Best Practices for the Unknown: Wearables, Devices & Things

Size: px
Start display at page:

Download "Best Practices for the Unknown: Wearables, Devices & Things"

Transcription

1 1_Q&A

2 Best Practices for the Unknown: Wearables, Devices & Things Bill Weir Senior Product Development Engineer & Developer Advocate, AT&T Pete Rembiszewski Principal Product Development Engineer, AT&T

3 Exploring the Unknown Image credit: NASA/CXC/JPL-Caltech/STScI/NSF/NRAO/VLA

4

5 When Facing the Unknown don t panic!

6 The Unknown Can Be Scary, But You probably know more than you think

7 And to Help Face the Unknown We have some best practices & strategies to help with the stuff you don t know

8 Areas We Will Cover 1. Network 2. Design/Verify 3. Data 4. Security/Privacy

9 Network Best Practices Image credit: NASA/CXC/JPL-Caltech/STScI/NSF/NRAO/VLA

10 Network Issues Are in Your Future Overloaded mobile networks could face a failure rate upwards of 30% for Machine-to-Machine (M2M) and Internet of Things (IoT) sessions 1 1. Cellwize White Paper Network Congestion Could See 30% Failure Rate for M2M and IoT

11 The Unknown Can Be Challenging But there are things you can do right now: Find the best tools and measure progress Increase your knowledge Follow best practices Be prepared to fail and move on quickly

12 Find the Best Tools Various tools measure network performance Speedtest HTTPing Wireshark tcpdump And ARO from AT&T ARO was designed just for wireless networks

13 ARO is A Great Tool In 2012 we launched ARO ARO is AT&T Application Resource Optimizer ARO can help you resolve future network issues

14 Network Best Practices: ARO ARO - Application Resource Optimizer Free diagnostic tool designed for wireless Shows how app is handling data & transfers ARO uncovers hidden issues Makes recommendations to fix them!

15 Measure Your Progress Bandwidth: maximum data transfer rate Throughput: rate of data transfer Latency: delay between network nodes Jitter: variation in packet delay Error rate: % of corrupted bits Measure & adjust to improve performance

16 Increase Your Network Knowledge Learn from your mistakes Study proven protocols & standards Learn how to manage connections Learn how to constantly improve

17 Network Best Practices Be strategic about your connections Know that you don t have all the answers Ask the right questions Define your true network requirements before you commit to a design

18 Follow Best Practices Consider the implications of your choices Avoid signal storms/traffic jams Bundle and batch Update only when there is a change

19 Follow Best Practices If possible Thread downloads (vs. serial) Remove redirects Pre-fetch files that are often used or expected Group connections TCP persistent connections HTTP Pipelining

20 Follow Best Practices: Grouping ARO shows when connections are not grouped Imagine an app that: 1. Downloads 1 file every 60s 2. Downloads 2nd file every 60s 3. Sends Analytics every 60s 54 seconds airtime 38J of energy used

21 Follow Best Practices: Grouping ARO shows when connections are well grouped Imagine same app But the connections are grouped together 14 seconds airtime 16J of energy used 68% Energy Savings

22 Design & Verification Strategies Image credit: NASA/CXC/JPL-Caltech/STScI/NSF/NRAO/VLA

23 Design Challenges of the Future The only equation you need to know: (H + S + C) n = W H = Hardware S = Software C = Connectivity W = Work Performed

24 Design Challenges Choices? Endless options can equal endless capabilities or endless confusion Cloud Service

25 Design Challenges Hardware Beacons Server Cloud Service Sensors Gateway Wearables Mobile Devices

26 Design Challenges Software/Versions Embedded Linux Cloud Service Arduino OSX ios Android

27 Design Challenges Connectivity BT 3G Cloud Service Fiber WiFi LTE

28 Design Challenges Business Logic First Thoughts - What may I immediately need to react to? Minimal Data Local Decision Short Term Retention Location Alert Cloud Service High Temperature Alarm Low Battery

29 Design Challenges Business Logic Second Thoughts - What will take some of time to react to? - Moderate Data, Moderate Retention Cloud Service Rain Sensor - No Rain Data Usage Tracking Steps

30 Design Challenges Business Logic Third Thoughts - What will take me a long time to figure out? - Lot s of Data, Remote Decision, Long Term Retention Cloud Service Seasonal Power Needs

31 Design Solutions Ways to Flatten the Landscape Libraries APIs Middleware

32 Design Solutions Maintenance Challenges Device Updates Replacing Hardware Power Consideration Connectivity Implications

