javascript SDK is designed to simplify and accelearte the integration of pervasive UC into your Web portals and applications. It provides 3rd parties with APIs, reference clients and source code for Voice/Video, IM, Presence, WebEx meeting escalations and Visual Voicemail. Join this session to discover how adding real-time collaboration to your enterprise Web application can increase productivity for end users. You will learn what capabilities are available in the toolkit, how it works with the Cisco UC system and how to get started with your integration.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
This document discusses Android services for background execution in mobile applications. It defines services and how they differ from threads, describes the various types of services and how to create them using the Android service wizard in RAD Studio. It also demonstrates services and discusses restrictions and workarounds. Resources for learning more about services are provided.
This document discusses the development of test tools and RealFlow testing at a third-party testing lab. It describes various self-designed test tools developed to automate testing of devices like routers, switches, and wireless products. It also outlines how RealFlow testing uses real network traffic replay techniques to test products under realistic conditions captured from a beta testing site. Finally, it mentions some experiments conducted with Software Defined Networking and OpenFlow technologies.
The summary provides an overview of the candidate's career objective, skills, and professional experience:
[1] The candidate has over 10 years of experience in WLAN technology testing and seeks a role where he can apply his skills and expertise to help achieve organizational goals. [2] He has extensive experience testing WLAN protocols, VOIP, and enterprise solutions using various automation tools and scripting languages. [3] The candidate's professional experience includes roles at Motorola Solutions and RelQ Software where he performed various testing projects involving wireless networks, mobile devices, and embedded systems.
Performance Tuning Oracle Weblogic Server 12cAjith Narayanan
The document summarizes techniques for monitoring and tuning Oracle WebLogic server performance. It discusses monitoring operating system metrics like CPU, memory, network and I/O usage. It also covers monitoring and tuning the Java Virtual Machine, including garbage collection. Specific tools are outlined for monitoring servers like the WebLogic admin console, and command line JVM tools. The document provides tips for configuring domain and server parameters to optimize performance, including enabling just-in-time starting of internal applications, configuring stuck thread handling, and setting connection backlog buffers.
More info http://bit.ly/IOLtestsen -- Test Sentinel software runs automated testing in-house for DSL, Gfast, and Wireless including Broadband Forum’s ID337, ID337i2, TR-114, TR-100, and TR-067 test plans before applying for the Broadband Forum Gfast Certification Program.
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedFelipe Prado
This document summarizes vulnerabilities found by researchers in 4G modules. It introduces the researchers and their backgrounds in security. It then provides an overview of 4G module components and architecture. Several vulnerabilities are listed, including RCE in baseband chips and authentication risks in V2X modules. Motivations for the research are discussed. Methods for attacking 4G modules are presented, such as using fake base stations, exploiting misconfigurations, and abusing private APNs. Preparations for attacks including obtaining firmware, shells, and network traffic are also covered.
[old] Network Performance Monitoring for DevOps and ITSite24x7
Take a look at our updated Network Monitoring presentation in the link given below:
https://www.slideshare.net/Site24x7/network-final
Get comprehensive performance insights by monitoring critical network devices such as routers, switches and firewalls with Site24x7.
About Site24x7:
Site24x7 offers unified cloud monitoring for DevOps and IT operations. Monitor the experience of real users accessing websites and applications from desktop and mobile devices. In-depth monitoring capabilities enable DevOps teams to monitor and troubleshoot applications, servers and network infrastructure including private and public clouds. End user experience monitoring is done from 50+ locations across the world and various wireless carriers. For more information on Site24x7, please visit http://www.site24x7.com/.
Forums: https://forums.site24x7.com/
Facebook: http://www.facebook.com/Site24x7
Twitter: http://twitter.com/site24x7
Google+: https://plus.google.com/+Site24x7
LinkedIn: https://www.linkedin.com/company/site...
