SlideShare a Scribd company logo
The	Tools	and	Machinery		
Behind	the	Curtain	
Jan	Van	Bruaene	
VP	of	Engineering,	Real-Time	Innovations	
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	
Our	customer’s	mission	critical	
systems	demand	high	quality	products
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	
RTI Quality
Management
System
•  Development	Process	Manual	
•  Naming	conventions	
•  Document	Organization	
•  Configuration	Management	
•  Branching	and	versioning	
•  Porting	process	
•  Coding	guides	
•  Design	and	code	reviews	
•  Testing	process	
•  Documentation	process	
•  Release	process	
•  Defect	management	
•  Root	cause	and	corrective	actions	
•  Maintenance,	Support	and	Escalation	processes	
•  IP,	legal	and	export	process	
•  Audit	process	
•  Vulnerability	management	process	
•  Etc.		
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2017	Real-Time	Innovations,	Inc.	Confidential.	
Customers	can	sign	up	to		
the	security	notification	list		
by	emailing	security@rti.com
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
Documented development processes and best practices
Development Milestones
©2018	Real-Time	Innovations,	Inc.	Confidential.	
Design		
Review	
Engineering		
Req.	Freeze		
Feature	
Freeze		
Code	
Freeze		
Install	Testing	
Completed		
General		
Availability	
Release	(GAR)	
~1yr	
Patch	
(Maintenance	
Release)	
New	Architecture	
Major	Release	
HEAD	
SUPPORT	
BRANCH	
PORTING	
BRANCH	
Major	Release	
CUSTOMER	
BRANCH	
Customer	Specific	Feature	
Patch	
•  Each	release	can	include	new	features,	new	RTI	Connext	products,	architecture	ports	and	bug	fixes.		
•  Certain	features	are	listed	as	‘experimental’	or	products	may	be	‘Beta’	releases	
Note:	not	shown	are	release	branches
©2018	Real-Time	Innovations,	Inc.	
The Tools
•  Configuration	management:	Git;	Atlassian	Fisheye		
•  Defect	management	and	traceability:	Atlassian	JIRA	
•  Enhancement	management:		Atlassian	JIRA	(and	Salesforce.com)	
•  Customer	case	tracking:	Salesforce.com	
•  Project	tracking	and	collaboration:	Atlassian	Jira,	Atlassian	Crucible,	Software	
Development	Folders	in	Egnyte,	Trello,	Microsoft	Project	and	Excel	
•  IDE:	Visual	Studio,	Eclipse,	SlickEdit,	Xcode,	atom,	zerobrane,	Wireframe	Sketcher	
•  Continuous	Integration:	Atlassian	Bamboo	
•  Memory	tools:	MemScope,	Rational	Purify,	Instruments	(Mac),	LeadDiag,	drmemory,	
Valgrind	and	JVisualVM	
•  Code	coverage	tools:	Rational	PureCoverage,	gcov	
•  CPU	profilers:	Callgrind,	Rational	Quantify,	JProfiler	
•  Static	Analysis	tools:	FindBugs	(Java),	clang	and	cppcheck	
•  Installers:	BitRock	InstallBuilder		
	
Work	in	progress:	Atlassian	
BitBucket,	Jenkins	CI
Atlassian tools provides us full traceability
©2018	Real-Time	Innovations,	Inc.	Confidential.
Dynamic Analysis using Valgrind with/without Buffer Pools
©2018	Real-Time	Innovations,	Inc.	
Testing
Regression	testing	
Feature	testing	
Interoperability	testing	
Install	testing	
Performance	and	scalability	testing	
Security	testing	
Endurance	testing
Unit tests - Regression testing
Also provide a level of single node feature testing
All	failing	unit	tests	are	analyzed.	Note	that	a	unit	test	may	fail	
not	only	because	of	a	functional	issue.	Other	reasons	include	
timing	issues,	infrastructure	issue,	platform	issue,	etc.
Feature testing
•  Our	previous	automated	RTI	Connext	DDS	distributed	feature	
framework	has	been	phased	out	and	will	be	replaced	by	a	new	
automated	distributed	feature	test	framework.		
–  Local	node	feature	testing	is	covered	partially	within	unit	tests.			
–  Manual	feature	testing	
•  RTI	Connext	Micro	has	a	new	
distributed	feature	test	framework		
and	test	description	language.
Interoperability testing
•  Vendor	interoperability	testing	done	at	OMG	events	through	shapes	demo.		
•  RTI	Connext	product	interoperability	testing	is	currently	done	manually		
–  During	install	testing	of	various	services	and	tools,	during	development,	and	
during	release	testing	of	Micro.		
–  Manual	testing	with	older	RTI	versions	is	done,	when	after	analysis,	we	
determine	there	is	a	risk	of	break	interoperability.		
•  Language	interoperability	testing	is	done	indirectly	through	the	usage	of	tools	
like	admin	console	(written	in	Java)	in	combination	with	applications	in	other	
languages.	We	have	also	added	automated	regression	tests	for	specific	features	
(e.g.,	keyhash).	
	
