FIWARE is an open source platform for building IoT applications and services. It provides interfaces like NGSI for discovering, accessing, and controlling IoT devices and sensor data. FIWARE supports exposing sensor data as consumable web services and discovering heterogeneous data sources. Its architecture includes roles for IoT context producers, consumers, and generic enablers for registry, orchestration, and data handling functions.
Mining Your Logs - Gaining Insight Through VisualizationRaffael Marty
In this two part presentation we will explore log analysis and log visualization. We will have a look at the history of log analysis; where log analysis stands today, what tools are available to process logs, what is working today, and more importantly, what is not working in log analysis. What will the future bring? Do our current approaches hold up under future requirements? We will discuss a number of issues and will try to figure out how we can address them.
By looking at various log analysis challenges, we will explore how visualization can help address a number of them; keeping in mind that log visualization is not just a science, but also an art. We will apply a security lens to look at a number of use-cases in the area of security visualization. From there we will discuss what else is needed in the area of visualization, where the challenges lie, and where we should continue putting our research and development efforts.
OpenStack security is a huge topic. In these slides I presented at the OpenStack Day, I analyzed cloud security the network to the application layer, going through specific layers, some in common between OpenStack itself and the applications.
Mining Your Logs - Gaining Insight Through VisualizationRaffael Marty
In this two part presentation we will explore log analysis and log visualization. We will have a look at the history of log analysis; where log analysis stands today, what tools are available to process logs, what is working today, and more importantly, what is not working in log analysis. What will the future bring? Do our current approaches hold up under future requirements? We will discuss a number of issues and will try to figure out how we can address them.
By looking at various log analysis challenges, we will explore how visualization can help address a number of them; keeping in mind that log visualization is not just a science, but also an art. We will apply a security lens to look at a number of use-cases in the area of security visualization. From there we will discuss what else is needed in the area of visualization, where the challenges lie, and where we should continue putting our research and development efforts.
OpenStack security is a huge topic. In these slides I presented at the OpenStack Day, I analyzed cloud security the network to the application layer, going through specific layers, some in common between OpenStack itself and the applications.
Topics of this presentation:
- Fundamental concepts and principles.
- General architecture guidance.
- IoT applications component design.
- Cross-cutting issues.
This presentation by Andrii Antilikatorov (Consultant, Engineering, GlobalLogic) was delivered at GlobalLogic Kharkiv .NET TechTalk #1 on May 24, 2019.
Keeping your Enterprise’s Big Data Secure by Owen O’Malley at Big Data Spain ...Big Data Spain
Security is a tradeoff between usability and safety and should be driven by the perceived threats.
https://www.bigdataspain.org/2017/talk/keeping-enterprises-big-data-secure
Big Data Spain 2017
November 16th - 17th Kinépolis Madrid
Distributed Sensor Data Contextualization for Threat Intelligence AnalysisJason Trost
As organizations operationalize diverse network sensors of various types, from passive sensors to DNS sinkholes to honeypots, there are many opportunities to combine this data for increased contextual awareness for network defense and threat intelligence analysis. In this presentation, we discuss our experiences by analyzing data collected from distributed honeypot sensors, p0f, snort/suricata, and botnet sinkholes as well as enrichments from PDNS and malware sandboxing. We talk through how we can answer the following questions in an automated fashion: What is the profile of the attacking system? Is the host scanning/attacking my network an infected workstation, an ephemeral scanning/exploitation box, or a compromised web server? If it is a compromised server, what are some possible vulnerabilities exploited by the attacker? What vulnerabilities (CVEs) has this attacker been seen exploiting in the wild and what tools do they drop? Is this attack part of a distributed campaign or is it limited to my network?
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...Jason Trost
2015 is turning out to be the most spectacular year of high profile compromises across almost every vertical and many companies are starting to consider new options to raise the bar for intrusion detection and incident response, including deploying honeypots.
In this workshop we will present an overview of the current state of the art of leveraging open source tools to build a novel intrusion detection system inside the enterprise. We will discuss the pros/cons and ins/outs of several major open source honeypots as well as how to manage and deploy these sensors using the Modern Honey Network, Splunk, as well as integration into other systems such as ArcSight. We will discuss real world deployments of honeypots, what worked and what didn't as well as recommendations for getting the most out of these non-convention network sensors.
This is the slide deck used in my recent talks at 2600Edinburgh and DEFCON Glasgow.
