The document discusses the emerging trend of connecting devices to the internet, noting that by 2009 there will be over 14 billion internet-connected devices, far surpassing the number of computers. It introduces Embrace's Device Brokerage Platform, which acts as a software layer that dynamically brokers interactions between applications and internet devices. This decouples devices from applications and addresses issues like remote management and integration that are difficult with traditional approaches. Customers are seeing a 10:1 reduction in management costs when using the platform.
Meeting Mobile and BYOD Security ChallengesSymantec
This white paper is written for enterprise executives who wish to understand what digital certificates are and why they are invaluable for mobile and Bring Your Own Device (BYOD) security on wired and wireless networks. The paper also illustrates the benefits of adopting Symantec Managed PKI Service and provides real-world use cases.
Come and learn how to easily connect IBM MessageSight to your enterprise systems to get the full benefits from the Internet of Things and Mobile. We'll cover connecting to IBM Integration Bus (IIB), MQ, Application Servers, and analytics with InfoSphere Streams.
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Vivek Garhewal
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming and applying it to perform for the same using RPC, RMI and various Mobile Agents and hence comparing different Mobile Agent systems
Rich Miller & Surendra Reddy
Lighthouse is a concept for the creation of an intercloud registry service, based on (1) access points established and maintained by cloud instances to disseminate operational metadata; and, (2) the use of publish/subscribe (pub/sub) asynchronous messaging as the dominant means of disseminating operational metadata among the constituents of the intercloud.
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...ijasuc
The advent of cloud computing has driven away the notion of having sophisticated hardware devices for
performing computing intensive tasks. This feature is very essential for resource-constrained devices. In
mobile cloud computing, it is sufficient that the device be a thin client i.e. which concentrates solely on
providing a graphical user interface to the end-user and the processing is done in the cloud. We focus on
adaptive display virtualization where the display updates are computed in advance using synchronization
techniques and classifying the job as computationally intensive or not based on the complexity of the
program and the interaction pattern. Based on application, the next possible key-press is identified and
those particular frames are pre-fetched into the local buffer. Based on these two factors, a decision is
then made whether to execute the job locally or in the cloud or whether we must take the next frame from
the local buffer or pull it from server. Jobs requiring greater interaction are executed locally in the
mobile to reduce interaction delay. If a job is to be executed in the cloud, then the results of the
processing alone are sent via the network to the device. The parameters are varied in runtime based on
network conditions and application parameters to minimise the interaction delay.
ENOMALY - Enomaly Inc., is a developer of system software for the virtualization and management of cloud computing. It is headquartered in Toronto, Ontario Canada.
Meeting Mobile and BYOD Security ChallengesSymantec
This white paper is written for enterprise executives who wish to understand what digital certificates are and why they are invaluable for mobile and Bring Your Own Device (BYOD) security on wired and wireless networks. The paper also illustrates the benefits of adopting Symantec Managed PKI Service and provides real-world use cases.
Come and learn how to easily connect IBM MessageSight to your enterprise systems to get the full benefits from the Internet of Things and Mobile. We'll cover connecting to IBM Integration Bus (IIB), MQ, Application Servers, and analytics with InfoSphere Streams.
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Vivek Garhewal
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming and applying it to perform for the same using RPC, RMI and various Mobile Agents and hence comparing different Mobile Agent systems
Rich Miller & Surendra Reddy
Lighthouse is a concept for the creation of an intercloud registry service, based on (1) access points established and maintained by cloud instances to disseminate operational metadata; and, (2) the use of publish/subscribe (pub/sub) asynchronous messaging as the dominant means of disseminating operational metadata among the constituents of the intercloud.
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...ijasuc
The advent of cloud computing has driven away the notion of having sophisticated hardware devices for
performing computing intensive tasks. This feature is very essential for resource-constrained devices. In
mobile cloud computing, it is sufficient that the device be a thin client i.e. which concentrates solely on
providing a graphical user interface to the end-user and the processing is done in the cloud. We focus on
adaptive display virtualization where the display updates are computed in advance using synchronization
techniques and classifying the job as computationally intensive or not based on the complexity of the
program and the interaction pattern. Based on application, the next possible key-press is identified and
those particular frames are pre-fetched into the local buffer. Based on these two factors, a decision is
then made whether to execute the job locally or in the cloud or whether we must take the next frame from
the local buffer or pull it from server. Jobs requiring greater interaction are executed locally in the
mobile to reduce interaction delay. If a job is to be executed in the cloud, then the results of the
processing alone are sent via the network to the device. The parameters are varied in runtime based on
network conditions and application parameters to minimise the interaction delay.
