This document discusses the OSWALD open hardware project at Oregon State University from 2008-2011. It provides background on the project's inception, an overview of the OSWALD hardware and custom Radix software, lessons learned around in-house development, budgeting, and a small team, and future prospects for educational usage.
Linaro's mission is to make it easier and quicker for ARM partners to deploy the latest technology into optimized Linux based products. This presentation covers the basic work from Linaro Android platform team.
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Toshiharu Harada, Ph.D
TOMOYO Linux is a MAC (Mandatory Access Control) implementation which gives support to protect Linux systems as well as to learn, understand and analyze system behavior. Being lightweight, it results suitable for embedded systems too. This tutorial aims to show in a practical way how to make the best use of TOMOYO Linux potentials in order to study and protect embedded Linux systems, taking Android as a specific study case. Though Android is amazingly expanding its target to various kinds of devices, it was designed mainly for mobile phones. Then, unlike other embedded operating systems, it presents some peculiar characteristics which require a particular attention to apply MAC effectively. The session is directed to those who want to learn how to use TOMOYO Linux, to managers or developers interested in security concerning embedded Linux and Android, and even to anyone just wishing to take a closer glance at Android internals.
The lecture by Bjoern Doebel for Summer Systems School'12.
L4Linux, DDEkit, POSIX compatabls
SSS'12 - Education event, organized by ksys labs[1] in 2012, for students interested in system software development and information security.
1. http://ksyslabs.org/
Linaro's mission is to make it easier and quicker for ARM partners to deploy the latest technology into optimized Linux based products. This presentation covers the basic work from Linaro Android platform team.
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Toshiharu Harada, Ph.D
TOMOYO Linux is a MAC (Mandatory Access Control) implementation which gives support to protect Linux systems as well as to learn, understand and analyze system behavior. Being lightweight, it results suitable for embedded systems too. This tutorial aims to show in a practical way how to make the best use of TOMOYO Linux potentials in order to study and protect embedded Linux systems, taking Android as a specific study case. Though Android is amazingly expanding its target to various kinds of devices, it was designed mainly for mobile phones. Then, unlike other embedded operating systems, it presents some peculiar characteristics which require a particular attention to apply MAC effectively. The session is directed to those who want to learn how to use TOMOYO Linux, to managers or developers interested in security concerning embedded Linux and Android, and even to anyone just wishing to take a closer glance at Android internals.
The lecture by Bjoern Doebel for Summer Systems School'12.
L4Linux, DDEkit, POSIX compatabls
SSS'12 - Education event, organized by ksys labs[1] in 2012, for students interested in system software development and information security.
1. http://ksyslabs.org/
The lecture by Bjoern Doebel for Summer Systems School'12.
IPC mechanisms and memory management in Fiasco.OC and L4Re
SSS'12 - Education event, organized by ksys labs[1] in 2012, for students interested in system software development and information security.
1. http://ksyslabs.org/
Presentation at Android Builders Summit 2012.
Based on the experience of working with ODM companies and SoC vendors, this session would discuss how to figure out the performance hotspot of certain Android devices and then improve in various areas including graphics and boot time. This session consists of the detailed components which seem to be independent from each other in traditional view. However, the situation changes a lot in Android system view since everything is coupled in a mass. Three frequently mentioned items in Android engineering are selected as the entry points: 2D/3D graphics, runtime, and boot time. Audience: Developers who work on Android system integration and platform enablement.
The promise of the IoT won’t be fulfilled until integrated
software platforms are available that allow software
developers to develop these devices efficiently and in
the most cost-effective manner possible.
This presentation introduces F9 microkernel, new open source
implementation built from scratch, which deploys
modern kernel techniques dedicated to deeply
embedded devices.
Staying ahead of the multi-core revolution with CDT debugmarckhouzam
Staying ahead of the multi-core revolution with CDT debug
The use of multi-core chips is now a reality for computer systems. With such technology however, software is becoming more complex, and problems exceedingly difficult to debug. The C/C++ Development Tooling (CDT) already provides advanced debugging features such as non-stop, multi-process, reversible debugging, tracepoints and more. In addition to those features, the CDT community has undertaken the implementation of a rich set of multi-core debugging features which will be available with GDB towards a Linux target and will also allow the integration of proprietary debuggers and targets.
