Romain Ferrari, Cybersecurity Engineer at Thales, presented Authzforce at OW2con'19: "Use of Attribute based Access Control with FIDO and OpenID Connect".
Neil Saunders (Beamly) - Securing your AWS Infrastructure with Hashicorp Vault Outlyer
A review of AWS security concepts, leaks at Beamly, an Introduction to Hashicorp Vault and how we use use Vault at Beamly.
Watch YouTube video here: http://bit.ly/25ytNAD
Join DevOps Exchange London Meetup: http://bit.ly/22y4Var
Follow DOXLON on Twitter: http://bit.ly/1ZdugEJ
A tutorial on how the process of writing an application using a browser’s WebAuthn API, plus how to install a server, how to generate authentication challenges & responses, and how to integrate with related IAM infrastructure.
Code: https://github.com/fido-alliance/webauthn-demo
Live slides: http://slides.com/herrjemand/jan-2018-fido-seminar-webauthn-tutorial#/
Real-time Data Processing with Amazon DynamoDB Streams and AWS LambdaAmazon Web Services
This document summarizes a presentation about using Amazon DynamoDB Streams and AWS Lambda for real-time data processing. It discusses how DynamoDB Streams provides a log of item-level changes in DynamoDB tables and how Lambda functions can be triggered by these streams to run custom code. Examples are given of building applications that replicate data, perform auditing, and send notifications in real-time. The presentation includes a demo of setting up cross-region replication and data auditing using DynamoDB Streams and Lambda.
Producer Performance Tuning for Apache KafkaJiangjie Qin
Kafka is well known for high throughput ingestion. However, to get the best latency characteristics without compromising on throughput and durability, we need to tune Kafka. In this talk, we share our experiences to achieve the optimal combination of latency, throughput and durability for different scenarios.
This document provides instructions for setting up and attending an eBPF workshop. It includes links for setting up the workshop platform, background slides, and code repository. It also lists an agenda with topics that will be covered, including setting up the eBPF lab, an introduction, eBPF 101, writing eBPF programs, BCC, and a tutorial. Attendees are asked to let the presenter know if they have any problems setting up.
This document summarizes a presentation about using Redis for duplicate document detection in a real-time data stream. The key points covered include:
- Redis is used to map external document IDs to internal IDs and cache these mappings to detect duplicates efficiently
- Lua scripting is used to generate IDs and check for duplicates in an atomic way
- Redis data structures like hashes and counters help count documents and store metadata efficiently
- A production deployment involved a single Redis server handling 70M keys and 10GB of RAM, with replication for high availability
Neil Saunders (Beamly) - Securing your AWS Infrastructure with Hashicorp Vault Outlyer
A review of AWS security concepts, leaks at Beamly, an Introduction to Hashicorp Vault and how we use use Vault at Beamly.
Watch YouTube video here: http://bit.ly/25ytNAD
Join DevOps Exchange London Meetup: http://bit.ly/22y4Var
Follow DOXLON on Twitter: http://bit.ly/1ZdugEJ
A tutorial on how the process of writing an application using a browser’s WebAuthn API, plus how to install a server, how to generate authentication challenges & responses, and how to integrate with related IAM infrastructure.
Code: https://github.com/fido-alliance/webauthn-demo
Live slides: http://slides.com/herrjemand/jan-2018-fido-seminar-webauthn-tutorial#/
Real-time Data Processing with Amazon DynamoDB Streams and AWS LambdaAmazon Web Services
This document summarizes a presentation about using Amazon DynamoDB Streams and AWS Lambda for real-time data processing. It discusses how DynamoDB Streams provides a log of item-level changes in DynamoDB tables and how Lambda functions can be triggered by these streams to run custom code. Examples are given of building applications that replicate data, perform auditing, and send notifications in real-time. The presentation includes a demo of setting up cross-region replication and data auditing using DynamoDB Streams and Lambda.
Producer Performance Tuning for Apache KafkaJiangjie Qin
Kafka is well known for high throughput ingestion. However, to get the best latency characteristics without compromising on throughput and durability, we need to tune Kafka. In this talk, we share our experiences to achieve the optimal combination of latency, throughput and durability for different scenarios.
This document provides instructions for setting up and attending an eBPF workshop. It includes links for setting up the workshop platform, background slides, and code repository. It also lists an agenda with topics that will be covered, including setting up the eBPF lab, an introduction, eBPF 101, writing eBPF programs, BCC, and a tutorial. Attendees are asked to let the presenter know if they have any problems setting up.
This document summarizes a presentation about using Redis for duplicate document detection in a real-time data stream. The key points covered include:
- Redis is used to map external document IDs to internal IDs and cache these mappings to detect duplicates efficiently
- Lua scripting is used to generate IDs and check for duplicates in an atomic way
- Redis data structures like hashes and counters help count documents and store metadata efficiently
- A production deployment involved a single Redis server handling 70M keys and 10GB of RAM, with replication for high availability
Project ACRN Device Model architecture introductionProject ACRN
The document provides an overview of the ACRN Device Model (DM) architecture. DM is responsible for creating UOS VMs and emulating devices based on command line configurations. It initializes by parsing options, creating the VM, setting up I/O, and loading the OVMF firmware. It then performs device emulation through virtual PCI devices, interrupt handling, and ACPI table virtualization. Device emulation involves registering devices, emulating configuration space, BARs, and interrupts. ACPI tables are virtualized to provide power management and configuration to the guest VM.