View Blogs: http://blogs.site24x7.com/
This document provides an overview of exploiting insecure IoT firmware. It begins with an introduction to IoT protocols like CoAP, MQTT, XMPP, and AMQP. It then discusses the OWASP top 10 security risks for IoT, focusing on insecure software/firmware. Common debugging interfaces for firmware like UART, JTAG, SPI, and I2C are explained. Operating systems and compilers used for IoT development are listed. Finally, the document outlines a methodology for exploiting insecure firmware, including getting the firmware, performing reconnaissance, unpacking, localizing points of interest, and then decompiling, compiling, tweaking, fuzzing, or pentesting the firmware. Tools mentioned include binwalk, firmwalk
Asia 14-garcia-illera-dude-wtf-in-my-caninjenerzntu
The document discusses vehicle electronic control units (ECUs) and techniques for interacting with a vehicle's CAN bus. It provides details on:
1) The ELM327 interface that is commonly used to communicate with the OBD-II port and protocols like CAN bus.
2) The CHT (CAN Hack Tool) hardware that was created to capture and inject CAN data at various speeds, beyond what the ELM327 supports.
3) How statistical analysis of CAN bus data can help determine common commands like unlocking doors based on identifying frequently transmitted packet IDs and payloads.
The document describes Polycom's test automation architecture which includes a .NET API layer called FANTA for performing actions on modules like MCUs and endpoints. Tests are created using FANTA and compiled as executables to be run by a TestShell. Results are stored in a database for reporting and analysis on test coverage. A resource manager is used to track device utilization and support test scheduling. The automation includes controls for MCUs, endpoints, and a web interface for executing and scheduling tests.
This document discusses attacks on wearable-mobile communication over Bluetooth Low Energy (BLE). It notes that while BLE uses encryption, any app on a device can subscribe to the same BLE channels and characteristics as legitimate apps to access sensitive data or send commands. This poses a risk as malware could obtain private data like heart rate or put devices into recovery mode. The document proposes mitigations like app-to-device pairing to restrict access to only registered apps and using application-specific keys to protect command integrity and data confidentiality. Future enhancements to mobile platforms and BLE specifications are needed to better support authentication and encryption between apps and devices.
This document discusses telemetry in applications. It defines telemetry as gathering data on application use and performance. Telemetry includes logs, metrics, and traces. Logs provide information for debugging, monitoring, and analysis. Metrics measure performance, health, errors and other indicators. Traces provide low-level debugging information. The document discusses how to implement logging, metrics and tracing in applications and what types of data each provides to various consumers like developers and security teams.
A modified version of my Desert Code Camp 2011.2 presentation on SignalR from November 5th, 2011.
It's modified since I'm more of a talker and rarely utilize bullet points and much text in my slides.
- The document discusses speeding up mobile development through continuous integration on real devices. It introduces Intuit's Virtual Device Lab (VDL), which allows running automated tests on real mobile devices through a browser.
- VDL addresses challenges developers face from the large number of device and OS combinations by running tests in parallel across many real devices. This reduces the development iteration cycle from days to minutes.
- The document highlights how VDL integrated with Intuit's test automation framework and tools like Cucumber and Calabash allows running tests remotely over WiFi. This provided significant time and cost savings compared to alternatives.
Firefox OS real-phone automation lab: goals, challenges, and successesStephen Donner
You might not find much information on the topic of large-scale, real-device (phone) test-automation labs, searching the Web. At least, Stephen and his team didn't, and, chartered with designing, building, and maintaining a Firefox OS phone-automation lab of over 40 devices, from the ground up, will share their goals, many challenges, successes, and lots of lessons learned along the way.
Auxenta Inc.'s Nuwan Dehigaspitiya looks into the diverse aspects of Mobile Testing, including QA challenges, testing aspects and strategies, performance testing and more in this presentation
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
The Internet of Fails - Where IoT (the Internet of Things) has gone wrong and how we’re making it right. By Mark Stanislav @mstanislav, Senior Security Consultant, Rapid7
DEVNET-1122 Integrating Cisco Collaboration into Web AppsCisco DevNet
The Cisco Jabber SDK for Web provides 3rd parties with the building blocks required to UC-enable Web-based applications. This javascript SDK is designed to simplify and accelearte the integration of pervasive UC into your Web portals and applications. It provides 3rd parties with APIs, reference clients and source code for Voice/Video, IM, Presence, WebEx meeting escalations and Visual Voicemail. Join this session to discover how adding real-time collaboration to your enterprise Web application can increase productivity for end users. You will learn what capabilities are available in the toolkit, how it works with the Cisco UC system and how to get started with your integration.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
2. • Continuously run thousands of
automated tests and scripts on
hundreds of real-devices for complete
confidence in your new 5G network
design and service validation.