This presentation will describe the efforts of the CDT's Multi-Core Debugging Work Group, where different companies and community members are joining forces to make multi-core debugging a reality for the CDT and Eclipse. We will cover the goals that have been established, the features that have been implemented or are actively being worked on, and the road ahead. We plan on showing many of the features that we aim for with actual demos, including the displaying of cores in a debug session, the dynamic grouping of cores/processes/threads, the pinning and cloning of debugging views, and a configurable layout of the debugging elements.
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)The Linux Foundation
The talk covers several technologies and best practices to managing Security Vulnerabilities, which are told as interconnected stories.
We will cover how the largest clouds in production came together through the Xen Project to develop an industry leading open source security process to manage software vulnerabilities effectively, how those vendors collaborated to stop cloud reboots through Live Patching and how security and CPU vendors collaborated to protect against 0-day vulnerabilities and advanced persistent threats using hardware assisted virtual machine introspection. Finally, we will also provide information how you can use tools such as CVE Details to assess how secure an open source technology is relative to another, such that you don't have to rely solely on security stories from the technology press.
The talk will cover how these technologies work, the limitations and challenges which still remain and how they are used in practice using examples of Xen Project based products and installations. We will also cover how these technologies impact software vulnerability management processes and system administrators.
(Embedded Linux Conference Europe 2014)
Linux uses many kind of embedded products. The products include not only consumer electronics but also control systems such as programmable logic controllers. There are many type of infrastructure systems and each system has different technical requirements. The requirements include not only real-time performance but also reliability-related functions. The infrastructure systems have to meet all the requirements. This presentation gives a summary of our study and development to adapt the Linux to infrastructure systems. Then we discuss the direction of future development. Please note, this presentation doesn't focus on a specific product.
Learn about Linux on System z Update: Current & Future Linux on System z Technology, Live Virtual Class, Wednesday, July 28. 2010. For more information, visit http://ibm.co/PNo9Cb.
The lecture by Bjoern Doebel for Summer Systems School'12.
Brief introduction to microkernels illustrated by examples (Fiasco.OC and L4Re).
SSS'12 - Education event, organized by ksys labs[1] in 2012, for students interested in system software development and information security.
1. http://ksyslabs.org/
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
Safety certification is one of the essential requirements for software to be used in highly regulated industries. The Xen Project, a secure and stable hypervisor that is used in many different markets, has been exploring the feasibility of building safety certified products on top of Xen for a year, looking at key aspects of its code base and development practices.
In this session, we will lay out the motivation and challenges of making safety certification achievable in open source and the Xen Project. We will outline the process the project has followed thus far and highlight lessons learned along the way. The talk will cover technical enablers, necessary process and tooling changes and community challenges offering an in-depth review of how Xen Project is approaching this exciting and and challenging goal.
Many projects start out with the intention of staying single license FOSS projects. As your project grows, reality hits: some components or files may need to use different licenses than originally anticipated. There are many reasons why this can happen: you may need to interface with projects of another license, you may want to import code from other projects or your developers may not understand the subtleties of the licenses in use. Besides the obvious challenges of managing mixed license FOSS projects, such as license compatibility and tracking what licenses you use, you are running the risk of exposing your project to unintended consequences.
This talk will explore unintended consequences, risks and best practices using some examples from the recent history of the Xen Project. In particular we will cover:
Refactoring can lead to licensing changes: best practices and unintended consequences when importing code from elsewhere.
Making code archeology easy from a licensing perspective and why it is important.
A worked example of a license change of a key component: process, pain points, their causes and how they could have been avoided
The perils of LGPL/GPL vX (or Later): the unintended consequences of not providing pre-defined copyright headers in your source base
We will conclude with a summary of lessons and best practices from both the Xen Project and a quick overview of how usage of SPDX and other tools may help you.