•  Note:	Interoperability	issues	are	documented	in	the	release	notes,	including	
backward	interoperability	options.
Install testing captures integration and interop issues
Manual	install	tests	plan	procedures	cover	
•  Installation	-	are	all	files	properly	installed?	
•  Graphical	User	Interface	tests,	e.g.,		
–  Integration	RTI	Launcher	with	Prototyper,	with	rtiddsgen,	
–  Admin	Console		
•  Documentation	tests	
•  Minimal	functionality		tests	for	all	products	using	the	
shipped	examples.		For	some	products,	we	run	a	full	
functionality	test	using	the	Getting	Started	Guide.		
This	is	performed	on	a	variety	of	platforms.		
•  Product	and	language	interoperability	testing	(limited)
Automated Install testing
•  Installation - filecheck to make sure files are properly installed.
•  Running rtiddsping, rtiddsspy and prototyper
•  Running rtiddsgen generated examples in C, C++, C++03. C++11, C++
CLI, C#, Java, using a combination of static/dynamic and release/debug
DDS libraries
•  Running shipped examples using a combination of static/dynamic and
release/debug DDS libraries
•  Performance examples in C++ and Java
•  TCP shipped examples in C
•  On more than 80 different architectures including Windows, Linux, Solaris,
Lynx, QNX, Darwin, VxWorks platforms. Not covered on e.g., VxWorks
653, etc.
Performance and memory profiling tests
•  Unit	tests	capture	performance	and	memory	information	for	specific	functions	
•  A	bespoke	performance	test	(PerfTest)	is	used	to	characterize	the	performance	
of	Connext	DDS,	and	can	be	used	in	conjunction	with	other	products,	e.g.,	
Routing	Service.	(Available	on	community.rti.com)		
•  A	specific	memTest	was	created	to	monitor	the	memory	footprint	of	Connext	
DDS.		
	
•  Connext	Micro	captures	memory	information	through	its	test	framework	
•  Admin	Console	takes	performance	snapshots	of	performance	critical	functions.	
The	results	are	analyzed	over	time		
•  Continuous	integration	of	PerfTest	and	MemTest	tests	ensures	we	do	not	regress	
as	new	features	are	added	to	the	Connext	DDS	product.
Automated performance, memory profiling and stress tests
compare variations with previous revisions. Performance data is
gathered at all levels of the product
Automated	Memory		
Usage	Statistics
DDS Secure Testing
•  DDS Secure functionality testing, including negative testing. E.g.,
–  configure DDS Secure with invalid governance or permissions file
–  configure DDS Secure with configuration files, with duplicate grant or subject names.
–  muck with the clock (e.g., provide a file with date past 2038)
–  tamper with wire communication
–  enable DDS Secure plugin with missing functions
•  DDS feature interoperability testing - validating how security interoperates with various
DDS features and products (e.g., reliability, batching, built-in types, CFT, different
transports, routing service, persistence service, etc)
•  DDS Vendor interoperability testing
•  Robustness and Performance testing
–  Valgrind (with/without RTI buffer mgt), perftest, discovery scalability
•  Usability testing
•  Red team testing at DoD IA Range in Quantico VA, part of the USS SECURE project
•  Fuzz testing
Endurance Testing
Testing	for	memory	growth,	or	other	unexpected	scenarios	in	long	
running	scenarios:	
1.  Start	publishing	samples	using	a	high	sequence	number.	
2.  Remote	participants	appearing	and	disappearing.	
3.  Remote	endpoints	appearing	and	disappearing.	
4.  Endpoints	communicating	with	different	instances	and	
message	sizes,	including	batching.	
	
