SlideShare a Scribd company logo
1 of 233
RoomWare
  Workshop
August 29 / 30, 2009
INTRO
HOME BREW GALORE
Glorious stuff you can make
         at home
RoomWare for:
(notice they are regular kids)
Three Keys

  Anyone can do it
  Simple to setup
No special knowledge
      required
Workshop basic goals


      Create concrete solutions
     Using off the shelf materials
Where anything is remote controllable
  via sensors or a mobile phone
Three design rules


      Easy to install
 Easy to expand / extend
Up and running in minutes
Means and Materials
      Microphones
       (Web) cams
     Paper & Printers
      Mobile phones
   Online web services
RoomWare Web Applications
Fields
1. Online: Web applications
2. Mobile: RoomWare applications
3. Local: User input via sensors
4. Server: Extending the RoomWare
   server
5. Conceptual: Use cases for RoomWare
   use
1: Online

1. Identity Broker
2. Visualization of social data
   (Flikr, Twitter, .. in Flash / HTML)
3. QR-code reader (Flash)
4. Connection to RoomWare Server
2: Mobile

1. Augmented (web) browser
  1. QR-code reader
  2. Direct call to RW service
2. QR-code / RoomWare handshake
3. RoomWare Remote control
3: Local (input / sensors)


1. Scratch input
2. Sensors
3. Camera: gestures / fiducials / QR / AR
4: RW Server
1. Installer
2. Bridges
3. Communication / interaction via
   Sockets
4. Definition / description of interfaces
5. Config panel
5: Conceptual



How would you like to use
     RoomWare?
PART ONE
BASIC CONCEPTS OF
    ROOMWARE
A quick flip through
   presentation



 Basic concepts of RoomWare
Basic concepts
    Record the moment
    Enrich the present *
     Connect to others
Connect to your environment
       Re-live the past
    Discover the future

   Basic concepts of RoomWare
CONCEPT ONE
Record the moment


   Basic concepts of RoomWare
Using




Record the moment
RFID cards / tags




              Record the moment
QR-codes




           Record the moment
Local readers




                Record the moment
Geo tagging




              Record the moment
RoomWare Server




           Record the moment
Record the moment
To bookmark




 Record the moment
An object




            Object + moment + location
              Record the moment
Record the moment
Record the moment
A point




          Moment + location
            Record the moment
An event




           Location + [start time | end time]
             Record the moment
Record the moment
CONCEPT TWO
Connect to others


   Basic concepts of RoomWare
Using:




Connect to others
Input devices




                Connect to others
Identifiers & readers




              Connect to others
RoomWare Server




           Connect to others
Identity Brokers

         Profile             Identity


                                              <XML>
   IN                        Social     OUT   <identity></identity>

        Identifier                             <identity></identity>

                             Profile           </XML>




                             Access
        Location
                             Grant

                    Connect to others
Proximity



  You   Proximity levels
        Close    Around the   Around the block
                   corner




                   Connect to your environment
Social networks




             Connect to others
Software




           Connect to others
To:




Connect to others
Link people




    • Showing relationships / connections
    • Showing meta-data (Data Cloud)
    • Linking people using Social Services

                 Connect to others
Connect to others
CONCEPT THREE
 Connect to your
  environment

   Basic concepts of RoomWare
Using:




Connect to your environment
(Mobile) devices




           Connect to your environment
Identifiers & readers




           Connect to your environment
RoomWare Server




         Connect to your environment
Proximity



  You   Proximity levels
        Close    Around the   Around the block
                   corner




                   Connect to your environment
Handshakes

 RW
                         RW Mobile
                                        Handshake
                           App


          Web            RoomWare
        interface          Server

 YOU
                           QR-code
                            reader


          Connect to your environment
Active devices



   • BlueTooth (MAC address)
   • WIFI
   • Active RFID
   • (anything with a radio transmitter)

             Connect to your environment
Pattern recognition




   • Biometric face recognition


             Connect to your environment
Software



   • Layar
   • RoomWare Remote mobile applications
   • ...
   • (Web) Applications

            Connect to your environment
Online services




   • Remote RoomWare Controller


           Connect to your environment
- Interacting with your environment
For:
- Interacting with the
     environment



 - Interacting with your environment
Using:




