Importance of security
End node security is important in the Internet of Things
mbed provides a platform for IoT with security baked into the core
Entropy is a corner stone for security
A practical approach to securing embedded and io t platformsArm
A practical approach to securing embedded & IoT platforms
What can we learn from mobile security and apply to IoT?
Building on proven security principles & Secure Partitioning Manager
What can be done to make the IoT developer’s job easier?
Summary
A practical approach to securing embedded and io t platformsArm
A practical approach to securing embedded & IoT platforms
What can we learn from mobile security and apply to IoT?
Building on proven security principles & Secure Partitioning Manager
What can be done to make the IoT developer’s job easier?
Summary
BKK16-200 Designing Security into low cost IO T SystemsLinaro
….Trust and security are essential for the Internet of Things (IoT) to scale. As your product becomes successful, attraction will be high for it to be hacked and, as a consumer, you'll suffer with consequences if security is not baked into the system, at every level. With IoT, we now need to enable an appropriate level of security for low cost IoT designs done by people with little or no security expertise. In this presentation, you will learn how ARM, Linaro and the ARM partnership are securing these low cost IoT endpoints by providing device security, lifecycle security and communication security, without the need for in-depth security experts…
SIPROTEC 5 - The core of digital substationsRyan O'Mara
Substations are essential assets in the Energy Grid and digital substations with SIPROTEC 5 are the answer to trends and challenges.
Learn more about Digital Subtations http://www.siemens.com/digital-substation
Learn more about SIPROTEC 5 htttp://www.siemens.com/siprotec5
Protection, Automation and Monitoring: SIPROTEC 5 v7.9/v8.0Ryan O'Mara
Highlights of SIPROTEC 5 family of multi-functional protection relays with control.
- SIPROTEC DigitalTwin
- Compatibility of SIPROTEC 4 and SIPROTEC 5 for 87L and 21
- IEC 61850-9-2 Process bus for digital substations (Server/Client)
- SIPROTEC 6MU85 Merging Unit
- Time synchronization with IEEE 1588 for High Precision applications
- SIPROTEC 7SS85 distributed busbar protection based on process bus
- Point-on-wave switching
- Conformal coating of SIPROTEC 5 devices as standard
- Cyber Security
- ATEX certification for 7SK85 and 7UM85
- New overcurrent and feeder protection SIPROTEC 7SJ81
- Web Browser
Protection relays and controls SIPROTEC 5 New Version V7.5Ryan O'Mara
Protective relay with controls, SIPROTEC 5 recently announced Version 7.50. These 10 slides outline the new features found in this update.
With Siemens protective relay and control technology on board, you have a reliable, global partner at your side. You can expect proven, dependable and durable technology for all areas. Efficient, comprehensive and thus designed for maximum supply security. Benefit from the detailed, innovative know-how of the world leader in the area of protection.
Practical real-time operating system security for the massesMilosch Meriac
Although real-time operating systems are ubiquitous in the industry, OS-level security features are silently absent in most microcontroller systems. As a result, securing these systems against active attackers becomes impractical due to the missing foundations.
We believe security does not need to cost an ARM and a leg in memory resources or device performance. Operating systems for MMU-less low-end microcontrollers should be on par with established security models. High end embedded systems security does not need to be exclusive to Cortex-A/x86 Linux systems.
uVisor is available under Apache License on Github : https://github.com/ARMmbed/uvisor
We will show how spatial isolation of process memories using the ARM v7M Memory Protection Unit (MPU) works - and how it effects interprocess-communication, memory management, thread synchronisation and internal protection of key-material.
We will then introduce temporal isolation for guaranteed operation and device safety even under local attack. To make our point we integrated an advanced security foundation into the vendor-independent RTOS abstraction layer CMSIS-RTOS. Our example implementation - the ARMmbed uVisor for CMSIS-RTOS - is available under the Apache License.
