DDS Advanced Tutorial - OMG June 2013 Berlin MeetingJaime Martin Losa
An extended, in-depth tutorial explaining how to fully exploit the standard's unique communication capabilities.Presented at the OMG June 2013 Berlin Meeting.
Users upgrading to DDS from a homegrown solution or a legacy-messaging infrastructure often limit themselves to using its most basic publish-subscribe features. This allows applications to take advantage of reliable multicast and other performance and scalability features of the DDS wire protocol, as well as the enhanced robustness of the DDS peer-to-peer architecture. However, applications that do not use DDS's data-centricity do not take advantage of many of its QoS-related, scalability and availability features, such as the KeepLast History Cache, Instance Ownership and Deadline Monitoring. As a consequence some developers duplicate these features in custom application code, resulting in increased costs, lower performance, and compromised portability and interoperability.
This tutorial will formally define the data-centric publish-subscribe model as specified in the OMG DDS specification and define a set of best-practice guidelines and patterns for the design and implementation of systems based on DDS.
Learn the latest about the DASH7 open source firmware project, OpenTag, with support for new DASH7 capabilities like RTLS, better sensor and security support, and bitrates of up to 200kbps.
How to connect FIWARE to Robots ? We discuss how the FIWARE enablers can connect to ROS2, a de facto standard for robotic frameworks, using Fast RTPS and KIARA.
Ein Anlass des www.swissipv6council.ch
Referentin: Nathalie Trenaman, RIPE NCC
Nathalie Trenaman von RIPE wird in ihrem Referat Best Practices zur Adressierung vermitteln und aufzeigen, wie Firmen zu ihrem IPv6 Range kommen. Die definitive Agenda wird so bald wie möglich bekannt gegeben.
Das Referat wird in Englisch gehalten.
18:00 Uhr
Begrüssung durch Silvia Hagen, Präsidentin Swiss IPv6 Council
18:05 Uhr
Nathalie Trenaman, RIPE
Inhalt:
1. Teil
IPv6 Adressierung
Wie muss ich ein IPv6 Netzwerk konzeptionell aufsetzen?
2. Teil
Policies
Vorstellung der Möglichkeiten für Unternehmen, sich die IPv6 Adressen zu sichern
Wer bekommt welche Ranges?
Wie muss man sich bewerben?
Q&A
Über RIPE NCC
RIPE NCC is the Regional Internet Registry responsible for IPv6 distribution in Europe, Middle East and Central Asia. We build awareness among all Internet stakeholders of the need to deploy IPv6. At this moment, RIPE NCC has over 10.000 members. 69% of these members have a block of IPv6 addresses. The first hurdle of an IPv6 deployment is building a scalable IPv6 addressing plan. Since there are so many addresses and distribution is done in subnets, a lot of engineers and architects see this phase of the deployment as one of the most challenging. Nathalie will shine a light on current best practices, taking into account different transitioning mechanisms and end users.
DDS Advanced Tutorial - OMG June 2013 Berlin MeetingJaime Martin Losa
An extended, in-depth tutorial explaining how to fully exploit the standard's unique communication capabilities.Presented at the OMG June 2013 Berlin Meeting.
Users upgrading to DDS from a homegrown solution or a legacy-messaging infrastructure often limit themselves to using its most basic publish-subscribe features. This allows applications to take advantage of reliable multicast and other performance and scalability features of the DDS wire protocol, as well as the enhanced robustness of the DDS peer-to-peer architecture. However, applications that do not use DDS's data-centricity do not take advantage of many of its QoS-related, scalability and availability features, such as the KeepLast History Cache, Instance Ownership and Deadline Monitoring. As a consequence some developers duplicate these features in custom application code, resulting in increased costs, lower performance, and compromised portability and interoperability.
This tutorial will formally define the data-centric publish-subscribe model as specified in the OMG DDS specification and define a set of best-practice guidelines and patterns for the design and implementation of systems based on DDS.
Learn the latest about the DASH7 open source firmware project, OpenTag, with support for new DASH7 capabilities like RTLS, better sensor and security support, and bitrates of up to 200kbps.
How to connect FIWARE to Robots ? We discuss how the FIWARE enablers can connect to ROS2, a de facto standard for robotic frameworks, using Fast RTPS and KIARA.