Profiling Multicore Systems to Maximize Core Utilization mentoresd
Profiling Multicore Systems to Maximize Core Utilization – Colin Walls
Underutilization of cores in a multicore system can be considered a bug. As your system incorporates more cores, you need to make sure that all the cores are being utilized fully. Un-expected inter-actions between processes, the operating system, and resources can prevent cores from delivering peak performance. In this session explore how to profile what each core is doing, which processes are running on each core, and understand where core utilization falls below optimum values.
Slides from May 27th, 2011 webinar on CloudBees' Pro version of Jenkins that has folders to handle large number of jobs, Role-based access control plugin, VMWare auto-scaling and others.
This paper describes return of experiences about using Linux technologies for industrial software developments. It gives feedback about embedded and real time usages of Linux.
(1) Pick up one Android phone and discover its internals
(2) Learn how to select the "weapons" to fight with
Android system facilities
(3) Skipping Java parts, we focus on the native area:
dynamic linking, processes, debugger, memory
layout, IPC, and interactions with frameworks.
(4) It is not comprehensive to familarize Android. The
goal is to utilize Android platforms, which are the
popular and powerful development devices to us.
The lecture by Bjoern Doebel for Summer Systems School'12.
IPC mechanisms and memory management in Fiasco.OC and L4Re
SSS'12 - Education event, organized by ksys labs[1] in 2012, for students interested in system software development and information security.
1. http://ksyslabs.org/
Presentation at Android Builders Summit 2012.
Based on the experience of working with ODM companies and SoC vendors, this session would discuss how to figure out the performance hotspot of certain Android devices and then improve in various areas including graphics and boot time. This session consists of the detailed components which seem to be independent from each other in traditional view. However, the situation changes a lot in Android system view since everything is coupled in a mass. Three frequently mentioned items in Android engineering are selected as the entry points: 2D/3D graphics, runtime, and boot time. Audience: Developers who work on Android system integration and platform enablement.
The promise of the IoT won’t be fulfilled until integrated
software platforms are available that allow software
developers to develop these devices efficiently and in
the most cost-effective manner possible.
This presentation introduces F9 microkernel, new open source
implementation built from scratch, which deploys
modern kernel techniques dedicated to deeply
embedded devices.
Staying ahead of the multi-core revolution with CDT debugmarckhouzam
Staying ahead of the multi-core revolution with CDT debug
The use of multi-core chips is now a reality for computer systems. With such technology however, software is becoming more complex, and problems exceedingly difficult to debug. The C/C++ Development Tooling (CDT) already provides advanced debugging features such as non-stop, multi-process, reversible debugging, tracepoints and more. In addition to those features, the CDT community has undertaken the implementation of a rich set of multi-core debugging features which will be available with GDB towards a Linux target and will also allow the integration of proprietary debuggers and targets.
This presentation will describe the efforts of the CDT's Multi-Core Debugging Work Group, where different companies and community members are joining forces to make multi-core debugging a reality for the CDT and Eclipse. We will cover the goals that have been established, the features that have been implemented or are actively being worked on, and the road ahead. We plan on showing many of the features that we aim for with actual demos, including the displaying of cores in a debug session, the dynamic grouping of cores/processes/threads, the pinning and cloning of debugging views, and a configurable layout of the debugging elements.
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)The Linux Foundation
The talk covers several technologies and best practices to managing Security Vulnerabilities, which are told as interconnected stories.
We will cover how the largest clouds in production came together through the Xen Project to develop an industry leading open source security process to manage software vulnerabilities effectively, how those vendors collaborated to stop cloud reboots through Live Patching and how security and CPU vendors collaborated to protect against 0-day vulnerabilities and advanced persistent threats using hardware assisted virtual machine introspection. Finally, we will also provide information how you can use tools such as CVE Details to assess how secure an open source technology is relative to another, such that you don't have to rely solely on security stories from the technology press.
The talk will cover how these technologies work, the limitations and challenges which still remain and how they are used in practice using examples of Xen Project based products and installations. We will also cover how these technologies impact software vulnerability management processes and system administrators.