More	to	come.		
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	
The RTI IIoT Lab
Our products are supported on a large set of architectures
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.	
The RTI HQ Lab Infrastructure consists of a large variety of target
architectures, a virtualized build and test infrastructure for enterprise
systems and a performance lab
©2018	Real-Time	Innovations,	Inc.	Confidential.
Software Architecture
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
RTI HQ IP Mobility Test Lab
©2018	Real-Time	Innovations,	Inc.	
Great	products	are	built		
…	by	great	and	motivated	people	
…	with	the	right	tools		
…	and	guided	by	the	professional	processes	
With	Headquarters	in	Sunnyvale,	CA	and	a	Development	and	Support	Center	in	Granada,	Spain
Thank	you	
	
#MunichConnextCon18	
jan@rti.com

More Related Content

What's hot

Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overview
tbeckwith
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
DBmaestro - Database DevOps
 
Craig Williams Resume_rev3
Craig Williams Resume_rev3Craig Williams Resume_rev3
Craig Williams Resume_rev3
Craig Williams
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of Things
Real-Time Innovations (RTI)
 
5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security
Doina Draganescu
 
Version1 database-managed-services-brochure
Version1 database-managed-services-brochureVersion1 database-managed-services-brochure
Version1 database-managed-services-brochure
Version 1
 
DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715
Patrick Eyberg
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
AlienVault
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Amazon Web Services
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don Jones
Netwrix Corporation
 
Security and Safety Assurance in Industrial IoT
Security and Safety Assurance in Industrial IoTSecurity and Safety Assurance in Industrial IoT
Security and Safety Assurance in Industrial IoT
Vladimir Sklyar
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutions
Netwrix Corporation
 
Audiovisual Digitization and Quality Control: How do people really do this?
Audiovisual Digitization and Quality Control: How do people really do this?Audiovisual Digitization and Quality Control: How do people really do this?
Audiovisual Digitization and Quality Control: How do people really do this?
WiLS
 
Hadoop and Big Data Security
Hadoop and Big Data SecurityHadoop and Big Data Security
Hadoop and Big Data Security
Chicago Hadoop Users Group
 

What's hot (14)

Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overview
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Craig Williams Resume_rev3
Craig Williams Resume_rev3Craig Williams Resume_rev3
Craig Williams Resume_rev3
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of Things
 
5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security
 
Version1 database-managed-services-brochure
Version1 database-managed-services-brochureVersion1 database-managed-services-brochure
Version1 database-managed-services-brochure
 
DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don Jones
 
Security and Safety Assurance in Industrial IoT
Security and Safety Assurance in Industrial IoTSecurity and Safety Assurance in Industrial IoT
Security and Safety Assurance in Industrial IoT
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutions
 
Audiovisual Digitization and Quality Control: How do people really do this?
Audiovisual Digitization and Quality Control: How do people really do this?Audiovisual Digitization and Quality Control: How do people really do this?
Audiovisual Digitization and Quality Control: How do people really do this?
 
Hadoop and Big Data Security
Hadoop and Big Data SecurityHadoop and Big Data Security
Hadoop and Big Data Security
 

Similar to The Tools and Machinery behind the curtain

Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
Giovanni Zanasca
 
I doc on cloud
I doc on cloudI doc on cloud
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
Real-Time Innovations (RTI)
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
ForgeRock
 
Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized Enterprises
TeamBreota
 
Stan Adkerson Professional Resume
Stan Adkerson Professional ResumeStan Adkerson Professional Resume
Stan Adkerson Professional Resume
Stan Adkerson
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
kanimozhin
 
Harsha CV
Harsha CVHarsha CV
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
Precisely
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
BabyBoy55
 
Software architecture
Software architectureSoftware architecture
Software architecture
Rifad Mohamed
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By Design
Amazon Web Services
 
Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions
Icinga
 
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Precisely
 
IoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreads
IndicThreads
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
Digital Bond
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
Techcello
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
IBM
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Glen Roberts, CISSP
 

Similar to The Tools and Machinery behind the curtain (20)

Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
 
I doc on cloud
I doc on cloudI doc on cloud
I doc on cloud
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized Enterprises
 
Stan Adkerson Professional Resume
Stan Adkerson Professional ResumeStan Adkerson Professional Resume
Stan Adkerson Professional Resume
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
Harsha CV
Harsha CVHarsha CV
Harsha CV
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
Software architecture
Software architectureSoftware architecture
Software architecture
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By Design
 
Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions
 
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
 
IoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreads
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
 

Recently uploaded

Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 

Recently uploaded (20)

Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 

The Tools and Machinery behind the curtain