OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Control, and Personal Care - Tom Enderes, CEO, Gatewide LLC & Prashant Viswanathan, Co-Founder, Gatewide LLC
This document discusses using OSGi technology and IP-based video surveillance for home security, access control, and personal care. It describes how IP cameras are better suited than analog solutions for integration into OSGi platforms. The connected home market for security, access control, and personal care is growing and offers opportunities for IP video surveillance integrated through OSGi. The document calls for action to make OSGi the standard for integrated connected home solutions and provides an example of an Integrated Home Security Service.
If you have workers making dust or fumes as they move fabrication from station to station, a portable dust collector can provide the needed flexible solution. Small, mobile, portable dust collectors work well with intermittent use in small spaces such as wood shops or tight production facilities.
Cómo realizar un CV diferente y conseguir el trabajo que deseasAngel Partida
Cómo realizar un CV diferente y conseguir el trabajo que deseas
Ayuda para buscar trabajo, tener mayor conocimiento de uno mismo para una búsqueda más eficaz de trabajo.
Consejos para realizar un CV que aporte algo distinto, objetivo conseguir una entrevista
Comparto experiencias que me han servido para conocerme profesionalmente y en la búsqueda de trabajo.
Experiencias que han ayudado a gente en su búsqueda de trabajo.
Las metodologías modernas son inmensas y demandantes,
el conocimiento es infinitamente grande, amplio y
dinámico, las comunicaciones y los avances tecnológicos
son cambiantes y agresivos; dándonos una metodología
de avances fascinantes que nos transportan por canales
de conocimientos, logros y realizaciones que sobrepasan
la imaginación humana.
Doctor Rafael Espada
Decano.
Presentación de MultiTrain dentro de la Gira Technet de Microsoft acerca de la Nube Híbrida y Microsoft Azure. Vemos conceptos clave y distintos escenarios de uso para los administradores de TI.
"Returning to profit" with the presentation of 2014 results, solutions to the energy dependence of water treatment plants , innovative materials in tunnels, among others.
More issues: http://acciona.sa/N4FgE
proyecto de aula del area lenguaje se construyó junto con las chicas de primero para continuar estimulando un proceso de aprendizaje mas significativo de la lectoescritura en la ied miguel angel builes, Barranquilla-Colombia finalizando con la edicion de un boletin, el cual sirvio como material para leer.
Paper over socialiteren: de moderne vorm van solliciteren!Josien Harder
Deze paper gaat over socialiteren, dé moderne vorm van solliciteren. Wil jij weten hoe dit in zijn werk gaat en hoe jij kan beginnen met socialiteren om aan je droombaan te komen? Lees dan mijn paper! Aanrader voor werkzoekenden!
Deze paper is geschreven in opdracht van mijn opleiding: Fontys Hogeschool Communicatie.
Influencer Marketing - Dave Schneider - Stukent Expert SessionStukent Inc.
Looking to work with influencers to grow your brand reach? Why not learn from an expert who is also the co-founder of an influencer marketing tool called Ninja Outreach. This Stukent Expert Session will walk you through how to find and work with influencers to effectively grow your business.
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE
Current mobile gadgets includes of rich devices (high resolution video camera, microphone, GPS, etc) which enable high quantity communication (Video conference, current location data, etc). Unfortunately, the rich devices make easy to conduct cyber espionage. For example, a high resolution video is used to read the text on a display. A GPS device is used to track the user's location ("Cerberus" and "mSpy" are famous. Japanese application named "karelog" became social issues). These devices are not used in company's office or factory and computer administrators want to prohibit these devices. Unfortunately, the devices are embedded in a mobile gadget and most of them cannot be disenabled by BIOS or EFI.
In order to In order to solve this problem, we propose a thin hypervisor called "DeviceDisEnabler (DDE)", which hides some devices from OS. DDE is a lightweight hypervisor and can be inserted to a pre-installed OS. Although the OS uses "IN" instruction to get the device information on PCI and USB (Vendor ID, Device Class, etc), the "IN" instruction is hooked by DDE and the device information is hidden if the devices is prohibited in the company.
Unfortunately, not only attackers but also employees want to bypass the DDE because they want to use the devices. In order to protect bypassing the DDE, it encrypts the disk image of the OS. It means the OS cannot be used without the help of DDE. In order to hide the encryption key, the DDE has three types of key managements (A technique gets a key from the Internet with a secure communication. A technique hides the key into a TPM chip and obtains it at a certain state of boot time only. A technique obfuscates the key into the code using Whitebox Cryptography technique).
Current implementation is based on BitVisor 1.4 and the target is a mobile gadget which has Intel CPU. I will talk about the requirements for ARM CPU based implementation.
If you have workers making dust or fumes as they move fabrication from station to station, a portable dust collector can provide the needed flexible solution. Small, mobile, portable dust collectors work well with intermittent use in small spaces such as wood shops or tight production facilities.