ENOMALY - Enomaly Inc., is a developer of system software for the virtualization and management of cloud computing. It is headquartered in Toronto, Ontario Canada.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonEurotech
How the Internet of Things is catching up with the Oil & Gas industry.
How Eurotech's IoT architecture had its roots in the oil & gas industry, and why it is still relevant today.
Development tools : a key driver for the M2M market take-offsimon_anyware
This is the presentation I originally made at the M2M Forum 2006 in Milan and which was showed in various tradeshows later that year
It shows how development tools can help the M2M market to take off by leveraging some level of technologies into IDE
Java in the Air: A Case Study for Java-based Environment Monitoring StationsEurotech
Eurotech and Oracle Joint presentation at JavaOne 2014 that introduces:
IoT Present and Challenges
Java, OSGi and Eclipse Kura: IoT Gateway Services
Embedded Data Stream: Edge Analytics
Use Case: Environment Monitoring Stations
Service oriented converged network accelerating digital transformationHuawei Technologies
To make use of the Internet of Things (IoT), mobile, and cloud technologies, enterprise campus networks need to support services ranging from industrial production to video surveillance and digital office functions.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
3. Current uses of Embrace’s Technology Factory employees getting instructions for the day and exchanging data with backend systems Sales personnel getting access to updated pricing information Send time & attendance data to payroll Remote and real time monitoring of energy meters Reading RFID Tags and routing tag information to back-end supply chain applications Update database of employees for premises access security device What do these devices have in common? Reorder of consumables for doctors offices Automatic scoring and storage of student test data
4.
5.
6.
7.
8. The Device Brokerage Functions Management Applications Devices Business Applications Device Brokerage ERP CRM SCM Custom Web Services/User Identity App Broker APPLICATION BROKER Adaptation to standards & custom applications Device Broker DEVICE BROKER Device and network abstraction Context Broker Device User Context Broker “ Decouples” devices from applications; Captures and manages the “context” interaction rules, event aggregation, filtering, etc.
9.
10.
11.
12.
13.
14. Device Vendor Landscape Embrace Wind River IBM BEA Oracle SUN Ubicom Intel FusionOne Openwave Palm Espial Prosyst Xanboo MFormation (Embedded) Processor (Embedded) OS, Stacks, etc. Application Microsoft Device Broker Qualcomm App/Management Broker MontaVista & Other Linux Siebel Metrix SAP PeopleSoft One-off, ad hoc software development is the alternative Questra Axeda Echelon emWare Lantronix NetSilicon Motorola APPLICATION DEVICE Complementary Products or Potential Partners Complementary Products or Potential Partners DRM Complementary Products Today In 2-3 years?
17. Embrace 3.0 Broker function and data flow Enterprise Back-Office Applications Ethernet WiFi Modem Embrace Device Adapter Device Serial, PIO Connection XML SSL TCP/IP Embrace Device Brokerage Platform Management Broker Services Direct Device Broker Services Connect Authenticate Security Abstract Upon connection, the Platform authenticates device registration and checks Adapter and camera for firmware upgrades. The Platform supports optional AES 256-bit encryption, and MD5 authentication. The Platform formats device specifics and events into a high-level abstraction. The Platform applies the relationships rules, and policies associated with the abstracted device. Embrace MicroClient Firmware A simple press of a button initiates the connection between the Adapter and the Device Brokerage Platform. Embrace provides an XML programming interface for integrating with target applications. Application Broker Services Adapt Transfer The device data is adapted to the requirements of the selected application. The Platform transfers the adapted data to the related application using TCP/IP, with optional SSL support.
18.
