Testing Persistent Storage Performance in Kubernetes with SherlockScyllaDB
Getting to understand your Kubernetes storage capabilities is important in order to run a proper cluster in production. In this session I will demonstrate how to use Sherlock, an open source platform written to test persistent NVMe/TCP storage in Kubernetes, either via synthetic workload or via variety of databases, all easily done and summarized to give you an estimate of what your IOPS, Latency and Throughput your storage can provide to the Kubernetes cluster.
Scaling Your Architecture for the Long TermRandy Shoup
This talk from the virtual 2020 CTO Summit (https://www.ctoconnection.com/summits) covers several architecture lessons to help you survive and thrive through the scaling phase of your company:
* Modular Architecture
* Event-Driven Communication
* Quality and Reliability
* Continuous Delivery
Financial Markets have latency and jitter requirements that Kernel-RT PREEMPT_RT allows to solve.
From Timesync with nfp, ptp, whiterabbit, to business requirement of minimal jitter and latency
SRv6 Mobile User Plane : Initial POC and ImplementationKentaro Ebisawa
SRv6 Mobile Uplane POC results and findings talked at ENOG55 @Nigata http://enog.jp/archives/2014
SRv6 functions: T.M.Tmap, End.M.GTP4.E using VPP and P4 on Tofino switch.
Time Sensitive Networking in the Linux Kernelhenrikau
Time Sensitive Networking provides mechanisms for sending data accross the network with very low latency, low jitter and low framedrops, opening up a whole range of new applications.
This talk primarily focuses on media, but the driver should be interesting for industrial applications and automotive as well.
Testing Persistent Storage Performance in Kubernetes with SherlockScyllaDB
Getting to understand your Kubernetes storage capabilities is important in order to run a proper cluster in production. In this session I will demonstrate how to use Sherlock, an open source platform written to test persistent NVMe/TCP storage in Kubernetes, either via synthetic workload or via variety of databases, all easily done and summarized to give you an estimate of what your IOPS, Latency and Throughput your storage can provide to the Kubernetes cluster.
Scaling Your Architecture for the Long TermRandy Shoup
This talk from the virtual 2020 CTO Summit (https://www.ctoconnection.com/summits) covers several architecture lessons to help you survive and thrive through the scaling phase of your company:
* Modular Architecture
* Event-Driven Communication
* Quality and Reliability
* Continuous Delivery
Financial Markets have latency and jitter requirements that Kernel-RT PREEMPT_RT allows to solve.
From Timesync with nfp, ptp, whiterabbit, to business requirement of minimal jitter and latency
SRv6 Mobile User Plane : Initial POC and ImplementationKentaro Ebisawa
SRv6 Mobile Uplane POC results and findings talked at ENOG55 @Nigata http://enog.jp/archives/2014
SRv6 functions: T.M.Tmap, End.M.GTP4.E using VPP and P4 on Tofino switch.
Time Sensitive Networking in the Linux Kernelhenrikau
Time Sensitive Networking provides mechanisms for sending data accross the network with very low latency, low jitter and low framedrops, opening up a whole range of new applications.
This talk primarily focuses on media, but the driver should be interesting for industrial applications and automotive as well.
Integrating Postgres with ActiveMQ and CamelJustin Reock
Learn how to use Postgres as a backing persistence adapter for the ActiveMQ messaging platform, as well as an integration endpoint for the powerful Apache Camel integration framework. Not only will you learn about JDBC, but you'll also get a solid introduction to these two mature and powerful integration platforms.
Kernel advantages for Istio realized with CiliumCynthia Thomas
Istio brings a myriad of options to provide routing rules, encryption, and monitoring for microservices, typically in container environments. Cilium provides accelerated network security using a modern kernel technology called BPF. Put the two together and what do you get? A distributed security solution enabling microservices traffic management, security, and monitoring while enforcing policy as close to the microservices as possible.