Cómo realizar un CV diferente y conseguir el trabajo que deseasAngel Partida
Cómo realizar un CV diferente y conseguir el trabajo que deseas
Ayuda para buscar trabajo, tener mayor conocimiento de uno mismo para una búsqueda más eficaz de trabajo.
Consejos para realizar un CV que aporte algo distinto, objetivo conseguir una entrevista
Comparto experiencias que me han servido para conocerme profesionalmente y en la búsqueda de trabajo.
Experiencias que han ayudado a gente en su búsqueda de trabajo.
Las metodologías modernas son inmensas y demandantes,
el conocimiento es infinitamente grande, amplio y
dinámico, las comunicaciones y los avances tecnológicos
son cambiantes y agresivos; dándonos una metodología
de avances fascinantes que nos transportan por canales
de conocimientos, logros y realizaciones que sobrepasan
la imaginación humana.
Doctor Rafael Espada
Decano.
Presentación de MultiTrain dentro de la Gira Technet de Microsoft acerca de la Nube Híbrida y Microsoft Azure. Vemos conceptos clave y distintos escenarios de uso para los administradores de TI.
"Returning to profit" with the presentation of 2014 results, solutions to the energy dependence of water treatment plants , innovative materials in tunnels, among others.
More issues: http://acciona.sa/N4FgE
proyecto de aula del area lenguaje se construyó junto con las chicas de primero para continuar estimulando un proceso de aprendizaje mas significativo de la lectoescritura en la ied miguel angel builes, Barranquilla-Colombia finalizando con la edicion de un boletin, el cual sirvio como material para leer.
Paper over socialiteren: de moderne vorm van solliciteren!Josien Harder
Deze paper gaat over socialiteren, dé moderne vorm van solliciteren. Wil jij weten hoe dit in zijn werk gaat en hoe jij kan beginnen met socialiteren om aan je droombaan te komen? Lees dan mijn paper! Aanrader voor werkzoekenden!
Deze paper is geschreven in opdracht van mijn opleiding: Fontys Hogeschool Communicatie.
Influencer Marketing - Dave Schneider - Stukent Expert SessionStukent Inc.
Looking to work with influencers to grow your brand reach? Why not learn from an expert who is also the co-founder of an influencer marketing tool called Ninja Outreach. This Stukent Expert Session will walk you through how to find and work with influencers to effectively grow your business.
Similar to OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Control, and Personal Care - Tom Enderes, CEO, Gatewide LLC & Prashant Viswanathan, Co-Founder, Gatewide LLC
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE
Current mobile gadgets includes of rich devices (high resolution video camera, microphone, GPS, etc) which enable high quantity communication (Video conference, current location data, etc). Unfortunately, the rich devices make easy to conduct cyber espionage. For example, a high resolution video is used to read the text on a display. A GPS device is used to track the user's location ("Cerberus" and "mSpy" are famous. Japanese application named "karelog" became social issues). These devices are not used in company's office or factory and computer administrators want to prohibit these devices. Unfortunately, the devices are embedded in a mobile gadget and most of them cannot be disenabled by BIOS or EFI.
In order to In order to solve this problem, we propose a thin hypervisor called "DeviceDisEnabler (DDE)", which hides some devices from OS. DDE is a lightweight hypervisor and can be inserted to a pre-installed OS. Although the OS uses "IN" instruction to get the device information on PCI and USB (Vendor ID, Device Class, etc), the "IN" instruction is hooked by DDE and the device information is hidden if the devices is prohibited in the company.
Unfortunately, not only attackers but also employees want to bypass the DDE because they want to use the devices. In order to protect bypassing the DDE, it encrypts the disk image of the OS. It means the OS cannot be used without the help of DDE. In order to hide the encryption key, the DDE has three types of key managements (A technique gets a key from the Internet with a secure communication. A technique hides the key into a TPM chip and obtains it at a certain state of boot time only. A technique obfuscates the key into the code using Whitebox Cryptography technique).
Current implementation is based on BitVisor 1.4 and the target is a mobile gadget which has Intel CPU. I will talk about the requirements for ARM CPU based implementation.
The WiLife Pro Video Security System is the world's first fully-integrated, turnkey, professional digital video security system. WiLife Pro seamlessly integrates WiLife-engineered components that include High-performance WiLife IP Cameras, feature-rich Windows-based Command Center software, and robust Internet remote access. Using powered Ethernet and plug-and-play camera discovery, it also offers the world's easiest set-up and most intuitive interface.
Overview of the VideoIQ prevention solution and why pattern analysis can help prevent the crime! Learn how to enhance existing surveillance systems with advanced analytics using easy to install and cost-effective multi-channel video analytic appliances.
Ruckus Wireless is a global Wi-Fi technology company. The company manufactures and markets Wi-Fi products directly to broadband services providers and WLAN systems indirectly to enterprise customers.
