Learn how to addressing medical and industrial challenges with BlackBerry QNX...Qt
The QNX® Neutrino® and its safety variant, the QNX® OS for Safety, are widely regarded as safe and secure operating systems for embedded devices, and Qt is one of the most widely used application and device development frameworks. In this webinar we will explore how solutions from these two embedded powerhouses can be combined for an even more powerful solution when stringent functional safety and security requirements are encountered.
1) The document discusses securing IoT devices and infrastructure through X.509 certificate-based identity and attestation, TLS-based encryption, and secure provisioning and management.
2) It describes securing the cloud infrastructure with Azure Security Center, Azure Active Directory, Key Vault, and policy-based access controls.
3) The document promotes building security into devices and infrastructure from the start through standards-based and custom secure hardware modules.
Towards 0-bug software in the automotive industryAshley Zupkus
What are the software safety and security standards that software developers in the automotive industry need to meet? How can safe, secure code be developed in accordance with the industry norms like ISO 26262, ISO 21434, and SOTIF? Experts specialized in the automotive industry will answer all your questions in this webinar dedicated to automotive software safety and security.
1. Latest safety and security standards for automotive software (ISO 26262, ISO 21434, and SOTIF) and how they impact software developers' work - Amin Amini, CertX
2. How to implement coding best practices to ensure the highest levels of safety & security in software in autonomous vehicles - Arnaud Telinge, EasyMile
3. How can code analysis tools be leveraged to help reach ISO 26262 and ISO 21434 demands more efficiently - Fabrice Derepas, TrustInSoft
AWS IoT is a fully managed cloud platform that allows connected devices to securely interact with cloud applications and other devices. It provides device SDKs, rules engines, authentication/authorization, and persistent device states. Z#bre uses the AWS IoT platform to power their connected healthcare product Lysbox, which monitors elderly individuals, allowing them to live independently longer while reducing costs. The scalable AWS IoT platform helps Z#bre deploy and manage thousands of devices across different networks and protocols.
Java in the Air: A Case Study for Java-based Environment Monitoring StationsEurotech
Eurotech and Oracle Joint presentation at JavaOne 2014 that introduces:
IoT Present and Challenges
Java, OSGi and Eclipse Kura: IoT Gateway Services
Embedded Data Stream: Edge Analytics
Use Case: Environment Monitoring Stations
Security and Robustness for VEDLIoT Components, from Cloud through Edge. Marcelo Pasin. VEDLIoT Conference Track co-located with IoT Tech Expo, Amsterdam, Netherlands, September 2023
This presentation by Westermo’s Technical Lead Engineers Dakota Diehl and Benjamin Campbell, is an integral part of the Westermo webinar held on April 30th 2020, covering how to simplify your network management using Westermo software tools WeConnect and WeConfig.
Watch the webinar session here: https://www.westermo.com/news-and-events/webinars/simplify-your-network-management-using-software-tools
People Counting: Internet of Things in Motion at JavaOne 2013Eurotech
This document discusses using Java and related technologies like OSGi and Eclipse Kura to develop an IoT gateway and edge analytics solution for environmental monitoring stations. It presents a use case of sensors collecting air quality data and transmitting it via MQTT to databases in the cloud for storage and complex event processing. The proposed architecture leverages Java SE Embedded, OSGi, and Oracle Event Processing Embedded to implement filtering, correlation, alerts and statistics on the gateway before transmitting data to an Everyware Cloud and Oracle Cloud for further analytics and management of devices.
Learn how to addressing medical and industrial challenges with BlackBerry QNX...Qt
The QNX® Neutrino® and its safety variant, the QNX® OS for Safety, are widely regarded as safe and secure operating systems for embedded devices, and Qt is one of the most widely used application and device development frameworks. In this webinar we will explore how solutions from these two embedded powerhouses can be combined for an even more powerful solution when stringent functional safety and security requirements are encountered.
1) The document discusses securing IoT devices and infrastructure through X.509 certificate-based identity and attestation, TLS-based encryption, and secure provisioning and management.
2) It describes securing the cloud infrastructure with Azure Security Center, Azure Active Directory, Key Vault, and policy-based access controls.
3) The document promotes building security into devices and infrastructure from the start through standards-based and custom secure hardware modules.