- Interacting with your environment
Projectors




         - Interacting with your environment
RoomWare Remote




  • (Mobile) Web Application
  • Accessible via phone and laptop


          - Interacting with your environment
QR / RFID handshake




    • To pair you to the Remote RoomWare
      Controller application




         - Interacting with your environment
Controllers


    • Wii-mote (whiteboard, laser pointer)
    • Arduino + input sensors
    • Scratch Input (sound + pattern recogn.)
    • Touch sensitivity via sound (“Sensitive
       Object”)
    • ...
            - Interacting with your environment
Sensors


    • Heat
    • Movement
    • Humidity
    • Pressure
    • Proximity
    • ....
          - Interacting with your environment
Devices


    • Door openers / magnetic locks
    • Heating / Cooling
    • Lighting
    • Audio / video players
    • ....
          - Interacting with your environment
Online preferences


    • Music
    • Books
    • Video’s
    • Artists
    • Brands
    • ....
         - Interacting with your environment
Online content




        - Interacting with your environment
Sophisticated stuff




         - Interacting with your environment
To:




- Interacting with your environment
Set music




            - Interacting with your environment
Share your photos




        - Interacting with your environment
Influence lighting




          - Interacting with your environment
Influence lighting




          - Interacting with your environment
Influence lighting




          - Interacting with your environment
Influence projections




         - Interacting with your environment
- Interacting with your environment
- I am here...




Connect to your environment
Mark your presence




              - I am here...
Mark your presence




              - I am here...
Mark your presence




              - I am here...
...here




          - I am here...
...here




          - I am here...
...or here




             - I am here...
- I am here...
- Where is .. ?




Connect to your environment
This person?




               - Where is...
That place?




              - Where is...
My friends & places?




                - Where is...
My events?




             - Where is...
Connect to your environment
- When will... ?




Connect to your environment
..this happen?




                 - When will...
- When will...
- What else is here?




  Connect to your environment
Exits, people I know




              - What else is here?
Places to go




               - What else is here?
Anything of interest




              - What else is here?
- What else is here?
CONCEPT FOUR
 Relive the past


  Basic concepts of RoomWare
Relive the past
Using




Relive the past
Logging




     • Identity Broker
     • Date / Time / Location based on
       RoomWare feedback




                  Relive the past
Relive the past
Replay your recorded life




        Relive the past
Your activity stream




                       Relive the past
Relive the past
Relive the past
Relive the past
Relive the past
Relive the past
CONCEPT FIVE
Discover the future


   Basic concepts of RoomWare
Discover the future
Agenda’s of venues and places




         Discover the future
PART TWO
TOOLS TO MAKE IT WORK
Conceptual / in practice




      Tools to make it work
ONE
Enabling the room


    Tools to make it work
Computers




            Enabling the room
RW Server
   Identification        (inter)action
                                                  Data Source
    ID Broker                    Web App



            RoomWare Server
      Bridge A     ID             Bridge B




                                  Adapter
    ID Reader

                           Sensors           Devices

                        Enabling the room
ZigBee networks




            Enabling the room
RFID readers




               Enabling the room
Active devices



   • BlueTooth (MAC address)
   • WIFI
   • Active RFID
   • (anything with a radio transmitter)

                  Enabling the room
Touch screens/tables




              Enabling the room
Projectors




             Enabling the room
Flat screens




               Enabling the room
Touch screens




                Enabling the room
Enabling the room
TWO
Interacting with the environment




          Tools to make it work
Input devices




          Interacting with the environment
Identifiers & readers




          Interacting with the environment
Controllers


    • Wii-mote (whiteboard, laser pointer)
    • Arduino + input sensors
    • Scratch Input (sound + pattern recogn.)
    • Touch sensitivity via sound (“Sensitive
       Object”)
    • ...
            Interacting with the environment
Sensors


    • Heat
    • Movement
    • Humidity
    • Pressure
    • Proximity
    • ....
          Interacting with the environment
Devices


    • Door openers / magnetic locks
    • Heating / Cooling
    • Lighting
    • Audio / video players
    • ....
          Interacting with the environment
Interacting with the environment
THREE
Connecting with others