EBU's report on DVB and VR
By David Wood, Consultant in Technology and Innovation to the European Broadcasting Union (EBU)
at 2nd ITU-T Mini-Workshop on Immersive Live Experience (ILE) in 19 January 2017
How to Sell Collaboration with Barco ClickSharerAVe [PUBS]
Barco ClickShare - How and Why It's a Perfect Collaboration Solution. Prepared and presented by Gary Kayye
Similar to OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Control, and Personal Care - Tom Enderes, CEO, Gatewide LLC & Prashant Viswanathan, Co-Founder, Gatewide LLC (20)
Eclipse Modeling Framework and plain OSGi the easy way - Mark Hoffman (Data I...mfrancis
OSGi Community Event 2018 Presentation by Mark Hoffmann (Data In Motion)
Abstract: This talk will show you how the EMF framework can be used in pure OSGi environments other than Equinox. We will introduce you into free configurable ResourceSets and the principle of a ResourceSetFactory. This enables your application to have multiple tenants with different model visibillity. The profit of OSGi services provides a behavior where even models can come and go all the time.
We will also give you look inside, how easy it is to extend the default code generation process of EMF to generate OSGi service component that handle the model registration in an OSGi way.
OSGi Community Event 2018 Presentation by BJ Hargrave (IBM)
Abstract: Java 9 introduced the Java Platform Module System (JPMS) as a way to modularize the Java platform and it can be also be used by developers to modularize their own applications, although JPMS lack a number of important features for software running on the Java platform.
As people look to support the latest versions of the Java platform, changes introduced in Java 9 related to JPMS led to the needs for some features in the OSGi Core specification. OSGi framework implementations like Eclipse Equinox and Apache Felix and tools like Bnd were updated to support these new features.
This session will explore the Java 9+ support added to OSGi Core R7 and Bnd and help you learn how to navigate the world of Java 9+ and OSGi.
Simplify Web UX Coding using OSGi Modularity Magic - Paul Fraser (A2Z Living)mfrancis
OSGi Community Event 2018 Presentation by Paul Fraser (A2Z Living)
Abstract: This talk will demonstrate how easy it is to create great web user interfaces using the OSGi Service registry and Declarative Services.
OSGi has developed to the point that much can be achieved with much reduced code complexity. Forget all the past OSGi techniques and see how it can be done now.
A short introduction will introduce OSGi in general and even if beginners do not fully understand the finer details of the talk, they will be amazed at what can be achieved using the OSGi service registry.
Do not be frightened by the terminology, come along and experience the magic of OSGi modularity.
User interfaces do not seem to get much attention in the OSGi community, it is time for a change.
OSGi for the data centre - Connecting OSGi to Kubernetes - Frank Lyaruumfrancis
OSGi Community Event 2018 Presentation by Frank Lyaruu
Abstract: OSGi offers an excellent service discovery mechanism, it is limited to services inside the JVM. That limits us in two ways: It limits us to Java services, and it limits us to one single machine, and neither are acceptable in this day and age. Can we connect our OSGi runtime to a cluster orchestration manager like Kubernetes so our runtime can interact with the cluster and allow us to respond to changes in the cluster as dynamically as we are used to in OSGi itself. I think we can.
Notes:
I will show how to discover Kubernetes services (and their pods) in a cluster, and inject those as configuration objects into an OSGi runtime. That allows us to monitor the Kubernetes cluster and dynamically have our OSGi services respond to (Kubernetes) service changes.
In general I hope to nudge the OSGi community to be more focused on connecting to other technologies rather than trying to stay in the OSGi walled garden. A well engineered OSGi application is perfectly suited to the dynamic nature of the cloud native world, but if we can't easily integrate with other services, well, nobody will care.
Remote Management and Monitoring of Distributed OSGi Applications - Tim Verbe...mfrancis
OSGi Community Event 2018 Presentation by Tim Verbelen (imec) & Jan S. Rellermeyer (TU Delft)
Abstract: With the proliferation of cloud computing and more recently mobile and edge computing, there is a increasing demand to build flexible and robust distributed applications. The OSGi service and module technology is a key enabler for such deployment. Recent additions to the OSGi standards provide a set of services that provide interfaces for managing distributed instances of OSGi frameworks. The REST Service (added in R6 compendium) offers an easy and language-independent way to manage bundes and introspect services from outside the network. The Cluster Information specifications (added in R7 compendium) provide means for applications to manage and monitor the deployment intrinsically, building on top of the Remote Service specifications. In the Eclipse Concierge project, we have provided the reference implementations of both specifications. In this talk, we will show how the services can be used to build distributed applications that benefit from the OSGi modularity.
OSGi with Docker - a powerful way to develop Java systems - Udo Hafermann (So...mfrancis
OSGi Community Event 2018 Presentation by Udo Hafermann (Software AG)
Abstract: In this talk we will share our experiences in developing a tool chain from classes, to bundles, to containers, to systems.
OSGi and Docker come together in a compelling way where the former provides modularity "in the small" and the latter "modularity in the large". We discover how the unique characteristics of OSGi enable a smooth transition from small to large.