(Embedded Linux Conference Europe 2014)
Linux uses many kind of embedded products. The products include not only consumer electronics but also control systems such as programmable logic controllers. There are many type of infrastructure systems and each system has different technical requirements. The requirements include not only real-time performance but also reliability-related functions. The infrastructure systems have to meet all the requirements. This presentation gives a summary of our study and development to adapt the Linux to infrastructure systems. Then we discuss the direction of future development. Please note, this presentation doesn't focus on a specific product.
Learn about Linux on System z Update: Current & Future Linux on System z Technology, Live Virtual Class, Wednesday, July 28. 2010. For more information, visit http://ibm.co/PNo9Cb.
The lecture by Bjoern Doebel for Summer Systems School'12.
Brief introduction to microkernels illustrated by examples (Fiasco.OC and L4Re).
SSS'12 - Education event, organized by ksys labs[1] in 2012, for students interested in system software development and information security.
1. http://ksyslabs.org/
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
Safety certification is one of the essential requirements for software to be used in highly regulated industries. The Xen Project, a secure and stable hypervisor that is used in many different markets, has been exploring the feasibility of building safety certified products on top of Xen for a year, looking at key aspects of its code base and development practices.
In this session, we will lay out the motivation and challenges of making safety certification achievable in open source and the Xen Project. We will outline the process the project has followed thus far and highlight lessons learned along the way. The talk will cover technical enablers, necessary process and tooling changes and community challenges offering an in-depth review of how Xen Project is approaching this exciting and and challenging goal.
Many projects start out with the intention of staying single license FOSS projects. As your project grows, reality hits: some components or files may need to use different licenses than originally anticipated. There are many reasons why this can happen: you may need to interface with projects of another license, you may want to import code from other projects or your developers may not understand the subtleties of the licenses in use. Besides the obvious challenges of managing mixed license FOSS projects, such as license compatibility and tracking what licenses you use, you are running the risk of exposing your project to unintended consequences.
This talk will explore unintended consequences, risks and best practices using some examples from the recent history of the Xen Project. In particular we will cover:
Refactoring can lead to licensing changes: best practices and unintended consequences when importing code from elsewhere.
Making code archeology easy from a licensing perspective and why it is important.
A worked example of a license change of a key component: process, pain points, their causes and how they could have been avoided
The perils of LGPL/GPL vX (or Later): the unintended consequences of not providing pre-defined copyright headers in your source base
We will conclude with a summary of lessons and best practices from both the Xen Project and a quick overview of how usage of SPDX and other tools may help you.
Profiling Multicore Systems to Maximize Core Utilization mentoresd
Profiling Multicore Systems to Maximize Core Utilization – Colin Walls
Underutilization of cores in a multicore system can be considered a bug. As your system incorporates more cores, you need to make sure that all the cores are being utilized fully. Un-expected inter-actions between processes, the operating system, and resources can prevent cores from delivering peak performance. In this session explore how to profile what each core is doing, which processes are running on each core, and understand where core utilization falls below optimum values.
Slides from May 27th, 2011 webinar on CloudBees' Pro version of Jenkins that has folders to handle large number of jobs, Role-based access control plugin, VMWare auto-scaling and others.
This paper describes return of experiences about using Linux technologies for industrial software developments. It gives feedback about embedded and real time usages of Linux.
(1) Pick up one Android phone and discover its internals
(2) Learn how to select the "weapons" to fight with
Android system facilities
(3) Skipping Java parts, we focus on the native area:
dynamic linking, processes, debugger, memory
layout, IPC, and interactions with frameworks.
(4) It is not comprehensive to familarize Android. The
goal is to utilize Android platforms, which are the
popular and powerful development devices to us.
A talk listing few main shortcomings of Docker, showing potential however questionable remedies, to finally introduce Alpine Linux - biggest revolution in Docker of recent.
Following on that rabbit a bit deeper down its hole, we introduce Unikernels - the next big thing in cloud, embedded, big data and scientific computing... well at least Docker is betting on it too.