Towards 0-bug software in the automotive industryAshley Zupkus
What are the software safety and security standards that software developers in the automotive industry need to meet? How can safe, secure code be developed in accordance with the industry norms like ISO 26262, ISO 21434, and SOTIF? Experts specialized in the automotive industry will answer all your questions in this webinar dedicated to automotive software safety and security.
1. Latest safety and security standards for automotive software (ISO 26262, ISO 21434, and SOTIF) and how they impact software developers' work - Amin Amini, CertX
2. How to implement coding best practices to ensure the highest levels of safety & security in software in autonomous vehicles - Arnaud Telinge, EasyMile
3. How can code analysis tools be leveraged to help reach ISO 26262 and ISO 21434 demands more efficiently - Fabrice Derepas, TrustInSoft
AWS IoT is a fully managed cloud platform that allows connected devices to securely interact with cloud applications and other devices. It provides device SDKs, rules engines, authentication/authorization, and persistent device states. Z#bre uses the AWS IoT platform to power their connected healthcare product Lysbox, which monitors elderly individuals, allowing them to live independently longer while reducing costs. The scalable AWS IoT platform helps Z#bre deploy and manage thousands of devices across different networks and protocols.
Java in the Air: A Case Study for Java-based Environment Monitoring StationsEurotech
Eurotech and Oracle Joint presentation at JavaOne 2014 that introduces:
IoT Present and Challenges
Java, OSGi and Eclipse Kura: IoT Gateway Services
Embedded Data Stream: Edge Analytics
Use Case: Environment Monitoring Stations
Security and Robustness for VEDLIoT Components, from Cloud through Edge. Marcelo Pasin. VEDLIoT Conference Track co-located with IoT Tech Expo, Amsterdam, Netherlands, September 2023
This presentation by Westermo’s Technical Lead Engineers Dakota Diehl and Benjamin Campbell, is an integral part of the Westermo webinar held on April 30th 2020, covering how to simplify your network management using Westermo software tools WeConnect and WeConfig.
Watch the webinar session here: https://www.westermo.com/news-and-events/webinars/simplify-your-network-management-using-software-tools
People Counting: Internet of Things in Motion at JavaOne 2013Eurotech
This document discusses using Java and related technologies like OSGi and Eclipse Kura to develop an IoT gateway and edge analytics solution for environmental monitoring stations. It presents a use case of sensors collecting air quality data and transmitting it via MQTT to databases in the cloud for storage and complex event processing. The proposed architecture leverages Java SE Embedded, OSGi, and Oracle Event Processing Embedded to implement filtering, correlation, alerts and statistics on the gateway before transmitting data to an Everyware Cloud and Oracle Cloud for further analytics and management of devices.
Cybersecurity and Software Updates in Medical Devices.pdfICS
This document discusses cybersecurity and software updates in medical devices. It provides an overview of Integrated Computer Solutions (ICS) and the services it offers for medical device development. These include human factors engineering, software development, medical device cybersecurity, and software verification testing. The document also discusses Toradex and the Torizon platform it provides for over-the-air software updates in embedded systems. It notes regulations and standards driving new requirements for medical device cybersecurity and software updates. Finally, it discusses strategies for implementing secure software updates, including A/B updates, delta updates, container-based updates, and leveraging hardware encryption.
Learn what makes SCADAguardian (the Nozomi Networks flagship technology) so unique and powerful. From enterprise IT, to OT, we enable scalable security strategies for ICS.
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Codit
While working on several Internet of Things projects with different customers in Europe, it became clear that Integration matters more than ever. Building an overall IoT solution requires many different technologies and skills. The Architect role is crucial to combining different services into one solid solution. Integration skills are extremely important in building robust and scalable IoT solutions. Every phase of the IoT value chain requires integration, since IoT solutions are distributed and decoupled by nature. Retro-fitting existing devices? Routing of telemetry data? Or even exposing analytics results through secured APIs? All these challenges require integration skills. Skills that are very familiar to specialists in the Integration business. This presentation will explain why these are great times to be an Integration expert and how we can help tackling current challenges.
IoT Solutions Made Simple with Everyware IoTEurotech
Everyware IoT is the IoT architecture designed by Eurotech: it is flexible, end-to-end and open. Its building blocks are the Multi-service IoT Gateways, Everyware Software Framework (ESF), the Java OSGi software framework for IoT gateways and Everyware Cloud, the IoT integration platform.