The document describes the FIDO2 specification which includes WebAuthn and CTAP. WebAuthn introduces a new JavaScript API for browser-based authentication and CTAP introduces a new API for platform-based authentication. It provides an overview of the registration and authentication flows including the use of public key credentials on servers to authenticate users. It also describes extensions, attestations, credential management and the goals of convenience and strong security in the FIDO standards.
The document discusses ACRN, an open-source lightweight hypervisor intended for consolidating heterogeneous workloads and streamlining IoT edge development. It provides an overview of ACRN's architecture and key modules, including boot process, CPU virtualization, memory management, interrupt handling, pass-through devices, and device model for handling I/O requests. The document also outlines enhancements in ACRN 2.0, such as supporting new operating systems and safety/real-time virtual machines.
MongoDB World 2015 - A Technical Introduction to WiredTigerWiredTiger
MongoDB 3.0 introduces a new pluggable storage engine API and a new storage engine called WiredTiger. The engineering team behind WiredTiger team has a long and distinguished career, having architected and built Berkeley DB, now the world's most widely used embedded database. In this talk we will describe our original design goals for WiredTiger, including considerations we made for heavily threaded hardware, large on-chip caches, and SSD storage. We'll also look at some of the latch-free and non-blocking algorithms we've implemented, as well as other techniques that improve scaling, overall throughput and latency. Finally, we'll take a look at some of the features we hope to incorporate into WiredTiger and MongoDB in the future.
Speaker: Jerry Reghunadh, Architect, CAPIOT Software Pvt. Ltd.
Level: 200 (Intermediate)
Track: Microservices
One of the leading assisted e-commerce players in India approached CAPIOT to rebuild their ERP system from the ground up. Their existing PHP-MySQL setup, while rich in functionality and having served them well for under half a decade, would not scale to meet future demands due to the exponential grown they were experiencing.
We built the entire system using a microservices architecture. To develop APIs we used Node.js, Express, Swagger and Mongoose, and MongoDB was used as the active data store. During the development phase, we solved several problems ranging from cross-service calls, data consistency, service discovery, and security.
One of the issues that we faced is how to effectively design and make cross-service calls. Should we implement a cross-service call for every document that we require or should we duplicate and distribute the data, reducing cross-service calls? We found a balance between these two and engineered a solution that gave us good performance.
In addition, our current system has 36 independent services. We enabled services to auto-discover and make secure calls.
We used Swagger to define our APIs first and enforce request and response validations and Mongoose as our ODM for schema validation. We also heavily depend on pre-save hooks to validate data and post-save hooks to trigger changes in other systems. This API-driven approach vastly enabled our frontend and backend teams to scrum together on a single API spec without worrying about the repercussions of changing API schemas.
What You Will Learn:
- How we used Swagger and Mongoose to off-load validations and schema enforcements. We used Swagger to define our APIs first and enforce request and response validations and Mongoose as our ODM for schema validation. We also heavily depend on pre-save hooks to validate data and post-save hooks to trigger changes in other systems. This API-driven approach vastly enabled our frontend and backend teams to scrum together on a single API spec without worrying about the repercussions of changing API schemas.
- How microservices and cross-service calls work. One of the issues that we faced is how to effectively design and make cross-service calls. Should we implement a cross-service call for every document that we require or should we duplicate and distribute the data, reducing cross-service calls? We found a balance between these two and engineered a solution that gave us good performance.
- How we implemented microservice auto discovery: Our current system has 36 independent services, so we enabled services to auto-discover and make secure calls.
Discuss the different ways model can be served with MLflow. We will cover both the open source MLflow and Databricks managed MLflow ways to serve models. Will cover the basic differences between batch scoring and real-time scoring. Special emphasis on the new upcoming Databricks production-ready model serving.
Linux kernel status in RISC-V (July 2018) presented at RISC-V Chennai workshop
https://content.riscv.org/wp-content/uploads/2018/07/0930-19.07.18-Atish-Patra-Western-Digital.pdf
Getting Started with Spring Authorization ServerVMware Tanzu
SpringOne 2021
Title: Getting Started with Spring Authorization Server
Speakers: Joe Grandja, Spring Security Engineer at VMware; Steve Riesenberg, Software Engineer at VMware
FIDO and the Future of User AuthenticationFIDO Alliance
The document discusses the problems with password-based authentication and introduces FIDO authentication as a solution. It summarizes that FIDO authentication uses public key cryptography to allow users to authenticate with a single gesture on their device, without needing shared secrets or passwords. FIDO authentication is being adopted by major companies and specifications are standardized, with over 500 authenticators certified for compatibility and security. The presentation promotes FIDO as the future of secure, usable authentication.
Ibm aix technical deep dive workshop advanced administration and problem dete...solarisyougood
1. The system initialization process begins with the system POST which checks and initializes hardware. The bootstrap code then loads the boot image from the boot list which typically includes the internal disk as the first option.