Highlights in SIPROTEC 5 Version 7.8
Cyber Security:
Role-based Access Control (RBAC) with central user
management
Usability:
SIPROTEC 5 Web Browser
New Device:
Paralleling Device SIPROTEC 7VE85
*AI Edge Server - #ATC series - CPU + NVIDIA GPU/ Intel VPU/ Google Coral TPU.
Ex. ANPR/LPR, video analytics (retail, pharmacy and etc.), face recognition, machine vision, factory automation, ship surveillance, autonomous drive, smart traffic in tunnel & highway, railway track AI/object detection, AI parking lanes control and etc.
LAS16-112: mbed OS Technical Overview
Speakers: Sam Grove
Date: September 26, 2016
★ Session Description ★
ARM mbed OS is an open source embedded operating system designed
specifically for the “things” in the Internet of Things. It includes all the features you need to develop a connected product based on very small memory footprint ARM Cortex-M microcontrollers, including security,connectivity, an RTOS, and drivers for sensors and I/O devices. You can start developing with mbed OS 5.1.0 today using a choice of 40 different development boards from 11 different providers and a wide choice of toolchains including a complete command line build management and configuration tool mbed CLI, industry standard desktop IDEs or ARM’s free online IDE.
★ Resources ★
Etherpad: pad.linaro.org/p/las16-112
Presentations & Videos: http://connect.linaro.org/resource/las16/las16-112/
★ Event Details ★
Linaro Connect Las Vegas 2016 – #LAS16
September 26-30, 2016
http://www.linaro.org
http://connect.linaro.org
Next Generation Embedded Systems Security for IOT: Powered by KasperskyL. Duke Golden
In an increasingly connected world full of new IOT technologies, the security risks are becoming the single biggest challenge as we advance toward a fully tech-enabled society. Kaspersky's security strategy is always - SECURE BY DESIGN.
BKK16-200 Designing Security into low cost IO T SystemsLinaro
….Trust and security are essential for the Internet of Things (IoT) to scale. As your product becomes successful, attraction will be high for it to be hacked and, as a consumer, you'll suffer with consequences if security is not baked into the system, at every level. With IoT, we now need to enable an appropriate level of security for low cost IoT designs done by people with little or no security expertise. In this presentation, you will learn how ARM, Linaro and the ARM partnership are securing these low cost IoT endpoints by providing device security, lifecycle security and communication security, without the need for in-depth security experts…
SIPROTEC 5 - The core of digital substationsRyan O'Mara
Substations are essential assets in the Energy Grid and digital substations with SIPROTEC 5 are the answer to trends and challenges.
Learn more about Digital Subtations http://www.siemens.com/digital-substation
Learn more about SIPROTEC 5 htttp://www.siemens.com/siprotec5
Protection, Automation and Monitoring: SIPROTEC 5 v7.9/v8.0Ryan O'Mara
Highlights of SIPROTEC 5 family of multi-functional protection relays with control.
- SIPROTEC DigitalTwin
- Compatibility of SIPROTEC 4 and SIPROTEC 5 for 87L and 21
- IEC 61850-9-2 Process bus for digital substations (Server/Client)
- SIPROTEC 6MU85 Merging Unit
- Time synchronization with IEEE 1588 for High Precision applications
- SIPROTEC 7SS85 distributed busbar protection based on process bus
- Point-on-wave switching
- Conformal coating of SIPROTEC 5 devices as standard
- Cyber Security
- ATEX certification for 7SK85 and 7UM85
- New overcurrent and feeder protection SIPROTEC 7SJ81
- Web Browser
Protection relays and controls SIPROTEC 5 New Version V7.5Ryan O'Mara
Protective relay with controls, SIPROTEC 5 recently announced Version 7.50. These 10 slides outline the new features found in this update.
With Siemens protective relay and control technology on board, you have a reliable, global partner at your side. You can expect proven, dependable and durable technology for all areas. Efficient, comprehensive and thus designed for maximum supply security. Benefit from the detailed, innovative know-how of the world leader in the area of protection.