Cynthia Thomas and Romain Lenglet discuss the architectural and performance benefits of using Cilium with Istio and provide a demo of this BPF-based, Linux kernel technology. Cilium provides an API-aware security solution that can make a decision on every single microservice flow, with the ability to enforce protocols such as HTTP, Kafka, and gRPC. By addressing security policy at the API layer, you can enforce policy efficiently with kernel capabilities while reducing the attack surface in a microservices deployment.
Netronome's half-day tutorial on host data plane acceleration at ACM SIGCOMM 2018 introduced attendees to models for host data plane acceleration and provided an in-depth understanding of SmartNIC deployment models at hyperscale cloud vendors and telecom service providers.
Presenter Bios
Jakub Kicinski is a long term Linux kernel contributor, who has been leading the kernel team at Netronome for the last two years. Jakub’s major contributions include the creation of BPF hardware offload mechanisms in the kernel and bpftool user space utility, as well as work on the Linux kernel side of OVS offload.
David Beckett is a Software Engineer at Netronome with a strong technical background of computer networks including academic research with DDoS. David has expertise in the areas of Linux architecture and computer programming. David has a Masters Degree in Electrical, Electronic Engineering at Queen’s University Belfast and continues as a PhD student studying Emerging Application Layer DDoS threats.
RESTful API – How to Consume, Extract, Store and Visualize Data with InfluxDB...InfluxData
Nowadays, every single modern application, system or solution does expose a RESTful API. On one hand, this is absolutely great and it has led to where we are today, having hundreds of other solutions or applications that can leverage these APIs, extend them, or even build on top of them.
On the other hand, we have difficulty monitoring these new and modern systems, applications or solutions.
In this session, we will learn how to query the data first using Swagger, when available, extract and parse the data that’s useful for us, store it in InfluxDB, and finally how to create beautiful and meaningful dashboards to have everything on a single pane of glass.
Tenedis: Déployer un socle de Monitoring UnifiéElasticsearch
Au cours de cette présentation Denis LIARD, le CTO de la société Tenedis (partenaire Elastic Advanced spécialisé dans l’Observabilité, leader français avec 30M€ de CA et 80 collaborateurs), présente les enjeux et retours d’expérience de Tenedis autour du déploiement d’un Socle de Monitoring Unifié basé sur Elastic, chez des grandes comptes français. Il y décrit notamment les raisons du choix technologique porté sur Elastic, les constats réalisés au cours des premiers projets et certains points clés qui peuvent contribuer au succès d’un tel projet.
The presentation describes how ABEMA uses video streaming technologies to improve its quality as a public media service. It also discusses technological challenges in the COVID-19 pandemic.
AbemaTV has faced a lot of technical challenges. In order to become mass media in Japan, we need to get over them. The presentation describes our approaches to solve them.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
Splunk Architecture | Splunk Tutorial For Beginners | Splunk Training | Splun...Edureka!
***** Splunk Training: https://www.edureka.co/splunk *****
This tutorial on Splunk Architecture will help you understand the various components that make up a Splunk distributed cluster and most importantly, it will give a detailed explanation of the architecture of Splunk.
Kirill Tsym discusses Vector Packet Processing:
* Linux Kernel data path (in short), initial design, today's situation, optimization initiatives
* Brief overview of DPDK, Netmap, etc.
* Userspace Networking projects comparison: OpenFastPath, OpenSwitch, VPP.
* Introduction to VPP: architecture, capabilities and optimization techniques.
* Basic Data Flow and introduction to vectors.
* VPP Single and Multi-thread modes.
* Router and switch for namespaces example.
* VPP L4 protocol processing - Transport Layer Development Kit.
* VPP Plugins.
Kiril is a software developer at Check Point Software Technologies, part of Next Generation Gateway and Architecture team, developing proof of concept around DPDK and FD.IO VPP. He has years of experience in software, Linux kernel and networking development and has worked for Polycom, Broadcom and Qualcomm before joining Check Point.