2. The boot image contains the AIX kernel, RAMFS, and a reduced ODM. The kernel is loaded into memory and initializes basic system services while the RAMFS acts as a temporary root file system.
3. If the system is unable to boot, common issues include hardware errors, an empty boot list, or a corrupted boot image on the boot logical volume. The system can be booted into maintenance mode from external media to access the root volume group and repair or rebuild the boot logical volume to
MySQL Replication Performance Tuning for Fun and Profit!Vitor Oliveira
MySQL Replication, in addition to bringing high-availability, is the foundation to build high-performance MySQL database systems. Using read scale-out and sharding one can design systems that go from the capacity of a single server to supporting the largest internet sites. But to design and operate high-performance, efficient, manageable and reliable deployments requires knowing the intricacies of the underlying technologies.
This session will provide insights on the main factors that affect the performance of Asynchronous Replication and Group Replication, and how to configure them to make the most out of the underlying computing system. It will also show the latest developments in MySQL 5.7 and 8.0, in areas spanning from group communication to the multi-threaded slave applier, and how effective they are in helping meet the performance requirements in terms of throughput, latency and durability to support the most demanding workload types.
This document provides an overview and introduction of the IBM Power S1014, S1022s, S1022, and S1024 servers. It describes the key features and specifications of these systems including their IBM Power10 processors, memory support, I/O and storage options, operating system support, and more. It also discusses the IBM solutions and technologies that can be used with these Power servers, such as the IBM PowerSC management framework, PowerVC virtualization software, and Red Hat OpenShift Container Platform.
USENIX LISA2021 talk by Brendan Gregg (https://www.youtube.com/watch?v=_5Z2AU7QTH4). This talk is a deep dive that describes how BPF (eBPF) works internally on Linux, and dissects some modern performance observability tools. Details covered include the kernel BPF implementation: the verifier, JIT compilation, and the BPF execution environment; the BPF instruction set; different event sources; and how BPF is used by user space, using bpftrace programs as an example. This includes showing how bpftrace is compiled to LLVM IR and then BPF bytecode, and how per-event data and aggregated map data are fetched from the kernel.
AuthzForce - Open Source Next-gen Access Control Framework for the Enterprise...OW2
The presentation will first give an brief overview of the AuthzForce project with a bit of history, i.e. where we come from (SunXACML project), up to where we arrive today (AuthzForce Core and Server); the licensing model (Community vs Enterprise version); and the main features, mentioning the main standard implemented (XACML, i.e. OASIS standard for access control). It introduces also the use cases: Thales internal projects, Collaborative projects (French/European): OpenCloudware, FIWARE, AU2EU, 5G-Ensure (IoT), etc.
Arcadia and Capella: Model-Based Systems Engineering made easier! euroforum -...Etienne Juliot
Capella – Engineering Continuity from Wishful Thinking to Implementation:
- How the Open Source solution Capella addresses the increasing complexity challenges in the automotive industry
- Demonstration of Capella: design a complete system and facilitate collaboration between systems, software and hardware engineering
- Why vendor neutral and open governance matters: the Industry Consortium supporting Capella
Presentation operated at Euroforum 2017: http://www.euroforum.de/software-eng/conference-2017/programme-2017/ by Etienne Juliot and Stéphane Bonnet
Project ACRN Device Model architecture introductionProject ACRN
The document provides an overview of the ACRN Device Model (DM) architecture. DM is responsible for creating UOS VMs and emulating devices based on command line configurations. It initializes by parsing options, creating the VM, setting up I/O, and loading the OVMF firmware. It then performs device emulation through virtual PCI devices, interrupt handling, and ACPI table virtualization. Device emulation involves registering devices, emulating configuration space, BARs, and interrupts. ACPI tables are virtualized to provide power management and configuration to the guest VM.
The document describes the FIDO2 specification which includes WebAuthn and CTAP. WebAuthn introduces a new JavaScript API for browser-based authentication and CTAP introduces a new API for platform-based authentication. It provides an overview of the registration and authentication flows including the use of public key credentials on servers to authenticate users. It also describes extensions, attestations, credential management and the goals of convenience and strong security in the FIDO standards.
The document discusses ACRN, an open-source lightweight hypervisor intended for consolidating heterogeneous workloads and streamlining IoT edge development. It provides an overview of ACRN's architecture and key modules, including boot process, CPU virtualization, memory management, interrupt handling, pass-through devices, and device model for handling I/O requests. The document also outlines enhancements in ACRN 2.0, such as supporting new operating systems and safety/real-time virtual machines.
MongoDB World 2015 - A Technical Introduction to WiredTigerWiredTiger
MongoDB 3.0 introduces a new pluggable storage engine API and a new storage engine called WiredTiger. The engineering team behind WiredTiger team has a long and distinguished career, having architected and built Berkeley DB, now the world's most widely used embedded database. In this talk we will describe our original design goals for WiredTiger, including considerations we made for heavily threaded hardware, large on-chip caches, and SSD storage. We'll also look at some of the latch-free and non-blocking algorithms we've implemented, as well as other techniques that improve scaling, overall throughput and latency. Finally, we'll take a look at some of the features we hope to incorporate into WiredTiger and MongoDB in the future.
Speaker: Jerry Reghunadh, Architect, CAPIOT Software Pvt. Ltd.
