Next Monday 31st May at 12:00 will be held the first session of Mobile Edge Computing/Cloud (MEC) Architecture Web Seminar.

You can register here.

This webinar is based on Deliverable D3.2 on "Intermediate E2E, MEC & Positioning Architecture" Section 4.3 about Mobile Edge Computing/Cloud (MEC). The following topics will be covered:  

  • Related work as basis for proposed solutions (3GPP, Automotive Edge Computing Consortium (AECC), Cloud Native Computing Foundation (CNCF))
  • Session continuity: 3GPP gateway switching
  • Session & service continuity: 3GPP session continuity + discovering and switching MEC-hosted application servers incl. examples based on 5GCroCo use cases Anticipated Cooperative Collision Avoidance (ACCA) and HD Mapping
  • MEC in context of cross-border / -MNO handover
  • Joined management and orchestration of Virtual Network Functions (VNFs) and MEC-hosted Application Servers
  • Deployments for controlled end-to-end QoS across multiple MNOs
  • Overview of conducted and planned trials   

Speaker Bio: 

Maciej Muehleisen received his PhD on “Voice over LTE” from RWTH Aachen University in 2015 and worked as a group leader for vehicular communication at Hamburg University of Technology (TUHH) from 2012 until 2016 focusing on highly reliable aircraft and maritime networks.

He is with Ericsson Research since 2017 and leads the architecture work package of the EU funded 5GCroCo projects on 5G for CCAM in cross-border environments. where he also serves as deputy Technical Coordinator. As “Industry Verticals Coordination” in the Research Area “Networks” he is furthermore supporting the technical coordination of Ericsson’s efforts in the Automotive Edge Computing Association (AECC) and 5G Automotive Association (5GAA).

His key research interest is in end-to-end design, evaluation, and approval of safety critical communication services. 

REGISTRATION

Next Monday 17th the last session of the Docker Security Guidelines Web Seminar will be held. Registration are now open.

Abstract:

Container technologies have seen a rise in popularity in recent years. They provide a convenient way of packaging applications for deployment in production and offer lightweight alternatives to virtual machines (VMs). However, containers do not offer the same security benefits as VMs and - from a security perspective - many things can be done wrong when developing and running containerized workloads.

This web-seminar gives an overview of security threats and common vulnerability patterns related to designing, developing, and deploying docker containers. The focus are the most common docker vulnerability patterns, as seen "in the wild" from the experience of security assessments and based on security best practices. Insecure practices, potential misconfigurations and common pitfalls related to the building of docker images, containers at runtime, and the host environment are covered. For every issue, secure solutions, available protection mechanisms, as well as examples are provided.

The target audience of this web-seminar are developers with a basic understanding of docker who want and need to ensure they build and run containerized workloads in a secure manner. Only issues to docker and docker-compose are covered. More complex container orchestration tools, such as Kubernetes or OpenShift, are out of scope. As preparation we suggest reading Section 4.5.3 of 5GCroCo Deliverable D3.2

Speaker bio:

Fabian Würfl works as Security Consultant at SEC Consult. His main areas of work are web application pen tests, network security assessments and Docker/Kubernetes/OpenShift security assessments. He regularly holds secure coding trainings for developers and works on internal software development projects.

 

REGISTRATION

Next 5GCroCo Web-Seminar on Cross-border/- MNO Handover Architecture and Trial Results  will be held next Mondays 19 April 2021.

 

Abstract:

Cooperative, Connected and Automated Mobility (CCAM) will enrich assisted and automated driving by exchange of information among vehicles (V2V), as well as between vehicles and the network, commonly also called ”cloud” or ”backend”, (V2N). CCAM services should not be interrupted when crossing a country border and with that also switching between different Mobile Network Operators (MNOs).

This webinar will present the 3GPP-complient network architecture applied in the 5GCroCo project to achieve cross-border / MNO (Inter-PLMN) handover. Furthermore, first results and experience from trials will be presented and discussed.

Spekar Bio:

Maciej Muehleisen received his PhD on “Voice over LTE” from RWTH Aachen University in 2015 and worked as a group leader for vehicular communication at Hamburg University of Technology (TUHH) from 2012 until 2016 focusing on highly reliable aircraft and maritime networks.

He is with Ericsson Research since 2017 and leads the architecture work package of the EU funded 5GCroCo projects on 5G for CCAM in cross-border environments. where he also serves as deputy Technical Coordinator. As “Industry Verticals Coordination” in the Research Area “Networks” he is furthermore supporting the technical coordination of Ericsson’s efforts in the Automotive Edge Computing Association (AECC) and 5G Automotive Association (5GAA).

His key research interest is in end-to-end design, evaluation, and approval of safety critical communication services. 

 

REGISTRATION

NEW DATES!

Next Monday 10th of May a new Web Seminar on Docker Security will be held. The seminar is divided in two sessions of 2 hours, starting at 12:00 CE.

Abstract:

Container technologies have seen a rise in popularity in recent years. They provide a convenient way of packaging applications for deployment in production and offer lightweight alternatives to virtual machines (VMs). However, containers do not offer the same security benefits as VMs and - from a security perspective - many things can be done wrong when developing and running containerized workloads.

This web-seminar gives an overview of security threats and common vulnerability patterns related to designing, developing, and deploying docker containers. The focus are the most common docker vulnerability patterns, as seen "in the wild" from the experience of security assessments and based on security best practices. Insecure practices, potential misconfigurations and common pitfalls related to the building of docker images, containers at runtime, and the host environment are covered. For every issue, secure solutions, available protection mechanisms, as well as examples are provided.

The target audience of this web-seminar are developers with a basic understanding of docker who want and need to ensure they build and run containerized workloads in a secure manner. Only issues to docker and docker-compose are covered. More complex container orchestration tools, such as Kubernetes or OpenShift, are out of scope. As preparation we suggest reading Section 4.5.3 of 5GCroCo Deliverable D3.2

 

Speaker bio:

Fabian Würfl works as Security Consultant at SEC Consult. His main areas of work are web application pen tests, network security assessments and Docker/Kubernetes/OpenShift security assessments. He regularly holds secure coding trainings for developers and works on internal software development projects.

 

REGISTRATION

Next 5GCroCo Web-Seminar on Challenges and Solutions for V2X Interoperability will be held next Monday 12 of April 2021. Registration here.

 

Abstract:

Section 3.3.5 of the recently published 5GCroCo Deliverable D3.1 on "Final Application Architecture" explains the challenges and solutions for interoperability around the Anticipated Cooperative Collision Avoidance (ACCA) use case. This use case serves as example to uncover challenges if information, in this case hazard warnings, must be shared between different automotive OEMs and between OEMs and different Road Traffic Authorities (RTAs).

“Standardization” is often considered necessary in this context. This presentation introduces the current and near-future eco-system of information sharing for connected vehicles. It describes how different solutions, beyond everyone just following the same standard, can be used to achieve service-level interoperability among different ITS systems and stakeholders. For each solution, involved stakeholders are identified and their respective effort to establish and maintain (evolve / upgrade) the interoperability solution.

Spekar Bio:

Maciej Muehleisen received his PhD on “Voice over LTE” from RWTH Aachen University in 2015 and worked as a group leader for vehicular communication at Hamburg University of Technology (TUHH) from 2012 until 2016 focusing on highly reliable aircraft and maritime networks.

He is with Ericsson Research since 2017 and leads the architecture work package of the EU funded 5GCroCo projects on 5G for CCAM in cross-border environments. where he also serves as deputy Technical Coordinator. As “Industry Verticals Coordination” in the Research Area “Networks” he is furthermore supporting the technical coordination of Ericsson’s efforts in the Automotive Edge Computing Association (AECC) and 5G Automotive Association (5GAA).

His key research interest is in end-to-end design, evaluation, and approval of safety critical communication services. 

REGISTRATION

­
We use cookies to facilitate navigation and improve your experience across our website. By clicking "Accept", you will be storing these cookies.