Ein Anlass des www.swissipv6council.ch
Referentin: Nathalie Trenaman, RIPE NCC
Nathalie Trenaman von RIPE wird in ihrem Referat Best Practices zur Adressierung vermitteln und aufzeigen, wie Firmen zu ihrem IPv6 Range kommen. Die definitive Agenda wird so bald wie möglich bekannt gegeben.
Das Referat wird in Englisch gehalten.
18:00 Uhr
Begrüssung durch Silvia Hagen, Präsidentin Swiss IPv6 Council
18:05 Uhr
Nathalie Trenaman, RIPE
Inhalt:
1. Teil
IPv6 Adressierung
Wie muss ich ein IPv6 Netzwerk konzeptionell aufsetzen?
2. Teil
Policies
Vorstellung der Möglichkeiten für Unternehmen, sich die IPv6 Adressen zu sichern
Wer bekommt welche Ranges?
Wie muss man sich bewerben?
Q&A
Über RIPE NCC
RIPE NCC is the Regional Internet Registry responsible for IPv6 distribution in Europe, Middle East and Central Asia. We build awareness among all Internet stakeholders of the need to deploy IPv6. At this moment, RIPE NCC has over 10.000 members. 69% of these members have a block of IPv6 addresses. The first hurdle of an IPv6 deployment is building a scalable IPv6 addressing plan. Since there are so many addresses and distribution is done in subnets, a lot of engineers and architects see this phase of the deployment as one of the most challenging. Nathalie will shine a light on current best practices, taking into account different transitioning mechanisms and end users.
Aspekte von IPv6-Security
• Hackertools & ein paar Angriffsszenarien
• 3 Empfehlungen
q a) Ist IPv6 sicherer als IPv4?
q b) Ist IPv6 unsicherer als IPv4?
q c) Wer ist an allem Schuld?
q d) Wie wirkt sich die Integration von IPv6 in
meine Organisation auf deren IT-Sicherheit aus?
Excellent primer on the DASH7 open source firmware environment called OpenTag that now supports DASH7 Mode 2, which enables multi-hop communications, better crypto and sensor support, multi-channel architecture, and much more in a very small (sub 20kb) stack.
DDS over Low Bandwidth Data Links - Connext Conf London October 2014Jaime Martin Losa
DDS (Data Distribution Service) over Low Bandwidth Data Links: Tactical Radios, Satellite, etc.
DDS implementations are widely used in defense and aerospace applications, being common to use very low bandwitdh data links.
This presentation explain how to achieve good performance in these scenarios.
A framework for building a strategic Enterprise IPv6 plan
Create a project team & plan
Identify business value, requirements & impacts
Assess equipment & applications for IPv6
Begin training & develop training plan
Develop the architectural solution
Obtain a prefix and build the address plan
Define an exception process for legacy systems
Update the security policy
Deploy IPv6 trials in the network
Test and monitor your deployment
eProsima RPC over DDS - OMG June 2013 Berlin MeetingJaime Martin Losa
DDS is being increasingly selected as the foundation of many mission- and business-critical systems. Some of these systems are designed to be completely data-centric and asynchronous, while others prefer to maintain some interactions (such as placing an order, performing a computation, etc.) as traditional client/server, request/reply, interactions. As such, many DDS users would like to define Services as a collection of operations/methods, and invoke methods using DDS as the transport for requests, replies and exceptions.
This talk will introduce eProsima RPC for DDS, a high performance Remote Procedure Call framework based on DDS, 100% standards-based and open source.
Swiss IPv6 Council Event, 24.02.2014
Neue Anforderungen an Security Devices durch IPv6
Referent: Christoph Weber, Swisscom
Mit der Einführung von IPv6 in die Datacenter und Client-Netzwerke werden neue Anforderungen an Security Devices wie Firewall, IDS/IPS und andere Security Enforcement Points gestellt. Dies erfordert Kenntnis von IPv6-spezifischen Security-Threats. Darauf basierend müssen neue Anforderungen definiert werden, gegen die anzuschaffende Geräte getestet werden müssen. Weiterhin müssen Standards bei bestehenden Geräten diesbezüglich angepasst werden, deren Implementierung validiert und Auditierungen angepasst werden.