• 3G, 4G/LTE, FirstNet, 5G, and Wi-Fi
network validation for both
Voice/Data, and services
• Android and iOS Device Testing – Plug
and Play – Real Devices
High Scale Automated Mobile Network Testing
– using real devices
www.miwtech.com/mcb
Android iOS
IoT
www.miwtech.com/mcb/
3. What we test → Mobile Devices, IoT
→ Mobile Applications
→ Mobile Network
• 3G, 4G/LTE, 5G, and Wi-fi, IoT
network validation for both
Voice and Data
• Service Validation (Voice,
Text, & HD Video)
• Network Validation (3G,
4G/LTE, 5G)
• Network Validation (eRAN &
EPC → MME / eDPG)
• Application Testing – Native
and 3rd Party
• OS Regression – Validates
Android or iOS upgrades
• Android and iOS Device
Testing – Plug and Play – Real
Devices
Areas of test:
www.miwtech.com/mcb/
4. MCellblock Feature Summary:
• Devices (UEs): Smart Phones, tablets, and wearables
• Supports most iOS and Android devices
• Automation and Manual Testing
• Each 4U MCb scalable to 32 devices
• Each MCb stands on its own: Interface / Server / Storage
/ Devices
• Multi-User with Roles and Permission assignments
• Groups for device isolation
• MCb’s can aggregate for access to larger pool of devices
• MCb Server can be On-Prem, Cloud, or Hosted
• Extensible Automation through REST API
• Video Capture of Automated and Manual Tests
• Voice Inject / Save / QoS using Bluetooth Controller
• IoT – Watch – Device SIM synchronization www.miwtech.com/mcb/
5. 48U Rack
Hardware Features:
• Each 4U MCellblock supports 32
devices
• Ten MCellblocks per Rack - 320
Devices!!
• Android and iOS Devices
• Fully Managed Rack
• MCb Server per MCellblock
• Managed USB controller
• Per port power management
• Per port power monitor
• Per port LED indicators
• Temperature monitoring
• Storage all in one enclosure
• RF Shielded: -60 dbm to -70 dbm;
www.miwtech.com/mcb/
MCellblock Hardware Feature Summary:
IO Panel (back plane):
• Redundant Power Supply
• 4 RF SMA Inputs
• Dual Ethernet Network
Connection
• HDMI – Monitor port
• USB 3.0 – Mouse/Keyboard
6. 48U Rack Hardware Features:
• Each 4U MCellblock supports 32 devices
• Ten MCellblocks per Rack - 320 Devices!!
• Android and iOS Devices
• Fully Managed Rack
• MCb Server per MCellblock – Easy Aggregation
• Managed USB controller
• Per port power management
• Per port power monitor
• Per port LED indicators
• Temperature monitoring
• Storage all in one enclosure
• RF Shielded: -60 dbm to -70 dbm;
• Up to 16 RF input signal ports
• Redundant Power Supplies per MCellblock
www.miwtech.com/mcb/
MCellblock Hardware Feature Summary:
7. Hardware Features:
• 2U RF enclosure’s
• 8 devices (large)
• 2 devices (small)
• RF isolation > 90 dB
• Great for Handover testing
• Great for drive testing
• myMCb Desktop for Script Engineers
• Designed for MOSA Engineers
• Designed for open-air network
• Up to eight varied size devices
• iOS & Android
www.miwtech.com/mcb/
MCellblock New Hardware:
8. MCellblock Voice Features Outline:
• Bluetooth and device setup is auto magic
• Complete Script Integration – All files attached to results
• Voice Inject – Voice Save
• Full Reference Voice Analysis – MOS Scoring using POLQA
• Modules with Voice Support:
• Calling Module
• Push to Talk
• Visual Voice Mail
• Real Time Text
• iOS & Android Support
www.miwtech.com/mcb/
Mos RFactor Quality Impairment
5 90 - 100 Excellent Imperceptible
4 80 – 90 Good Perceptible but not annoying
3 70 – 80 Fair Slightly annoying
2 50 – 70 Poor Annoying
1 Less then 50 Bad Very Annoying
9. MCellblock Voice Preloaded Files
• Perceptual Objective Listening Quality
Analysis (POLQA) aka ITU-T Rec. P
• Default POLQA files designed for testing:
• BrEnglish_WB_f1s4_f1s2_6s.wav - British english,
wide band, female, pause, female, 6 seconds total
• BrEnglish_WB_m1s1_m1s3_8s.wav. - British english,
wide band, male, pause, male, 8 seconds total
• BrEnglish_WB_m1s1_m1s3_6s.wav- British english,
wide band, male, pause, male, 6 seconds total
• BrEnglish_WB_f1s4_f1s2_8s.wav - British english,
wide band, female, pause, female, 8 seconds total
www.miwtech.com/mcb/
10. Screen Mirroring – Multi Phones per Screen
• Ability to watch and work