Extending DevOps to Big Data Applications with KubernetesNicola Ferraro
DevOps, continuous delivery and modern architectural trends can incredibly speed up the software development process. Big Data applications cannot be an exception and need to keep the same pace.
Eclispe daytoulouse combining the power of eclipse with android_fr_1024_768_s...Mathias Seguy
Cette présentation a été donnée à l'Eclipse Day Toulouse 2012 par Android2EE - Mathias Seguy (1/2h).
L’objectif est de présenter l'utilisation du plugin Android pour eclipse, en particulier la Vue DDMS. Cette présentation se finit par la mise en place de la chasse d'une fuite mémoire dans un programme Android avec l'utilisation du Heap dump et du plugin MAT d'eclipse (Memory analysis Tool).
Cette présentation est une présentation d’Android2EE, entreprise spécialisée dans l’expertise, le consulting et la formation Android. Vous souhaitez apprendre la programmation Android, Android2EE vous accompagne au-travers ses EBooks ou ses formations.
Laissez moi vous raconter mon histoire concernant cette entreprise. En 2010, je me suis penché sur la technologie Android, j’ai écrit trois EBooks sur l’art de la programmation Android (disponible sur Android2EE). J’ai quitté ma précédente entreprise et j’ai créé l’entreprise Android2EE (Android To Enterprise Edition) dont l’objectif est la formation, l’expertise et le consulting Android. J’ai quelques contrats en tant que consultant et aussi en tant que formateur. J’ai monté un ensemble de formations Android pour les entreprises:
Formation Initiale : Devenir autonome (3j).
Formation Approfondissement (2j).
Formation Spécificité Tablette et Graphisme(2j).
Formation Applications complexes (2j).
Formation chef de projet - responsable technique (1j).
Formation Mutlimédia (2j).
Formation sur mesure (2 à 3j).
Je pratique ces formations en donnant des cours dans les universités et les écoles d’ingénieurs de Toulouse ainsi que dans de grandes conférences Java:
CESI-EXIA, EPITECH, Sup-Info, IUP ISI, InfoSup, IUP SI, IUP ISI, IngeSup, INSA
Et bien sûr: Devoxx France (LA conférence Java française de 2012), Mercredi 18 Avril 2012,
Et
JCertif Afrique 2012 (LA conférence Java du continent Africain) Septembre 2012 Conférence et Cours
Enfin, j’ai investi l’espace numérique, voici quelques uns des ces sites:
http://www.android2ee.com/
http://mathias-seguy.developpez.com/
http://blog.developpez.com/android2ee-mathias-seguy/
http://android2ee.blogspot.com/
La critique de mon livre « Android A Complete course » par developpez.com (dont je ne suis pas peu fier, quand même):
http://android.developpez.com/livres/#L9791090388000
J’ai des articles sur Developpez.com concernant Android.
Ah oui, j’oubliais, mon cv se trouve ici (si jamais) : http://mathias-seguy.developpez.com/MathiasSeguyCV201106/
Docker is one of the most interesting and promising paradigm shifts of the last years. In this talk, I will introduce Docker shortly and present universal lessons learned after two years of practical use. It becomes clear that not only source code needs to be refactored, but also infrastructure, processes and people's mindsets. Once embraced, Docker allows for faster ramp-up times and is an enabler for modern software development.