In der Präsentation durch Christoph Weber von Swisscom werden die Ansätze, Ideen und Tools anhand von Firewall-Tests aufgezeigt und dargestellt, wie diese praktisch durchgeführt werden können und wie Ergebnisse bewertet werden müssen.
Fiware - communicating with ROS robots using Fast RTPSJaime Martin Losa
How to connect FIWARE to Robots ? We discuss how the FIWARE enablers can connect to ROS2, a de facto standard for robotic frameworks, using Fast RTPS and KIARA.
Aspekte von IPv6-Security
• Hackertools & ein paar Angriffsszenarien
• 3 Empfehlungen
q a) Ist IPv6 sicherer als IPv4?
q b) Ist IPv6 unsicherer als IPv4?
q c) Wer ist an allem Schuld?
q d) Wie wirkt sich die Integration von IPv6 in
meine Organisation auf deren IT-Sicherheit aus?
Excellent primer on the DASH7 open source firmware environment called OpenTag that now supports DASH7 Mode 2, which enables multi-hop communications, better crypto and sensor support, multi-channel architecture, and much more in a very small (sub 20kb) stack.
DDS over Low Bandwidth Data Links - Connext Conf London October 2014Jaime Martin Losa
DDS (Data Distribution Service) over Low Bandwidth Data Links: Tactical Radios, Satellite, etc.
DDS implementations are widely used in defense and aerospace applications, being common to use very low bandwitdh data links.
This presentation explain how to achieve good performance in these scenarios.
A framework for building a strategic Enterprise IPv6 plan
Create a project team & plan
Identify business value, requirements & impacts
Assess equipment & applications for IPv6
Begin training & develop training plan
Develop the architectural solution
Obtain a prefix and build the address plan
Define an exception process for legacy systems
Update the security policy
Deploy IPv6 trials in the network
Test and monitor your deployment
eProsima RPC over DDS - OMG June 2013 Berlin MeetingJaime Martin Losa
DDS is being increasingly selected as the foundation of many mission- and business-critical systems. Some of these systems are designed to be completely data-centric and asynchronous, while others prefer to maintain some interactions (such as placing an order, performing a computation, etc.) as traditional client/server, request/reply, interactions. As such, many DDS users would like to define Services as a collection of operations/methods, and invoke methods using DDS as the transport for requests, replies and exceptions.
This talk will introduce eProsima RPC for DDS, a high performance Remote Procedure Call framework based on DDS, 100% standards-based and open source.
Swiss IPv6 Council Event, 24.02.2014
Neue Anforderungen an Security Devices durch IPv6
Referent: Christoph Weber, Swisscom
Mit der Einführung von IPv6 in die Datacenter und Client-Netzwerke werden neue Anforderungen an Security Devices wie Firewall, IDS/IPS und andere Security Enforcement Points gestellt. Dies erfordert Kenntnis von IPv6-spezifischen Security-Threats. Darauf basierend müssen neue Anforderungen definiert werden, gegen die anzuschaffende Geräte getestet werden müssen. Weiterhin müssen Standards bei bestehenden Geräten diesbezüglich angepasst werden, deren Implementierung validiert und Auditierungen angepasst werden.
In der Präsentation durch Christoph Weber von Swisscom werden die Ansätze, Ideen und Tools anhand von Firewall-Tests aufgezeigt und dargestellt, wie diese praktisch durchgeführt werden können und wie Ergebnisse bewertet werden müssen.
Fiware - communicating with ROS robots using Fast RTPSJaime Martin Losa
How to connect FIWARE to Robots ? We discuss how the FIWARE enablers can connect to ROS2, a de facto standard for robotic frameworks, using Fast RTPS and KIARA.
