What if your coffee machine makes your coffee when you wake up and how about if it tells your toaster to keep your sandwich ready at your breakfast time? Thread is built to turn cool ideas like these into reality!
Had the pleasure to introduce and discuss LoRaWaN unconference IoT 2018 and Smart IoT Product Managers Meetup in Tel Aviv. This presentation is a practical guide to LoRaWan and what it takes to build solutions with it.
Presentation by Quaenet on what LoRaWAN is and the role it plays in the Internet of Things (IoT and IIoT). Presented at Silicon Halton IoT Peer2Peer group Sep 2018.
This presentation gives brief description of Wi-Fi Technolgy, standards, applications,topologies, how Wi-Fi network works, security,advantages and innovations.
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends:
Exposing the device to a management framework
Exposing that management framework to a business centric logic
Exposing that business layer and data to end users.
This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles between cloud, APIs and native hardware/software configurations.
Had the pleasure to introduce and discuss LoRaWaN unconference IoT 2018 and Smart IoT Product Managers Meetup in Tel Aviv. This presentation is a practical guide to LoRaWan and what it takes to build solutions with it.
Presentation by Quaenet on what LoRaWAN is and the role it plays in the Internet of Things (IoT and IIoT). Presented at Silicon Halton IoT Peer2Peer group Sep 2018.
This presentation gives brief description of Wi-Fi Technolgy, standards, applications,topologies, how Wi-Fi network works, security,advantages and innovations.
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends:
Exposing the device to a management framework
Exposing that management framework to a business centric logic
Exposing that business layer and data to end users.
This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles between cloud, APIs and native hardware/software configurations.
Bluetooth Low Energy (BLE) or Bluetooth Smart is the low energy version of Bluetooth and integrated into the Bluetooth standard v4.0. The presentation briefs about the BLE and its architecture.
Presented at Robert Bosch Centre for Cyber Physical Systems at Indian Institute of Science, Bengaluru
We did not predict the Internet, the Web, social networking, Facebook, Twitter, millions of apps for smart-phones, etc. New research problems arise due to the large scale of devices, the connection of the physical and cyber worlds, the openness of the systems of systems, and continuing problems of privacy and security. It is hoped that there is more cooperation between the research communities in order to solve the myriad of problems sooner as well as to avoid re-inventing the wheel when a particular community solves a problem.
Z-wave is a protocol used for wireless communication mainly in home-automation. This protocols caters needs of residential control and automation market which effectively and smartly control lighting, security systems.
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
IoT and connected devices: an overviewPascal Bodin
This is the presentation I use as a support to my 9 hour-long talk to postgraduate students of a French Telecom and Electronics Master. The idea is to provide them with a broad view, including some non-technical domains.
A talk I gave to Hackware v0.7, v0.8, Hackers & Painters, NUS Hackers, One Maker Group and iOS Dev Scout to introduce the audience to basic Bluetooth Low Energy concepts followed by code explanations.
Part 1 of my presentation at Hackware v0.7 (Arduino and Android only) can be seen here. https://www.youtube.com/watch?v=pNnwXPatzjc
Part 2 (Raspberry Pi, iOS and BLE Sniffer) can be seen here. https://www.youtube.com/watch?v=UDNkrlfW9Sg
The code is available here. https://github.com/yeokm1/intro-to-ble
The new 5G unified air interface is being designed to not only vastly enhance mobile broadband performance and efficiency, but also scale to connect the massive Internet of Things and enable new types of services such as mission critical control that require ultra-low latency and new levels of reliability and security. The new design will unify diverse spectrum types and bands, scale from macro deployments to local hotspots and efficiently multiplex the envisioned 5G services across an extreme variation of requirements.
For more information on 5G technologies, use cases and timelines, please visit us at www.qualcomm.com/5G.
Bluetooth Low Energy (BLE) or Bluetooth Smart is the low energy version of Bluetooth and integrated into the Bluetooth standard v4.0. The presentation briefs about the BLE and its architecture.