Level: 200 (Intermediate)
Track: Microservices
One of the leading assisted e-commerce players in India approached CAPIOT to rebuild their ERP system from the ground up. Their existing PHP-MySQL setup, while rich in functionality and having served them well for under half a decade, would not scale to meet future demands due to the exponential grown they were experiencing.
We built the entire system using a microservices architecture. To develop APIs we used Node.js, Express, Swagger and Mongoose, and MongoDB was used as the active data store. During the development phase, we solved several problems ranging from cross-service calls, data consistency, service discovery, and security.
One of the issues that we faced is how to effectively design and make cross-service calls. Should we implement a cross-service call for every document that we require or should we duplicate and distribute the data, reducing cross-service calls? We found a balance between these two and engineered a solution that gave us good performance.
In addition, our current system has 36 independent services. We enabled services to auto-discover and make secure calls.
We used Swagger to define our APIs first and enforce request and response validations and Mongoose as our ODM for schema validation. We also heavily depend on pre-save hooks to validate data and post-save hooks to trigger changes in other systems. This API-driven approach vastly enabled our frontend and backend teams to scrum together on a single API spec without worrying about the repercussions of changing API schemas.
What You Will Learn:
- How we used Swagger and Mongoose to off-load validations and schema enforcements. We used Swagger to define our APIs first and enforce request and response validations and Mongoose as our ODM for schema validation. We also heavily depend on pre-save hooks to validate data and post-save hooks to trigger changes in other systems. This API-driven approach vastly enabled our frontend and backend teams to scrum together on a single API spec without worrying about the repercussions of changing API schemas.
- How microservices and cross-service calls work. One of the issues that we faced is how to effectively design and make cross-service calls. Should we implement a cross-service call for every document that we require or should we duplicate and distribute the data, reducing cross-service calls? We found a balance between these two and engineered a solution that gave us good performance.
- How we implemented microservice auto discovery: Our current system has 36 independent services, so we enabled services to auto-discover and make secure calls.
Discuss the different ways model can be served with MLflow. We will cover both the open source MLflow and Databricks managed MLflow ways to serve models. Will cover the basic differences between batch scoring and real-time scoring. Special emphasis on the new upcoming Databricks production-ready model serving.
Linux kernel status in RISC-V (July 2018) presented at RISC-V Chennai workshop
https://content.riscv.org/wp-content/uploads/2018/07/0930-19.07.18-Atish-Patra-Western-Digital.pdf
Getting Started with Spring Authorization ServerVMware Tanzu
SpringOne 2021
Title: Getting Started with Spring Authorization Server
Speakers: Joe Grandja, Spring Security Engineer at VMware; Steve Riesenberg, Software Engineer at VMware
FIDO and the Future of User AuthenticationFIDO Alliance
The document discusses the problems with password-based authentication and introduces FIDO authentication as a solution. It summarizes that FIDO authentication uses public key cryptography to allow users to authenticate with a single gesture on their device, without needing shared secrets or passwords. FIDO authentication is being adopted by major companies and specifications are standardized, with over 500 authenticators certified for compatibility and security. The presentation promotes FIDO as the future of secure, usable authentication.
Ibm aix technical deep dive workshop advanced administration and problem dete...solarisyougood
1. The system initialization process begins with the system POST which checks and initializes hardware. The bootstrap code then loads the boot image from the boot list which typically includes the internal disk as the first option.
2. The boot image contains the AIX kernel, RAMFS, and a reduced ODM. The kernel is loaded into memory and initializes basic system services while the RAMFS acts as a temporary root file system.
3. If the system is unable to boot, common issues include hardware errors, an empty boot list, or a corrupted boot image on the boot logical volume. The system can be booted into maintenance mode from external media to access the root volume group and repair or rebuild the boot logical volume to
MySQL Replication Performance Tuning for Fun and Profit!Vitor Oliveira
MySQL Replication, in addition to bringing high-availability, is the foundation to build high-performance MySQL database systems. Using read scale-out and sharding one can design systems that go from the capacity of a single server to supporting the largest internet sites. But to design and operate high-performance, efficient, manageable and reliable deployments requires knowing the intricacies of the underlying technologies.
This session will provide insights on the main factors that affect the performance of Asynchronous Replication and Group Replication, and how to configure them to make the most out of the underlying computing system. It will also show the latest developments in MySQL 5.7 and 8.0, in areas spanning from group communication to the multi-threaded slave applier, and how effective they are in helping meet the performance requirements in terms of throughput, latency and durability to support the most demanding workload types.
This document provides an overview and introduction of the IBM Power S1014, S1022s, S1022, and S1024 servers. It describes the key features and specifications of these systems including their IBM Power10 processors, memory support, I/O and storage options, operating system support, and more. It also discusses the IBM solutions and technologies that can be used with these Power servers, such as the IBM PowerSC management framework, PowerVC virtualization software, and Red Hat OpenShift Container Platform.