19. The Device Brokerage: A Java Technology Management Applications Devices Business Applications Device Brokerage ERP CRM SCM Custom Web Services/User Identity App Broker Device Broker Context Broker Device User JMX JSP In use J2EE J2ME In development JCA On the roadmap JNDI JavaSpaces Jini Investigation
20. Computing evolution Mainframe PC Web Service Technology Vision: The Right Next Step for Devices No enterprise integration problem for devices The deployed brokerage technology applies “services” in general Device Brokerage Platform Database Desktop Application Microprocessor HTTP, HTML Browser XML Distributed Systems Device evolution Dumb devices Smart specialized devices Internet appliances Proprietary and diverse PC/Laptops as gateways Device as a service
21. The Market Horizontalization Trend Processor OS Networking Software Application IBM DEC … . Sun THE WEB Intel, etc. Microsoft Unix BEA IBM SUN … CRM ERP SCM … Horizontal Server Industry THE DEVICE STAMPEDE Device variety will remain but network- level Horizontalization occurs CRM ERP SCM … Embedded Processor Embedded OS Networking Software Application Wide variety of devices for specific applications Device Brokerage Platform
22.
23.
Editor's Notes
Thanks and introductions. In introducing the company, present 3 real world examples of companies you are currently working with and the problems them are looking to solve. ----------------------------------------------------------GUIDELINES-------------------------------------------------------- Turn to AGENDA before starting. DO NOT START THE STORY PREMATURELY. This is NOT an engineering presentation. BUILD SUSPENSE ON EACH SLIDE Change the slide the “relieve” the suspense (with the payoff.) Don’t ever say “the chart shows…” Simply quote the data from a chart to support the story. Your STORY is ON THE SLIDES. Note how the script EXACTLY MATCHES the titles and bullets. They are in resonance. Don’t tell a DIFFERENT story. DON’T SAY ANY MORE THAN IS IN THE SCRIPT. RESIST THE IMPULSE TO “AD LIB” or give just “a little more explanation”. “ #” are “BEATS” -- distinct pauses in delivery for a heartbeat.
Most people have become aware of electronic devices – such as bar code scanners – that collect information and send it down a wire to a nearby computer. # What is outside most people’s awareness, however, is the massive effort underway, in thousands of enterprises worldwide, supported by hundreds of entrepreneurial ventures and projects, to connect every conceivable device, appliance or machine to some software application or other, and to do it through the Internet, rather than through a serial cable to a nearby PC. In this new “extended” # or “pervasive” # Internet as it has been called # the software applications, running on servers, might be miles # or continents # removed from the devices with which they interact. # # WE ARE GOING TO TALK TODAY about this future Internet # the EXTENDED INTERNET # and the STAMPEDE to connect devices to it, and some of the reasons behind this stampede. # WE ARE GOING TO touch on “connectivity” -- the focus of nearly ALL entrepreneurial activity to date, and demonstrate how connectivity is the WRONG ISSUE to be focused on from here on out. # WE ARE GOING to demonstrate that the “REAL” issue is COMPLEXITY REDUCTION # and talk about its two components -- INTEGRATION and MANAGEMENT # We ARE GOING to discuss a general-case model for COMPLEXITY REDUCTION and give it a name # WE ARE GOING to introduce you [update you on] Embrace’s Device Brokerage Platform, a complete SOLUTION FOR COMPLEXITY MANAGEMENT through DEVICE INTEGRATION AND MANAGEMENT, and, FINALLY… WE ARE GOING to END UP WITH a little data about Embrace. [CHANGE SLIDE]
A good starting place is to pick six (6) unrelated electronic devices and ask the question: “WHAT DO THESE DEVICES HAVE IN COMMON?” # # [CHANGE SLIDE (while question hangs in the air…)]
The answer: They are all part of a STAMPEDE … to connect EVERY CONCEIVABLE DEVICE with an electronic heartbeat to the Internet. There is a vast amount of CONNECTIVITY work on hundreds of fronts. SCORES of ventures have been started, LARGE NUMBERS OF STANDARDS have been proposed and adopted, ONE INTERFACE CHIP AFTER ANOTHER has been announced. And on the device front, we are ALL seeing efforts connect cell phones, PDAs, thermostats, vehicles, scanners, toasters, televisions, intravenous pumps, air quality monitors, trains, copiers -- anything you can think of -- to the Internet. BUT WHY? Why is this happening now? Why are companies and investors spending valuable capital IN THESE DIFFICULT ECONOMIC TIMES? Why are there, for example, OVER FORTY STARTUP COMPANIES or ESTABLISHED FIRMS working on INTERNET DEVICE CONNECTIVITY CHIPS?