The Nuxeo Way: leveraging open source to build a world-class ECM platformNuxeo
How can one create and deliver enterprise-class software, worth tens of years of R&D, with minimal capital investment? Open source can help, as well as the right context and ecosystem. This first talk will highlight the experience gained in the 8 first years of Nuxeo, and how they were applied to the latest iteration of the Nuxeo Platform.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Free Complete Python - A step towards Data Science
OSWALD: Lessons from and for the Open Hardware Movement
1. Background
Lessons Learned
Future prospects
Linux Plumbers Conference 2011
OSWALD: Lessons from and for the Open Hardware Movement
Tim Harder
OSU Open Source Lab
September 9, 2011
Tim Harder Linux Plumbers Conference 2011
2. Project history
Background
Hardware
Lessons Learned
Software
Future prospects
Educational usage
Inception of the OSWALD and the project’s timeline
Concepts/ideas leading to the project
OSU Platforms for Learning
TekBots program for ECE students
Paired with Beaversource
Combines coding and social networking — Elgg + Trac
Easy introduction to open source communities
Timeline
Project started in June 2008
Release first prototypes in December 2008
First deployment in April 2009
Large-scale deployment in October 2009
Project stalls mainly due to hardware issues in 2010
Tim Harder Linux Plumbers Conference 2011
3. Project history
Background
Hardware
Lessons Learned
Software
Future prospects
Educational usage
Design considerations
Price
Flexibility
Manufacturability
Openness
BeagleBoard used as a model platform
Tim Harder Linux Plumbers Conference 2011
4. Project history
Background
Hardware
Lessons Learned
Software
Future prospects
Educational usage
OSWALD hardware
ARM processor DVI out (up to 5-way rocker switch
128 MB RAM 1024x768) Speaker
Resistive touchscreen
256 MB NAND Microphone
Touchpad
3.5” 320x240 display 3-axis accelerometer Built-in battery
(a) CORE.0 board (b) OSWALD
Tim Harder Linux Plumbers Conference 2011
5. Project history
Background
Hardware
Lessons Learned
Software
Future prospects
Educational usage
OSWALD software
X-Loader and U-Boot bootloaders
Linux kernel: OMAP tree + OSWALD
patches
Custom distribution: Radix
Other platforms: Gentoo, Ångström,
Poky, MeeGo, and Android
Code repositories:
code.oregonstate.edu/git
Wiki: beaversource.oregonstate.
edu/projects/cspfl
Tim Harder Linux Plumbers Conference 2011
6. Project history
Background
Hardware
Lessons Learned
Software
Future prospects
Educational usage
Composition of Radix
Built using OpenEmbedded
Lightweight and flexible
Matchbox desktop
GCC, Java (via jamvm), Python, Perl
SDK available
Emulation possible via qemu branch
Default Radix desktop
Tim Harder Linux Plumbers Conference 2011
7. Project history
Background
Hardware
Lessons Learned
Software
Future prospects
Educational usage
Applications available on Radix
Figure: Applications
Focus on lightweight
applications
Examples:
PDF viewer: epdfview
Image viewer: gpicview
(a) epdfview (b) gpicview File manager: pcmanfm
Drawing/writing: xournal
Patched to work better within
OSWALD environment
Plenty of other software:
mplayer, octave, etc
(c) pcmanfm (d) xournal
Tim Harder Linux Plumbers Conference 2011
8. Project history
Background
Hardware
Lessons Learned
Software
Future prospects
Educational usage
Gaming
Figure: Various games and emulators running on the OSWALD
(a) Opentyrian (b) Freedoom (c) Numpty Physics
(d) Snes9x (e) Dosbox (f) ScummVM
Tim Harder Linux Plumbers Conference 2011
9. Project history
Background
Hardware
Lessons Learned
Software
Future prospects
Educational usage
A hands-on approach to computer science
Freshmen students acquire devices on entry into the CS
program
Devices are integrated into courses throughout the curriculum
to enhance labs and lectures
Help emulate real world development and programming
environments for students
Tim Harder Linux Plumbers Conference 2011
10. Project history
Background
Hardware
Lessons Learned
Software
Future prospects
Educational usage
A hands-on approach to computer science
Mainly used in introductory
classes for a few terms
Programming basics in Java,
data structures, and a few other
classes
OSU Robotics club: used in the
2010 Mars rover design
Tim Harder Linux Plumbers Conference 2011
11. Background Hardware
Lessons Learned Software
Future prospects Educational
In-house development
Great for small projects and limited deployments
Allows for better control over the platform — experts close at
hand
Hard to fix problems on complex platforms quickly
Disastrous when core development team moves on
Tim Harder Linux Plumbers Conference 2011
12. Background Hardware