Practical real-time operating system security for the massesMilosch Meriac
Although real-time operating systems are ubiquitous in the industry, OS-level security features are silently absent in most microcontroller systems. As a result, securing these systems against active attackers becomes impractical due to the missing foundations.
We believe security does not need to cost an ARM and a leg in memory resources or device performance. Operating systems for MMU-less low-end microcontrollers should be on par with established security models. High end embedded systems security does not need to be exclusive to Cortex-A/x86 Linux systems.
uVisor is available under Apache License on Github : https://github.com/ARMmbed/uvisor
We will show how spatial isolation of process memories using the ARM v7M Memory Protection Unit (MPU) works - and how it effects interprocess-communication, memory management, thread synchronisation and internal protection of key-material.
We will then introduce temporal isolation for guaranteed operation and device safety even under local attack. To make our point we integrated an advanced security foundation into the vendor-independent RTOS abstraction layer CMSIS-RTOS. Our example implementation - the ARMmbed uVisor for CMSIS-RTOS - is available under the Apache License.
Highlights in SIPROTEC 5 Version 7.8
Cyber Security:
Role-based Access Control (RBAC) with central user
management
Usability:
SIPROTEC 5 Web Browser
New Device:
Paralleling Device SIPROTEC 7VE85
*AI Edge Server - #ATC series - CPU + NVIDIA GPU/ Intel VPU/ Google Coral TPU.
Ex. ANPR/LPR, video analytics (retail, pharmacy and etc.), face recognition, machine vision, factory automation, ship surveillance, autonomous drive, smart traffic in tunnel & highway, railway track AI/object detection, AI parking lanes control and etc.
LAS16-112: mbed OS Technical Overview
Speakers: Sam Grove
Date: September 26, 2016
★ Session Description ★
ARM mbed OS is an open source embedded operating system designed
specifically for the “things” in the Internet of Things. It includes all the features you need to develop a connected product based on very small memory footprint ARM Cortex-M microcontrollers, including security,connectivity, an RTOS, and drivers for sensors and I/O devices. You can start developing with mbed OS 5.1.0 today using a choice of 40 different development boards from 11 different providers and a wide choice of toolchains including a complete command line build management and configuration tool mbed CLI, industry standard desktop IDEs or ARM’s free online IDE.
★ Resources ★
Etherpad: pad.linaro.org/p/las16-112
Presentations & Videos: http://connect.linaro.org/resource/las16/las16-112/
★ Event Details ★
Linaro Connect Las Vegas 2016 – #LAS16
September 26-30, 2016
http://www.linaro.org
http://connect.linaro.org
Next Generation Embedded Systems Security for IOT: Powered by KasperskyL. Duke Golden
In an increasingly connected world full of new IOT technologies, the security risks are becoming the single biggest challenge as we advance toward a fully tech-enabled society. Kaspersky's security strategy is always - SECURE BY DESIGN.
My slides from the Generate Conference, quickly and entropically packed in a PDF.
(Slide notes in brackets.) Typeface is Averia, "the average font": http://iotic.com/averia/
"Session ID: BUD17-503
Session Name: The HPE Machine and Gen-Z - BUD17-503
Speaker:
Grant Likely
Track:
★ Session Summary ★
With the exponential rise in quantity of data to manage, the modern data centre is increasingly limited by the capacity of individual machines. Since storage and compute demand more capacity than can be provided by a single machine, we distribute both over large clusters and use the network to transfer data between where it is stored and where it is processed. Moving all that data around uses deep storage stacks which incur a significant performance impact. If we could somehow flatten the storage stack and provide applications with direct access to data, then we could improve performance by orders of magnitude.