      Tools to make it work
Identity Brokers

         Profile             Identity


                                               <XML>
   IN                       Social       OUT   <identity></identity>

        Identifier                              <identity></identity>

                            Profile             </XML>




                            Access
        Location
                            Grant

                  Connecting to others
Software




           Connecting to others
Connecting to others
PART THREE
 THE FRAMEWORK
Basic setup

• Identity Broker
• RoomWare Server
• ID Readers (RFID, BT, QR-code)
• (Web) Applications
• Sensors and Devices
• Bridges
              The framework
Identification        (inter)action

                                               Data Source
 ID Broker                    Web App



         RoomWare Server
   Bridge A     ID             Bridge B




 ID Reader              Sensors           Devices



                      The framework
Identification        (inter)action

                                               Data Source
 ID Broker                    Web App

                                     Pointer to
         RoomWare Server
   Bridge A     ID             Bridge B




                               Adapter
 ID Reader

                        Sensors           Devices

                      The framework
Identity Reader
• Is used to identify people in a location
• Can be any device: BlueTooth, RFID, ...
• Can be software: Biometric Face
  recognition, QR codes
• Can be [one] to [one] (RFID, QR code)
• Can be [one] to [many] (BlueTooth)

               The framework
Identity Broker

• Is an external service
• Can be any provider
• Is called by the RoomWare Server
• Translates an abstract number to one
  or more (online) identities



               The framework
Basic ID Broker setup

         Profile
                [one]      [one]



                [many]              [many]
                                                           <XML>
IN                                                   OUT   <identity></identity>

       Identifier                       Identity
                                                           <identity></identity>
                                                           </XML>


     - QR code                      - Flickr
     - RFID card                    - Twitter
     - BlueTooth ID                 - FaceBook
     - BlueTooth MAC address        - LinkedIn
     - ...                          - ...




                                   Identity Broker
Protecting Identities
• Basis: distrust + roles (professional/private)
• User defines which social identities are
  public (visible for anyone)
• Per location the user sets access grants to
  specific social identities
• Each set of grants can be put in a social
  profile


                 Identity Broker
Using QR codes
                                         QR-code
• Each of your social profiles can be
  represented by a unique QR-code
• Each of these QR-codes is a key
• By showing the QR-code, the user creates
  a connection between a social profile and a
  location


                Identity Broker
Using specific identifiers


• Social profiles can also be connected to
  specific Identifiers (RFID card, BlueTooth
  device, QR-code)




                Identity Broker
ID Broker: access grant
                      [many]
        Profile      [one]       Identity
           [one]                         [many]


           [many]                        [many]
                                                        <XML>
IN                   [many]      Social           OUT   <identity></identity>

      Identifier                                         <identity></identity>
                    [many]
                                 Profile                 </XML>


                                 [one]

                                         [many]


                    [one]       Access
       Location      [many]
                                Grant

                             Identity Broker
Identity Broker
(Web) Applications
• Run outside RoomWare Server
• Uses external Web Services to create
  (data) visualizations related to present
  people
• RoomWare Server has pointer to App
• RoomWare server acts as a bridge for
  the app to interact with the space


                The framework
Adapters

• Are pieces of software to communicate
  with RoomWare and Sensors and Devices
• Plugs into RoomWare via XML stream or
  using Sockets




              The framework
Sensors


• Read temperature, rotation, speed,
  humidness, etcetera




               The framework
Devices


• Perform actions: like opening / closing
  doors, setting temperature




                The framework
Bridges

• Pass information from A to B
• Have a limited intelligence
• Have no awareness of what is sent
• Connect (Web) Applictions to Readers,
  Sensors and Devices



               The framework
Identification        (inter)action

                                               Data Source
 ID Broker                    Web App



         RoomWare Server
   Bridge A     ID             Bridge B




                               Adapter
 ID Reader

                        Sensors           Devices

                      The framework
Conclusion

• RoomWare aggregates Identities and passes
  these to (Web) Applications
• Communication is directly between Web
  Applications and Devices
• RoomWare Server functions as a bridge

               The framework
PART FOUR
THE WEB INTERFACE
Room        Software           Presentation

                                     Mobile
               Web
             Application
ID readers                          Laptop /
                                    desktop

 Sensors
             RoomWare               Beamer
 Devices




             The web interface
Room        Software           Presentation

                                     Mobile
              Remote
              Control
ID readers                          Laptop /
                                    desktop