• iOS and Android Mix
• Video Record of Scenarios
• Great for both manual testing and
automation validation
• Device Control:
• Portrait or Landscape
• Volume Control
• Search Key
• App Switch Key
• Home Key
• Back
• Text entry using keyboard
• Scale Option – to control size
• Resolution – Used when
bandwidth limits are low
• Refresh
11. Manual Testing – using Screen Mirroring
Screen Mirroring:
• One session limit per
device
• Video Record
• Voice inject / record with
Bluetooth
• Portrait or Landscape
• Volume Control
• Search Key
• App Switch Key
• Home Key
• Back
• Text entry using keyboard
• Scale Option – to control
size
• Resolution – Used when
bandwidth limits are low
• Refresh
• Watch Mode (1 per
session)
www.miwtech.com/mcb/
12. Automated Application & Network Testing
Using – real devices
• FAST path to automating any device or mobile application
• Extensible to most orchestration test frame works via REST API
• User defined Test Suites with scheduler
• Single Function test case for any device
• Multi-user, Admin management for user and device groups
• Continuous, repeatable and error free test execution
• Parallel device execution at any scale, with any test case
• Check Points with Screen shots and Video for trouble shooting
• Performance Metrix for CPU, Memory, and Network
• Extensive Logs for devices, test execution, and Appium
• Manager level dashboards for instant visibility
Automation
www.miwtech.com/mcb/
13. Automation Life Cycle – Using Real Devices
• Today – Manual tests occurs at a point of change. New Device, New OS,
New Application, Network upgrades and changes → MCb Manual Test
• Automate Manual Test –
• Allowing tests to occur multiple times a day, finding problems quick and early
• In wireless the test path is always changing: Device, OS, Application, Network
Capacity, Platform, …
• Understand User Group TOL requirement
• MCb & User → Steps through Application with target device/OS
• Expected Results
• Validation Points
• Points of Interest
• Exceptions – Items not easily addressable by automation
• Logs / Video / Checkpoints for all or failed tests
• Implement TOL – Orchestrated through Automated Network Test, ANT
Summary:
www.miwtech.com/mcb
• iOS Google Maps – Automated Test, to search and find directions for any destination
16. Large Scripting Library
Test Scripts*:
• deviceRegistration / deviceDeregistration
• browseInternet, CNN
• google, yahoo, tracFone
• chase, papaJohns, googlemaps
• netflix, snapchat, instagram
• hulu, twitter, amazonPrime
• youTube, marketPlace
• directTv, popGmail
• googleMessenger
• facebook, outlook
Automation Features*:
• REST API
• Watch Mode
• Full Video Capture
• Manual Testing
• Test Suites / Test Logs / Test Results
• Checkpoints with Video / Screen capture
* Not Inclusive List
www.miwtech.com/mcb/
17. Calling Functions*:
• makeCall, endCall, verifyCall, answerCall
• makeVideoCall, answerVideoCall, muteCall
• mergeCall, swapCall, rejectCall, holdCall
• resumeCall, answer2ndCall
• enterStarCodes, callDialPad, callN11
• enableWifiCalling
Large library of functions to build custom scenarios
Chat Functions*:
• createGroup, sendText, readText
• sendFile, readFile, delConv
• addChatBot, startChatBot
• addToGroup, dropFromGroup
System Functions*:
• enableAirplaneMode, enalbeHotSpot
• speedTest, softwareUpdate
• installApplication, openApplication
Function Modules:
• Calling
• Chat
• System
• Push-to-talk
• Visual-Voice Mail
• Real Time Text
• Dynamic Traffic Management
* Not Inclusive List
www.miwtech.com/mcb/
18. Benefits: MCb – Aggregated Model
• Single front end Server
• Single code point
• Larger pool of devices
• Snapshots for quick
restore of previous
images
• Reduce management
costs
• Single upgrades
• Single sign-on for all
user accounts
• Clone images for new
feature trials
• Increased performance
for node with front end
separations
Virtual Server Image (MCb)
Server
Node
Unit1
Server
Node
Unit2
Server
Node
Unit3
Server
Node
Unit4
Server
Node
Unit5
Virtual Server Image #2
Server
Node
Unit A
Server
Node
Unit B
Server
Node
Unit C
www.miwtech.com/mcb/
19. iOT – Watch / Wearables!