IoT and M2M Services for the Railway MarketEurotech
M2M and IoT railway applications in which our customers used Eurotech’s EDC Platform to deliver advanced services and to gain significant savings in achieving better energy efficiency, managing passenger flow and implementing smart video surveillance.
An Introduction to Eclipse Kura - Eclipse Day Florence 2014Eurotech
Deploying and configuring one device to act as a node in the Internet of Things is relatively easy. Doing the same for hundreds or thousands of devices is not so easy though. This is where the new Eclipse project Kura comes in.
Kura is a Java/OSGi-based container for M2M applications running in service gateways.
Kura was contributed to Eclipse by Eurotech who developed the original technology to run on everything from general purpose devices, rugged mobile computers, wearable devices, service gateways and vehicle consoles, all the way down to the Raspberry Pi.
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Codit
“Internet of Things” is changing our world and today the Internet of Things knows almost as many applications as there are types of devices connected. In this session, Sam and Glenn will give an overview of the latest IoT solutions, the different learnings from the field and explain which key components are instrumental to integrating your solutions to the Azure IoT platform to ensure they are robust, future-proof and secure.
M2M in Transportation, Mining and AgricultureEurotech
Eurotech's M2M Offering for Transportation and Mobility
Rugged Devices and Solutions for Vehicles
Vertical Market Applications for Transportation, Agriculture and Mining.
The document discusses the architecture of the AWS IoT platform. It allows connected devices to interact securely with cloud applications and other devices. It includes device SDKs to connect and authenticate devices, a device gateway to communicate over MQTT and HTTP, authentication and authorization using certificates, a rules engine to route messages based on rules, and a device shadow for persistent device states. It also includes a device registry for identity management and the AWS IoT APIs. The platform securely connects millions of devices and applications with zero provisioning required.
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Codit
The document discusses different connectivity options for IoT including direct connectivity, cloud gateways, and field gateways. It also summarizes some pitfalls to consider like assuming stable cloud connectivity, neglecting legacy systems, forgetting edge capabilities, weak security, and lack of remote updates. Additionally, it provides an overview of the Azure IoT landscape and services like IoT Hub, IoT Edge, analytics services, and security features. It describes how IoT Hub can be used for device management including configuration, querying, and troubleshooting.
IoT is a green field of new business opportunities. The ran has started…..
Everyware Device Cloud (EDC) is a full set of Operational Technologies available also as a service, which represent the fastest way to start an IoT business.
You can connect a Device to Cloud in 15 minutes.
With EDC A typical IoT project would take 2 to 6 months to go live and the ROI is really fast
.
Unique Value Proposition in M2M: Hardware, Software & Service Building Blocks...Eurotech
Eurotech provides hardware, software, and services for Internet of Things (IoT) solutions. They offer a range of computing boards, devices, and integrated vertical solutions. Eurotech also provides a multi-service gateway approach and an M2M integration platform called Everyware Cloud to help customers connect devices, integrate and analyze data, and build applications. Their full-stack offering helps customers reduce costs and time to market for IoT projects.
Secure Your Medical Devices From the Ground Up ICS
The Food and Drug Administration (FDA) has recently released new guidance on cybersecurity for medical devices. This presentation will provide an overview of this guidance and review what is required for 510(k) submissions. We will also discuss the upcoming European Union (EU) cybersecurity regulations and how they compare to the FDA guidance.
This webinar with ICS and partner RTI, the largest software framework company for autonomous systems, will focus on threat modeling and cybersecurity risk assessments in light of the new guidance, and how these activities impact design requirements for medical devices. You will learn common pitfalls and mistakes to avoid when establishing organizational best practices in cybersecurity.
We will also discuss the challenges to securing data in motion for connected medical devices and describe how a data-centric software framework based on open standards, addresses the design requirements for highly reliable, scalable and secure systems.
Attendees will gain an understanding of the current regulatory expectations, best practices for cybersecurity risk assessments, and standards-based solutions for secure data connectivity.
Check Point is a cyber security company founded in 1993 that has adapted to meet customers' needs over the years. It offers a comprehensive portfolio of security products including threat prevention appliances, endpoint security, mobile security, network protection, security management, and public/private cloud solutions. Check Point aims to provide holistic security services and sees security as an integral part of business processes.