USENIX LISA2021 talk by Brendan Gregg (https://www.youtube.com/watch?v=_5Z2AU7QTH4). This talk is a deep dive that describes how BPF (eBPF) works internally on Linux, and dissects some modern performance observability tools. Details covered include the kernel BPF implementation: the verifier, JIT compilation, and the BPF execution environment; the BPF instruction set; different event sources; and how BPF is used by user space, using bpftrace programs as an example. This includes showing how bpftrace is compiled to LLVM IR and then BPF bytecode, and how per-event data and aggregated map data are fetched from the kernel.
AuthzForce - Open Source Next-gen Access Control Framework for the Enterprise...OW2
The presentation will first give an brief overview of the AuthzForce project with a bit of history, i.e. where we come from (SunXACML project), up to where we arrive today (AuthzForce Core and Server); the licensing model (Community vs Enterprise version); and the main features, mentioning the main standard implemented (XACML, i.e. OASIS standard for access control). It introduces also the use cases: Thales internal projects, Collaborative projects (French/European): OpenCloudware, FIWARE, AU2EU, 5G-Ensure (IoT), etc.
Arcadia and Capella: Model-Based Systems Engineering made easier! euroforum -...Etienne Juliot
Capella – Engineering Continuity from Wishful Thinking to Implementation:
- How the Open Source solution Capella addresses the increasing complexity challenges in the automotive industry
- Demonstration of Capella: design a complete system and facilitate collaboration between systems, software and hardware engineering
- Why vendor neutral and open governance matters: the Industry Consortium supporting Capella
Presentation operated at Euroforum 2017: http://www.euroforum.de/software-eng/conference-2017/programme-2017/ by Etienne Juliot and Stéphane Bonnet
Mastering modes and states is key to analyze the expected behavior and performance of a system in different spectrums of situations.
However, as systems and missions become more complex,
the combination of modes and states across system, subsystem, and component levels becomes exponential and jeopardizes this good understanding.
In this webinar, we will:
Present the original Arcadia / Capella approach for integrating the study of the impacts of modes and states in architectural design, both from methodological and tooling perspectives.
Explain the introduction of the concepts of “configurations” and “situations” as means to specify and analyze the system in specific contexts.
[Capella Day Toulouse] ATL2 modernization: when MBSE keeps its promisesObeo
Talk held by Guillaume Journaux and Tony Soquet (Thales Services) at Capella Day Toulouse 2017.
More details: https://www.eclipsecon.org/france2017/capella-day
Speaker: Chris Du Preez
Host: Angel Alberici
Youtube: Virtual Muleys (https://www.youtube.com/c/VirtualMuleysOnline/videos)
Meetups: https://meetups.mulesoft.com/events/details/mulesoft-online-group-english-presents-runtime-fabric-rtf-foundations/
Runtime Fabric Foundations. Tune in this time to get a full overview around RTF: architecture, learning paths, tips, how to avoid pitfalls and more. Time to learn. Chris Du Preez will be guiding us through this 50 minutes session!
Anypoint Runtime Fabric is a container service that automates the deployment and orchestration of Mule applications and API gateways. Runtime Fabric runs within a customer-managed infrastructure on AWS, Azure, virtual machines (VMs), and bare-metal servers. (Find out more: https://docs.mulesoft.com/runtime-fabric/1.7/)
The document discusses Istio, an open source service mesh that provides traffic management, resilience, and security for microservices applications. It begins with an overview of microservices and common challenges in managing microservices applications. It then introduces Istio and its components that address these challenges, such as intelligent routing, policy enforcement, and telemetry collection. Specific Istio features like traffic control, splitting, and mirroring are demonstrated. Finally, it provides instructions for getting started with Istio and links for additional information.
Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018Amazon Web Services
Making AWS services accessible from within OpenShift is seamless. From a single platform, operations teams can administer AWS services, and developers can easily find and consume those services within their applications in a truly hybrid environment. In this session, we dive deep into deploying OpenShift on AWS and deploying the AWS Service Broker. We also share some very interesting use cases. Because this is a deep-dive session, we recommend you have an understanding of containers and native AWS services. This session is brought to you by AWS partner, Red Hat, Inc.
CA Performance Manager Agility by using Docker Containers for Network Manag...CA Technologies
Everything is moving more quickly as companies try to achieve first-mover advantage by leveraging their network and offering advanced services. Join the experts at CA technologies to learn how using Docker containers can help expedite your testing and delivery of new network and product offerings.
For more information, please visit http://cainc.to/Nv2VOe
This document summarizes the collaboration between eNovance and Cloudwatt to scale out eNovance's private pod solution on Cloudwatt's public cloud. Key points include:
- eNovance and Cloudwatt have collaborated since 2012 on OpenStack deployment, recruitment, training, and product definition. Their relationship is now focused on product collaboration and joint go-to-market.
- eNovance's accelerator pod is a turnkey OpenStack solution ideal for hybrid cloud. It provides high density and performance in an all-in-one appliance for fast deployment.
- Cloudwatt's public cloud offers compute, storage, networking and security capabilities based on OpenStack. It provides a sovereign public cloud option in
PSOCLD 1007 Cisco Hybrid Cloud Platform for Google CloudRohit Agarwalla
The document provides an overview of the Cisco Hybrid Cloud Platform for Google Cloud. It discusses how the solution allows customers to develop and deploy applications anywhere across on-premises and Google Cloud environments using consistent tools and policies. Key components of the solution include Cisco Container Platform, HyperFlex, ACI, CloudCenter, Stealthwatch Cloud, and Apigee for hybrid deployments. The demo shows how the Booksinfo sample app can be deployed across on-prem and Google Kubernetes Engine clusters with Istio for service mesh capabilities.