The resulting environment enables developers to grow distributed systems on their local machine and test them with plain JUnit at all levels of granularity - classes to systems. During development OSGi enables the tool chain to update the system without container rebuilds.
While an increase in productivity is one benefit of such an environment, an arguably more important benefit is the way it empowers developers to gain new insights.
A real world use case with OSGi R7 - Jurgen Albert (Data In Motion Consulting...mfrancis
OSGi Community Event 2018 Presentation by Jurgen Albert (Data In Motion Consulting GmbH)
Abstract: OSGi is often conceived as a tool to write efficient Java Applications for resource limited Devices or If resources are a real issue in complex applications. On the other hand Microservices became the buzzword of the cloud and is often implemented using Spring or other Programming languages. OSGi carries the concept of microservices in its core and is therefore much better suited to the task then most other approaches. This talk will show you how a service can be built with a real-worldish use case, leveraging the power of OSGi R7. It will show the combined usage of PushsStreams, the JaxRS Whiteboard, the configurator, remote deployment and a lot of the other cool things OSGi has to offer.
OSGi Feature Model - Where Art Thou - David Bosschaert (Adobe)mfrancis
OSGi Community Event 2018 Presentation by David Bosschaert (Adobe)
Abstract: OSGi lends itself well to develop extensible applications assembled from reusable modules, where a set of bundles together with a set of configurations deployed to a provisioned OSGi framework is the application.
While this works very well for the originally intended use-cases, maintaining and building large applications developed by multiple teams often requires to assemble multiple larger components for which there is limited support in OSGi as of today. This is especially true in cases where multiple groups of bundles, configuration, metadata, and other artifacts need to be combined.
In this talk we will introduce you to OSGi RFP-188, named OSGi Features, which defines the requirements on providing a solution. We'll establish a shared understanding of the problem space and how it relates to already available mechanisms in OSGi (like e.g. subsystems, deploymentadmin, startlevels, etc.) and will subsequently, review it in the context of some of the current (open source) solutions like Apache Karaf Features and Apache Sling Features and Bnd.
Migrating from PDE to Bndtools in Practice - Amit Kumar Mondal (Deutsche Tele...mfrancis
OSGi Community Event 2018 Presentation by Amit Kumar Mondal (Deutsche Telekom AG) & Jochen Hiller (Deutsche Telekom AG)
Abstract: QIVICON is an Eclipse SmartHome based solution from Deutsche Telekom AG. It utilises OSGi to provide a modular Java runtime.
Since the beginning, QIVICON leveraged Eclipse PDE with Maven & Eclipse Tycho as its build technology but over the time, the complexity increased. It became hard to get an overview and manage the runtime and build dependencies. Especially maintaining target configurations for IDE and CI/CD build, having different embedded gateways for installation increased complexity significantly.
Bndtools is the 'swiss army knife' in the context of OSGi development since it takes the nitty-gritty pains and loads off the developer's chest. And that's why we decided to avail the benefits of Bndtools.
But, many other OSGi-based projects still cannot avail the benefits as they are very tightly coupled with Eclipse PDE. Want to make a switch from your existing PDE source base to Bndtools? This talk would give you an overview to proceed towards this.
We would like to further demonstrate in this talk how to set up a Bndtools workspace from an existing PDE workspace, convert all current projects to Bnd projects and embrace the OSGi-way of developing bundles.
Since QIVICON containing more than 350 projects utilised this solution to move to a higher modularity maturity level, this talk would, therefore, outline the pros, cons and the learnings using Bndtools in such a big OSGi project for embedded development.
OSGi CDI Integration Specification - Ray Augé (Liferay)mfrancis
OSGi Community Event 2018 Presentation by Ray Augé (Liferay)
Abstract: This talk discusses the upcoming OSGi CDI Integration Specification and demonstrates common usage patterns and its component model that brings OSGi dynamics; like services and configuration, to CDI and provides for an ecosystem of CDI portable extentions.
How OSGi drives cross-sector energy management - Jörn Tümmler (SMA Solar Tech...mfrancis
OSGi Community Event 2018 Presentation by Jörn Tümmler (SMA Solar Technology)
Abstract: SMA is a leading global specialist in photovoltaic system technology with more than 3,000 SMA employees in 20 countries.
In 2015 SMA decided to develop the ennexOS platform - a cross-sector platform for holistic, intelligent energy management. An important part of this platform is the data-manager - an IoT gateway that acquires information from various energy generators, storages and loads and performs commissioning and management tasks.
This new generation of data-managers demanded for new approaches in software-architecture to:
run on a broad range of hardware platforms, and
be extendible e.g. to support different protocols for easy integration, and
to enable a broad range of applications in the energy-management field that may be customized by apps installed during runtime
After an exhaustive investigation on existing solutions, OSGi was chosen as the key technology for this new generation of devices - a quite challenging decision, because at this point there was only limited experience in Java and OSGi development in the company.
