The document discusses the next ten years of RISC-V development. It notes that while specialized ISAs come and go, general purpose ISAs can last for decades. In the next ten years, RISC-V aims to become the industry standard ISA across all computing devices. To manage diversity, RISC-V uses a modular design with bases and extensions. The Technical Steering Committee will focus development on key application domains and release architecture profiles to guide the ecosystem. New security threats and applications will emerge, requiring ongoing development and specialization of RISC-V.
Linux firmware for iRMC controller on Fujitsu Primergy serversVladimir Shakhov
Integrated Remote Management Controller aka iRMC (http://manuals.ts.fujitsu.com/file/11470/irmc-s4-ug-en.pdf) is a special-purpose ARM board, included in every Fujitsu Primergy server and actually running on GNU/Linux. Digging into the process of creation of iRMC firmware, significantly based on FOSS components, including Linux kernel, busybox, glibc, net-snmp and many others. Lecture covering technical details how its working, how to use OpenSource components together with propiertary code.
[DockerCon 2023] Reproducible builds with BuildKit for software supply chain ...Akihiro Suda
Images maintained by a reputable organization or an individual are often considered to be trustworthy; however, it is hard to deny the possibility that they might have silently injected malicious codes that are not present in the source repo. Also, even if they have no malicious intent, their images can still be compromised on an accidental leakage of registry credentials.
The latest release of BuildKit solves this supply chain security concern with reproducible builds. Reproducible builds is a technique to ensure that a bit-for-bit identical image can be reproduced from its source code, by anybody, at any time. When multiple actors can attest to an image's reproducibility, it signifies that the image contains no code of a secret origin.
Audiences of this talk will learn how they can and how sometimes they cannot make their images reproducible to improve their trust.
Linux firmware for iRMC controller on Fujitsu Primergy serversVladimir Shakhov
Integrated Remote Management Controller aka iRMC (http://manuals.ts.fujitsu.com/file/11470/irmc-s4-ug-en.pdf) is a special-purpose ARM board, included in every Fujitsu Primergy server and actually running on GNU/Linux. Digging into the process of creation of iRMC firmware, significantly based on FOSS components, including Linux kernel, busybox, glibc, net-snmp and many others. Lecture covering technical details how its working, how to use OpenSource components together with propiertary code.
[DockerCon 2023] Reproducible builds with BuildKit for software supply chain ...Akihiro Suda
Images maintained by a reputable organization or an individual are often considered to be trustworthy; however, it is hard to deny the possibility that they might have silently injected malicious codes that are not present in the source repo. Also, even if they have no malicious intent, their images can still be compromised on an accidental leakage of registry credentials.
The latest release of BuildKit solves this supply chain security concern with reproducible builds. Reproducible builds is a technique to ensure that a bit-for-bit identical image can be reproduced from its source code, by anybody, at any time. When multiple actors can attest to an image's reproducibility, it signifies that the image contains no code of a secret origin.
Audiences of this talk will learn how they can and how sometimes they cannot make their images reproducible to improve their trust.
Ray Tracing with Intel® Embree and Intel® OSPRay: Use Cases and Updates | SIG...Intel® Software
Explore practical examples of Intel® Embree and Intel® OSPRay in production rendering and the best practices of using the kernels in typical rendering pipelines.
In this deck from the 2019 Stanford HPC Conference, Todd Gamblin from Lawrence Livermore National Laboratory presents: Spack - A Package Manager for HPC.
"Spack is a package manager for cluster users, developers and administrators. Rapidly gaining popularity in the HPC community, like other HPC package managers, Spack was designed to build packages from source. Spack supports relocatable binaries for specific OS releases, target architectures, MPI implementations, and other very fine-grained build options.
This talk will introduce some of the open infrastructure for distributing packages, challenges to providing binaries for a large package ecosystem and what we're doing to address problems. We'll also talk about challenges for implementing relocatable binaries with a multi-compiler system like Spack. Finally, we'll talk about how Spack integrates with the US Exascale project's open source software release plan and how this will help glue together the HPC OSS ecosystem.
Todd is a computer scientist in the Center for Applied Scientific Computing at Lawrence Livermore National Laboratory. His research focuses on scalable tools for measuring, analyzing, and visualizing performance data from massively parallel applications. Todd is also involved with many production projects at LLNL. He works with Livermore Computing’s Development Environment Group to build tools that allow users to deploy, run, debug, and optimize their software for machines with million-way concurrency.
Todd received his Ph.D. in computer science from the University of North Carolina at Chapel Hill in 2009. His dissertation investigated parallel methods for compressing and sampling performance measurements from hundreds of thousands of concurrent processors. He received his B.A. in Computer Science and Japanese from Williams College in 2002. He has also worked as a software developer in Tokyo and held research internships at the University of Tokyo and IBM Research.
Watch the video: https://youtu.be/DhUVbroMLJY
Learn more: https://computation.llnl.gov/projects/spack-hpc-package-manager
and
http://hpcadvisorycouncil.com/events/2019/stanford-workshop/
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Maksim Vazhenin [Dell Technologies] | InfluxDB for Storage System Monitoring ...InfluxData
This talk tells the story of how Dell switched its internal monitoring system shipped with Dell EMC ECS Enterprise Object Storage from a home-grown monitoring system to InfluxDB-based stack. The session will cover the following topics:
Lessons learned on completely changing the monitoring stack on the shipped system while doing continuous releases
Building a separate service running Flux language which connects to InfluxDB instances
Running multiple InfluxDB instances for HA
Using Flux language for Grafana dashboards and alerting rules
How to control metrics ingest rate and cardinality to have predictable resource consumption
Shipping InfluxDB with storage system for internal monitoring and running InfluxDB with low memory constraints (3Gb)
Embedded Fest 2019. Wei Fu. Linux on RISC-V--Fedora and Firmware in practiceEmbeddedFest
Summarize Fedora on RISC-V development including the little history, current status and some simple steps describing how to run Fedora on QEMU,FPGA board or the SiFive RV64 development board. Meanwhile, provide the status of current Specs and firmware(OpenSBI/UEFI/uboot) for RISC-V and the kernel development status.
Ray Tracing with Intel® Embree and Intel® OSPRay: Use Cases and Updates | SIG...Intel® Software
Explore practical examples of Intel® Embree and Intel® OSPRay in production rendering and the best practices of using the kernels in typical rendering pipelines.
In this deck from the 2019 Stanford HPC Conference, Todd Gamblin from Lawrence Livermore National Laboratory presents: Spack - A Package Manager for HPC.
"Spack is a package manager for cluster users, developers and administrators. Rapidly gaining popularity in the HPC community, like other HPC package managers, Spack was designed to build packages from source. Spack supports relocatable binaries for specific OS releases, target architectures, MPI implementations, and other very fine-grained build options.
This talk will introduce some of the open infrastructure for distributing packages, challenges to providing binaries for a large package ecosystem and what we're doing to address problems. We'll also talk about challenges for implementing relocatable binaries with a multi-compiler system like Spack. Finally, we'll talk about how Spack integrates with the US Exascale project's open source software release plan and how this will help glue together the HPC OSS ecosystem.
Todd is a computer scientist in the Center for Applied Scientific Computing at Lawrence Livermore National Laboratory. His research focuses on scalable tools for measuring, analyzing, and visualizing performance data from massively parallel applications. Todd is also involved with many production projects at LLNL. He works with Livermore Computing’s Development Environment Group to build tools that allow users to deploy, run, debug, and optimize their software for machines with million-way concurrency.
Todd received his Ph.D. in computer science from the University of North Carolina at Chapel Hill in 2009. His dissertation investigated parallel methods for compressing and sampling performance measurements from hundreds of thousands of concurrent processors. He received his B.A. in Computer Science and Japanese from Williams College in 2002. He has also worked as a software developer in Tokyo and held research internships at the University of Tokyo and IBM Research.
Watch the video: https://youtu.be/DhUVbroMLJY
Learn more: https://computation.llnl.gov/projects/spack-hpc-package-manager
and
http://hpcadvisorycouncil.com/events/2019/stanford-workshop/
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Maksim Vazhenin [Dell Technologies] | InfluxDB for Storage System Monitoring ...InfluxData
This talk tells the story of how Dell switched its internal monitoring system shipped with Dell EMC ECS Enterprise Object Storage from a home-grown monitoring system to InfluxDB-based stack. The session will cover the following topics:
Lessons learned on completely changing the monitoring stack on the shipped system while doing continuous releases
Building a separate service running Flux language which connects to InfluxDB instances
Running multiple InfluxDB instances for HA
Using Flux language for Grafana dashboards and alerting rules
How to control metrics ingest rate and cardinality to have predictable resource consumption
Shipping InfluxDB with storage system for internal monitoring and running InfluxDB with low memory constraints (3Gb)
Embedded Fest 2019. Wei Fu. Linux on RISC-V--Fedora and Firmware in practiceEmbeddedFest
Summarize Fedora on RISC-V development including the little history, current status and some simple steps describing how to run Fedora on QEMU,FPGA board or the SiFive RV64 development board. Meanwhile, provide the status of current Specs and firmware(OpenSBI/UEFI/uboot) for RISC-V and the kernel development status.
Why trade performance for flexibility when you can program your network with new protocols and capabilities at wire speed?
In this workshop learn how ASICs are made, why flexible silicon is critical to the future of networking and what you can do with Cisco’s next-generation UADP 2.0.
Resources:
Watch the related TechWiseTV episode: http://bit.ly/2fiqH1f
Watch the TechWiseTV: New Era in Networking playlist: http://bit.ly/2jpoRjB
Fluttercon Berlin 23 - Dart & Flutter on RISC-VChris Swan
Arm has dominated the mobile space since the dawn of smartphones, but systems based on the open source RISC-V instruction set architecture will bring new choices for manufacturers and us, their customers. RISC-V SDKs showed up in the Dart dev channel in Apr 22, but it's still pretty hard to build stuff due to lots of missing dependencies. As always happens with new stuff, the hardware people are waiting for broader software support, and the software people are waiting for a larger hardware installed base. This talk examines the forces that are driving RISC-V forward, and what developers can expect from a world that will have RISC-V devices, mobile phones, tablets and cloud services.
In this deck from the 2016 Stanford HPC Conference, Kurt Keville from R&D Labs at MIT presents: Introduction to RISC-V.
"Today’s server systems provide many knobs which influence energy efficiency and performance. Some of these knobs control the behavior of the operating systems, whereas others control the behavior of the hardware itself. Choosing the optimal configuration of the knobs is critical for energy efficiency. In this talk recent research results will be presented, including examples of big data applications that consume less energy when dynamic tuning is employed."
Kurt works on optimizing HPC codes for educational and institutional (R&D labs) purposes at MIT. He assesses new supercomputing hardware as part of his responsibilities. He has published in IEEE conferences and journals and he teaches embedded programming once a year. Kurt has a BS from West Point and an MS from MIT.
Learn more: http://soc.mit.edu
Sign up for our insideHPC Newsletter: http://insideHPC.com/newsletter
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2022/06/introducing-the-kria-robotics-starter-kit-robotics-and-machine-vision-for-smart-factories-a-presentation-from-amd/
Chetan Khona, Director of Industrial, Vision, Healthcare and Sciences Markets at AMD, presents the “Introducing the Kria Robotics Starter Kit: Robotics and Machine Vision for Smart Factories” tutorial at the May 2022 Embedded Vision Summit.
A robot is a system of systems with diverse sensors and embedded processing nodes focused on core capabilities such as motion, navigation, perception, machine vision, communication and control — alongside more unique and application-specific requirements. With the new Kria KR260 Robotics Starter Kit and the Kria Robotics Stack (KRS), users can easily build a complete robotics system using a ROS 2-based environment with low-latency, deterministic communications connecting production-ready Kria SOMs.
The resultant adaptive system can readily implement evolving and diverse algorithms as well as scale across multiple projects. This presentation highlights the capabilities and solutions possible with the Kria KR260 Robotics Starter Kit for roboticists, machine vision developers and industrial solution architects.
Similar to RISC-V Summit 2020: The Next Ten Years (20)
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
1. The Next Ten Years
Krste Asanovic
UC Berkeley, RISC-V International, & SiFive Inc.
krste@berkeley.edu
RISC-V Summit
December 9, 2020
2. General-Purpose ISAs last for Decades
§ The original ISA, IBM 360, now 56 years old
§ Intel x86 now 42 years old
§ ARM now 35 years old
§ RISC-V now 10 years old
§ All in active development, with new hardware
implementations in advanced technologies
2
3. Special-Purpose ISAs come and go
§ Array processors
§ Network processors
§ Image processors
§ DSPs
§ GPUs
§ AI accelerators
§ Types of specialized processor persist, but rare for
hardware ISA to last more than a decade
3
4. A Lot Happened in Last Ten Years
§ Deep learning emerged
- e.g., AlexNet 2012
§ Whole new classes of security challenge appeared
- e.g., Meltdown/Spectre 2017/2018
§ These are now the primary topics of research in
architecture community
4
5. In Next Ten Years
§ New security threats will arise, but don’t know what
§ New application areas could become prominent, but
don’t know which
§ We’ll need to at least start on RV128 base definition
§ RISC-V will increase adoption throughout computing
- Free and open + simple modular design
§ New specialized processors, but more based on RISC-V
rather than specialized and/or proprietary base
5
6. Our Modest RISC-V Project Goal
6
Become the industry-standard ISA for all
computing devices
This is happening!
Far faster, more domains, than anyone predicted
Demand at every performance level (low to ludicrous)
Demand for all features of all other ISAs ever built!
Using a new community ISA spec development model
8. Managing Diversity
§ A single fixed ISA spec cannot work for all domains
§ So RISC-V designed to be modular:
- bases (RV32E, RV32I, RV64I, RV128…)
- standard extensions (MAFDQC, Zfh, Z… )
- custom extensions (Xaiwidget, X… )
§ Can combine modules to build application-specific ISA
§ But difficult to have broad support across software
and toolchain ecosystem for any combination
8
9. Focusing Community Development
§ Many good ideas, task groups started, but need to
prioritize/finish extensions to make RISC-V successful
§ Technical Steering Committee to focus short-term
effort on meeting needs of a few application domains
- Where are RISC-V ISA gaps?
- Where are RISC-V ISA opportunities?
- What is needed for complete and compelling solution?
9
10. Architecture Profiles
§ Initially (under development):
- RVA19 – application processor profile for 2019
- RVM19 – microcontroller processor profile for 2019
§ Only includes ratified extensions at date of creation
§ Specifies mandatory base/extensions, optional standard
extensions, and unsupported standard extensions
§ Reduces complexity for software ecosystem and RISC-V users
§ TSC to drive future roadmap for architecture profiles
§ Next target is RVA21 and RVM21 for December ‘21 Summit
10
11. Profiles versus Platforms
§ Architecture profiles standardize ISA components
visible to software, both unprivileged and privileged
components
§ Platform standards standardize hardware
implementation choices including supported ISA,
booting, memory configurations, discovery, device
handling, debug attach, …
12. Vertical Industry Focus to follow
§ Architecture profiles provide generic design for class
of processor
§ Certain industry areas will require additional
specialized support (e.g., FUSA) to be prioritized by
TSC based on member interests
§ Enhance profiles, or add more profiles, for industry
verticals
13. Next Ten Years Summary
§ New application areas, and new demands for security
and dependability
§ Free and open, simple and modular ISA best way of
meeting these challenges
§ RISC-V International organizing to manage upcoming
complexity as RISC-V spreads to ever more
application areas, and ever more members and
contributors
13