This document provides an introduction and overview of Apache NiFi 1.11.4. It discusses new features such as improved support for partitions in Azure Event Hubs, encrypted repositories, class loader isolation, and support for IBM MQ and the Hortonworks Schema Registry. It also summarizes new reporting tasks, controller services, and processors. Additional features include JDK 11 support, encrypted repositories, and parameter improvements to support CI/CD. The document provides examples of using NiFi with Docker, Kubernetes, and in the cloud. It concludes with useful links for additional NiFi resources.
This document provides an overview of the Xen Project's capabilities and challenges for automotive and embedded applications. It discusses the Xen Project ecosystem, key capabilities like virtualization performance, security features, and support for real-time and safety requirements. It also notes challenges like achieving full safety certification. Recent progress is highlighted, such as reducing the code size of a minimal Xen configuration, making Xen dom0-less, and starting work on MISRA compliance with a partner.
- Platform as a Service (PaaS) provides scalable applications and services through standards-based components at multiple levels, robust tooling for cloud deployment, and automated governance.
- Stratos is a full middleware platform available as a service that provides self-service provisioning, multi-tenancy, elastic scaling, metering and billing through a collection of modular services.
- StratosLive is the public PaaS offering from Stratos that provides all the core Stratos services as a fully-managed cloud platform.
Tap as a service: What you need to know nowFawad Khaliq
Tap-as-a-Service is a relatively new OpenStack project that was designed to provide tenants and service providers a means of monitoring the traffic flowing in their Neutron provisioned virtual networks. A lot of work has been carried out in the last two cycles, with multiple developers from around the world now contributing to the cause.
This presentation offers a review of all the progress made to date. We will discuss the primary motivations for monitoring network activity, explore the major challenges one can expect to encounter when attempting to monitor network traffic in a cloud environment and describe the need for a platform oriented solution. Next, an overview of the TaaS architecture and API will be presented, along with an update on current development activities and some of the planned enhancements for the future. We will also demonstrate traffic visibility solutions for a representative set of use cases covering network trouble-shooting, security and analytics.
Red hat ansible automation technical deckJuraj Hantak
Ansible Automation can be used to deliver a high-level introduction of Red Hat Ansible Automation. This deck contains speaker notes and can be used to start discussions with customers. It provides a technical overview but not a deep dive. Follow-on discussions would leverage Red Hat Ansible Automation technical materials.
Scaleable PHP Applications in KubernetesRobert Lemke
Kubernetes is also called the "distributed Linux of the cloud" – which implies that it provides fundamental infrastructure, which can solve a lot of challenges. Let’s see how PHP applications fit into this picture. In this presentation, we are going to explore when Kubernetes is a good fit for operating your PHP application and how it can be done in practice. We’ll look at the whole lifecycle: how to build your application, create or choose the right Docker images, deploy and scale, and how to deal with performance and monitoring. At the end you will have a good understanding about all the different stages and building blocks for running a PHP application with Kubernetes in production.
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...Weaveworks
Cloud-native applications are increasingly spanning across hybrid and multi-cloud environments such as on-premise data centers, in the cloud (Amazon EKS, Azure AKS, Google Cloud GKE) and at the edge. Customers need to ensure security and resiliency for their cloud-native applications while managing releases through reliable, consistent deployment and runtime policies.
In this session, we’ve partnered with Tetrate to showcase how to effectively manage advanced deployments using Weave GitOps. Managing application configurations by different teams across multiple Kubernetes clusters is made possible with Weave GitOps and Tetrate Service Bridge. Using familiar Git workflows, Weave Policy-as-Code enables application engineers to quickly deliver new features safely.
Join us as we demonstrate the scenarios where:
- All changes to application configuration are managed through Git workflows.
- GitOps provides an extra layer of security by removing the need for direct access to Kubernetes clusters.
- Policy-as-Code guarantees security, resilience and coding standards compliance.
- Tetrate Service Bridge provides dynamic configuration of application workloads and failover across multiple Kubernetes clusters.
Similar to Presentation of Authzforce project, OWcon'19, June 12-13, 2019, Paris. (20)
OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in RomaOW2
This presentation is given by Stefano Pampaloni at the RIOS Open Source Week, Nov. 2022 in Roma.
Abstract: Established in 2007 as a non-profit organisation, OW2 is an independent community dedicated to promoting open source software for information systems and fostering their business ecosystems. OW2 federates 50+ organizations and 2500+ IT professionals worldwide. OW2 hosts 50+ technology Projects. RIOS is an Italian network of companies established in 2015 aiming to improve open source adoption and to build sustainable businesses around it
OW2 and RIOS are working together to foster collaboration between European open-source stakeholders.
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...OW2
The Good Governance Initiative (GGI) proposes a methodological framework to assess open-source awareness, compliance and governance in any kind of organizations, helping them to structure and improve the use of FOSS towards an OSPO. The GGI was initiated by OW2 and is developed by the OSPO Alliance. This presentation will give an overview of the initiative, its organization, roadmap, first achievements and next steps.