This talk will present the key factors that lead to this decision, how we very carefully build up Java and OSGi knowledge, and started with an initial design. OSGi enRoute and the support of OSGi experts helped us to accelerate our development and become familiar with OSGi - although we also had times when we were struggling because of the new technology.
The talk will demonstrate what we have reached until now and we will tell you if OSGi has kept it's promise ...
Improved developer productivity thanks to Maven and OSGi - Lukasz Dywicki (Co...mfrancis
OSGi Community Event 2018 Presentation by Lukasz Dywicki (Code-House)
Abstract: During this short presentation I will revisit existing mechanisms and approach towards OSGi and JEE development. I will show how many manual steps can be avoided and how to maintain project in effective manner. I will try to find a balance between execution environment requirements and programmer happines at same time.
I believe that OSGi and Eclipse ecosystem experience troubles gaining people from outside for few reasons. Beside overall impression of OSGi complexity there is equally old and invalid complain about quaility of developer tooling. Since invention of BND development experience can be really pleasant and independent of text editor/IDE preferences. Sadly lots of people still rely on former experiences spreading black/bad PR. I would like to clarify their point.
After this presentation attendees will learn:
How to use Maven to build OSGi projects (without Tycho).
How to automate manual tasks.
How to build custom software distributions with Maven artifacts and run it with Apache Karaf.
That OSGi development doesn't differ much from regular day-to-day usage of application servers or microservice runtimes.
This talk is intended for people who know basics of OSGi as it will show few basic technics towards better developer productivity.
It Was Twenty Years Ago Today - Building an OSGi based Smart Home System - Ch...mfrancis
OSGi Community Event 2018 Presentation by Christer Larsson (Makewave)
Abstract: OSGi was originally designed for Smart Homes and Residential Gateways almost 20 years ago.
This talk will present how the OSGi specifications have evolved over the years, and how you today, in 2018, design an OSGi based Smart Home System.
A real world use case of a Swedish Smart Home start-up company will be used to illustrate different design principles and how OSGi remains as relevant today as it was when it started.
Popular patterns revisited on OSGi - Christian Schneider (Adobe)mfrancis
OSGi Community Event 2018 Presentation by Christian Schneider (Adobe)
Abstract: We will look at common cloud and design patterns and see how the special properties of the OSGi environment allows us to rethink these patterns. The talk shows some well known patterns like the service registry and the whiteboard but also some unique patterns like out of band circuit breaker or graceful degregation.
The patterns are shown with some examples using declarative services(DS). So some basic OSGi and DS knowledge is of advantage but not required.
For OSGi beginners the well established OSGi patterns will help getting started the right way. Experienced OSGi developers will find some new patterns to think about. Cloud or enterprise developers will get a new approach to some patterns they are used to which hopefully inspires them to take another look at the current state of OSGi.
Integrating SLF4J and the new OSGi LogService 1.4 - BJ Hargrave (IBM)mfrancis
OSGi Community Event 2018 Presentation by BJ Hargrave (IBM)
Abstract: OSGi Compendium R7 provides a major update to the OSGi LogService specification. A new logging API is added which supports logging levels and dynamic logging administration. A new Push Stream-based means of receiving log entries is also added. But it is quite often the case you need to use other code such as open source projects which are using slf4j for their logging API. This session will explore the new OSGi LogService changes and how you can integrate code using both slf4j logging and OSGi LogService logging.
OSG(a)i: because AI needs a runtime - Tim Verbelen (imec)mfrancis
OSGi Community Event 2018 Presentation by Tim Verbelen (imec)
Abstract: Nowadays AI is reaching new heights on the hype cycle, especially due to recent advances in deep learning techniques. A lot of deep learning frameworks exist for creating and training deep neural networks, the most popular ones being PyTorch and TensorFlow. However, how to integrate, deploy and manage these neural networks in complex software systems is often overlooked. In this talk we show how OSGi can be used as a modular runtime for deep learning models. We embed those models inside OSGi bundles, and use the extender pattern to make these available as OSGi services. You can then use your favorite OSGi specs such as DS and PushStreams to integrate these into your application.
Flying to Jupiter with OSGi - Tony Walsh (ESA) & Hristo Indzhov (Telespazio V...mfrancis
OSGi Community Event 2018 Presentation by Tony Walsh (ESA) & Hristo Indzhov (Telespazio Vega)
Abstract: The European Space Operations Centre (ESOC) is the main operations center for the European Space Agency (ESA), operating a number of earth observation and scientific missions. Monitoring and control functions needed by spacecraft operators are provided by software systems which are reused across missions, but tailored and extended for mission specific needs. The current generation of monitoring and control systems are becoming obsolete and a European wide initiative called the European Ground Systems Common Core (EGS-CC) (http://www.egscc.esa.int) has been started to develop the next generation.