The document discusses Microsoft's IoT and edge computing solutions. It provides examples of how various companies are using IoT solutions to improve operations and save money. It also summarizes Microsoft's Azure IoT platform services including IoT Hub, IoT Central, IoT Edge, Azure Sphere, and Windows IoT. These services provide secure connectivity, management and analytics tools to connect, monitor and control IoT devices at scale.
Application Layer Security for IoT: The Case Study of a Smart HomeIRJET Journal
This document summarizes a research paper that applied application layer security protocols to a simulated smart home system using the Contiki-NG operating system. The researchers first designed a smart home network in Cooja simulator with various sensor nodes communicating with a border router and cloud. They then added the OSCORE and EDHOC security protocols to encrypt communication between the nodes. Finally, they evaluated the impact of applying these protocols on memory footprint and energy consumption compared to an unsecured implementation. The results showed that the current implementation introduced a small overhead compared to other security solutions.
IoT Day 2019 Naples - Microsoft Azure ShpereMirco Vanini
Microsoft Azure Sphere is a highly secured IoT solution that consists of an Azure Sphere certified microcontroller chip, the Azure Sphere Operating System, and Azure Sphere Security Services in the cloud. It is designed to provide security updates for 10 years. The solution aims to help securely connect billions of IoT devices and fuel digital transformation across industries. It offers built-in security features to address growing IoT security threats and risks. The current development kit uses the MT3620 Azure Sphere chip and provides tools to simplify and streamline IoT development.
The document discusses designing an IoT gateway with security protection. It describes how an IoT gateway can connect various devices like sensors and actuators to the cloud using different wireless protocols. It highlights that information security is a key concern for IoT gateways. The document then provides an overview of the TM4C microcontroller family from Texas Instruments that can be used to build a secure IoT gateway reference design. It describes the various security features that can be implemented using the microcontrollers and software libraries to protect connected assets.
Ng Tock Hiong discusses the zero trust security model and its implementation using VMware's NSX platform. A zero trust model prevents threats from moving laterally inside a network through strict micro-granular security policies tied to individual workloads. NSX enables this by providing distributed firewalling and security services at the hypervisor layer. This allows fine-grained micro-segmentation of workloads and simplifies network security management. NSX also provides visibility into the entire environment and automates security policy provisioning as workloads move or change.
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...Praxistage
Digitalisierung gestalten: Innovationen, Chancen und Wege in die Zukunft. Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait Austria GmbH)
Más contenido relacionado
Similar a Fr. Vanessa Kluge, BA (Kontron AIS GmbH)
Cybersecurity and Software Updates in Medical Devices.pdfICS
This document discusses cybersecurity and software updates in medical devices. It provides an overview of Integrated Computer Solutions (ICS) and the services it offers for medical device development. These include human factors engineering, software development, medical device cybersecurity, and software verification testing. The document also discusses Toradex and the Torizon platform it provides for over-the-air software updates in embedded systems. It notes regulations and standards driving new requirements for medical device cybersecurity and software updates. Finally, it discusses strategies for implementing secure software updates, including A/B updates, delta updates, container-based updates, and leveraging hardware encryption.
Learn what makes SCADAguardian (the Nozomi Networks flagship technology) so unique and powerful. From enterprise IT, to OT, we enable scalable security strategies for ICS.
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Codit
While working on several Internet of Things projects with different customers in Europe, it became clear that Integration matters more than ever. Building an overall IoT solution requires many different technologies and skills. The Architect role is crucial to combining different services into one solid solution. Integration skills are extremely important in building robust and scalable IoT solutions. Every phase of the IoT value chain requires integration, since IoT solutions are distributed and decoupled by nature. Retro-fitting existing devices? Routing of telemetry data? Or even exposing analytics results through secured APIs? All these challenges require integration skills. Skills that are very familiar to specialists in the Integration business. This presentation will explain why these are great times to be an Integration expert and how we can help tackling current challenges.
IoT Solutions Made Simple with Everyware IoTEurotech
Everyware IoT is the IoT architecture designed by Eurotech: it is flexible, end-to-end and open. Its building blocks are the Multi-service IoT Gateways, Everyware Software Framework (ESF), the Java OSGi software framework for IoT gateways and Everyware Cloud, the IoT integration platform.
