The expansion of the World Wide Web to include information that is generated by physical devices with embedded sensing and actuation capabilities entails a surge of high-frequency real-time data that is mostly published without further processing in its raw form. To derive "smart" decisions from this data and thus use it to enable a "smart world" requires the distilling of more abstract, higher-level knowledge from it. We propose the concept of a computational marketplace as a framework to enable the analysis and aggregation of real-time data. Here, multiple tiers of hyperlinked algorithms from different providers interact to refine data within computational graphs, which are linked structures of cascaded processing steps. In the associated paper, S. Mayer and D. Karam, A Computational Space for the Web of Things, we present an analysis of the key constraints on such a framework and provide a corresponding implementation as well as results from evaluations in an experimental use case scenario.
What is Linked Data?
Presented at the Linked Data for Libraries on Thursday, November 6, 2014 at Trinity College Dublin
http://www.dri.ie/linked-data-libraries
A RESTful and Decentralised Implementation of Open Objects
Dice Lab, Royal Holloway University of London
Paulo Ricca, Kostas Stathis
paper: http://www.webofthings.org/wot/2013/papers/wot3-ricca.pdf
Trendy service discovery protocol at WoT 2012Talal Butt
We propose, trendy, a new registry-based Service Discovery protocol with context awareness. It uses CoAP-based RESTful web services to provide a standard interoperable interface which can be easily translated from HTTP. In addition, trendy introduces an adaptive timer and grouping mechanism to minimise control overhead and energy consumption. Trendy ’s grouping is based on location tags to localise status maintenance traffic and to compose and offer new group based services. Our simulation results show that trendy techniques reduce the control traffic considerably and also reduce the energy consumption, while offering the optimal service selection.
Towards a Project Centric Metadata Model and Lifecycle for Ontology Mapping G...Christophe Debruyne
Christophe Debruyne, Brian Walshe, Declan O'Sullivan: Towards a Project Centric Metadata Model and Lifecycle for Ontology Mapping Governance. Paper presented at iiWAS 2015 on the 13th of December 2015, Brussels, Belgium.
Fin fest 2014 - Internet of Things and APIsRobert Greiner
An overview of the core concepts behind the ultra-hyped Internet of Things. We start the presentation with an overview and slight re-classification of what the Internet of Things is. Then, we jump into how to *serve* the internet of things - discussing a homebrew project using the RaspberryPi and Microsoft Azure.
What is Linked Data?
Presented at the Linked Data for Libraries on Thursday, November 6, 2014 at Trinity College Dublin
http://www.dri.ie/linked-data-libraries
A RESTful and Decentralised Implementation of Open Objects
Dice Lab, Royal Holloway University of London
Paulo Ricca, Kostas Stathis
paper: http://www.webofthings.org/wot/2013/papers/wot3-ricca.pdf
Trendy service discovery protocol at WoT 2012Talal Butt
We propose, trendy, a new registry-based Service Discovery protocol with context awareness. It uses CoAP-based RESTful web services to provide a standard interoperable interface which can be easily translated from HTTP. In addition, trendy introduces an adaptive timer and grouping mechanism to minimise control overhead and energy consumption. Trendy ’s grouping is based on location tags to localise status maintenance traffic and to compose and offer new group based services. Our simulation results show that trendy techniques reduce the control traffic considerably and also reduce the energy consumption, while offering the optimal service selection.
Towards a Project Centric Metadata Model and Lifecycle for Ontology Mapping G...Christophe Debruyne
Christophe Debruyne, Brian Walshe, Declan O'Sullivan: Towards a Project Centric Metadata Model and Lifecycle for Ontology Mapping Governance. Paper presented at iiWAS 2015 on the 13th of December 2015, Brussels, Belgium.
Fin fest 2014 - Internet of Things and APIsRobert Greiner
An overview of the core concepts behind the ultra-hyped Internet of Things. We start the presentation with an overview and slight re-classification of what the Internet of Things is. Then, we jump into how to *serve* the internet of things - discussing a homebrew project using the RaspberryPi and Microsoft Azure.