250+ million devices will be connected by 2003 one for each computer, but 14.3 billion will be “on line” by 2010 Let’s fully contemplate the IMPACT of this forecast: # # By the year Two Thousand and Ten (2010), 95% of all devices connected to the Internet will NOT be COMPUTERS or ROUTERS. # THEY WILL BE: thermostats, toasters, televisions and traffic signals # buildings, barcode readers and baby monitors # IV pumps, pacemakers and pizza ovens # and VIRTUALLY ANYTHING ELSE YOU CAN THINK OF # that can be monitored, maintained, manipulated, or managed remotely # or that can serve as a portal for data to and from the Internet and remote applications. [CHANGE SLIDE]
So, if you STEP BACK from the problem a little, you realize that CONNECTIVITY is a SMALL, AND DECREASINGLY SIGNIFICANT portion of the EXTENDED INTERNET LANDSCAPE. # The CRITICAL problems # the COMPLEXITY REDUCTION PROBLEMS to be solved # are DEVICE MANAGEMENT, and DEVICE INTEGRATION. # And of these # there has just been a small amount of highly application-specific activity in DEVICE MANAGEMENT. # # A general case management solution has been lacking, and # A general case integration solution has been lacking. [CHANGE SLIDE]
What the Internet requires for its transition to the EXTENDED Internet is a NEW SOFTWARE LAYER whose ENTIRE PURPOSE is to achieve COMPLEXITY REDUCTION # # ORDERS OF MAGNITUDE of complexity reduction. # # This software layer would exist to BROKER ALL INTERACTIONS between SOFTWARE APPLICATIONS and Internet enabled devices. # # It would serve as a complete ECOLOGY for DEVICE INTEGRATION and for DEVICE MANAGEMENT. ## We call this new layer the DEVICE BROKERAGE LAYER. [CHANGE SLIDE IMMEDIATELY]
Embrace has spent the last [FOUR] years developing a complete, SOFTWARE PLATFORM that can be used by I.T. managers or other constituents to construct and OPERATE a Device Brokerage Ecology for their applications, enterprise, or markets. -------------------------- FOR NOVICE AUDIENCES, DON’T GO BEYOND HERE----------------------------------- # # The platform allows the creation of device brokerages for any arbitrary set of Web-based software applications # and any digital device # Internet-enabled or not. # It generates unique application and device brokers that provide a NATURAL INTEGRATION of devices into applications. # It provides a complete management brokerage function that permits the AD HOC management of thousands to millions of remote devices. # It includes FIRMWARE for use by device manufacturers, an optional device-Internet adapter to use with non-Internet-ready ,legacy serial devices. [CHANGE SLIDE]
It is interesting to note why Embrace, alone has come up with this comprehensive solution to reducing complexity in the extended Internet. # # First, and foremost, the problem is so broad in scope that it takes a COMPLETE, TOP DOWN, SYSTEMS-LEVEL SOLUTION, based upon a very simple MODEL. # # We essentially took a CLEAN SHEET OF PAPER, analyzed the ENTIRE PROBLEM, and created a SYSTEM-LEVEL ARCHITECTURE. That architecture is the NEW SOFTWARE LAYER for the extended internet # the DEVICE BROKERAGE. # # Other people have not taken such a broad view because, frankly, EVERYBODY HAS BEEN FOCUSED ON CONNECTIVITY # and only a few visionaries have even thought about the CHAOS that 14 billion, ad-hoc-connected devices, would bring to the Internet # and to I.T. managers. # # Finally, as all significant advancements in -- and simplifications to technology, we invested heavily in our beliefs. The result, in only a few years, is a SIGNIFICANT BODY of INTELLECTUAL PROPERTY that has resulted in 12 patent filings to date, with the first granted [recently]. # Embrace is in a UNIQUE POSITION with a UNIQUE VISION, and a FULLY-IMPLEMENTED, AVAILABLE solution. [CHANGE SLIDE] [NB: Don’t belabor the details of the slide. The listener can read it later. Move on…]
In terms of the MARKET LANDSCAPE, because of our belief in a COMPREHENSIVE SOLUTION, we have tackled a much broader area than anybody else playing in the space. # The device brokerage platform provides a complete, end-to-end solution for device management AND device integration, and the scope of the solution encompasses both devices AND applications. # Companies like Ubicom, Intel, Wind river, and Echelon have been part of the “CONNECTIVITY CROWD”, seeking to implement connectivity, per se. # FusionOne and Openwave also have this focus, but [DESCRIBE WHY THEY ALSO HAVE AN APPLICATION FOCUS.] # BEA and ORACLE are concerned with [DESCRIBE in 10 words their focus.] # Only Axeda and Questra, who are part a tiny fraternity that shows the beginnings of understanding the complexity issues -- at least from the standpoint of device management -- and Sun and IBM -- who have been focused on [DESCRIBE IN 10 or less WORDS] have REACHED THE FRINGES of the CRITICAL SPACE served by EMBRACE. [CHANGE SLIDE] [NB: depending on the audience, you might need to come back to this slide later to correctly describe and position the other players.]