IANAL: what developers should know about IP and LegaliText Group nv
These are the slides of the Java One talk by Bruno Lowagie on Wednesday October 28 at 10 AM in Imperial Ballroom A at the Hilton in San Francisco.
Bruno will discuss topics such as open source licenses, intellectual property, trademarks and software patents. Bruno isn't a lawyer, but he'll share his experience with legal issues as a developer.
Integrating Postgres with ActiveMQ and CamelJustin Reock
Learn how to use Postgres as a backing persistence adapter for the ActiveMQ messaging platform, as well as an integration endpoint for the powerful Apache Camel integration framework. Not only will you learn about JDBC, but you'll also get a solid introduction to these two mature and powerful integration platforms.
Kernel advantages for Istio realized with CiliumCynthia Thomas
Istio brings a myriad of options to provide routing rules, encryption, and monitoring for microservices, typically in container environments. Cilium provides accelerated network security using a modern kernel technology called BPF. Put the two together and what do you get? A distributed security solution enabling microservices traffic management, security, and monitoring while enforcing policy as close to the microservices as possible.
Cynthia Thomas and Romain Lenglet discuss the architectural and performance benefits of using Cilium with Istio and provide a demo of this BPF-based, Linux kernel technology. Cilium provides an API-aware security solution that can make a decision on every single microservice flow, with the ability to enforce protocols such as HTTP, Kafka, and gRPC. By addressing security policy at the API layer, you can enforce policy efficiently with kernel capabilities while reducing the attack surface in a microservices deployment.
Netronome's half-day tutorial on host data plane acceleration at ACM SIGCOMM 2018 introduced attendees to models for host data plane acceleration and provided an in-depth understanding of SmartNIC deployment models at hyperscale cloud vendors and telecom service providers.
Presenter Bios
Jakub Kicinski is a long term Linux kernel contributor, who has been leading the kernel team at Netronome for the last two years. Jakub’s major contributions include the creation of BPF hardware offload mechanisms in the kernel and bpftool user space utility, as well as work on the Linux kernel side of OVS offload.
David Beckett is a Software Engineer at Netronome with a strong technical background of computer networks including academic research with DDoS. David has expertise in the areas of Linux architecture and computer programming. David has a Masters Degree in Electrical, Electronic Engineering at Queen’s University Belfast and continues as a PhD student studying Emerging Application Layer DDoS threats.
RESTful API – How to Consume, Extract, Store and Visualize Data with InfluxDB...InfluxData
Nowadays, every single modern application, system or solution does expose a RESTful API. On one hand, this is absolutely great and it has led to where we are today, having hundreds of other solutions or applications that can leverage these APIs, extend them, or even build on top of them.
On the other hand, we have difficulty monitoring these new and modern systems, applications or solutions.
In this session, we will learn how to query the data first using Swagger, when available, extract and parse the data that’s useful for us, store it in InfluxDB, and finally how to create beautiful and meaningful dashboards to have everything on a single pane of glass.
Tenedis: Déployer un socle de Monitoring UnifiéElasticsearch
Au cours de cette présentation Denis LIARD, le CTO de la société Tenedis (partenaire Elastic Advanced spécialisé dans l’Observabilité, leader français avec 30M€ de CA et 80 collaborateurs), présente les enjeux et retours d’expérience de Tenedis autour du déploiement d’un Socle de Monitoring Unifié basé sur Elastic, chez des grandes comptes français. Il y décrit notamment les raisons du choix technologique porté sur Elastic, les constats réalisés au cours des premiers projets et certains points clés qui peuvent contribuer au succès d’un tel projet.
The presentation describes how ABEMA uses video streaming technologies to improve its quality as a public media service. It also discusses technological challenges in the COVID-19 pandemic.
AbemaTV has faced a lot of technical challenges. In order to become mass media in Japan, we need to get over them. The presentation describes our approaches to solve them.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
Splunk Architecture | Splunk Tutorial For Beginners | Splunk Training | Splun...Edureka!