Data Pioneers - Roland Haeve (Atos Nederland) - Big data in organisatiesMultiscope
Roland Haeve is cross competence manager Big Data voor Atos Nederland. Roland heeft ruim 18 jaar ICT-ervaring in het aanbieden van complete oplossingen binnen onder andere Business Intelligence (BI) en Big Data (Analytics). Big Data is voor veel bedrijven nog pionieren en uitzoeken wat de mogelijkheden zijn. In zijn presentatie zal Roland ingaan op succesvolle Big Data cases. Hij zal hierbij niet enkel inzoomen op Nederland, maar ook bredere, Europese voorbeelden meenemen.
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationCHAKER ALLAOUI
Study and simulation of the systems modern IoT with examples of connected objects such as: GPS(GLOBAL POSITIONING SYSTEM), Philips Hue, Thermometer, and connected cars implemented with the technology nodeJS and Node-Red with the communication protocol of M2M ( MQTT).
As well as an analytical study based on Elasticsearch, MongoDB, Apache Hadoop, Apache Hive and Jaspersoft.
A significant proportion of developments in the Internet of Things (IoT) is driven by non-technical innovators and ambitious hobbyists. Node-RED targets this audience and offers a widely used rapid prototyping platform for IoT data plumbing on the basis of JavaScript. Data platforms for the IoT provide storage facilities and value in the form of visualisation & analytics to business and end users alike. This report details how Node-RED connects to 11 different platforms and what additional services these provide.
The Industrial Internet of Things (IIoT) is one of todays hottest topics within the automation and manufacturing industries. Individuals and organizations that uses variable frequency drives have high expectations that the IIoT ecosystem will deliver on its promises of added value through increased productivity, predictive maintenance, and reduced asset downtime. The idea is to come up with a prototype of a remote monitoring system for VLT FC-302 Danfoss drives. A portal that interfaces with the cloud server and displays the current state of all connected drives.
An emulation framework for IoT, Fog, and Edge ApplicationsMoysisSymeonides
In this talk, we presented an emulation framework that eases the modeling, deployment, and large-scale experimentation of fog and 5G testbeds. The framework provides a toolset to (i) model complex fog topologies comprised of heterogeneous resources, network capabilities, and QoS criteria; (ii) abstractions for physical 5G infrastructure concepts such as radio units, edge servers, mobile nodes, user equipment, and node trajectories; (iii) deploy the modeled configuration and services using popular containerised descriptions to a cloud or
local environment; (iv) experiment, measure and evaluate the deployment by injecting faults, adapting the configuration at runtime, real-time updates of the radio network (i.e., signal strength) and respective network QoS to test different “what-if” scenarios that reveal the limitations of service before introduced to the public. The framework has been used for studying the performance of Intelligent transportation services, Industrial IoT micro-service applications, geo-distributed deployments of big data engines, and many more.
The presentation took place at Athens Demokritos Research Center organised by SKEL | The AI Lab
video: https://www.youtube.com/watch?v=z37I1QVFabg
Autonomous Agents for Flexible Hypermedia Systems Simon Mayer
The Web of Things community used to be driven by the application of Web technologies to enable flexible mashups of smart devices on top of the Internet of Things, an objective that we consider accomplished (from a research standpoint) in many different domains ranging from smart homes and cars to dynamic factories in the Industrie 4.0 paradigm. One of the next big things for us – consequently, perhaps, from an AAMAS standpoint – is to increase the autonomy of our Web-enabled devices and their understanding of one another, for instance by outfitting them with semantic descriptions of their properties and functions and, sometimes, even bestowing agency upon them. In this talk, I discuss this convergence that will enrich real-world devices with AAMAS technologies, and open up real-world applications to the AAMAS community, while examining important properties of the Web architecture that support flexibly interacting autonomous things on the Web.
Data Pioneers - Roland Haeve (Atos Nederland) - Big data in organisatiesMultiscope
Roland Haeve is cross competence manager Big Data voor Atos Nederland. Roland heeft ruim 18 jaar ICT-ervaring in het aanbieden van complete oplossingen binnen onder andere Business Intelligence (BI) en Big Data (Analytics). Big Data is voor veel bedrijven nog pionieren en uitzoeken wat de mogelijkheden zijn. In zijn presentatie zal Roland ingaan op succesvolle Big Data cases. Hij zal hierbij niet enkel inzoomen op Nederland, maar ook bredere, Europese voorbeelden meenemen.