33 Verify with ARO Tools you need ARO TCPDUMP Virtualbox Small footprint Linux image

34 Different Traffic Patterns = Different Ways of Thinking Device Local Connectivity Hub or Proxy Wireless Network Server Local Proxy Wearable Thermostat Agent Wireless Network Device or Local Hub Internet Network Service Network Proxy Direct to Network Service API Gateway VPN Mobile Device Remote Sensor Agent Agent Network Proxy or Gateway Wireless Network Network Service Network Service or API

35 Capturing IoT and Service Data Device Local Connectivity Hub or Proxy Wireless Network Server Agent Device or Local Hub Network Service Limited to No UI Limited or No Access Android & ios Execute ARO TCPDump TCPDump May not be able to capture on IoT devices (No UI or Access) Use ARO collector on android device as hotspot or paired with wearable Use ARO on wearable android devices Use TCPDUMP to capture PCAP file

36 Validating APIs and SDKs Wireless Network Device SDK API Network Service or API Android or ios ARO Client Response Request TCPDump Test SDK and API logic with real use cases (Roll your own apps) Capture trace on supported device (Android or ios) Use TCPDUMP to capture PCAP file

37 Android Emulator (Android Studio) Xcode ARO Network Attenuator Internet Ability to Adjust Network Speed (UL & DL) Latency Packet Loss Block Domain ~~~ ~~~ ~~~~ ~~~

38 Design, Build, Verify, Deploy Repeat Capture a PCAP via TCPDUMP OR Implement Fixes Transfer the Trace Files Process the Trace Study the trace using the Analyzer Capture an ARO Trace Gather a trace using the Collector

39 Data Strategies Image credit: NASA/CXC/JPL-Caltech/STScI/NSF/NRAO/VLA

40 Data Issues in the Future Data created by the Internet of Things is projected to hit Zettabytes by 2019, according to Cisco. 1 A zettabyte is a trillion gigabytes 1.

41 Data Best Practices: Storage Data will come from everywhere & anywhere You will need flexibility & scalability Build adequate storage solutions Embrace the Cloud

42 Data Best Practices: Data Questions Questions about data timing How often do you need to update your data? How much data do you need to make a decision? How soon do you need that decision? Do I need all of this data? Are you sending duplicate data?

43 Data Best Practices: Prefetching Anticipate user behavior & use prefetching Send whatever data which is required next Requires that you understand user behavior And understand your data Use common sense & study user interaction relative to the data

44 Data Best Practices: Avoid Duplication Duplicate downloads slow response time Does the data really need updating? Check to see if you are sending duplicate data Dupes can be reduced by caching Use HTTP 304 codes to check for freshness

45 Data Best Practices: HTTP Headers You can rely on proven standards like HTTP Understand how HTTP really works Submit correct directions in the headers Don t Use Etags Not Efficient Cache Control is Faster/More Efficient

46 Security & Privacy Strategies Image credit: NASA/CXC/JPL-Caltech/STScI/NSF/NRAO/VLA

47 Security & Privacy Issues in the Future Within two years, 90% of all IT networks will have an IoT-based security breach 1 1. December, 2014 International Data Corporation - IDC FutureScape: Worldwide Internet of Things 2015 Predictions Web Conference

48 Security & Privacy Contributing Factors Increased Complexity Disparate Hardware & Software Broader Attack Surface Device Limitations And the Big Carrot LOTS OF DATA

49 Security & Privacy Challenges Endless Options for Hackers? Embedded Linux Arduino BT 3G Cloud Service LTE Fiber OSX WiFi ios Android

50 Security & Privacy Broader Attack Surface

51 Security & Privacy Solutions Choices for Developers = Choices for Hackers ios

52 Security & Privacy Data Messages Purchases Pictures Temperature Cloud Service Medical Location Contacts Pictures

53 Security & Privacy Solutions ARO Can Help: Verify SSL is Being Used Without SSL..POST /auth/login? username=knitterdad&password=asdfghjkl.. Trace.pcap With SSL.i? wo ŽŽØv =iêìì.s 5j& OžtÇuSL ÒÎ%Mï! éuó

54 Security & Privacy Solutions ARO Can Help: Verify Third Party APIs Outbound & Inbound Traffic Host: i661.myserver.com I recognize these domains Host: Host: Where is this going?