Hewlett Packard Enterprise recently demonstrated that we can do exactly with their research project, ""The Machine"". Instead of moving data around with a network, The Machine uses multi terabytes of persistent memory and a next generation fabric-attached memory interconnect to provide a single pool of storage which can be accessed by any processor in the cluster. It shows that we can provide applications with immediate load/store access to huge data sets in a model called Memory-Driven Computing.
Proof in hand, now it is time to bring Memory-Defined Computing to the data centre. Gen-Z is an open systems interconnect designed to provide memory semantic access to data and devices via direct attached, switched or fabric topologies. HPE has joined the Gen-Z consortium and is using the knowledge gained with The Machine to help shape Gen-Z to set the stage for true Memory-Driven Computing. With putting memory at the centre, this enables us to overcome the limitations of today's computing systems and power innovations.
This session will cover two topics. It will start with a status update on The Machine and an overview of how it works. Then we'll shift into an introduction of Gen-Z, and how it can reshape the architecture of computing in the years to come.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/bud17/bud17-503/
Presentation:
Video: https://youtu.be/1BVtChDQVyQ
---------------------------------------------------
★ Event Details ★
Linaro Connect Budapest 2017 (BUD17)
6-10 March 2017
Corinthia Hotel, Budapest,
Erzsébet krt. 43-49,
1073 Hungary
---------------------------------------------------
Keyword: HPE, Gen-Z
http://www.linaro.org
http://connect.linaro.org
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961"
NLP Secrets Seminar 2012 - Quantum Energy - 21062012Grant Hamel
NLP is about understanding the way that we think and ultimately produce results. Quantum is about inter-connectivity, especially through Time, Energy, Space & Matter.
This presentation is about leading our thinking towards manifesting abundance in a rapid, practical, sustainable way.
Describe WSO2 IoT server device type plugin and its details. Please check below video for the complete presenation.
https://youtu.be/F4Ss5SU_VGM?t=16m48s
OMA Seminar/Webinar, October 27, 2016, "How Developers Can Get the Most Out of IoT Standards and Tools" - Presentation #4 from Hatem Oueslati, CEO and Co-Founder, IOTEROP
"Security, Interoperability and Remote Device Management in IoT: How LWM2M can meet the Challenge of Tomorrow’s Industries and Smart Cities"
Provides an overview of how LWM2M and DNS-SD/DNS-SEC can be used together to provide for secure communications, remote management and provisioning of constrained devices in the Internet of Things using open source software components leshan and Tiaki created in the eclipse IoT community.
The LAMP (Linux/Apache HTTP Server/MySQL/PHP) stack has dominated web infrastructures, in the IoT it is believed a similar open source stack will dominate IoT deployments. This presentation will look at the new technology requirements and architectures required for IoT solutions. It will identify three stacks of software required by any IoT solution, and finally present how open source communities, such as the Eclipse IoT community, are already supplying the critical software technology needed by IoT solution providers.
Presented at IoT Evolution, Feb 8 2017
In this session, Distinguished Engineer, James Gosling, discusses how AWS innovates in the Internet of Things. James shares stories and experiences in deploying IoT systems, and how AWS thinks of scalability in IoT. In addition, James shares his experiences in engineering Java embedded systems in IoT.
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)Open Mobile Alliance
Presentation delivered during the Internet of Things World, Santa Clara pre-event workshop by Ian Skerrett – VP of Marketing, Eclipse Foundation
Eclipse IoT Foundation provides the technology needed to build IoT Devices, Gateways and Cloud Platforms. Eclipse has several IoT projects you will learn about in this presentation:
● What IoT projects are being developed in Eclipse Foundation
● What are Leshan and Wakaama projects and how they are related to LwM2M
● What Eclipse tools are available and how they can be obtained
● What is next for Eclipse Foundation
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
Companies and researchers are exploring ways to make software and hardware development easier for the masses. Soon you will be able to build your own autonomous drone, create a sensor that assess the watering needs of your plants, and develop a cat tracking device with minimal coding and hardware skills.
What is the place of security and privacy in this exciting development?
Are we building the next generation of Internet security vulnerabilities right now?