• Designed for Multiple Sim Shared Identity (MSSI)
• Touch / Application Testing – Same technology as phones
• Appium
• Connected via WiFi / usb cable to MCb
• Optionally Paired with user device / application
• Test both phone & watch together
• Test up 32 iOT Watches or 16 Primary Device (PD) / Secondary
Device (SD) pairs
• Testing Services and Applications for:
• Calling
• Texting
• Browsing
• Maps
• Android Pay
• Fitness
• Music Streaming
• WiFi
• LTE
• Bluetooth
• Calling
• Texting
• GPS - Fit Apps / Maps
• Music streaming
• Android Pay
iOT - Watches
www.miwtech.com/mcb/
20. Google Maps Use case
• Objective: Verify search and find directions to location from
current location
• Each run will produce:
• Details of Test and Devices
• Video of entire run if selected
• Check points – snap shots of the script at its various stages with
screen capture and data
• Points of Interest – none provided with Google Maps
• Parameters
• Logs: Test Script Logs, Appium Logs, Device Logs
• Performance Charts: Memory, CPU, Battery Temp & Life, Network
Google Maps
• Parameters:
• Search Text
• Max Wait Time
www.miwtech.com/mcb/
21. Google Maps - Checkpoints
Google Maps
• Parameters:
• Search Text
• Max Wait Time
www.miwtech.com/mcb/
23. MCb Roadmap 2020
July Aug Sept Oct Nov Dec
ePTT
mcPTT Scenarios
ANT / SVT MaaP (S 20) MSP(maint)
Messaging Device Validation for IPME Chat Module
Core Scenarios, Device Page Sort, Export, Https:
Voice Core iOS Voice Scripts
Ant Script Integration
MOSA Design Building Blocks / Click and Run / Scenarios Beta Trial
Phase2 Phase3 part 1 Phase3 part 2
iOS Voice
QE 30 Scripts / month: AT&T Carrier Shelf, Mobile Security, Smart Wifi, TV, Broswer, ..
Other Scripts
Health Check 3x Daily – Auto Email
Hardware Bluetooth Controller, myMCb, MCb RF 2U
Core Enh: Scenarios, Scenario Video
27. VoWifi to VoLTE Demo
• Using MCellBlock – 2 Devices
• Primary focus on the Mobile Originator – Caller
• Initial setup – NO LTE and wifi on with wifi calling enabled
• Phone Call is made from Phone C to Phone D
• LTE is turned on
• Wifi turned off
• Verify call is still in progress
• Success!!!
Demo
Phone C Phone D
28. • WiFi – On
• Wifi Calling
• Airplane Mode –
On <NO LTE>
Steps: VoWifi → VoLTE: Setup
29. • Phone Ready
• Dialing number
• Call in progress
Steps: VoWifi → VoLTE: Make Call
• airplaneMode(on)
• wifiEnable()
• wifiCalling(on)
• makeCall(PhoneD)
30. • Turn off Airplane
mode – LTE ON
• Turn off Wifi
• Verify Call still in
progress
Steps: VoWifi → VoLTE: transfer
• airplaneMode(off)
• wifiEnable(FALSE)
• verifyCall(PhoneD)
36. THANK YOU
Jim Kinnebrew
Vice President – Sales and Product
Mobile: (817) 271-7711
16700 NE 79th St. Suite 100 Redmond, WA 98052
miwtech.com/mcb/
MCellblock:
• 5G, LTE, 4G, FirstNet, Wifi, and 3G network validation
• Android and iOS Device Testing
• Application Testing