Presented at Robert Bosch Centre for Cyber Physical Systems at Indian Institute of Science, Bengaluru
We did not predict the Internet, the Web, social networking, Facebook, Twitter, millions of apps for smart-phones, etc. New research problems arise due to the large scale of devices, the connection of the physical and cyber worlds, the openness of the systems of systems, and continuing problems of privacy and security. It is hoped that there is more cooperation between the research communities in order to solve the myriad of problems sooner as well as to avoid re-inventing the wheel when a particular community solves a problem.
Z-wave is a protocol used for wireless communication mainly in home-automation. This protocols caters needs of residential control and automation market which effectively and smartly control lighting, security systems.
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
IoT and connected devices: an overviewPascal Bodin
This is the presentation I use as a support to my 9 hour-long talk to postgraduate students of a French Telecom and Electronics Master. The idea is to provide them with a broad view, including some non-technical domains.
A talk I gave to Hackware v0.7, v0.8, Hackers & Painters, NUS Hackers, One Maker Group and iOS Dev Scout to introduce the audience to basic Bluetooth Low Energy concepts followed by code explanations.
Part 1 of my presentation at Hackware v0.7 (Arduino and Android only) can be seen here. https://www.youtube.com/watch?v=pNnwXPatzjc
Part 2 (Raspberry Pi, iOS and BLE Sniffer) can be seen here. https://www.youtube.com/watch?v=UDNkrlfW9Sg
The code is available here. https://github.com/yeokm1/intro-to-ble
The new 5G unified air interface is being designed to not only vastly enhance mobile broadband performance and efficiency, but also scale to connect the massive Internet of Things and enable new types of services such as mission critical control that require ultra-low latency and new levels of reliability and security. The new design will unify diverse spectrum types and bands, scale from macro deployments to local hotspots and efficiently multiplex the envisioned 5G services across an extreme variation of requirements.
For more information on 5G technologies, use cases and timelines, please visit us at www.qualcomm.com/5G.
The Differences Between Bluetooth, ZigBee and WiFiMostafa Ali
Understanding Differences Between Bluetooth, ZigBee and WiFi.
It's not about what is the best it's just a description, the best you have to choose for your project what is suitable more?
The wireless technology which has wide range of applications in automation and control. Low power consumption and reliable data transfer is main advantage of this technology
The right Wireless Architecture for youCisco Canada
The explosion of mobile devices driven by the BYOD phenomena is placing a renewed focus and premium on proper WLAN design and deployment. Cisco offers the most extensive and flexible no solutions set on the market, from Autonomous Access Points to Converged Access, including FlexConnect and Cloud based solutions.
The EIT Digital Alumni Foundation creates a vibrant, active and successful alumni network for EIT Digital. Our mission is to keep strong connections among fellow alumni and the EIT Digital ecosystem.
We organise meet-ups, maintain an engaged community and discussion forum, keep track of alumni careers and support students and alumni to get in contact with companies, public institutions and academia.
Rainveig is responsible for CERN’s entrepreneurship activities: she works to foster a culture of entrepreneurship at one of the world’s largest centres for scientific research, as well as assisting personnel wanting to create companies.
"EIT Digital Alumni: State of Play" - Francesco BonadimanEIT Digital Alumni
The EIT Digital Alumni Foundation is a community which
gathers graduates of the educational programmes, as well as professionals who had a formal function within EIT Digital, a pan-European organization supported by the EIT, a body of the European Union.
Despite being just 3 years old, our community comprises over 900 registered members, the majority of whom are professionals working in some of the most renowned tech companies in the world, or running their own startup.
In the past 2 years only, we have organised more than 50 events, involving over 2000 participants, across tens of countries throughout Europe. More information and details can be found at http://alumni.eitdigital.eu
“Blockchain & Energy: hype or solution?” - Simone AccorneroEIT Digital Alumni
Learn about the current status of the energy transition, the importance of energy flexibility and how blockchain can help overcome market and technological challenges.