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationCHAKER ALLAOUI
Study and simulation of the systems modern IoT with examples of connected objects such as: GPS(GLOBAL POSITIONING SYSTEM), Philips Hue, Thermometer, and connected cars implemented with the technology nodeJS and Node-Red with the communication protocol of M2M ( MQTT).
As well as an analytical study based on Elasticsearch, MongoDB, Apache Hadoop, Apache Hive and Jaspersoft.
A significant proportion of developments in the Internet of Things (IoT) is driven by non-technical innovators and ambitious hobbyists. Node-RED targets this audience and offers a widely used rapid prototyping platform for IoT data plumbing on the basis of JavaScript. Data platforms for the IoT provide storage facilities and value in the form of visualisation & analytics to business and end users alike. This report details how Node-RED connects to 11 different platforms and what additional services these provide.
The Industrial Internet of Things (IIoT) is one of todays hottest topics within the automation and manufacturing industries. Individuals and organizations that uses variable frequency drives have high expectations that the IIoT ecosystem will deliver on its promises of added value through increased productivity, predictive maintenance, and reduced asset downtime. The idea is to come up with a prototype of a remote monitoring system for VLT FC-302 Danfoss drives. A portal that interfaces with the cloud server and displays the current state of all connected drives.
An emulation framework for IoT, Fog, and Edge ApplicationsMoysisSymeonides
In this talk, we presented an emulation framework that eases the modeling, deployment, and large-scale experimentation of fog and 5G testbeds. The framework provides a toolset to (i) model complex fog topologies comprised of heterogeneous resources, network capabilities, and QoS criteria; (ii) abstractions for physical 5G infrastructure concepts such as radio units, edge servers, mobile nodes, user equipment, and node trajectories; (iii) deploy the modeled configuration and services using popular containerised descriptions to a cloud or
local environment; (iv) experiment, measure and evaluate the deployment by injecting faults, adapting the configuration at runtime, real-time updates of the radio network (i.e., signal strength) and respective network QoS to test different “what-if” scenarios that reveal the limitations of service before introduced to the public. The framework has been used for studying the performance of Intelligent transportation services, Industrial IoT micro-service applications, geo-distributed deployments of big data engines, and many more.
The presentation took place at Athens Demokritos Research Center organised by SKEL | The AI Lab
video: https://www.youtube.com/watch?v=z37I1QVFabg
Autonomous Agents for Flexible Hypermedia Systems Simon Mayer
The Web of Things community used to be driven by the application of Web technologies to enable flexible mashups of smart devices on top of the Internet of Things, an objective that we consider accomplished (from a research standpoint) in many different domains ranging from smart homes and cars to dynamic factories in the Industrie 4.0 paradigm. One of the next big things for us – consequently, perhaps, from an AAMAS standpoint – is to increase the autonomy of our Web-enabled devices and their understanding of one another, for instance by outfitting them with semantic descriptions of their properties and functions and, sometimes, even bestowing agency upon them. In this talk, I discuss this convergence that will enrich real-world devices with AAMAS technologies, and open up real-world applications to the AAMAS community, while examining important properties of the Web architecture that support flexibly interacting autonomous things on the Web.
Talk held at the IEEE GLOBECOM 2014 Industry Workshop on the Internet of Things and Services about how the Web of Things (WoT) and Semantic Technologies add interoperability to the Internet of Things (IoT)
Configuration of Smart Environments Made SimpleSimon Mayer
We present an approach that combines semantic metadata and reasoning with a visual modeling tool to enable the goal-driven configuration of smart environments for end users. In contrast to process-driven systems where service mashups are statically defined, this approach makes use of embedded semantic API descriptions to dynamically create mashups that fulfill the user's goal. The main advantage of the presented system is its high degree of flexibility, as service mashups can adapt to dynamic environments and are fault-tolerant with respect to individual services becoming unavailable. To support end users in expressing their goals, we integrated a visual programming tool with our system. This tool enables users to model the desired state of their smart environment graphically and thus hides the technicalities of the underlying semantics and the reasoning. Possible applications of the presented system include the configuration of smart homes to increase individual well-being, and reconfigurations of smart environments, for instance in the industrial automation or healthcare domains.