55 Conclusion Image credit: NASA/CXC/JPL-Caltech/STScI/NSF/NRAO/VLA

56 Areas We Covered 1. Network 2. Design/Verify 3. Data 4. Security/Privacy

57 Take Away Remember that you don t have all the answers

58 Take Away But you may know more than you realize

59 Take Away Research before you design

60 Take Away Reduce complexity

61 Take Away Measure & adjust to improve performance

62 Take Away Secure your data

63 Take Away And use ARO

64 And Finally don t panic!

65 Learn More Developer.att.com/ARO Contact Bill: Contact Pete:

66

67 1_Q&A

68 1_Q&A

Intelligent Edge Computing and ML-based Traffic Classifier. Kwihoon Kim, Minsuk Kim (ETRI) April 25.

Intelligent Edge Computing and ML-based Traffic Classifier. Kwihoon Kim, Minsuk Kim (ETRI)  April 25. Intelligent Edge Computing and ML-based Traffic Classifier Kwihoon Kim, Minsuk Kim (ETRI) (kwihooi@etri.re.kr, mskim16@etri.re.kr) April 25. 2018 ITU Workshop on Impact of AI on ICT Infrastructures Cian,

More information

Democratized Performance Test Platform. Open source, enterprise ready modular platform, that is tool chain friendly.

Democratized Performance Test Platform. Open source, enterprise ready modular platform, that is tool chain friendly. Democratized Performance Test Platform Open source, enterprise ready modular platform, that is tool chain friendly. Democratized Performance Test Platform Open source, enterprise ready modular platform,

More information

Why Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic

Why Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic Why Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic Presented by Stephen Friedenthal, IoT Solutions Architect About Cisco Systems, Inc. San Fran Companies want to derive

More information

NCP VPN Path Finder for Juniper SRX Gateways

NCP VPN Path Finder for Juniper SRX Gateways NCP VPN Path Finder Technology In many cases, IPsec and SSL VPN are complementary, because they solve different problems. This complementary approach allows a single device to address all remote-access

More information

B U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

B U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved. B U I L D I N G O N T H E G A T E W A Y Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

Powering the Internet of Things with MQTT

Powering the Internet of Things with MQTT Powering the Internet of Things with MQTT By Ming Fong Senior Principal Development Engineer Schneider-Electric Software, LLC. Introduction In the last ten years, devices such as smartphones, wearable

More information

SaaS Providers. ThousandEyes for. Summary

SaaS Providers. ThousandEyes for. Summary USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications

More information

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust Solution Brief: Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust DeviceTone, our ready to run "connect, manage and enable" solution for product companies, makes secure connectivity,

More information

High Performance: What These Apps Did May Shock You

High Performance: What These Apps Did May Shock You High Performance: What These Apps Did May Shock You Doug Sillars ARO Technical Lead Tiffany Kinkade ARO Developer Advocate Doug Sillars ARO Technical Lead @Dougsillars Tiffany Kinkade ARO Developer Advocate

More information

AT&T Developer Program

AT&T Developer Program AT&T Developer Program Application Resource Optimizer (ARO) User Guide Publication Date: August 13, 2014 Legal Disclaimer This document and the information contained herein (collectively, the "Information")

More information

AT&T Developer Program

AT&T Developer Program AT&T Developer Program Application Resource Optimizer (ARO) Testing Guide Publication Date: April 27, 2015 Legal Disclaimer This document and the information contained herein (collectively, the "Information")

More information

ThousandEyes for. Application Delivery White Paper

ThousandEyes for. Application Delivery White Paper ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services

More information

AT&T Developer Program

AT&T Developer Program AT&T Developer Program Application Resource Optimizer (ARO) Testing Guide Publication Date: August 13, 2014 Legal Disclaimer This document and the information contained herein (collectively, the "Information")

More information

Network Design and Management. Nixu Ltd.

Network Design and Management. Nixu Ltd. Network Design and Management Nixu Ltd. Contents Network Design and Management The FCAPS Model High Availability solutions SNMP protocol Nixu Ltd. 2/31 Network Design and Management Network Design and

More information

Building a Future-Proof Data- Processing Solution with Intelligent IoT Gateways. Johnny T.L. Fang Product Manager

Building a Future-Proof Data- Processing Solution with Intelligent IoT Gateways. Johnny T.L. Fang Product Manager Building a Future-Proof Data- Processing Solution with Intelligent IoT Gateways Johnny T.L. Fang Product Manager Abstract To date, most discussions about the Industrial Internet of Things (IoT) have been

More information

Micro Focus Desktop Containers

Micro Focus Desktop Containers White Paper Security Micro Focus Desktop Containers Whether it s extending the life of your legacy applications, making applications more accessible, or simplifying your application deployment and management,