“Earthquakes aren’t the only thing shaking up Santiago” - Dora PalfiEIT Digital Alumni
I will be sharing my experience of moving to Santiago to participate in Start-Up Chile’s the S-factory program. All you need is an idea and a bit of courage: you might find yourself building your venture down South!
A story on how to keep Europe’s largest student organisation innovative. What can we learn from a community of volunteers, motivating each other to reach a common goal?
“Hands-on: Build a Low-Power IoT Prototype” - Hylke VisserEIT Digital Alumni
Get started with Internet of Things in less than an hour. In this technical workshop you’ll build a simple sensor system and connect it to the Internet. Requirements: Laptop with WiFi and a USB port. More info: https://ttn.fyi/eitdigital
“Create your own cryptocurrency in an hour” - Sandip PandeyEIT Digital Alumni
Blockchain has already started disrupting or improving several industries with innovative solutions impacting our lives in more ways than we could have ever imagined. One such application of blockchain is a cryptocurrency. In this workshop, we create a simple cryptocurrency based on smart contracts, and talk about a few best practises on writing secure smart contracts to get you started with developing decentralized applications.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
4. | What is Thread?
A low power, secure and Internet-based mesh networking
technology for IoT products.
• Built on proven, widely available and supported technologies
• Uses IPv6 (6LoWPAN)
• Runs on existing 802.15.4 silicon from multiple providers
• Legacy-free design with updated architecture
• Designed with a new security architecture to make it simple and
secure to add and remove products
• Supports 250+ products per network
• Designed for very low power operation
6LoWPAN
IEEE 802.15.4 MAC
Applications
UDP
IP Routing
Security/Commissioning
IEEE 802.15.4 PHY
5. | What is Thread?
✔ No single point of failure
✔ Self-healing
✔ Interference robustness
✔ Self-extending
✔ Reliable enough for critical
infrastructure
✔ Low power
✔ Resilient (mesh)
✔ IP-based
✔ Open protocol
✔ Secure and user friendly
✔ Fast time to market
✔ Existing radio silicon
Thread Is
6. |
Securely and scalably connecting an ecosystem of low power
products to each other, to cloud services, and to consumers via their
mobile devices supporting applications
• Appliances
• Access control
• Climate control
• Energy management
• Lighting
• Safety
• Security
Thread in Homes
9. |
The Thread Group is:
A technology alliance, not just another standards defining organization (SDO)
A nonprofit market education group promoting Thread’s use in connected products
Ensuring a great user experience through rigorous, meaningful product certification
Structured as a Delaware 501 (c) (6) Non-Profit Corporation for the mutual benefit of its members
Independent, vendor-neutral and open to all — any entity can join
Organizational membership only — one membership, one vote
Who Is Thread?
13. |
Border Router
Forwards data to and from
cloud/other networks
Provides optional Wi-Fi
connectivity
Ethernet
Wi-Fi
Cellular
Thread
Thread Router
Routes traffic among devices
Form the mesh topology
Eligible to become the Leader
End Device
Designed for low power operation
May be powered or sleepy
May be router-eligible if powered
Many One Up to 32 Up to 64 per Router+ + +
Hundreds of Devices per Network
=
Thread Leader
Manages network parameters
Coordinates commissioners
Makes network decisions
Network Topology Roles
14. |
W
i-Fi
System Messaging Model
Thread
Home Area Network
Device-to-device communication
within Thread network
Border router forwards data to
Wi-Fi / Ethernet / Cloud
Wi-Fi connectivity to mobile
devices when at homeCloud connectivity to mobile devices
when not at home
15. | Key Features Overview
•IP-based
• Simple bridging to other IP networks
•Flexible Network
• Not tied to specific device types
•Robust
• No single point of failure
•Secure
• Robust security, simple commissioning
•Low Power devices
• Support for battery powered devices
Physical Radio (PHY)
IEEE 802.15.4 MAC
(including MAC security)
IPv6
Distance Vector Routing
UDP + DTLS
Application Layer
IEEE 802.15.4 (2006)