Lessons Learned Software
Future prospects Educational
Shoestring budget planning
Bad hardware batches can quickly kill small projects
Hard to communicate with 3rd party manufacturers
Difficult to plan through hardware revisions
Tim Harder Linux Plumbers Conference 2011
13. Background Hardware
Lessons Learned Software
Future prospects Educational
Finding external support
Nearly impossible to find a vendor neutral solution
Companies enjoy promising future devices
Generally slow, similar to the grant process
Sponsors
Tim Harder Linux Plumbers Conference 2011
14. Background Hardware
Lessons Learned Software
Future prospects Educational
Small development team
Allowed for more experimental and
reactive system building
Communication network was quick
and easy to navigate
Hard to spend development time
working on training new developers
Difficult to spend time on important
side projects — GUI development and
theming, keyboard improvement, etc Radix virtual keyboard
Building a community
Tim Harder Linux Plumbers Conference 2011
15. Background Hardware
Lessons Learned Software
Future prospects Educational
GUI hassles
Figure: Display problems
Small resolutions not supported well in many
current GUI toolkits (desktop-centric apps
are mainly to blame)
(a) GTK dialog Generally requires extensive theming and
toolkit rework
Most companies/projects create their own
themes or toolkits for mobile interfaces
(b) File menu
Tim Harder Linux Plumbers Conference 2011
16. Background Hardware
Lessons Learned Software
Future prospects Educational
Prepare a solid software foundation, i.e. get someone else
to do the work
In the best case, use a well-tested platform with plenty of 3rd
party support and documentation
Outsource majority of development and documentation efforts
to a community or larger project
Focus efforts on creating educational content and related
content modules
Tim Harder Linux Plumbers Conference 2011
17. Background Hardware
Lessons Learned Software
Future prospects Educational
Poor classroom experiences are costly
Teachers are very risk averse
Mistakes and rushed deployments are extremely expensive
Hard to regain entry and confidence in the classroom
environment
Students are turned off by poor experiences
Tim Harder Linux Plumbers Conference 2011
18. Background Hardware
Lessons Learned Software
Future prospects Educational
Required infrastructure for successful deployments
Have necessary support in place and trained before large
deployments
More lead-in time for professors and TAs for Q&A sessions
and training before classroom usage
Documentation and related support information a must
Additional resources: debugging environments, basic IDE
support, SDKs, and VMs
Tim Harder Linux Plumbers Conference 2011
19. Background Hardware
Lessons Learned Software
Future prospects Educational
Extremely high barrier to entry for newcomers
Average incoming student has minimal exposure to working
with Linux let alone in embedded development environments
Deploy devices from the top down
Test runs with advanced/older students and trickle down as
the project matures
Tim Harder Linux Plumbers Conference 2011
20. Background
Project status
Lessons Learned
OSWALD 2.0
Future prospects
OSWALD’s future
Current status: extremely small amount of working devices
left in stock
Project suspended while searching for funds and future
platform
Looking and interested in any ideas or suggestions towards
possible devices
Tim Harder Linux Plumbers Conference 2011
21. Background
Project status
Lessons Learned
OSWALD 2.0
Future prospects
Searching for the perfect platform
Information sharing, interoperability, user-centered design, and
collaboration around open source education
Well-supported 3rd party device with a relatively open
platform
Dream goal: Help create a platform used by multiple
universities to develop open curriculum around open source
and embedded development
Tim Harder Linux Plumbers Conference 2011
22. Background
Project status
Lessons Learned
OSWALD 2.0
Future prospects
Requirements for an open, educational platform
Hardware: Rugged case, decent battery life, and
well-supported chipset family
Software: OS flexibility (no jailbreaking required)
Environment: Support standard programming environments
(Java and C/C++ for current classes)
Connectivity: Wifi and USB host mode required
Desired features: Easily modifiable case and rich set of I/O
devices
Tim Harder Linux Plumbers Conference 2011
23. Background
Lessons Learned
Future prospects
Acknowledgements
Developers
Ben Goska, Kevin Kemper, Corbin Simpson,
and all other unmentioned contributors
Project managers
Carlos Jensen, Don Heer, and others
Sponsors
Tim Harder Linux Plumbers Conference 2011