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

Lecture 15 Networking Fundamentals. Today s Plan

Lecture 15 Networking Fundamentals. Today s Plan Lecture 15 Networking Fundamentals Slides attributed to Neil Spring Today s Plan Talk about networking in general Layers, Routing Specifically about IP and TCP Service model, what TCP provides Work our

More information

AT&T Developer Program

AT&T Developer Program AT&T Developer Program Application Resource Optimizer (ARO) User Guide Publication Date: April 27, 2015 Legal Disclaimer This document and the information contained herein (collectively, the "Information")

More information

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Cisco Cloud Security. How to Protect Business to Support Digital Transformation Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,

More information

Whitepaper. IoT Protocols. PAASMER Support for Protocols. Website:

Whitepaper. IoT Protocols. PAASMER Support for Protocols. Website: Whitepaper IoT Protocols PAASMER Support for Protocols Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. IoT Protocols 4 3. Connectivity Protocols 5 4. Application Layer

More information

AT&T SD-WAN Network Based service quick start guide

AT&T SD-WAN Network Based service quick start guide AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy

More information

A quick guide to the Internet. David Clark 6.978J/ESD.68J Lecture 1 V1.0 Spring 2006

A quick guide to the Internet. David Clark 6.978J/ESD.68J Lecture 1 V1.0 Spring 2006 A quick guide to the Internet David Clark 6.978J/ESD.68J Lecture 1 V1.0 Spring 2006 Why should you care? People say: Why doesn t the Internet Protect me from spam. Control porn Keep terrorists from plotting

More information

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.

More information

Intelligent Load Balancing: Persistence Balance

Intelligent Load Balancing: Persistence Balance More Bandwidth. More Reliability. More Survivability Intelligent Load Balancing: Persistence Balance Application Note Understanding Outbound Balance Routing The BODi delivers a simple, cost effective way

More information

Hypertext Transport Protocol HTTP/1.1

Hypertext Transport Protocol HTTP/1.1 Hypertext Transport Protocol HTTP/1.1 Jim Gettys Digital Equipment Corporation, ISBU Visiting Scientist, World Wide Web Consortium 10/17/96 20-Apr-01 1 Acknowledgments HTTP/1.1 Authors Roy Fielding (UCI)

More information

An Implementation of Fog Computing Attributes in an IoT Environment

An Implementation of Fog Computing Attributes in an IoT Environment An Implementation of Fog Computing Attributes in an IoT Environment Ranjit Deshpande CTO K2 Inc. Introduction Ranjit Deshpande CTO K2 Inc. K2 Inc. s end-to-end IoT platform Transforms Sensor Data into

More information

Flash: an efficient and portable web server

Flash: an efficient and portable web server Flash: an efficient and portable web server High Level Ideas Server performance has several dimensions Lots of different choices on how to express and effect concurrency in a program Paper argues that

More information

Fog Computing. ICTN6875: Emerging Technology. Billy Short 7/20/2016

Fog Computing. ICTN6875: Emerging Technology. Billy Short 7/20/2016 Fog Computing ICTN6875: Emerging Technology Billy Short 7/20/2016 Abstract During my studies here at East Carolina University, I have studied and read about many different t types of emerging technologies.

More information

Introduction to mobile performance testing

Introduction to mobile performance testing Introduction to mobile performance testing Igor Markov, Shlomi Zalma, Shane Evans, Wilson Mar June 11 & 13, 2013 HP LoadRunner components End User Client(s) Internet/WAN Application Server(s) Database

More information

WarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects -

WarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects - WarpTCP WHITE PAPER Technology Overview -Improving the way the world connects - WarpTCP - Attacking the Root Cause TCP throughput reduction is often the bottleneck that causes data to move at slow speed.

More information

Network Defenses 21 JANUARY KAMI VANIEA 1

Network Defenses 21 JANUARY KAMI VANIEA 1 Network Defenses KAMI VANIEA 21 JANUARY KAMI VANIEA 1 Similar statements are found in most content hosting website privacy policies. What is it about how the internet works that makes this statement necessary

More information

SD-WAN. Evolving Beyond MPLS in the Enterprise Network. 55 Water Street, 32nd Floor New York, NY (877)

SD-WAN. Evolving Beyond MPLS in the Enterprise Network. 55 Water Street, 32nd Floor New York, NY (877) SD-WAN Evolving Beyond MPLS in the Enterprise Network 55 Water Street, 32nd Floor New York, NY 10041 1 (877) 963-8663 www. Overview Public, private and hybrid cloud services, unified communications/ collaboration,