GLPi v.10, les fonctionnalités principales et l'offre cloudOW2
Presentation de la solution open source GLPi lors de la session "Open cloud by OW2" dans la conférence Cloud Datacenter + infra des 29 et 30 juin 2022 à Paris.
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...OW2
Presentation de la solution open source Centreon lors de la session "Open Cloud by OW2" à la conférence Cloud Datacenter+Infra des 29 et 30 juin à Paris.
FusionIAM : la gestion des identités et des accés open sourceOW2
La solution FusionIAM est présentée dans la session "Open Cloud by OW2", organisée lors de la conférence Cloud Datacenter + Infra les 29 et 30 juin 2022 à Paris.
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...OW2
Connaissez-vous OW2 ? Aventure commencée en 1999 à Grenoble sur la base d'un consortium industriel dédié au middleware open source, devenu association sans but lucratif d'échelle européenne en 2006 sous le nom d'OW2, nous agissons pour la diffusion du libre dans le monde professionnel depuis plus de 20 ans.
OW2 compte des adhérents de toute taille : 2.600 individuels en adhésion gratuite, et 30 institutionnels, de la TPE unipersonnelle à Orange, Microsoft ou Huawei, de l'Inria ou le Fraunhofer Fokus à la Gendarmerie Nationale ou la ville de Paris.
Nos projets sont plus célèbres que nous : ASM, Centreon, Lutece, PrestaShop, Sympa ou Rocket.Chat vous diront peut-être quelque chose ?
Philosophiquement, OW2 se trouve quelque part entre Eclipse et Apache : culture technique, infrastructure d'hébergement et d'assistance pour les projets, sur la ligne de crête entre l'esprit du libre et les contraintes du business, nous sommes un acteur de l'économie sociale, persuadé que l'open source est central dans une transformation sociétale nécessaire qui ne pourra se faire sans l'adhésion du monde industriel et académique.
A un tournant de notre histoire, nous investissons le créneau de la qualité industrielle des projets avec notre méthodologie "Market readiness Levels", et la gouvernance de l'open-source comme membre fondateur de l'OSPO Alliance (ospo.zone) et éditeur du guide méthodologique "OSS Good Governance handbook".
Ne nous y trompons pas : OW2 est un acteur éminemment politique, porteur d'une vision fondée sur la transformation du monde professionnel et de ses valeurs par le code et la coopération. Et cette présentation, avec un survol de notre histoire, adhérents, initiatives et projets, est également l'occasion d'en débattre.
The document discusses three initiatives by OW2 to engage mainstream open source software users. It describes a beta-testing campaign platform to get user feedback, a market readiness levels assessment to help users evaluate projects, and an open source governance initiative to help users adopt best practices. The overall goal is to bring users into the open source ecosystem to help projects become more sustainable.
Towards a sustainable solution to open source sustainability, OW2online20, Ju...OW2
A few years ago, Heartbleed epitomized a massive open source sustainability problem for critical parts of the internet infrastructure. The bug, which affected the popular OpenSSL cryptographic software library, notably compromised the confidentiality of 4.5 million US patient records and cost the industry an estimated $500M. It was soon revealed that the root cause of the issue was that OpenSSL was precariously understaffed. Open source sustainability became a major theme overnight. Stories of maintainer burn-out made the headlines. And tentative solutions started to emerge, most of them donation-based. In this talk we’ll explore a number of existing strategies to fund open source and make it more sustainable, from patronage to dedicated ad networks. And we’ll defend the idea that the best path to open source sustainability is to help companies understand the tangible business value they can get from contributing to open source.
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...OW2
Presentation of the advanced optimization concepts for cloud computing application using open source Melodic/Morphemic platform. It will cover application architecture polymorphing and proactive adaptation based on forecasted applications needs.
Open Source governance and the Eclipse Foundation, OW2online, June 2020OW2
Presentation by Gael Blondelle, Managing Director at Eclipse Foundation.
Abstract:
In this talk, we will cover two complementary topics: The different Eclipse projects related to Open Source governance, like Eclipse SW360, SW360 Antenna, and Eclipse Steady, as well as the opportunity to leverage SW360 as the core of a larger Open Source governance initiative.
The Eclipse IP Process that has been applied to hundreds of Eclipse projects for more than 15 years and is going through a modernization process that involves both simplification from the developer point of view, and openness to new source of trusted data like Clearly Defined.
Open source contribution policies, OW2online, June 2020OW2
Open source contribution policies are long, boring, overlooked documents, that generally suck. They're designed to protect the company at all costs. But in the process, end up hurting engineering productivity, and morale. Sometimes they even unknowingly put corporate IP at risk.
But that's not inevitable.
It's possible to write open source contribution policies that make engineers lives easier, boost morale and productivity, reduce attrition, and attract new talent. And it's possible to do so while reducing the company's IP risk, not increasing it.
In this talk, we'll look at the general structure of contribution policies, examples in the wild, and tactics to make them suck less.
We'll also look at how to turn these policies into self-service software, preventing the tedious email back and forth between engineering and legal in most cases and making open source contribution a breeze. Presentation by Tobbie Langel, UnLockOpen.