In his talk Hannes Tschofenig will highlight challenges with Internet of Things, what role standardization plays, and what contributions ARM, a provider of microprocessor IP, is making to improve IoT security.
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 WorkshopOpen Mobile Alliance
OMA hosted a Workshop in Edinburgh on Friday, May 06, where field engineer Hannes Tschofenig, Senior Principal Engineer at ARM, showed attendees how to use the LwM2M protocol on FRMDM-K64F boards, designed by NXP in collaboration with mbed, to connect to the mbed cloud service (formally known mbed Connector) and to the Leshan server.
This presentation is a part of the Workshop Agenda:
9:15-9:30 Opening Remarks and Brief Overview of LWM2M
9:30-10:30 Demo of the Arduino Yun by HOP Ubiquitous
10:30-10:45 Demo of the LwM2M Editor Tool and DevKit
11:00-15:00 NXP FRDM-K64F Platform with ARM mbed demo
See more here: https://github.com/OpenMobileAlliance/OMA_LwM2M_for_Developers/wiki/2016-May-IoT-Platform-Training-%28Workshop%29
Nerospec IIoT is part of a group of companies, Nerospec Core is a group of key individuals specialising in Industrial Networks, Mining, Machine Automation and of course IIoT. The Internet of Things (IoT) industry has come about due to the need for effective tools to transform outdated processes into the Industrial 4.0 revolution and streamline machine data.
LAS16-203: Platform security architecture for embedded devicesLinaro
LAS16-203: Platform security architecture for embedded devices
Speakers: Mark Hambleton
Date: September 27, 2016
★ Session Description ★
Heads up on what ARM are doing with the new ARMv8-M architecture from a software perspective.
★ Resources ★
Etherpad: pad.linaro.org/p/las16-203
Presentations & Videos: http://connect.linaro.org/resource/las16/las16-203/
★ Event Details ★
Linaro Connect Las Vegas 2016 – #LAS16
September 26-30, 2016
http://www.linaro.org
http://connect.linaro.org
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesNRB
We are expecting more and more from our IBM z Systems. Our critical data and applications are nested in our IBM z Systems infrastructure, and more than ever it positions itself as the security hub. It now exports services to secure distributed environment thanks to its security as a services capabilities. During this lecture, Mr Darées talks about z Systems Roles for security in most of today’s hot topics (compliance, Database encryption, Tokenization, Digital Certificates, ...).
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEELinaro
Smart connected devices such as mobile phones, tablets and Digital TVs are required to handle data with strong security and confidentiality requirements. A “Trusted Execution Environment” (TEE) provides an environment for processing data securely, protected from normal platform applications. This talk is intended as an introduction to Trusted Execution, and the open-source Trusted Execution Environment OP-TEE in particular. It introduces the GlobalPlatform TEE Specifications, explains how Trusted Execution is implemented by ARM TrustZone and OP-TEE, and outlines how trusted boot software manages the secure boot of an ARM platform. Finally, it gives some pointers on how to get started with OP-TEE.
IoT Solutions Made Simple with Everyware IoTEurotech
Everyware IoT is the IoT architecture designed by Eurotech: it is flexible, end-to-end and open. Its building blocks are the Multi-service IoT Gateways, Everyware Software Framework (ESF), the Java OSGi software framework for IoT gateways and Everyware Cloud, the IoT integration platform.
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...44CON
Data Center security has been forced to reinvent itself as software complexity increases, networking capabilities grow more agile, and attack complexity turns unmanageable. With this change, the need for security policy enforcement to be handled at the edge has pushed functionality onto host compute systems, resulting in inherent performance loss and security weakness due to consolidation of resources.
In the first part of the talk we will be presenting a SmartNIC-based model for data-center security that solves both the performance problem and the security problems of edge-centric policy models. The model features a more robust isolation of responsibilities, superior offload capabilities, significantly better scaling of policy, and unique visibility opportunities.