RFC 4944,
RFC 6282, RFC 6775
RFC 1058, RFC 2080
RFC 768, RFC 6347, RFC
4279, RFC 4492, RFC 3315,
RFC 5007
Thread Standard
6LowPAN
RFC 4862
16. |
• All devices have IPv6 address plus short
address on HAN
• Devices for Unique Local Address (ULA)
locally or Global Unicast Address (GUA) if
IPv6 prefix available
• Home Network can directly address devices
through Border Routers
• Cloud Services can address devices from the
Internet
• Devices use IP to address any connected node
— HAN, LAN, or WAN
IP-based: Direct Addressability
End Device
Thread Leader
Thread Router
Border Router
Thread Link
17. |
• Devices join as Router Eligible or End
Device
• Router Eligible: Can become Routers if
needed
• First router on network becomes Leader
• Leader: Makes decisions within network
• End Devices: Route through parent
• Can be “sleepy” to reduce power consumption
Flexible: Simplified Device Types
End Device
Thread Leader
Thread Router
Border Router
Thread Link
18. |
• Dynamic Leaders
• If Leader fails, another Router will become
Leader
• Router Promotion
• Leader can promote Router Eligible devices to
Routers to improve connectivity if required
Robust: No Single Point of Failure
End Device
Thread Leader
Thread Router
Border Router
Thread Link
New Leader
Promoted
to Router
19. |
• Simple Commissioning
• User authorizes devices onto the network using smart
phone or web
• Can be done on network if there is a device with a
graphical interface (GUI)
• DTLS Security session established between new
device and commissioning device to authenticate
and provide credentials
• Once commissioning session is done — device
attaches to network
• MAC security used for all messages
• Application level security is based on end-device
Secure: Security and Commissioning
End Device
Thread Leader
Thread Router
Border Router
Thread Link
20. |
• Sleeping devices poll parents for messages
(or remote device if application
configured)
• Sleeping devices not required to check
which allows lower power operation
• Parents hold messages for sleeping
devices
• Sleeping device automatically switches
parent connection is lost
Low Power Operation: Sleepy Devices
End Device
Thread Leader
Thread Router
Border Router
Thread Link
21. |
• Commercial products must be certified in order to receive the Thread logo
• Validation of device behavior
• Commissioning
• Network functionality and interoperability
• Device operation in network
• The certification program addresses components and end products
• Sponsor and Contributor Members have access to a standard test harness
and sample commissioning app
• Certification uses a 3rd party test lab
Thread Certification
22. |
• Enables users to effortlessly add devices
on the Thread Network and manage
settings
• Designed as a reference app with source
code for all Sponsor and Contributor level
members
• Communication via Thread Group’s
MeshCoP Protocol and CoAP
• Communication library written in C and
C++, leveraging code that is extendable
across iOS and Android
Thread Commissioning Application
24. | The Value of Thread
MARKET READY
Broad selection of silicon
Four certified stacks
Publicly available specification
Active certification program
Fast-ramp tools accelerating
time to market
Global Solution
SEAMLESSLY
INTEGRATED
Seamlessly and securely works
with users’ existing networks
Extends the internet into low
power end devices without
translators
Easily extends to personal
devices
IP-BASED
Convergence layer across all
networks
Ease of Development
Application layer choices
Multiple Ecosystems
Flexibility to add or change app
layers, ecosystems
Device-to-device and device-to-
cloud communication
BUILT FOR IoT
Low energy footprint
Secure and reliable
connectivity
No single point of failure
Interoperability
Scalability
Based on proven standards
Thread is a low power, secure and future-proof mesh networking technology for IoT products.
25. |
•What is the environment?
• Home, Commercial, Professional, Personal?
• Number of devices to support?
•Is it standalone or part of an ecosystem?
• A proprietary ecosystem?
• Established industry ecosystem or ecosystems?
• Is it a single product or a system?
•What is this product connecting to?
Defining the IoT Product