The aim of this presentation is to provide a clear comparison of the most well known Internet-wide scanning tools: Censys, Shodan and ZoomEye. After this comparison, the talk then looks towards the potential use case is to
Template is from SlidesCarnival.
October 2014 Webinar: Cybersecurity Threat DetectionSqrrl
Using Sqrrl Enterprise and the GraphX library included in Apache Spark, we will construct a dynamic graph of entities and relationships that will allow us to build baseline patterns of normalcy, flag anomalies on the fly, analyze the context of an event, and ultimately identify and protect against emergent cyber threats.
Slides from the webinar led by Ely Kahn and Luis Maldonado discussing strategies to reduce Mean Time to Know in detecting cybersecurity attacks, threats, or data breaches.
Using Cisco pxGrid for Security Platform Integration: a deep diveCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. This session will cover: Functional and architectural basics of Cisco Platform Exchange Grid (pxGrid), the new publish/subscribe/query contextual information exchange framework for creating integration between DevNet Zone partner platforms and Cisco security products; Integration use-cases such as utilizing pxGrid for executing threat response actions on the network and using identity, endpoint device and user access privilege context to enhance our DevNet Zone partners analytics, forensics and reporting; First-hand developer perspective from DevNet Zone partner ID/IP who used pxGrid to integrate Ping Identity and Cisco Identity Services Engine.
Threat Hunting with Elastic at SpectorOps: Welcome to HELKElasticsearch
HELK offers another approach for advanced cyber-hunting analytics, focusing on the importance of data documentation, quality, and modeling when developing analytics and making sense of disparate data sources inside the contested environment.
Présentation de la suite ELK dans un contexte SIEM et zoom sur Wazuh (OSSEC) , IDS open source
Venez découvrir comment être proactif face aux problèmes de cyber sécurité en analysant les données fournies par vos équipements et applications critiques.
Naming, Search and Discovery in IoT: Issues and proposed solutions in the FP7...iotest
Naming, Search and Discovery in IoT: Issues and proposed solutions in the FP7 EU IoT.est Project, presented at the IERC AC2 meeting at the FIA (Future Internet Assembly), Aalborg, Denmark, 9 May 2012
Topics of this presentation:
- Fundamental concepts and principles.
- General architecture guidance.
- IoT applications component design.
- Cross-cutting issues.
This presentation by Andrii Antilikatorov (Consultant, Engineering, GlobalLogic) was delivered at GlobalLogic Kharkiv .NET TechTalk #1 on May 24, 2019.
Keeping your Enterprise’s Big Data Secure by Owen O’Malley at Big Data Spain ...Big Data Spain
Security is a tradeoff between usability and safety and should be driven by the perceived threats.
https://www.bigdataspain.org/2017/talk/keeping-enterprises-big-data-secure
Big Data Spain 2017
November 16th - 17th Kinépolis Madrid
Distributed Sensor Data Contextualization for Threat Intelligence AnalysisJason Trost
As organizations operationalize diverse network sensors of various types, from passive sensors to DNS sinkholes to honeypots, there are many opportunities to combine this data for increased contextual awareness for network defense and threat intelligence analysis. In this presentation, we discuss our experiences by analyzing data collected from distributed honeypot sensors, p0f, snort/suricata, and botnet sinkholes as well as enrichments from PDNS and malware sandboxing. We talk through how we can answer the following questions in an automated fashion: What is the profile of the attacking system? Is the host scanning/attacking my network an infected workstation, an ephemeral scanning/exploitation box, or a compromised web server? If it is a compromised server, what are some possible vulnerabilities exploited by the attacker? What vulnerabilities (CVEs) has this attacker been seen exploiting in the wild and what tools do they drop? Is this attack part of a distributed campaign or is it limited to my network?
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...Jason Trost
2015 is turning out to be the most spectacular year of high profile compromises across almost every vertical and many companies are starting to consider new options to raise the bar for intrusion detection and incident response, including deploying honeypots.
In this workshop we will present an overview of the current state of the art of leveraging open source tools to build a novel intrusion detection system inside the enterprise. We will discuss the pros/cons and ins/outs of several major open source honeypots as well as how to manage and deploy these sensors using the Modern Honey Network, Splunk, as well as integration into other systems such as ArcSight. We will discuss real world deployments of honeypots, what worked and what didn't as well as recommendations for getting the most out of these non-convention network sensors.
This is the slide deck used in my recent talks at 2600Edinburgh and DEFCON Glasgow.