This talk will explain why OSGi was chosen and how it is used in the development of next generation of monitoring and control software. It will describe how OSGi provides the necessary framework that enables the software to be extended for the different space systems it is expected to support. The overall software architecture will be discussed, some of the challenges faced and the benefits gained by using OSGi. The first target mission for the system is JUICE (http://sci.esa.int/juice) which will explore the moons of Jupiter and which is scheduled for launch in 2022.
MicroProfile, OSGi was meant for this - Ray Auge (Liferay)mfrancis
OSGi Community Event 2018 Presentation by Ray Augé (Liferay)
Abstract: The craze is fully on. The past couple of years have seem micro services grow from next _flava_ to fully consuming of the software industry. The Eclipse micorprofile.io project is tackling the issue putting common usage patterns together over a foundation of CDI. What better assembly driver is there than OSGi to put it all together. This talk will demonstrate building your own MicroProfile using OSGi and the OSGi enRoute packaging model.
Prototyping IoT systems with a hybrid OSGi & Node-RED platform - Bruce Jackso...mfrancis
OSGi Community Event 2018 Presentation by Bruce Jackson (Myriad)
Abstract: Node-RED is often used as a protyping tool for IoT systems. However, there are also a large number of OSGi components that have already been built to interface to devices, sensors and systems. In this talk I will show how two completely different runtime environments (OSGi and Node-RED) can be combined into a single platform for prototyping (and more) combining the strengths of both languages and systems.
Being able to quickly and simply prototype IoT application is extremely useful, and to this end many people have adopted Node-Red, a Node.js based runtime with extensive support for plugins to interface to various IoT hardware and protocols. However, this requires these services/protocols to be developed in Javascript, and there is already a significant body of code developed in Java/OSGi that it would be desirable to re-use.
The talk will explain how it is possible to:
Create and manage a Node-Red runtime from within an OSGi bundle
Share OSGi components and object into the Node-Red runtime
Interact and build Node-Red flows that exchange data and call methods between Node.js and OSGi
This is obviously useful for the original purpose: prototyping IoT systems, but also demonstrates some interesting techniques for bridging between different languages and runtimes.
How to connect your OSGi application - Dirk Fauth (Bosch)mfrancis
OSGi Community Event 2018 Presentation by Dirk Fauth (Bosch)
Abstract: In todays connected world the requirement to connect applications across network boundaries has become a common requirement. With OSGi there are several ways to accomplish this, as there are different specifications to achieve this. In this talk we will look at some of these specifications to show what options there are and which might fit your requirements. Starting from an architecture that makes use of the HTTP Whiteboard pattern, over Remote Services to finally showing the usage of the JAX-RS Whiteboard specification introduced with R7. We will show the general usage of these specifications and explaining the advantages and disadvantages of each solution.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Essentials of Automations: Optimizing FME Workflows with Parameters
OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Control, and Personal Care - Tom Enderes, CEO, Gatewide LLC & Prashant Viswanathan, Co-Founder, Gatewide LLC
1.
2. OSGi Technology
and
IP-Based Video
Surveillance
in Home Security,
Access Control and
Personal Care
Tom Enderes, Cofounder & CTO, Gatewide LLCTom Enderes, Cofounder & CTO, Gatewide LLC
Prashant Viswanathan, Cofounder, Gatewide LLCPrashant Viswanathan, Cofounder, Gatewide LLC
3. Introduction to Video SurveillanceIntroduction to Video Surveillance
•• Traditional Video Surveillance:Traditional Video Surveillance:
–– CCTV and 24/7 recording on tapes.CCTV and 24/7 recording on tapes.
•• PresentPresent
–– CCTV and Digital Video Recorders (DVRs)CCTV and Digital Video Recorders (DVRs)
–– Broadband boomBroadband boom
Remote video surveillance over the InternetRemote video surveillance over the Internet
PC
Internet
DVR
CCTV camera
CCTV camera
CCTV camera
4. IPIP--Based Video SurveillanceBased Video Surveillance
•• Present and Future:Present and Future:
–– EndEnd--toto--end IP: IP Cameras (AKA Network Cameras) are IPend IP: IP Cameras (AKA Network Cameras) are IP
addressableaddressable
•• MarketMarket [JPF 2005][JPF 2005]
–– Global Network Video Market $790 M by 2005Global Network Video Market $790 M by 2005
–– More than half of security cameras will be IPMore than half of security cameras will be IP--Based by 2007Based by 2007
•• IPIP--CamerasCameras
–– Cameras have become cheaperCameras have become cheaper
–– Flexible (Local and remote surveillance)Flexible (Local and remote surveillance)
–– ScalableScalable
–– BroadbandBroadband
–– IntegrationIntegration
–– Now equal or better features than analog camerasNow equal or better features than analog cameras……
6. IP Cameras and The OSGi PlatformIP Cameras and The OSGi Platform
•• IP cameras moreIP cameras more
suitable forsuitable for OSGsOSGs thanthan
analog solutions:analog solutions:
No hardwareNo hardware
modifications!modifications!