IoT and M2M Services for the Railway MarketEurotech
M2M and IoT railway applications in which our customers used Eurotech’s EDC Platform to deliver advanced services and to gain significant savings in achieving better energy efficiency, managing passenger flow and implementing smart video surveillance.
An Introduction to Eclipse Kura - Eclipse Day Florence 2014Eurotech
Deploying and configuring one device to act as a node in the Internet of Things is relatively easy. Doing the same for hundreds or thousands of devices is not so easy though. This is where the new Eclipse project Kura comes in.
Kura is a Java/OSGi-based container for M2M applications running in service gateways.
Kura was contributed to Eclipse by Eurotech who developed the original technology to run on everything from general purpose devices, rugged mobile computers, wearable devices, service gateways and vehicle consoles, all the way down to the Raspberry Pi.
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Codit
“Internet of Things” is changing our world and today the Internet of Things knows almost as many applications as there are types of devices connected. In this session, Sam and Glenn will give an overview of the latest IoT solutions, the different learnings from the field and explain which key components are instrumental to integrating your solutions to the Azure IoT platform to ensure they are robust, future-proof and secure.
M2M in Transportation, Mining and AgricultureEurotech
Eurotech's M2M Offering for Transportation and Mobility
Rugged Devices and Solutions for Vehicles
Vertical Market Applications for Transportation, Agriculture and Mining.
The document discusses the architecture of the AWS IoT platform. It allows connected devices to interact securely with cloud applications and other devices. It includes device SDKs to connect and authenticate devices, a device gateway to communicate over MQTT and HTTP, authentication and authorization using certificates, a rules engine to route messages based on rules, and a device shadow for persistent device states. It also includes a device registry for identity management and the AWS IoT APIs. The platform securely connects millions of devices and applications with zero provisioning required.
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Codit
The document discusses different connectivity options for IoT including direct connectivity, cloud gateways, and field gateways. It also summarizes some pitfalls to consider like assuming stable cloud connectivity, neglecting legacy systems, forgetting edge capabilities, weak security, and lack of remote updates. Additionally, it provides an overview of the Azure IoT landscape and services like IoT Hub, IoT Edge, analytics services, and security features. It describes how IoT Hub can be used for device management including configuration, querying, and troubleshooting.
IoT is a green field of new business opportunities. The ran has started…..
Everyware Device Cloud (EDC) is a full set of Operational Technologies available also as a service, which represent the fastest way to start an IoT business.
You can connect a Device to Cloud in 15 minutes.
With EDC A typical IoT project would take 2 to 6 months to go live and the ROI is really fast
.
Unique Value Proposition in M2M: Hardware, Software & Service Building Blocks...Eurotech
Eurotech provides hardware, software, and services for Internet of Things (IoT) solutions. They offer a range of computing boards, devices, and integrated vertical solutions. Eurotech also provides a multi-service gateway approach and an M2M integration platform called Everyware Cloud to help customers connect devices, integrate and analyze data, and build applications. Their full-stack offering helps customers reduce costs and time to market for IoT projects.
Secure Your Medical Devices From the Ground Up ICS
The Food and Drug Administration (FDA) has recently released new guidance on cybersecurity for medical devices. This presentation will provide an overview of this guidance and review what is required for 510(k) submissions. We will also discuss the upcoming European Union (EU) cybersecurity regulations and how they compare to the FDA guidance.
This webinar with ICS and partner RTI, the largest software framework company for autonomous systems, will focus on threat modeling and cybersecurity risk assessments in light of the new guidance, and how these activities impact design requirements for medical devices. You will learn common pitfalls and mistakes to avoid when establishing organizational best practices in cybersecurity.
We will also discuss the challenges to securing data in motion for connected medical devices and describe how a data-centric software framework based on open standards, addresses the design requirements for highly reliable, scalable and secure systems.
Attendees will gain an understanding of the current regulatory expectations, best practices for cybersecurity risk assessments, and standards-based solutions for secure data connectivity.
Check Point is a cyber security company founded in 1993 that has adapted to meet customers' needs over the years. It offers a comprehensive portfolio of security products including threat prevention appliances, endpoint security, mobile security, network protection, security management, and public/private cloud solutions. Check Point aims to provide holistic security services and sees security as an integral part of business processes.