On the migration of a large scale network from i pv4 to ipv6 environmentIJCNCJournal
This work mainly addresses the design a large scale network using dual stack mechanisms. We focused on
the most important theoretical concepts of the IPv6 protocol, such as addressing, address allocation,
routing with the OSPF and BGP protocols and routing protocols performance in dual stack network using
GNS3 and Wireshark simulators. we have a tendency to measure a perfect model and a true large-scale
network atmosphere victimization out there end-to-end activity techniques that focuses on a large-scale
IPv4 and IPv6 backbone and created performance the IPv4 and IPv6 network. In this paper, we compiled
IPv6 address planning in large scale network, performance statistics of each network in terms of TCP
throughput, delay jitters, packet loss rate, and round trip time. It is found that, a minor degradation within
the throughput of the TCP, delay jitter, a lower packet loss rate, and a rather longer round trip time are
occurred in a real large scale dual stack network
1.What is IP address
2.When & how it was devised
3.IPV4 Features & its functionality
4.Benefits of IPV4 & Devices supporting IPV4
5.Problems of IPV4 & What happened to IPV5
6.What led to IPV6
7.IPV6 Features & Functionality
8.Benefits of IPV6 & supporting devices
9.How transition from IPV4 to IPV6 will happen
10.Problems & challenges that are anticipated & Conclusion
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
Network optimization of ipv6 networks using tunnel header compressioneSAT Journals
Abstract
IPv6 is the successor internet protocol which will eventually replace IPv4. These two protocols are not compatible with each other and it will take time to migrate towards IPv6, until then both the protocols need to coexist for a long time. The main overhead involved with both the protocols is header length of 20 bytes in case of IPv4 and of 40 bytes in case of IPv6. This overhead will affect the network performance specially over tunneling mechanism where one header is encapsulated inside another. Tunneling is widely deployed over the network for various purposes like network security, mobility and transition mechanism. Header compression can be applied to compress the excess protocol headers to improve the performance of network. In this paper we want to use header compression in context of 6 to 4 tunneling transition. Using header compression over 6 to 4 tunnels would result in better response times reduced packet size and reduced packet losses. We want to simulate this algorithm using EXata Cyber 1.1 simulator.
Keywords: Header Compression, IPv4, IPv6, ROHC, 6 to 4 tunneling.
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
Research the issues that you might face as a network administrator whe.docxacarolyn
Research the issues that you might face as a network administrator when moving an enterprise network from IPv4 to IPv6. Discuss the changes you will need to make in your day-to-day activities managing the network or the tools you will need. Assume the addressing scheme has been worked out. How will this change impact your troubleshooting process, your tools, and the process you use to identify network errors?
Solution
The task of switching from IPv4 to IPv6 is a daunting task since virtually every device needs to support it. It’s best to approach a cost-effective implementation in steps or phases, breaking down your network security and system’s environment into smaller components. There are several important factors to consider before implementing an IPv6 strategy. These include:
IP Address Management
Address Management is one of the most important factors to understand before you implement an IPv6 strategy. Many of the ideas that governed the design of IPv4 networks are not necessary in IPv6, and in some cases hinder it. When designing IPv4 networks, conservation is a driving factor. With IPv6, this is no longer a concern.For this reason, transitioning from IPv4 to IPv6 may feel uncomfortable at first. The designers of IPv6 have recommended ISP internet service allocate /48 networks to all customers with the exception of very large or mobile customers. It is highly recommended to run a /64 on all LANs, regardless of size. Many protocols in IPv6 such as Stateless Address Auto-configuration (SLAAC) require the use of /64 on all LAN interfaces. It is highly recommended not to use more specific networks such as /96 for your LANs. The exception to this would be for assigning addresses to WAN point to point links and loopback interfaces. WAN links can be assigned /126 networks, and loopback interfaces should have /128 addresses.
Dual Stack Support
Dual Stack Support is a fundamental requirement for implementing IPv6. Your network security design may include the typical core, distribution, and access layers. Implementing IPv6 in the core first, then through the distribution and access layers is optimal.
Prepare a plan of action to research a network problem.
Conduct the research needed to isolate the problem.
Use a structured approach to identify a network problem.
Identify the severity of a network problem based on its initial symptoms.
Detecting errors like dropped packets or retransmissions on the network level is relatively easy. Figuring out if those errors affect the performance and connectivity of your services is however another matter. Some network errors are mitigated and compensated for by network protocols and active networking components, like network interfaces. Meanwhile, other network errors lead to performance problems that negatively affect your services.
.
My first book preview.
The published eBook willl have plenty of Hyperlinks to Flash movies to explain advanced topics. You can donate or order the books if you want.
These are a few tools that we are using during my advanced IPv6 Training and in particular the "Hacking and Protecting IPv6 Networks"
Enjoy!
http://www.ipv6forlife.com/modulation/IPv6HackSecu4.html
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar