Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Technical personnel skilled in the Akraino platform and blueprint can be trained to support Akraino's landing operations and technical support in China.


Blueprint Landing Plans

Member company of Akraino China office will adopt and/or deploy these blueprints.

IEC Type 5: SmartNIC for Integrated Edge Cloud (IEC) Blueprint Family

...

Industrial Conference:

Exhibition: 

Target Industries:


The AI Edge: Federated ML application at edge

haihui wang

Akraino Certification Program

Jim Xu

Guide for Akraino Apps run on Tencent Cloud

Bart Dong

...


Public Cloud Edge Interface (PCEI) Blueprint Family

PCEI Documentation

Oleg Berzin

Federated Multi-Access Edge Cloud Platform

Deepak Vij


5G MEC/Slice System to Support Cloud Gaming, HD Video and Live Broadcasting Blueprint

Zigeng Fu Feng Yang


BluVal

Thor Chin

The Blueprint Validation Framework offers a set of tools that can be used to test Akraino deployments on different layers (hardware, os, k8s, openstack, etc).

The framework provides tests at different layers of the stack, like hardware, operating system, cloud infrastructure, security, etc. Since the project is constantly evolving, the full list of available tests can be found in the projects repo, where the tests are located under their respective layer. Each layer has its own container image built by the validation project. The full list of images provided can be found in the project’s DockerHub repo.

Bluval User Guide

Thor Chin


Security

Randy Stricklin Daniil Egranov Wenhui Zhang

If you are working on driver code, Vuls and Lynis are needed.

If you are developing container based application code, Vuls, Lynis and Kuber-Hunter are needed.

If you are developing VM based application code, Vuls (testing setup inside each VM) and Lynis (testing setup inside each VM) are needed.  

Vuls scan usually takes around 10 to 20 mins.

Kuber-Hunter usually takes about 10 mins. 

Lynis scan usually takes about 2 mins. 

Steps To Implement Security Scan Requirements