***** Splunk Training: https://www.edureka.co/splunk *****
This tutorial on Splunk Architecture will help you understand the various components that make up a Splunk distributed cluster and most importantly, it will give a detailed explanation of the architecture of Splunk.
Kirill Tsym discusses Vector Packet Processing:
* Linux Kernel data path (in short), initial design, today's situation, optimization initiatives
* Brief overview of DPDK, Netmap, etc.
* Userspace Networking projects comparison: OpenFastPath, OpenSwitch, VPP.
* Introduction to VPP: architecture, capabilities and optimization techniques.
* Basic Data Flow and introduction to vectors.
* VPP Single and Multi-thread modes.
* Router and switch for namespaces example.
* VPP L4 protocol processing - Transport Layer Development Kit.
* VPP Plugins.
Kiril is a software developer at Check Point Software Technologies, part of Next Generation Gateway and Architecture team, developing proof of concept around DPDK and FD.IO VPP. He has years of experience in software, Linux kernel and networking development and has worked for Polycom, Broadcom and Qualcomm before joining Check Point.
IANAL: what developers should know about IP and LegaliText Group nv
These are the slides of the Java One talk by Bruno Lowagie on Wednesday October 28 at 10 AM in Imperial Ballroom A at the Hilton in San Francisco.
Bruno will discuss topics such as open source licenses, intellectual property, trademarks and software patents. Bruno isn't a lawyer, but he'll share his experience with legal issues as a developer.
Open source: an introduction to IP and LegalBruno Lowagie
Open Source India (OSI) Days talk by Bruno Lowagie about intellectual property in the context of open source, about open source licenses, and about keeping track of the IP of your project.
iText has developed open source Software for development of a pdf engine in a Java environment. The way that iText managed to find the most appropriate FOSS protection strategy is exemplary for a lot of other open source software companies. The dual licensing model makes it possible to share knowledge for free with those who accept the terms of the FOSS license and to distribute it under a commercial license for those who want to makes business with it.
www.FITT-for-Innovation.eu
Half hour presentation about Free/Open Source Software and Intellectual Property. Case study about the Research Agreement to make an overview of the IP of iText, a Java-PDF library. Some examples of issues that were dealt with.
OpenChain Conformance: Arm Case Study
This case study unpacks how the open source team at Arm used the OpenChain industry standard to simplify and speed their compliance process.
Related OSS Projects - Peter Rowe, Flexera SoftwareOpenStack
Audience Level
Intermediate
Synopsis
Today’s fast-paced development environment has changed the compliance landscape. Many software projects consist of more than 50% Open Source Software (OSS) components, but as much as 99% are undocumented, increasing the complexities of managing your company’s software compliance process.
Of particular concern is “Zombie software”, or software that is outdated and contains vulnerable versions of certain components. Zombies can live in your code forever if you’re not aware of them. The acceleration of modern development lifecycles and the breakdown of an undocumented software supply chain have opened up new pathways for zombies to enter your software – leaving you exposed to security threats.
This presentation discusses best practices for implementing an Open Source Software management strategy that covers common pitfalls and commercial licence issues as well as the optimal way to track and eliminate the risks associated with Zombies!
Speaker Bio:
Involved in and around IT development for over 20 years, starting as a web developer using NotePad in 1995 when the most exciting thing online was Sun’s animated Java coffee cup, through Numega Pre-Sales selling BoundsChecker and now into the brave, new World of Open Source and software composition analysis.
Increasingly, software is designed and developed from pre-existing software, that are modified and adapted according to one’s needs.
The issue is relevant in connection with the world of open source, where very often the user does not know within what limits he can develop software and also when his work can be considered a derivative work.
But not only that. The topic is particularly important in connection with the contracts that assign intangible assets and know-how.