No new networks inNo new networks in
the house! Driversthe house! Drivers
•• IP Camera API andIP Camera API and
Drivers are availableDrivers are available
now!now!
IP Camera API
Camera Driver
IP Camera IP Camera
8. What is Home Security ?What is Home Security ?
•• Traditional Security Systems for SOHO:Traditional Security Systems for SOHO:
–– Intrusion detection & fire alarmsIntrusion detection & fire alarms
–– Simple and inexpensive technology:Simple and inexpensive technology:
•• Panels, sensors wired to one central controllerPanels, sensors wired to one central controller
•• Silent alarm (phone line)Silent alarm (phone line)
•• Current Developments:Current Developments:
–– Integration of access controlIntegration of access control
–– Adaptation of new technologies (Web, Home Network)Adaptation of new technologies (Web, Home Network)
•• Business Entities:Business Entities:
–– EndEnd--customerscustomers
–– InstallersInstallers
–– Monitoring Companies / Central Station OperatorsMonitoring Companies / Central Station Operators
–– ManufacturersManufacturers
9. Home Security MarketHome Security Market
•• Mature Market!Mature Market!
Worldwide security equipment market was $49B in 2003,Worldwide security equipment market was $49B in 2003,
expected to grow to $73 billion by 2008expected to grow to $73 billion by 2008 [SSN, 02/2005].[SSN, 02/2005].
•• Players and sales channels are well establishedPlayers and sales channels are well established
•• Example deal in Northern California, USA:Example deal in Northern California, USA:
–– EndEnd--useruser
•• Wants to install a security system for his 3 bedroom houseWants to install a security system for his 3 bedroom house
•• Is referred to a local installer to buy his system.Is referred to a local installer to buy his system.
–– InstallerInstaller
•• buys equipment from manufacturers or distributorsbuys equipment from manufacturers or distributors
•• sells equipment and installation for approx $900 (3 bedroom houssells equipment and installation for approx $900 (3 bedroom house).e).
•• sells (or resells (or re--sells) monitoring: $22 / month for at least one year.sells) monitoring: $22 / month for at least one year.
10. Home Security: Business OpportunityHome Security: Business Opportunity
•• Problem: Silent Alarms ==Problem: Silent Alarms == False Alarms!False Alarms!
Solution: Add visual verification (video surveillance) service.Solution: Add visual verification (video surveillance) service.
•• Problem: Adding video surveillance service.Problem: Adding video surveillance service.
IP Cameras?IP Cameras?
Not integrated to security system.Not integrated to security system.
Too many products to install and configure.Too many products to install and configure.
Extension module?Extension module?
Expensive hardware. Dedicated wiring.Expensive hardware. Dedicated wiring.
Solution:Solution: OSGi!OSGi!
11. Access Control and Video SurveillanceAccess Control and Video Surveillance
•• Access Control:Access Control:
–– Enable only authorized staff access to certain facilities / resoEnable only authorized staff access to certain facilities / resources (physical /urces (physical /
logical).logical).
–– Tracking and logging of staff.Tracking and logging of staff.
–– Technology: PIN, Magnetic Card, Proximity Card, Smart CardTechnology: PIN, Magnetic Card, Proximity Card, Smart Card
•• Current trends:Current trends:
–– CheaperCheaper more attractive for SOHOmore attractive for SOHO
–– Change of technology: Biometrics, Cell PhoneChange of technology: Biometrics, Cell Phone
–– Integration into security system (e.g. enable access to person AIntegration into security system (e.g. enable access to person AND disableND disable
alarm)alarm)
•• Access control market data (US):Access control market data (US):
–– $1.6 B 2003$1.6 B 2003 $3.4 B 2008$3.4 B 2008 [SSN 10/2004][SSN 10/2004]
•• Business Opportunity : Visual LoggingBusiness Opportunity : Visual Logging
–– Take short video with timestamp of everyone that isTake short video with timestamp of everyone that is
•• Entering your home (Entering your home (““Have my children come home?Have my children come home?””))
•• Entering your property (Entering your property (““Who scratched my parked car?Who scratched my parked car?””))
12. Personal Care and Video SurveillancePersonal Care and Video Surveillance
•• Child Care:Child Care:
–– Products:Products:
•• Audio and audio/visual monitors COTS : $50Audio and audio/visual monitors COTS : $50 -- $200$200
–– Issues:Issues:
•• Emergency events can still be missed, as continuous monitoring dEmergency events can still be missed, as continuous monitoring decreasesecreases
attention.attention.
–– Opportunity:Opportunity:
•• Use of audio / video / biometric technology to create alerts.Use of audio / video / biometric technology to create alerts.
•• Care for the elderlyCare for the elderly
–– Products and ServicesProducts and Services
•• Emergency pendant and dialer unitEmergency pendant and dialer unit
•• Central care operator $22 / month.Central care operator $22 / month.