Semantic Metadata to Support Device Interaction in Smart EnvironmentsSimon Mayer
Slides for a talk held at the Fourth International Workshop on the Web of Things (WoT 2013) on Sep 9th, 2013. For the full paper, see http://www.webofthings.org/wot/2013/program.php
Service Integration in the Web of ThingsSimon Mayer
Talk about service integration technologies in REST systems held at the "Web Intelligence 2013 - Le Web des Objets" Summer School on the 4th of September 2013 in Lyon, France. The slides give an overview of the Web of Things and current efforts to integrate services offered by Web-enabled devices.
Searching in a Web-based Infrastructure for Smart ThingsSimon Mayer
Given the expected high number of accessible digitally augmented devices and their communication requirements, this paper presents our work on creating a Web-based infrastructure for smart things to facilitate the integration, look-up, and interaction with such devices for human users and machines. To exploit the locality of interactions with and between smart things, the proposed infrastructure treats the location of a smart thing as its main property and is therefore structured hierarchically according to logical place identifiers. We discuss the infrastructure's look-up mechanism that leverages Web patterns to foster scalability and load balancing and features an advanced caching mechanism that greatly reduces the response time and number of exchanged messages. These properties are demonstrated in an evaluation in a simulated smart environment.
In Search of an Internet of Things Service Architecture: REST or WS-*? A Deve...Simon Mayer
Current trends inspired from the development of the Web 2.0 advocate designing smart things (e.g., wireless sensors nodes or home appliances) as service platforms. Interoperable services are mainly achieved using two different approaches: WS-* and RESTful Web services. These approaches have previously been compared with respect to performance and features, but no work has been done to elicit the developers' preferences and programming experiences. We conducted a study in which 69 novice developers learned both technologies and implemented mobile phone applications that retrieve sensor data, both through a RESTful and through a WS-* service architecture. The results complement the available technological decision framework when building Internet of Things applications. The results suggest that developers find REST easier to learn than WS-* and consider it more suitable for programming smart things. However, for applications with advanced security and Quality of Service requirements, WS-* Web services are perceived to be better suited.
In the Web of Things initiative, we propose to make smart things first-class citizens of the World Wide Web. This allows to apply widely used Web mechanisms (bookmarking, browsing,...) to things and to use physical devices just like any other service on the Web. In the talk, some of the prototypes that we have been building in our lab are presented. We also ask what will be the "next big thing" in connecting and mashing up real-time, real-world services.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
A Computational Space for the Web of Things
1. A Computational Space for the Web of Things
3rd International Workshop on the Web of Things (WoT 2012), Newcastle, UK
Simon Mayer, Distributed Systems Group, ETH Zurich, simon.mayer@inf.ethz.ch
David S. Karam, Chair of Scientific Computing, TU Munich, karam@in.tum.de
2. Motivation / Background
Earthquake and Tsunami on March 11, 2011
Nuclear meltdown in three reactors of the Fukushima NPP
Releases of radioactive materials
US federal occupational limit: 0.5 μSv/h
www.pref.fukushima.jp
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 2
3. Motivation / Background
Cheap
Geiger
counters
Radiation
data
streams
“Wind from Fukushima” App
Mashing of radiation and wind data
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 3
4. Motivation / Background
Commodity
Hardware
Information
Markets
Apps like “Wind from Fukushima” allow to
mashup this data to provide a service
What happens with the refined data?
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 4
5. Motivation / Background
Crowd-sourced information creation
Commodity
Hardware
Information sharing and aggregation
Information
Markets
Comput
ational
Markets Information processing, refinement, and
analysis
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 5
6. Motivation / Background
Smartphones, Smart Consumer
Crowd-sourced information creation
Products, Electricity Meters, ...
Commodity
Hardware
Cosm, Sen.Se, Twitter,
Information sharing and aggregation
FB Graph API, ...