More information

VirtuLocity VLNCloud Software Acceleration Service Virtualized acceleration wherever and whenever you need it

VirtuLocity VLNCloud Software Acceleration Service Virtualized acceleration wherever and whenever you need it VirtuLocity VLNCloud Software Acceleration Service Virtualized acceleration wherever and whenever you need it Bandwidth Optimization with Adaptive Congestion Avoidance for Cloud Connections Virtulocity

More information

Adaptive Video Acceleration. White Paper. 1 P a g e

Adaptive Video Acceleration. White Paper. 1 P a g e Adaptive Video Acceleration White Paper 1 P a g e Version 1.0 Veronique Phan Dir. Technical Sales July 16 th 2014 2 P a g e 1. Preface Giraffic is the enabler of Next Generation Internet TV broadcast technology

More information

Lecture 04 Introduction: IoT Networking - Part I

Lecture 04 Introduction: IoT Networking - Part I Introduction to Industry 4.0 and Industrial Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 04 Introduction: IoT Networking

More information

The Future of Network Infrastructure & Management

The Future of Network Infrastructure & Management WHITE PAPER The Future of Network Infrastructure & Management Software-defined networks, cloud management and LTE offer the ability to adapt a network to the changing workforce. Future Look: New Way to

More information

CS551 End to End Argument [Saltzer81a]

CS551 End to End Argument [Saltzer81a] CS551 End to End Argument [Saltzer81a] Bill Cheng http://merlot.usc.edu/cs551-f12 1 The End-to-end Argument Deals with where to place protocol functionality (e.g., encryption, reliability, ordering, duplication

More information

Enabling Performance & Stress Test throughout the Application Lifecycle

Enabling Performance & Stress Test throughout the Application Lifecycle Enabling Performance & Stress Test throughout the Application Lifecycle March 2010 Poor application performance costs companies millions of dollars and their reputation every year. The simple challenge

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

TRex Realistic Traffic Generator

TRex Realistic Traffic Generator DEVNET-1120 TRex Realistic Traffic Generator Hanoch Haim, Principal Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco

More information

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS White Paper Table of Contents Executive Summary... 3 Audience.... 3 Introduction.... 3 Architecture....

More information

AWS Lambda. 1.1 What is AWS Lambda?

AWS Lambda. 1.1 What is AWS Lambda? Objectives Key objectives of this chapter Lambda Functions Use cases The programming model Lambda blueprints AWS Lambda 1.1 What is AWS Lambda? AWS Lambda lets you run your code written in a number of

More information

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network

More information

Seminar report Google App Engine Submitted in partial fulfillment of the requirement for the award of degree Of CSE

Seminar report Google App Engine Submitted in partial fulfillment of the requirement for the award of degree Of CSE A Seminar report On Google App Engine Submitted in partial fulfillment of the requirement for the award of degree Of CSE SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org Acknowledgement

More information

Intelligent Mobile App Testing

Intelligent Mobile App Testing White Paper Intelligent Mobile App Testing The field of software functional testing is undergoing a major transformation. What used to be an onerous manual process took a big step forward with the advent

More information

Stanislav Harvan Internet of Things

Stanislav Harvan Internet of Things Stanislav Harvan v-sharva@microsoft.com Internet of Things IoT v číslach Gartner: V roku 2020 bude na Internet pripojených viac ako 25mld zariadení: 1,5mld smart TV 2,5mld pc 5mld smart phone 16mld dedicated

More information

Managing Remote Medical Devices Through The Cloud. Joel K Young SVP of Research and Development & CTO Digi International Friday, September 9 11:30AM

Managing Remote Medical Devices Through The Cloud. Joel K Young SVP of Research and Development & CTO Digi International Friday, September 9 11:30AM Managing Remote Medical Devices Through The Cloud Joel K Young SVP of Research and Development & CTO Digi International Friday, September 9 11:30AM Overview The Connectivity and Access Problem What information

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Data Analytics for IoT: Applications to Security and Privacy. Nick Feamster Princeton University

Data Analytics for IoT: Applications to Security and Privacy. Nick Feamster Princeton University Data Analytics for IoT: Applications to Security and Privacy Nick Feamster Princeton University Growing Market for IoT Analytics More than 25 billion devices by 2020 Each of these devices generates data.