 Sensors
             RoomWare               Beamer
Devices




             The web interface
The web interface
RoomW
                Remote   are
                       Control




The web interface
Room      Software           Presentation

                                  Mobile
          Visualize
  ID
                                 Laptop /
readers
                                 desktop

Sensors
          RoomWare               Beamer
Devices




          The web interface
The web interface
Parts

• Remote calls to RoomWare server
• Webinterface in Flash / Ajax / HTML
• Communication via HTTP POST /
  Sockets
• Security via handshake / pairing

              The web interface
Local         Web
User ID

ID Reader


             ID Broker


RW Server    Identities

              Web App


            The web interface
Local       Web App           Web Client
              RW Conn
                Event
                                User actions
               handler
RW Server
              Data Retr.
                                Visualization
                 Send
             Instructions         Room

                                  Sensors
 Adapter
                                  Devices

            The web interface
PART FIVE
AUTHENTICATION
   PROCESSES
Means

• RFID
• BlueTooth
• QR-code
• Mobile Phone


           Authentication process
Basic assumptions #1


• RFID / BlueTooth: Preferred Identifiers
• QR-code = easy to copy = “unsafe”
• QR-code = identifier = easy to produce

           Authentication process
ID Broker + QR-code
Create        ID Broker
account
                                    Account ID
               Identity




                                   Print out

          Authentication process
RFID / BlueTooth


• Using QR-code to link RFID / BT to my
  Identity




             Authentication process
Register RFID | BT
      ID        Reader               Handler
      √ Registered
1                    QR-code                        QR + RFID
                                      Application
                      reader                        QR + BTID
      X Unregistered                                3.
2.a                    RFID                              Register
                      Reader
                                      RoomWare
                                        Server
2.b                  BlueTooth                       ID Broker
                      Reader


                            RFID / BlueTooth
Register Process
    ID        Reader               Application
    √ Registered
1                   Read              Show identity
                   QR-code          based on QR-code
    X Unregistered
2              Read [xxID]           “Please confirm”
    ?
                    Feedback         “Register [xxID]
3                  ID Broker         failed | success”

                          RFID / BlueTooth
Use RFID | BT
      ID        Reader               Handler
      √ Registered
1.a                  QR-code          Application   3: visualiza-
                      reader                            tions
      √ Registered
1.b                    RFID
                                                      ID Broker
                      Reader
                                      RoomWare
                                        Server
1.c                  BlueTooth
                      Reader                         2: Social
                                                     Identities

                            RFID / BlueTooth
Possible Scenarios
• Single ID Broker: I register once. Every
  venue will recognize me
• Multiple ID Brokers: At each new
  venue I do basic registration process. My
  [xxID] will be locally stored & linked to
  specific broker
• Central IDB Switch: All RW Servers
  call Central IDB Switch. Stored is
  [xxID] + link to “Personal ID Broker”

              RFID / BlueTooth
QR-code


• Using only QR-codes to identify and
  connect




            Authentication process
Authentication


• RoomWare requires affirmation of your
  presence
• Authentication via handshake


                QR-code
RW QR handshake
RW QR


                            RoomW
                                      are
 +      =Access               Mobile
                            Applicat
                                     ion

YOUR QR




                  QR-code
RW QR handshake
QR-code   Device          RoomWare
RW
                           RW Mobile
                                       Handshake
                             App


            Web            RoomWare
          interface          Server

YOU
                            QR-code
                             reader

                      QR-code
PART SIX
PROXIMITY CONCEPTS
Basis
Possible means
• Active devices
• Remote sensing
• BlueTooth, WIFI, active RFID
• Face recognition
• Geo location
• ...
Proximity



  You   Proximity levels
        Close    Around the   Around the block
                   corner
Proximity



  You   Proximity levels
        Close    Around the   Around the block
                   corner
Proximity
                                                                   Location
                         Location
Service




    You       Proximity levels
              Close      Around the   Around the block
                           corner



                                                         Service

              Location




          Service
Feedback
                                                                 Location
                       Location
Service




    You       Proximity levels
              Close    Around the   Around the block
                         corner



                                                       Service

              Event




          Service
Feedback


• Who else is here?
• Where am I?
• What can I do/find here?
Actions


• Direct manipulation of RW connected
  devices
• Projection of my public data to my
  surroundings
Concepts in action
Close proximity