Information
Markets
Comput
ational
Markets Information processing, refinement, and
analysis
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 6
7. Algorithms should be linked together in an open
and extensible fashion to enable multi-tier
computations in a construct that we call a
computational marketplace
8. Constraints on a Computational Marketplace
Clients need to be able to find computations on the
marketplace and select appropriate computations to
achieve their goal
The marketplace should provide meta-information about
algorithms and thus help to optimize traversal
Mechanisms required for security and billing
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 8
9. Constraints on a Computational Marketplace
Clients need to be able to find computations on the
marketplace and select appropriate computations to
achieve their goal
The marketplace should provide meta-information about
algorithms and thus help to optimize traversal
Mechanisms required for security and billing
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 9
10. Interface Discovery
Marketplace API exposes paths
GET marketplace/node_arrhythmia
{
“service” : “www.arrhythmia_detection.net”
“forward_paths” : {
“emergency” : “node_dispatch”,
“default” : “node_start_arrhythmia”
}
}
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 10
11. Interface Discovery
GET marketplace/node_arrhythmia
{
Marketplace API exposes paths “service” :
“www.arrhythmia_detection.net”
“forward_paths” : {
“emergency” : “node_dispatch”,
“default” : “node_start_arrhythmia”
}
}
“Graph Crawler” maps computational graph
Basically an ordinary search machine…
Crawler
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 11
12. Constraints on a Computational Marketplace
Clients need to be able to find computations on the
marketplace and select appropriate computations to
achieve their goal
The marketplace should provide meta-information about
algorithms and thus help to optimize traversal
Mechanisms required for security and billing
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 12
13. Path Traversal Guidance
Humans do it...
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 13
14. Path Traversal Guidance
Machines can, too!
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 14
15. Path Traversal Guidance using Path Deciders
Application-specific (here: Arrhythmia Detection)
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 15
16. Path Traversal Guidance will work if...
Machines can understand and interpret path names
Long shot, but could work...
Definitely future work!
Path descriptions (e.g., “emergency”) are fixed/meaningful
Easy!
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 16
17. Constraints on a Computational Marketplace
Clients need to be able to find computations on the
marketplace and select appropriate computations to
achieve their goal
The marketplace should provide meta-information about
algorithms and thus help to optimize traversal
Mechanisms required for security and billing
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 17
18. Computational Paths Optimization
Optimize traversal according to application needs
Multi-dimensional cost metrics: time, money, quality,...
routes → Generic path deciders
Marketplace offers this information, but does not decide on
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 18
19. Computational Paths Optimization using Path
Deciders
Generic (here: Lowest time cost path)
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 19
20. Constraints on a Computational Marketplace
Clients need to be able to find computations on the
marketplace and select appropriate computations to
achieve their goal
The marketplace should provide meta-information about
algorithms and thus help to optimize traversal
Mechanisms required for security and billing
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 20
21. Security and Billing
Authentication, authorization, and billing schemes to
restrict access to computational resources
Don’t create a centralized repository for login data: trust
problems, security problems, scaling problems...
Instead use third-party schemes (OAuth 2.0!) and inline
this functionality as a linked computational node!
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 21
22. Demo 1: Arrhythmia Patient Scenario
Four separate computational mashups
Arrhythmia Arrhythmia probability from heartbeat data
Ambulance Optimal ambulance dispatch
Traffic Predicts traffic from location of people and cars and
weather data from yahoo/google predict
Composite mashup: Weather + Traffic + Ambulance +
Arrhythmia
OAuth-based authentication for prediction API
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 22
23. Demo 2: Marketplace Exchange
Time cost-based traversal optimization of multiple clients
Uses generic time-cost-based path decider...
Three arrhythmia detectors: 𝐶𝐶𝐶𝐶 𝑖 = 𝑑 + 𝑘 ∗ #𝑐𝑐𝑐𝑐𝑐𝑐𝑐 𝑖
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 23
24. Demo 2: Marketplace Exchange
Time cost-based traversal optimization of multiple clients
Uses generic time-cost-based path decider...
Three arrhythmia detectors: 𝐶𝐶𝐶𝐶 𝑖 = 𝑑 + 𝑘 ∗ #𝑐𝑐𝑐𝑐𝑐𝑐𝑐 𝑖
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 24
25. Conclusion
Concept of computational marketplace
Constraints for scalable, fault-tolerant, and change-tolerant
N-tiered computational model
Proof of concept marketplace implementation + scenarios
7/13/2012 WoT 2012: 3rd International Workshop on the Web of Things 25