More information

CSE/EE 461 HTTP and the Web

CSE/EE 461 HTTP and the Web CSE/EE 461 HTTP and the Web Last Time The Transport Layer Focus How does TCP share bandwidth? Topics AIMD Slow Start Application Presentation Session Transport Network Data Link Fast Retransmit / Fast

More information

AT&T Developer Program Application Resource Optimizer (ARO)

AT&T Developer Program Application Resource Optimizer (ARO) AT&T Developer Program Application Resource Optimizer (ARO) Testing Guide Publication Date: 1/31/2017 Legal Disclaimer This document and the information contained herein (collectively, the "Information")

More information

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly

More information

Moving to a New Business Phone System

Moving to a New Business Phone System Moving to a New Business Phone System BroadSoft White Paper OneCloudNetworks is an authorized BroadSoft Service Provider 2015 BroadSoft. All Rights Reserved. Introduction Phone systems have been installed

More information

Circadence Presentation. May 1, Gary Morton/Dave Frick

Circadence Presentation. May 1, Gary Morton/Dave Frick Circadence Presentation May 1, 2012 Gary Morton/Dave Frick Circadence Overview Corporate Overview Privately held/headquartered in Boulder (founded 1993) Originally an on-line gaming company (VR1) Divested

More information

Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers

Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers BRKPAR-2333 Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers Paolo Ferrari, Senior Director Sales Southern Europe, Ipswitch, Inc. WhatsUp Gold Jan 2018 Agenda

More information

Never Drop a Call With TecInfo SIP Proxy White Paper

Never Drop a Call With TecInfo SIP Proxy White Paper Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video

More information

Building a Secure Wireless Network. Use i and WPA to Protect the Channel and Authenticate Users. May, 2007

Building a Secure Wireless Network. Use i and WPA to Protect the Channel and Authenticate Users. May, 2007 Agenda: Securing Wireless Networks Building a Secure Wireless Network Joel M Snyder Senior Partner Opus One jms@opus1.com Using encryption and authentication Handling unauthenticated users Managing RF

More information

Apigee Edge Cloud. Supported browsers:

Apigee Edge Cloud. Supported browsers: Apigee Edge Cloud Description Apigee Edge Cloud is an API management platform to securely deliver and manage all APIs. Apigee Edge Cloud manages the API lifecycle with capabilities that include, but are

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access)

Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Published June 2015 Why do certain web-based applications have issues through the rewrite engine compared to accessing the resource

More information

CloudCheck TruSpeed. Reliably Fast Broadband & Wi-Fi for the Home. June,

CloudCheck TruSpeed. Reliably Fast Broadband & Wi-Fi for the Home. June, CloudCheck TruSpeed June, 2018 Reliably Fast Broadband & Wi-Fi for the Home 1 6-1-2018 ASSIA Overview Who is ASSIA? A fast-growing profitable cloud data-science software-solutions company Enables reliably

More information

What s New for Oracle Internet of Things Cloud Service. Topics: Oracle Cloud. What's New for Oracle Internet of Things Cloud Service Release 17.4.

What s New for Oracle Internet of Things Cloud Service. Topics: Oracle Cloud. What's New for Oracle Internet of Things Cloud Service Release 17.4. Oracle Cloud What's New for Oracle Internet of Things Cloud Service Release 17.4.5 E70360-16 December 2017 What s New for Oracle Internet of Things Cloud Service As soon as new and changed features become

More information

Voice, Video and Data Convergence:

Voice, Video and Data Convergence: : A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information

More information

VirtuLocity VLN Software Acceleration Service Virtualized acceleration wherever and whenever you need it

VirtuLocity VLN Software Acceleration Service Virtualized acceleration wherever and whenever you need it VirtuLocity VLN Software Acceleration Service Virtualized acceleration wherever and whenever you need it Bandwidth Optimization with Adaptive Congestion Avoidance for WAN Connections model and supports

More information

Rethink the Network It is more than just transport

Rethink the Network It is more than just transport Rethink the Network It is more than just transport Christian Buhrow cbuhrow@extrahop.com Founded in 2007 in Seattle (USA) ; well-funded, rapidly emerging market leader Global leadership in wire data analysis

More information

Validate Pre-Deployment and Live Networks and Applications

Validate Pre-Deployment and Live Networks and Applications IxChariot 8 Validate Pre-Deployment and Live Networks and Applications Key Features New HTML5-based web interface zero client installation; browser-based IxChariot 8 is a new version of the industry's