The document discusses Microsoft's IoT and edge computing solutions. It provides examples of how various companies are using IoT solutions to improve operations and save money. It also summarizes Microsoft's Azure IoT platform services including IoT Hub, IoT Central, IoT Edge, Azure Sphere, and Windows IoT. These services provide secure connectivity, management and analytics tools to connect, monitor and control IoT devices at scale.
Application Layer Security for IoT: The Case Study of a Smart HomeIRJET Journal
This document summarizes a research paper that applied application layer security protocols to a simulated smart home system using the Contiki-NG operating system. The researchers first designed a smart home network in Cooja simulator with various sensor nodes communicating with a border router and cloud. They then added the OSCORE and EDHOC security protocols to encrypt communication between the nodes. Finally, they evaluated the impact of applying these protocols on memory footprint and energy consumption compared to an unsecured implementation. The results showed that the current implementation introduced a small overhead compared to other security solutions.
IoT Day 2019 Naples - Microsoft Azure ShpereMirco Vanini
Microsoft Azure Sphere is a highly secured IoT solution that consists of an Azure Sphere certified microcontroller chip, the Azure Sphere Operating System, and Azure Sphere Security Services in the cloud. It is designed to provide security updates for 10 years. The solution aims to help securely connect billions of IoT devices and fuel digital transformation across industries. It offers built-in security features to address growing IoT security threats and risks. The current development kit uses the MT3620 Azure Sphere chip and provides tools to simplify and streamline IoT development.
The document discusses designing an IoT gateway with security protection. It describes how an IoT gateway can connect various devices like sensors and actuators to the cloud using different wireless protocols. It highlights that information security is a key concern for IoT gateways. The document then provides an overview of the TM4C microcontroller family from Texas Instruments that can be used to build a secure IoT gateway reference design. It describes the various security features that can be implemented using the microcontrollers and software libraries to protect connected assets.
Ng Tock Hiong discusses the zero trust security model and its implementation using VMware's NSX platform. A zero trust model prevents threats from moving laterally inside a network through strict micro-granular security policies tied to individual workloads. NSX enables this by providing distributed firewalling and security services at the hypervisor layer. This allows fine-grained micro-segmentation of workloads and simplifies network security management. NSX also provides visibility into the entire environment and automates security policy provisioning as workloads move or change.
Similar a Fr. Vanessa Kluge, BA (Kontron AIS GmbH) (20)
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...Praxistage
Digitalisierung gestalten: Innovationen, Chancen und Wege in die Zukunft. Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait Austria GmbH)
Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)Praxistage
Unternehmensfinanzierungen im Umbruch - Wie gelingt die Transformation hin zu einer nachhaltigen Wirtschaft. Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)
Die Kunst der Anpassung: Wie die Digitalisierung mit Telekommunikationsleistungen zukünftigen Herausforderungen begegnen kann. Was braucht die Gesellschaft und die Wirtschaft? Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)
Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...Praxistage
Keynote: Das Versprechen der Transformation einlösen - Die praktische Umsetzung von Digital- und Personal-Strategien in der Landeshauptstadt Kiel. Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung und Feuerwehr der Landeshauptstadt Kiel)
Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)Praxistage
Arbeitskräfteüberlassung, Personalsuche oder Outsourcing? Wie lösen Sie das Problem des technischen Fachkräftemangels in Ihrem Unternehmen. Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)
Josef Weissinger (Soroban IT-Beratung GmbH)Praxistage
ZMR, SZR, ZPR, RSV und EIDAS? Warum Ihnen diese Abkürzungen als Unternehmen etwas sagen sollten, um Registerservices über den Österreichischen Portalverbund und mit unserer Portallösung nutzen zu können. Josef Weissinger (Soroban IT-Beratung GmbH)
Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)Praxistage
Breitband Austria 2030 – Der österreichischen Weg in die Gigabit-Gesellschaft. Ein Überblick über die Förderprogramme Access, OpenNet, Connect und GigaApp. Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)
Hr. David Simon (Juniper Networks, Inc.)Praxistage
AI-betriebenes Netzwerk des nächsten Jahrzehnts - Welche Vorteile werden sich für Unternehmen und Benutzer daraus ergeben? David Simon (Juniper Networks, Inc.)
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
3. › Easy and fast connectivity
› Open to connect to any network
› Security at its core
› Remote accessibility
› 24/7 availability
› Dynamic and self-adapting
› Scalability
Major characteristics
Kontron | Praxistage 2024
What is essential for IoT solutions?