–– Issues:Issues:
•• Person might be incapable of even pressing the pendant.Person might be incapable of even pressing the pendant.
–– Opportunity:Opportunity:
•• Video surveillance with image processingVideo surveillance with image processing
to detect emergency situations!to detect emergency situations!
13. Connected Home Market Segments: SummaryConnected Home Market Segments: Summary
•• Video surveillance is on the rise in variousVideo surveillance is on the rise in various
connected home market segmentsconnected home market segments
•• IPIP--based video surveillance is growing at a fasterbased video surveillance is growing at a faster
rate than the CCTVrate than the CCTV--based video surveillance.based video surveillance.
•• IPIP--based video surveillance can be integrated intobased video surveillance can be integrated into
OSGi Apps today:OSGi Apps today:
–– Open Source API:Open Source API: http://iphttp://ip--cameracamera--api.sourceforge.netapi.sourceforge.net//
–– Certified Drivers for Axis and Sony Cameras availableCertified Drivers for Axis and Sony Cameras available
from Gatewide LLC.from Gatewide LLC.
14. Connected Home Markets: OSGiConnected Home Markets: OSGi
•• OSGi is currently not a major player yet.OSGi is currently not a major player yet.
•• Why should it become a major player?Why should it become a major player?
–– VideoVideo Can be done with Linux, no reason to switchCan be done with Linux, no reason to switch
to OSGi.to OSGi.
–– Automatic Software UpdateAutomatic Software Update Is being done, noIs being done, no
reason to switchreason to switch
HoweverHowever……
15. OSGiOSGi’’ss Big OpportunityBig Opportunity
.. is Integration!!!.. is Integration!!!
•• ProblemProblem ““product hellproduct hell””::
–– residential gateway, home entertainment system,residential gateway, home entertainment system,
home security system, access control, surveillance,home security system, access control, surveillance,
etc.etc.
•• Solution:Solution:
–– Integrate functionality of various products and serviceIntegrate functionality of various products and service
on one hardware platform accessed overon one hardware platform accessed over one GUIone GUI!!
•• OSGi is the technology to deliver this!OSGi is the technology to deliver this!
16. Call for ActionCall for Action
.. to make OSGi technology the de.. to make OSGi technology the de--factofacto--standard forstandard for
integrated solutions!integrated solutions!
–– Act fast!Act fast!
–– Use OSGi to provide a service which hasUse OSGi to provide a service which has
•• better service features and quality.better service features and quality.
•• approximately the same cost as existing service.approximately the same cost as existing service.
Example: Integrated Home Security Service (IHSS)Example: Integrated Home Security Service (IHSS)
–– Components and FeaturesComponents and Features
•• Integrated Home Gateway (IHG): hardware, OSGi, applicationIntegrated Home Gateway (IHG): hardware, OSGi, application
•• Alarm sensors (motion, glass break, fire)Alarm sensors (motion, glass break, fire)
•• IP camerasIP cameras
•• For EndFor End--user: Remote surveillance and ease of useuser: Remote surveillance and ease of use
•• For installer: Easy installation / configuration of sensors / caFor installer: Easy installation / configuration of sensors / cameras.meras.
•• For Monitoring Company: Remote management / visual alarm verificFor Monitoring Company: Remote management / visual alarm verificationation
–– HSG is OSGi based.HSG is OSGi based.
IHSS can add functionality during deployment!IHSS can add functionality during deployment!
17. Call for Action (2)Call for Action (2)
•• IHSS: Special technical issues for adding functionality:IHSS: Special technical issues for adding functionality:
–– Development / Test / Verification.Development / Test / Verification.
–– Integration into one GUIIntegration into one GUI
•• IHSS: Business Issues:IHSS: Business Issues:
–– Must include existing security installers, sales and distributioMust include existing security installers, sales and distribution channelsn channels
need to partner with a big security manufacturer to produce theneed to partner with a big security manufacturer to produce the IHG!IHG!
–– Who is the OSGI Operator?Who is the OSGI Operator?
Monitoring Company:Monitoring Company:
–– Pro: Only party to receive recurring revenue. Is interested in mPro: Only party to receive recurring revenue. Is interested in managing the IHG.anaging the IHG.
–– Contra: Does not have knowContra: Does not have know--how to operatehow to operate OSGsOSGs. Would not know about non. Would not know about non--
security services.security services.
–– How can we get other companies from various segments to developHow can we get other companies from various segments to develop servicesservices
for the IHG?for the IHG?
•• Show the business potential.Show the business potential.
•• Solve theSolve the ““one GUIone GUI”” issue.issue.
•• Provide access to the technology (Evaluation Kit)Provide access to the technology (Evaluation Kit)
18. Thank You !Thank You !
Q & AQ & A
Tom Enderes,Tom Enderes, tom@gatewide.comtom@gatewide.com
Prashant Viswanathan,Prashant Viswanathan, vp@gatewide.comvp@gatewide.com