More information

5G From Fixed Wireless Today to Mobility & Transformative Improvements by 2019

5G From Fixed Wireless Today to Mobility & Transformative Improvements by 2019 5G From Fixed Wireless Today to Mobility & Transformative Improvements by 2019 5G is rapidly climbing the hype cycle. Qualcomm has even claimed it could be as transformative as electricity. Wireless network

More information

Solutions For Your Internet Of Things

Solutions For Your Internet Of Things Solutions For Your Internet Of Things 29 March 2017 Arun Shankar Our Journey Nov 14 stealth Sep 15 Jul 16 Sep 16 Nov 16 Feb 17 Founded in Japan 5K+ clients US launch Europe launch 2017 More exciting things

More information

ICN & 5G. Dr.-Ing. Dirk Kutscher Chief Researcher Networking. NEC Laboratories Europe

ICN & 5G. Dr.-Ing. Dirk Kutscher Chief Researcher Networking. NEC Laboratories Europe ICN & 5G Dr.-Ing. Dirk Kutscher Chief Researcher Networking NEC Laboratories Europe Performance and Security Today User Equipment Access Network Core/Service Network Application Servers 2 NEC Corporation

More information

WiZi-Cloud: Application-transparent Dual ZigBee-WiFi Radios for Low Power Internet Access

WiZi-Cloud: Application-transparent Dual ZigBee-WiFi Radios for Low Power Internet Access WiZi-Cloud: Application-transparent Dual ZigBee-WiFi Radios for Low Power Internet Access Tao Jin, Guevara Noubir, Bo Sheng College of Computer and Information Science Northeastern University InfoCom 2011,

More information

ThoughtSpot on AWS Quick Start Guide

ThoughtSpot on AWS Quick Start Guide ThoughtSpot on AWS Quick Start Guide Version 4.2 February 2017 Table of Contents Contents Chapter 1: Welcome to ThoughtSpot...3 Contact ThoughtSpot... 4 Chapter 2: Introduction... 6 About AWS...7 Chapter

More information

FUJITSU Cloud Service K5 - API Management Service Description

FUJITSU Cloud Service K5 - API Management Service Description FUJITSU Cloud Service K5 - API Management Service Description August 8, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided

More information

Virtual Support Engineer Remote Access and Monitoring Solutions for OEMs & System Integrators

Virtual Support Engineer Remote Access and Monitoring Solutions for OEMs & System Integrators Virtual Support Engineer Remote Access and Monitoring Solutions for OEMs & System Integrators Rev 5058-CO900C Virtual Support Engineer Simple and Secure Connectivity Real-time Alarming Data Collection

More information

Apigee Edge Cloud - Bundles Spec Sheets

Apigee Edge Cloud - Bundles Spec Sheets Apigee Edge Cloud - Bundles Spec Sheets Description Apigee Edge Cloud is an API management platform to securely deliver and manage all APIs. Apigee Edge Cloud manages the API lifecycle with capabilities

More information

AWS Reference Architecture - CloudGen Firewall Auto Scaling Cluster

AWS Reference Architecture - CloudGen Firewall Auto Scaling Cluster AWS Reference Architecture - CloudGen Firewall Auto Scaling Cluster Protecting highly dynamic AWS resources with a static firewall setup is neither efficient nor economical. A CloudGen Firewall Auto Scaling

More information

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING A STRONG PARTNER COMPANY Link11 - longstanding security experience Link11 is a European IT security provider, headquartered in Frankfurt, Germany

More information

Problem Code: #ISR13. College Code :

Problem Code: #ISR13. College Code : Ministry Category : Indian Space Research Organisation (ISRO) Problem statement : Detect security breaches or anomalies in Network traffic using Network log analysis Team Leader Name : Vipin George Problem

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions FAQ December Revision Table of Contents General... 3 Agent Deployment... 5 Cloud Administration... 8 Security... 10 Purchase... 10 Support... 11 Page 2 of 11 justsamit Frequently

More information

STATEFUL TCP/UDP traffic generation and analysis

STATEFUL TCP/UDP traffic generation and analysis XENATM STATEFUL TCP/UDP traffic generation and analysis Ideal for validating firewalls, switches, routers, NAT routers, proxies, load-balancers, bandwidth shapers and more. VULCAN LAYER 4-7 GIGABIT ETHERNET

More information

Internet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12

Internet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12 Chapter12 Internet Platform Management The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect, it

More information

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic KEY FINDINGS INTERACTIVE GUIDE Uncovering Hidden Threats within Encrypted Traffic Introduction In a study commissioned by A10 Networks, Ponemon surveyed 1,023 IT and IT security practitioners in North