In M&A transactions, the question of succession in IP contracts is of fundamental importance. Indeed, the issue of software ownership and licensing is very important for the incorporating company. Very often in M&A transactions, due diligence is required to exclude possible risks of copyright infringement. What are the clauses to pay attention to in software license agreements?
The topic is of great interest in legal matters, concerning, for example, the rights that the creator of the derivative work has, the rights of the author of the original work and the choice of the best license to release the software.
The talk aims to analyze the different possible answer to this questions, trying to define what is meant by derivative work and the clauses to be paid attention in the contracts in order not to incur civil and criminal penalties in the context of merger and acquisition operations.
In this presentation, I look at the valuation of start-ups from two different angles: from the point of view of the founder/owner and from the point of view of the investor/business angel.
Open Source Survival: A Story from the TrenchesBruno Lowagie
In this slide deck, I discuss eight different ways you can make money as an open source developer. It's part of a series of presentations to promote my book "Entreprenerd."
Slides for the book presentation of "Entreprenerd: Building a Multi-Million-Dollar Business with Open Source Software" in which Bruno Lowagie tells the story about how he developed the open source PDF library iText, how he created an international group of companies for the project, and how he grew the business from start-up to exit.
Waarom iText de Leeuw van de Export 2016 moet winnenBruno Lowagie
10 redenen waarom iText volgende week de Leeuw van de Export niet mag verliezen. We zijn #1 exportkampioen, #2 groeikampioen, #3 werkgever, #4 innovator, #5 expert, #6 evangelist, #7 ambassadeur, #8 ondernemer, #9 reiziger, en #10 winnaar.
Belgium and the US: a mutual introductionBruno Lowagie
Slide deck for my guest lecture at the University College Leuven Limburg about doing business in Belgium and doing business in the US, based on my own experience at iText.
My slides for the Startup Weekend Ghent (December 5-7). It's also kind of a "Best of BizCamp" overview. Three really short, provocative, 10-minute talks about doing business.
Doing business in the US: Yes, You Can!Bruno Lowagie
Draft of the slide deck for my talk at VOKA on Friday, September 5, 2014: http://www.voka.be/oost-vlaanderen/opleidingen/2014/9/zakelijk-succes-in-de-vs/
Community Leadership Summit - Calistoga March 2013Bruno Lowagie
These are the slides of team 3 at the Community Leadership Summit in Calistoga (at the Open Source Think Tank). Our group discussed the topic "Developer Growth", answering questions such as: How will you attract new developers to participate? How will you retain developers so they become significant and sustained contributors? How will you attract new demographic of developers, outside of the current industry? How will you encourage existing partner organizations to contribute developers to the project? How will you deal with organizational requirements (e.g. NDAs, copyright assignment, re-licensing requirements, etc)? How will you keep developers motivated and feeling they have a sense of personal influence on the project? How will you avoid entitlement?
Bizcamp #8: The Founder's Dilemmas, Control vs. Wealth decisionsBruno Lowagie
In this talk, scheduled for May 28th, Bruno Lowagie, the CEO of the iText Software Group, will talk about the book "The Founder's Dilemmas" by Noam Wasserman, explain the different Control vs. Wealth decisions discussed in this book, and apply what is said in the book to his own business.
Ik heb een paar schetsen gemaakt van een kruispunt dat gevaarlijk is voor fietser. Ik heb twee scenario's getekend om dit kruispunt over te steken. De vragen die ik hierbij heb, zijn: "Heb ik de plicht om dit kruispunt op de gevaarlijke manier over te steken?" of "Heb ik het recht om dit kruispunt op de veilige manier over te steken?"
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
Charge simply means 'accusation'.
A charge is a formal recognition of concrete accusations by a magistrate or a court based upon a complaint or information against the accused.
A charge is drawn up by a court only when the court is satisfied by the prima facie evidence against the accused.
The basic idea behind a charge is to make the accused understand what exactly he is accused of so that he can defend himself.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.