• Connect to other people
• Find common interests
• Share information from public space
In another room


• Where is...?
• Find people interesting to you
• Find objects close by
Around the corner


• Where is...?
• Find people interesting to you
• Find objects close by
Around the block


• Where is...?
• Find locations and people interesting to you
• Find objects close by
END
PART SIX
DATA CLOUDS
Basis #1




        Your data
        cloud

You
Venue



  Interaction
                Your data
                cloud

     You
Ambient
       Service



Venue
                Ambient
                 Service




  Interaction
                           Your data
                           cloud

     You
Basis #3



 PULL
NOT PUSH!
PART SEVEN
REMOTE ROOMWARE
   CONTROLLER
Hitting 2 recievers


You
Phone: Seeing 2 services
Hitting more recievers



            You
Phone: Seeing more services
And more services
Acessing a service


   Location Based
    Service Info
     Lorum ipsum
               Use >
Ambient
      Service
                                     Basic Setup
                            “Open ID”         Online
    DataCloud
                            connector        services



Server          Server

reciever        reciever




     item ID


      You                  item ID
                                         Feed back
      Web                               from venue
   connection
Usage
Finding people




   Me
Finding stuff
Making stuff happen
Conclusion
Location / time based Bookmarks
  Location based Applications
  Location based Interactions
Bookmarks - AnyWhere Server
 Applications - Any provider
  Interactions - RoomWare
Parts
AnyWhere offers:   Anyone offers:


Identification
Central access
                   • Proxies
Data Shielding
                   • Services
Bookmarking
                   • Controls

More Related Content

Similar to RoomWare August Workshop Presentation

Elements of Connected Products
Elements of Connected ProductsElements of Connected Products
Elements of Connected ProductsJordan Husney
 
Roomware: Adobe User Group komt hard
Roomware: Adobe User Group komt hardRoomware: Adobe User Group komt hard
Roomware: Adobe User Group komt hardPeter Kaptein
 
Flare: an overview
Flare: an overviewFlare: an overview
Flare: an overviewCisco DevNet
 
Flare APIs Overview
Flare APIs OverviewFlare APIs Overview
Flare APIs OverviewCisco DevNet
 
Windows 8 DevUnleashed - Session 2
Windows 8 DevUnleashed - Session 2Windows 8 DevUnleashed - Session 2
Windows 8 DevUnleashed - Session 2drudolph11
 
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCloudIDSummit
 
1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication
1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication
1+1=3 Combining IP Intelligence and Mobile Network Location for AuthenticationLocaid Technologies
 
End to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdfEnd to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdfAlvaro Viebrantz
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeekNightHyderabad
 
Second screen iot_day_stockholm_2014
Second screen iot_day_stockholm_2014Second screen iot_day_stockholm_2014
Second screen iot_day_stockholm_2014Steffen Larsen
 
Securing the Network, por Ricardo Ross
Securing the Network, por Ricardo RossSecuring the Network, por Ricardo Ross
Securing the Network, por Ricardo RossForo Global Crossing
 
Voice Applications with Adhearsion @ ATLAUG 2012
Voice Applications with Adhearsion @ ATLAUG 2012Voice Applications with Adhearsion @ ATLAUG 2012
Voice Applications with Adhearsion @ ATLAUG 2012Adhearsion Foundation
 
Enabling IoT devices to talk Web: The Community approach
Enabling IoT devices to talk Web: The Community approachEnabling IoT devices to talk Web: The Community approach
Enabling IoT devices to talk Web: The Community approach Charalampos Doukas
 
Flare - tech-intro-for-paris-hackathon
Flare - tech-intro-for-paris-hackathonFlare - tech-intro-for-paris-hackathon
Flare - tech-intro-for-paris-hackathonCisco DevNet
 
Mozilla BrowserID/Persona (2012 MDN Hack Day LDN)
Mozilla BrowserID/Persona (2012 MDN Hack Day LDN)Mozilla BrowserID/Persona (2012 MDN Hack Day LDN)
Mozilla BrowserID/Persona (2012 MDN Hack Day LDN)teoli2003
 

Similar to RoomWare August Workshop Presentation (20)

Elements of Connected Products
Elements of Connected ProductsElements of Connected Products
Elements of Connected Products
 