3
How does
this come
about?
› Utilizing connected devices as base
4. › Malware infections
› Data Theft
› Lack of compatibility with new
security technology
› Regular automatic updates
› Exploitable backdoors
› Loopholes or flaws in operation
systems
› Denial of Service (DoS)
Kontron | Praxistage 2024
IoT security issues and challenges at the edge
4
› Insecure interfaces – authentication is key
› Insufficient data protection – insecure
communication and data storage
› IoT skill gap
› Poor IoT device management – shadow
IoT, unmanaged, unknown, unauthorized
5. By managing your connected devices efficiently and securely
Kontron | Praxistage 2024
How can these challenges be solved?
5
Accessibility
Cyber Security
Maintenance
Connectivity
Health
6. 6
› DIY Syndrome
› Time consuming for
personnel
› Difficult to scale
› Limited visibility of health
and performance factors
› Data overload leads to
inefficiencies and
limitation in IoT solution
functionality
Why manual and poor device management is a risk for IT teams?
Common Traps
Kontron | Praxistage 2024
7. › Confidentiality
› Integrity
› Availability
Three pillars on all levels
There is no way around Security by Design (#1)
7
Kontron | Praxistage 2024
Device
System
Network
Application
Cloud
8. Development Process
› Automatic build process (continuous integration)
ensure short development cycles
› Automated testing
› Automated CVE/CWE scanning
› Threat modelling as integrated method for
development and test
› Product development by SCRUM
› Rapid development with APEX
Deployment Process
› Infrastructure as a code enables fast reaction to
changes and requirements
› Integration / Scenario tests with risk assessment
› Automated rollout of new versions on all staging
systems
› Trust areas
› Approval process according to the dual control
principle
› Tracking and registration of each update
› Complete overview of installed versions on each
server
Kontron | Praxistage 2024
Agile Development and Deployment
Security by Design (#1)
8
9. › Knowledge about supply chains
› Knowledge about security status
› Recommendations for actions
Software Bill of Material (S-BOM)
Supplier management (#2)
9
› Which libraries and modules have been used?
› Provide a bill of material
› Determine version and provide documentation
› Are there security issues known?
› Are there patches available?
› Should we use alternatives?
› Tests against CVE/CWE database (e.g. mitre.org / nist.org)
› Description of the security issues
› Allocation of the version to the component
› Notes on remediation
› Automatic tracking of 3rd party software
› Continuous version tracking and documentation of results
Kontron | Praxistage 2024
OLD
NEW
11. The time to act is now
Advanced cyber security regulations by EU legislation
11
2014
2016
2016
2018
2019 2023
EU Cybersecurity Act
European cybersecurity
certification framework
GDPR
Processing of personal data
of individuals
NIS Directive
Directive on attacks against
information systems
NIS2 Directive
“Security by Design” and
“Security by Default”
EU Cyber
Resilience Act
Cybersecurity requirements
for products with digital
elements
Expected
2023
Kontron | Praxistage 2024
12. › EU Data Act
› A new regulation that
establishes uniform rules for
data access, switching cloud
providers, and
interoperability
requirements in the EU.
› Objective: Create a single
data market in the EU with
reuse of data across all
sectors of the economy.
› Target group: Mandatory for
products and services in the
EU
› Validity:
› Cyber Resilience Act
› A proposal for a legal
framework to define
cybersecurity requirements
for hardware and software
products placed on the
market in the European
Union.
› Objective: To improve the
security of digital products
› Target group: Mandatory for
all companies that
manufacture products with
digital elements
› NIS2
› EU-wide piece of legislation
that provides legal
measures to improve the
overall level of cybersecurity
in the EU by ensuring
preparedness and
cooperation between
Member States and
requiring key actors in key
industries to take security
measures and report
incidents.
› Objective: Increase cyber
security and resilience in the
EU
› Target group: Mandatory for
operators of critical
infrastructures
› IEC 63442
› International series of
standards covering cyber
security for operational
technology in automation
and control systems. The
standards take a risk-based
approach to cyber security
and provide a framework for
the systematic assessment,
mitigation and management
of cyber security risks in
industrial automation and
control systems.