So, to SUMMARIZE # A TECTONIC SHIFT in the composition of the Internet will occur as the STAMPEDE to connect devices continues unabated. # With all the focus on connectivity, there has been virtually no thinking about the COMPLEXITY of this BRAVE NEW WORLD, and how to reduce and mange it. # Embrace has given this considerable thought, and has developed a general case, top down solution that adds a new layer to the Internet hierarchy -- one providing on device integration and device management services to significantly reduce complexity, and # We have developed a turnkey platform that implements this model for any vertical market. # # Thank you.
This process has occurred several times before. # Years ago, APPLICATION, NETWORKING SOFTWARE (such as existed,) OPERATING SYSTEMS, and PROCESSORS were all SPECIFIC to a particular hardware vendor. If you chose a certain solution, the “rest” of the stack was pre-ordained. # However, in the face of a paradigm shift -- here we have shown the onset of the World Wide Web -- both applications and infrastructure reshaped themselves to support a horizontally-oriented model. # In the case of the Extended Internet, we anticipate that the same process will occur, driven by the DEVICE STAMPEDE. # # At present, applications are tightly bound to SPECIFIC devices running SPECIFIC operating systems and interconnected with SPECIFIC networking software (or hard-wired.) However, the COMPLEXITY REDUCTION demanded to solve the CHAOS brought on by the DEVICE STAMPEDE will force -- and enable -- the same HORIZONTALIZATION PROCESS to occur, once again. # In this case, the high-level applications will end up COMPLETELY DEVICE INDEPENDENT, and the layer between such applications and the devices themselves -- here represented by their embedded processor and operating systems -- will be the DEVICE BROKERAGE LAYER. [CHANGE SLIDE]
Now, with this astounding trend, there have been MASSIVE INVESTMENTS IN CONNECTIVITY occurring in recent years [which I am sure you are well aware of.] Efforts have proceeded on THREE FRONTS, fundamentally -- the development of CHIPS to facilitate connection by OEM devices to an IP network according to the PROTOCOL du jour ; # ADAPTERS that facilitate the connection of LEGACY DEVICES to the Internet, and: # PROTOCOLS, STANDARDS, and COMPONENT SOFTWARE, EMBEDDED OPERATING SYSTEMS, and PROTOCOL STACKS. # # To the OUTSIDE WORLD, and to SEASONED INDUSTRY OBSERVERS, the extended Internet is ALL ABOUT CONNECTIVITY. # # BUT IT’S NOT. [Don’t rush through this; this is the key point of the entire presentation] # # # To FOCUS on CONNECTIVITY is to IGNORE the CHAOS that 14 billion -- or even 1 billion -- devices is going to bring to the Internet. OR, more to the point, chaos brought TO THE POOR I.T. MANAGER FACED WITH INTEGRATING all of these devices with REVENUE APPLICATIONS, # or MANAGING VAST SEAS OF REMOTE DEVICES in a sensible fashion. # # The COMPLEXITY brought on by the DEVICE STAMPEDE MUST be ADDRESSED, and reduced. [CHANGE SLIDE after a BEAT] [NB: no need to quote any of the statistics on the slide]