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...OW2
The document discusses using open source development techniques within companies through an approach called InnerSource. It suggests that InnerSource can help companies be more resilient, as open source projects have been during the COVID-19 pandemic, by breaking down silos and fostering distributed development communities within organizations. To effectively manage InnerSource, companies should use a data-driven approach and define metrics for people, processes, and community engagement to track success over time in a continuous improvement model.
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020OW2
Presentation by Olivier Fendt, Senior Manager Open Source Software at Siemens.
Abstract: The well-known OpenChain project launched in Sept 2019 a Tooling Group. The objective of this group is to realize a turn-key Open Source toolchain for Open Source Compliance, which is / can be easily integrated in the software development CI/CD pipelines. The Tooling Group uses open source principles to accomplish this, creating a meritocracy producing real world solutions for real world challenges, and sharing these results with all interested parties. The presentation gives an overview of the Tooling group its objectives, the areas of focus, the current state and future plans.
Open Source Compliance at Orange, OW2online, June 2020OW2
Presentation by Nicolas Toussaint, Software Architect, Orange.
Abstract: Orange and Orange Business Services have turned to full open source solutions to tackle the complex problem of respecting the open source legal compliance constraints.
This talk presents the journey undertaken the past few years to build and improve the existing tooling and processes to make compliance validation possible, as well as allow overseeing progresses.
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020OW2
Presentation by Boris Baldassari, Consultant, Castalia Solutions.
Abstract: While Open Source Software has become mainstream, the understanding of its key principles, from ethics and collaboration to governance and community management, is gaining more interest and attention. There is a comprehensive volume of studies and reports backing up our individual and collective experience, yet we still cannot reliably measure these characteristics, and even less clearly define or assess them.
In an attempt to build up confidence and foster maturity in this area, this talk will look at the various existing models and metrics related to OSS compliance and governance, and build upon them to propose methods and tools for their evaluation and analysis. We will discuss the requirements and essential questions to ask, offer guidelines for implementation and suggest efficient ways to present results.
Intelligent package management with FASTEN, OW2online, June 2020OW2
Presentation by Amir Mir, TUDelft.
As recent events, such as the leftpad incident and the Equifax data breach, have demonstrated, dependencies on networks of external libraries can introduce projects to significant operational and compliance risks as well as difficult to assess security implications. FASTEN introduces fine-grained, method-level, tracking of dependencies on top of existing dependency management networks. In our talk, we will present how FASTEN works on top of the Rust/Cargo and Java/Maven ecosystems.
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020OW2
The DECODER project simplifies software library and component reuse, while ensuring that they will behave as expected by the developer. The DECODER central database (PKM) stores code-related artifacts and establish bindings between them, notably by generating formal specification from informal requirements or semi-formal models from source code. Presentation by Virgile Prevosto, CEA List.
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...OW2
Presentation by Hui Song, Senior Scientist, SINTEF. We would like to share our research journey towards enabling DevOps for IoT applications, and how Open Source makes the journey feasible and fun.
DevOps is widely adopted for developing cloud applications, which supports developers in continuously placing software changes directly to production. As companies are including IoT and Edge devices into their IT infrastructures, supporting DevOps for IoT is a must. However, IoT challenges some fundamental assumptions behind DevOps, such as the homogeneous infrastructure and centralized governance, and therefore, breaking-through research is needed. Funded by H2020, 30 people from 12 partners crossing academia and industry gathered to solve these fundamental challenges, which results in full-stack open source tools for automatic deployment, learning-based operation and security monitoring of IoT applications, and risk management of the development process. The tools are evaluated on industrial use cases in intelligent transportation, smart building, and eHealth.
The mass open source tools and communities around IoT development provides the sound foundation for this design research and the opportunities for the further exploitation of the results. In particular, we are proud of spinning off a start-up to commercialize the risk management services in the open source + SaaS model.
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...OW2
Artificial Intelligence is now smarter than ever, showing human-like abilities at complex tasks such as images classification or natural language processing.
But despite its recent advances, it's still not a silver bullet. This talk will present a few challenges in the research and development of artificial intelligence that slow down its progress and adoption. In particular, problems around fairness, the training of models and how to share them will be introduced as well as possible Free Software solutions. Presentation by Vincent Lequertier, PhD Student, Lyon UNiverversity.
Cacti and Big Data at Orange France, OW2online, June 2020OW2
We propose a walkthrough of current utilization of Open Source Software in capacity planning for the Orange network infrastructure.
The objective of our project is to have a platform that helps engineers to carefully plan the resources available to them as well as to correlate different incidents within remote parts of the infrastructure.
In order to achieve this we started using Cacti with the Spine collector which worked great, but Orange France is a very large company with many entities, each with its own governance, and so we began to see some limitations.
There was a need to centralize some information from different parts in Orange France as well as to integrate the equipment capacity and load values into BigData Orange.
In order to achieve this we developed the “Puits de donneés” platform completely based on Open Source Software.
The visualization and statistical analysis part is handled by Grafana while the ETL runs on Apache Software Foundation products like NiFi, Zookeeper and Ambari with a storage solution from MariaDB for which we did extensive performance tuning and customization due to the large amounts of data.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.