Roomware: Adobe User Group komt hard
Roomware: Adobe User Group komt hardRoomware: Adobe User Group komt hard
Roomware: Adobe User Group komt hard
 
Flare: an overview
Flare: an overviewFlare: an overview
Flare: an overview
 
Flare APIs Overview
Flare APIs OverviewFlare APIs Overview
Flare APIs Overview
 
Windows 8 DevUnleashed - Session 2
Windows 8 DevUnleashed - Session 2Windows 8 DevUnleashed - Session 2
Windows 8 DevUnleashed - Session 2
 
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
 
1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication
1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication
1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication
 
End to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdfEnd to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdf
 
Empathic Computing
Empathic ComputingEmpathic Computing
Empathic Computing
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
 
Second screen iot_day_stockholm_2014
Second screen iot_day_stockholm_2014Second screen iot_day_stockholm_2014
Second screen iot_day_stockholm_2014
 
Windows phone 7
Windows phone 7Windows phone 7
Windows phone 7
 
Securing the Network, por Ricardo Ross
Securing the Network, por Ricardo RossSecuring the Network, por Ricardo Ross
Securing the Network, por Ricardo Ross
 
Voice Applications with Adhearsion @ ATLAUG 2012
Voice Applications with Adhearsion @ ATLAUG 2012Voice Applications with Adhearsion @ ATLAUG 2012
Voice Applications with Adhearsion @ ATLAUG 2012
 
Enabling IoT devices to talk Web: The Community approach
Enabling IoT devices to talk Web: The Community approachEnabling IoT devices to talk Web: The Community approach
Enabling IoT devices to talk Web: The Community approach
 
Osiot13 IoT buildout
Osiot13 IoT buildoutOsiot13 IoT buildout
Osiot13 IoT buildout
 
Web conferancing
Web conferancingWeb conferancing
Web conferancing
 
Flare - tech-intro-for-paris-hackathon
Flare - tech-intro-for-paris-hackathonFlare - tech-intro-for-paris-hackathon
Flare - tech-intro-for-paris-hackathon
 
Mozilla BrowserID/Persona (2012 MDN Hack Day LDN)
Mozilla BrowserID/Persona (2012 MDN Hack Day LDN)Mozilla BrowserID/Persona (2012 MDN Hack Day LDN)
Mozilla BrowserID/Persona (2012 MDN Hack Day LDN)
 

More from Peter Kaptein

Tnw tiny funding_clean2
Tnw tiny funding_clean2Tnw tiny funding_clean2
Tnw tiny funding_clean2Peter Kaptein
 
Room ware next_slideshare
Room ware next_slideshareRoom ware next_slideshare
Room ware next_slidesharePeter Kaptein
 
Roomware and the Web of things
Roomware and the Web of thingsRoomware and the Web of things
Roomware and the Web of thingsPeter Kaptein
 
Roomware Main Concepts
Roomware Main ConceptsRoomware Main Concepts
Roomware Main ConceptsPeter Kaptein
 
The phone as a Remote Control
The phone as a Remote ControlThe phone as a Remote Control
The phone as a Remote ControlPeter Kaptein
 
2009 RoomWare server basics
2009 RoomWare server basics2009 RoomWare server basics
2009 RoomWare server basicsPeter Kaptein
 

More from Peter Kaptein (8)

Tnw tiny funding_clean2
Tnw tiny funding_clean2Tnw tiny funding_clean2
Tnw tiny funding_clean2
 
Room ware next_slideshare
Room ware next_slideshareRoom ware next_slideshare
Room ware next_slideshare
 
Roomware Server
Roomware ServerRoomware Server
Roomware Server
 
Post Privacy Era
Post Privacy EraPost Privacy Era
Post Privacy Era
 
Roomware and the Web of things
Roomware and the Web of thingsRoomware and the Web of things
Roomware and the Web of things
 
Roomware Main Concepts
Roomware Main ConceptsRoomware Main Concepts
Roomware Main Concepts
 
The phone as a Remote Control
The phone as a Remote ControlThe phone as a Remote Control
The phone as a Remote Control
 
2009 RoomWare server basics
2009 RoomWare server basics2009 RoomWare server basics
2009 RoomWare server basics
 

Recently uploaded

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

RoomWare August Workshop Presentation