More information

Managing Wi-Fi With CloudCheck

Managing Wi-Fi With CloudCheck Managing Wi-Fi With CloudCheck ASSIA Software Solutions Reliably Fast Broadband & Wi-Fi for the Home 1 June 6 2018 ASSIA Overview Market Leader in Diagnostics and Optimization Software DSL & Optical Broadband

More information

Virtual Support Engineer

Virtual Support Engineer Virtual Support Engineer Remote Access and Monitoring Solutions for OEMs & System Integrators Rev 5058-CO900C Copyright 2012 Rockwell Automation, Inc. All rights reserved. Copyright 2012 Rockwell Automation,

More information

Synchronized Security

Synchronized Security Synchronized Security Revolutionizing Advanced Threat Protection Per Söderqvist Sales Engineer Nordics and Baltics 1 A Proven Market Leader Endpoint Encryption Leader UTM Unified Threat Management EPP

More information

BROADBAND FORUM S USER SERVICES PLATFORM (USP)

BROADBAND FORUM S USER SERVICES PLATFORM (USP) BROADBAND FORUM S USER SERVICES PLATFORM (USP) UTILIZING NEW TECHNOLOGIES TO CONTROL AND MANAGE DEVICES IN THE HOME JOHN BLACKFORD - PRODUCT MANAGEMENT DIRECTOR, ARRIS TABLE OF CONTENTS INTRODUCTION...

More information

FUJITSU Cloud Service K5 - API Management Service Description

FUJITSU Cloud Service K5 - API Management Service Description FUJITSU Cloud Service K5 - API Management Service Description March 22, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided

More information

ABSTRACTING CONNECTIVITY FOR IOT WITH A BACKHAUL OPERATOR

ABSTRACTING CONNECTIVITY FOR IOT WITH A BACKHAUL OPERATOR ABSTRACTING CONNECTIVITY FOR IOT WITH A BACKHAUL OPERATOR NIGEL CHADWICK VIDEO TRANSCRIPT Welcome! What s your name and what do you do? Hi, it s Nigel Chadwick. I m one of the founders of Stream Technologies.

More information

Design your network to aid forensics investigation

Design your network to aid forensics investigation 18th Annual FIRST Conference Design your network to aid forensics investigation Robert B. Sisk, PhD, CISSP Senior Technical Staff Member IBM Baltimore, Maryland USA Master Outline Introduction Incident

More information

I am a Data Nerd and so are YOU!

I am a Data Nerd and so are YOU! I am a Data Nerd and so are YOU! Not This Type of Nerd Data Nerd Coffee Talk We saw Cloudera as the lone open source champion of Hadoop and the EMC/Greenplum/MapR initiative as a more closed and

More information

Preparing your network for the next wave of innovation

Preparing your network for the next wave of innovation Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

40,000 TRANSFORM INFRASTRUCTURE AT THE EDGE. Introduction. Exploring the edge. The digital universe is doubling every two years

40,000 TRANSFORM INFRASTRUCTURE AT THE EDGE. Introduction. Exploring the edge. The digital universe is doubling every two years TRANSFORM INFRASTRUCTURE AT THE EDGE Dell EMC enables robust, efficient edge computing virtually anywhere with micro Modular Data Centers Introduction Edge computing is becoming one of the biggest buzzwords

More information

WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM

WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM Introduction Phone systems have been installed in offices of all different sizes for more than 40 years, providing a vital service to the business. Since

More information

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking : Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet

More information

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant Smart and Secured Infrastructure Rajesh Kumar Technical Consultant IoT Use Cases Smart Cities Connected Vehicles / V2X / ITS Industrial Internet / IIoT / Industry 4.0 Enterprise IoT / Smart Buildings Technical

More information

Cisco Application Policy Infrastructure Controller Data Center Policy Model

Cisco Application Policy Infrastructure Controller Data Center Policy Model White Paper Cisco Application Policy Infrastructure Controller Data Center Policy Model This paper examines the Cisco Application Centric Infrastructure (ACI) approach to modeling business applications

More information

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) is no longer a fanciful vision. It is very much with us, in everything from

More information

Pimp My Data Grid. Brian Oliver Senior Principal Solutions Architect <Insert Picture Here>

Pimp My Data Grid. Brian Oliver Senior Principal Solutions Architect <Insert Picture Here> Pimp My Data Grid Brian Oliver Senior Principal Solutions Architect (brian.oliver@oracle.com) Oracle Coherence Oracle Fusion Middleware Agenda An Architectural Challenge Enter the

More information