› Objective: Ensure reliability
and safety of critical
industrial processes and
infrastructure
› Target group: Mandatory for
offshore installations and
ships
Overview for Mechanical Engineering Companies
Kontron | Praxistage 2024
Major Security Standards 2024
12
Deep Dive
13. 13
Working Team
Our IT team of the charging stations may be in trouble
Core competence:
› Application development
Reality Check!
Kontron | Praxistage 2024
Is this all doable?
Potential gaps:
› Hardware knowledge
› Embedded software expertise
› Network security
› Multi-layered connectivity
VS
14. › Data-driven analysis and decision-making
› Improved automated operations
› Enhanced security
› Seamless connectivity
› Increased efficiency
Why automated device management offers great benefits in
order to future-proofing your fleet?
14
Kontron | Praxistage 2024
OT
IoT
IT
Benefits of the convergence of IT, OT and Internet of Things
16. Device Management KontronOS Docker Management
Integrated but independently usable
Five Key Services of K-PORT
› Condition monitoring of the IoT
devices
› Manage all devices worldwide in a
cloud-based environment for edge
devices
› Easily onboard IoT devices
› Manage device fleets
› Hardened operating system for X86 or
Arm, based on Yocto Linux
› Two redundant operating system
partitions ensuring maximum uptime
› Secure management interface for
updates and deployment
› Short-term updates in case of "critical"
vulnerabilities.
› Manage Docker Containers
› Encapsulate customer applications
(images) in containers
› CLI communication with Docker
Registry
› Deploy Docker containers
automatically with Docker Compose
to fleets of devices in the field
Kontron | Praxistage 2024
17. Remoting VPN-Service
Integrated but independently usable
Five Key Services of K-PORT
Kontron | Praxistage 2024
› Centralized management of desktop and remote
accesses, e.g. RDP & SSH accesses
› Establishment of secure remote connections
› Command line access
› Activate and deactivate temporary direct access to
the machine and plant network
› Direct connection "tunneling" between networks
› Manage, monitor and log VPN connections
› Connect to a device simultaneously
18. How a hardened OS ensures to run them reliably
Kontron | Praxistage 2024
Focus on building your applications is paramount
18
#1 Security
› Flexible and portable: Linux based can be used flexibly for Intel® x86 & Arm® based
devices
› Tailored to Docker containers: containerized applications are lightweight and ideal
for connected devices, KontronOS creates a secure environment for them
› Reduced to the essentials: a minimal Linux operating system with all the necessary
functions it needs to ensure smooth operation
› Maximum uptime: two redundant partitions (active and passive) ensure maximum
uptime in the event of a failure, interruption or failed update and guarantee a
smooth operation of Docker containers
19. KontronOS
Kontron | Praxistage 2024
Hardened operation system as security at its core
19
› Two redundant partitions for redundancy and automated
rollback to older versions in case of problems in the update
process
› Clear separation between operating system and application
level
› Continuous CVE/CWE investigation
› Support of the integrated security mechanism at boot level via
TPM 2.0 on x86 and via HAB for Arm®
› Web UI for configuring network zones of integrated firewall
and IP address
#1 Security
20. From image to template via CLI and Docker Compose integration
Kontron | Praxistage 2024
Automated Build Process
20
#2 Automation
› Image › Single Container
› Container Set
› Docker
Compose
Operation System
+
› Template
or
› CLI
› Drag & Drop
› Docker
Compose
› CLI
› Drag & Drop
21. Plan your rollout scenarios strategically
Kontron | Praxistage 2024
Automated Update Cycle
21
#2 Automation
› Nearby Location
› Test Lab
› Germany
› Norway
Operation System
+
› Template
› Worldwide
22. Standard IoT Stack to Fully Customized
Kontron | Praxistage 2024
Fleet Management Solution that fits your application
22
Standard IoT Stack
KBox A-250 (x86)
Licenses
i.MX8M Mini (Arm®)
Get started right away
Modified Standard
Modified HW: Arm-based to x86-based
Licenses + project costs
Get started in weeks
Fully Customized
Custom HW
Customized OS
Licenses + project costs
Get started in months
#3 Flexibility
23. From Security to Digital Services
Kontron | Praxistage 2024
The interaction of the Susietec® portfolio
23
24. 24
How do you future-proof your IoT solutions?
› Security at its core
› Automation at its heart
› Flexibility in its mind