To illustrate this, we present a SmartNIC-based reference architecture for network layout, as well as examples of SmartNIC security controls and their resulting threat models.
The second part of the talk will unveil a new innovative technique for tamper proof host introspection as SmartNICs are in a unique position to analyze and inspect the memory of the host to which they are attached. Normally, this functionality is reserved for a hypervisor, where it is known as ‘guest introspection’ or ‘virtual-machine introspection’. With host introspection, security controls no longer live in the hypervisor, but on the SmartNIC itself, on a separate trust domain. In this way, the visibility normally achieved with guest introspection can be performed for the entire host memory in an isolated and secure area. In order for host introspection to work in the same way as guest introspection, memory is DMA transferred in bursts over the PCI-e bus that attaches the SmartNIC to the host. As this method can be subverted to hide unwanted software, we will demonstrate a novel approach to tamper proof the acquisition of memory and for performing live introspection.
Host introspection complements the network controls implemented using the SmartNIC by enabling the measurement of the integrity and the behavior of workloads (virtual machines, containers, bare metal servers) to identify possible indicators of compromise. The visibility and context gained also enhances the granularity of network controls, resulting in measurably better security for the data center compared to traditional software-only based controls.
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304Linaro
Session ID: SFO17-304
Session Name: Demystifying Security Root of Trust Approaches for IoT/Embedded
- SFO17-304
Speaker: Suresh Marisetty
Track: LHG,LITE,Security
★ Session Summary ★
The current trend of IoT market segment is expected to enable and deploy about 50 billion connected devices by year 2020. IoT devices will be deployed across the board to cater to multiple use cases like Home/building Automation, Automotive, a highly fragmented embedded segment: gateways, set top boxes, security cameras, industrial automation, digital signage, healthcare, etc. This trend will bring about a great challenge of securing the connected end point IoT devices from a myriad of physical and remote attacks ex: DDOS Mirai botnet launched through IoT devices like digital cameras and DVR players
Problem Statement: Each use cases has its own IoT device constraints like: Cost, Power, Performance, memory footprint, security objectives, etc. The fundamental basis for any secure IoT and Embedded solution is the Root of Trust (RoT), which provides assurance of the integrity of the system software from: boot and runtime firmware, to OS loader, to the Kernel, to the user Applications. This poses a serious issue and challenges the one-size fits all RoT solution model.
ARM has taken on this challenge head on to come up with a microcontroller security architecture solution that caters to the various IoT devices constraints, by offering ARM Cortex-M family of processors. ARM’s flexible and scalable architecture solution will allow an OEM or Silicon partner to adapt the base security architecture and to extend it in a seamless way. This caters to the requirements of different market segments through add-on hardware, firmware and software security enhancements.
The session will present the ARM’s base security system and software architecture based on the upcoming Cortex V8M solution that will provide a hardware and firmware assisted Trust Zone based Security RoT aka TBSA-M for a range of markets, to include the highly constrained IoT devices. Furthermore, the session will discuss about how the base RoT capability can be extended in a seamless way with additional hardware assisted mechanisms to offer high levels of functionality and/or robustness for less constrained IoT devises with options like TBSA-M+, TBSA-HSM and platform level security software abstraction framework to decouple the chosen RoT capability for various OSes and the Cloud security frameworks.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/sfo17/sfo17-304/
Presentation:
Video: https://www.youtube.com/watch?v=aIwmRXFOshs
---------------------------------------------------
★ Event Details ★
Linaro Connect San Francisco 2017 (SFO17)
25-29 September 2017
Hyatt Regency San Francisco Airport
Symposium on Securing the IoT - Security is the future of IoT - mbedAustin Blackstone
Presentation given at Symposium on Securing the IoT in Boston on October 30th 2018 - www.securingthenet.com. Covers the basic of why security is so important in IoT and how security is baked into the Arm Mbed / Pelion ecosystem by default.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host