FIWARE Webinar Recordings

The FIWARE Foundation offers a series of training workshops in the form of online webinars. These are designed to appeal to a variety of audiences and are ranked according to their level of difficulty. Look at the FIWARE site to check the list of upcoming webinars

The webinar series will covers all you need to learn about FIWARE: what each of the FIWARE components brings and how apps can be developed using them. We will explain what the vision and value proposition of FIWARE is in specific domains such as Smart Cities, Smart Agrifood, Smart Energy, and Smart Industry and showcase the kind of initiatives members of the FIWARE Community are carrying out beyond the development of the technology.

Each webinar is recorded, the recordings are listed below.

Academy Courses

Lesson 1. Introduction to FIWARE

This video presentation is a basic introduction describing what FIWARE is, why you need it and how the elements of the FIWARE Catalogue can help accelerate the development of your Smart Solution.

Lesson 2. Core Context Management

  • What is Context Data?
  • What is a Context Broker?
  • What is NGSI v2?
  • Introduction to harmonized data models
  • How to read and update context data via REST
  • How to assign relationships between Entities
  • How to register other sources as context data
  • How to subscribe to changes in context

This video presentation is a basic introduction describing what FIWARE is, why you need it and how the elements of the FIWARE Catalogue can help accelerate the development of your Smart Solution.

Lesson 3. What is an IoT Agent?

  • What is a transport?
  • What is a message protocol?
  • What do the terms northbound/southbound and north/south port mean ?
  • How are commands and measurements processed?

  • What is an IoT Agent? What does it do?

  • How can I configure an IoT Agent over HTTP?
  • How can I configure an IoT Agent over MQTT?

This video presentation shows how to connect IoT Devices to the Context Broker using an IoT Agent and how to ensure your device is FIWARE Ready.

Lesson 4. How to Secure FIWARE Architectures

  • What are Identity Management and Access Control?
  • Which FIWARE components will you need?
  • What are Authentication and Authorization? How do they differ?
  • What is OAuth2? What flows are supported?

  • What is a PEP Proxy? What does it do?

  • What is a PDP and when will I need one?
  • What terms such as RBAC, PBAC and XACML mean and how are they used?

This video presentation shows how to add Identity Management and Access Control elements to your FIWARE Architecture by using the Generic Enablers from the Security Chapter.