The aim of this presentation is to provide a clear comparison of the most well known Internet-wide scanning tools: Censys, Shodan and ZoomEye. After this comparison, the talk then looks towards the potential use case is to
Template is from SlidesCarnival.
October 2014 Webinar: Cybersecurity Threat DetectionSqrrl
Using Sqrrl Enterprise and the GraphX library included in Apache Spark, we will construct a dynamic graph of entities and relationships that will allow us to build baseline patterns of normalcy, flag anomalies on the fly, analyze the context of an event, and ultimately identify and protect against emergent cyber threats.
Slides from the webinar led by Ely Kahn and Luis Maldonado discussing strategies to reduce Mean Time to Know in detecting cybersecurity attacks, threats, or data breaches.
Using Cisco pxGrid for Security Platform Integration: a deep diveCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. This session will cover: Functional and architectural basics of Cisco Platform Exchange Grid (pxGrid), the new publish/subscribe/query contextual information exchange framework for creating integration between DevNet Zone partner platforms and Cisco security products; Integration use-cases such as utilizing pxGrid for executing threat response actions on the network and using identity, endpoint device and user access privilege context to enhance our DevNet Zone partners analytics, forensics and reporting; First-hand developer perspective from DevNet Zone partner ID/IP who used pxGrid to integrate Ping Identity and Cisco Identity Services Engine.
Threat Hunting with Elastic at SpectorOps: Welcome to HELKElasticsearch
HELK offers another approach for advanced cyber-hunting analytics, focusing on the importance of data documentation, quality, and modeling when developing analytics and making sense of disparate data sources inside the contested environment.
Présentation de la suite ELK dans un contexte SIEM et zoom sur Wazuh (OSSEC) , IDS open source
Venez découvrir comment être proactif face aux problèmes de cyber sécurité en analysant les données fournies par vos équipements et applications critiques.
Naming, Search and Discovery in IoT: Issues and proposed solutions in the FP7...iotest
Naming, Search and Discovery in IoT: Issues and proposed solutions in the FP7 EU IoT.est Project, presented at the IERC AC2 meeting at the FIA (Future Internet Assembly), Aalborg, Denmark, 9 May 2012
INTRODUCTION TO INTERNET OF THINGS
Evolution of Internet of Things – Enabling Technologies – IoT Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT Models – Simplified IoT Architecture and Core IoT Functional Stack – Fog, Edge and Cloud in IoT
The Internet of Things (IoT) is a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity that allow these objects to collect and exchange data.
Why IoT?
With the development of technologies like M2M (machine-to-machine communication) and widespread of Internet, communication over long distance became possible.
This useful exchange of information across the globe with minimal human intervention led to an innovative concept called Internet of Things (IoT) where objects represent themselves as a digitally forming large network of connected devices that can communicate over the internet.
Components comprising IoT
IoT Hardware – These include sensors, micro-controller devices for control, servers, an edge or gateway.
IoT software – It includes mobile and web applications that are responsible for data collection, device integration, real-time analysis and application and process extension.
IoT Lifecycle
Collect: The life cycle of IoT starts with collecting data from different sources deployed in a particular region. These sources could be any sensors or device capable of transmitting data connected to a gateway. Data are efficiently collected and passed forward through a communication channel for analysis.
Communicate: This phase involves secure and reliable transfer of data. Routers, switches and firewall technologies play a vital role in establishing communication between devices. The Data is sent to the cloud or other data centers using the internet which is our major means of communication in IoT.
Analysis: This phase is an important part of the IoT lifecycle. In this phase data collected from different sensor devices are collected and analysed based on the use case to extract some useful output/information.
Action: This is the final stage of IoT lifecycle. Information obtained by the analysis of sensor data is acted upon and proper actions and measures are taken based on the analysis result.
Sensing WiFi Network for Personal IoT Analytics Fahim Kawsar
We present the design, implementation and evaluation of an enabling platform for locating and querying physical objects using existing WiFi network. We propose the use of WiFi management probes as a data transport mechanism for physical objects that are tagged with WiFi-enabled accelerometers and are capable of determining their state-of-use based on motion signatures. A local WiFi gateway captures these probes emitted from the connected objects and stores them locally after annotating them with a coarse grained location estimate using a proximity ranging algorithm. External applications can query the aggregated views of state-of-use and location traces of connected objects through a cloud-based query server. We present the technical architecture and algorithms of the proposed platform together with a prototype personal object analytics application and assess the feasibility of our different design decisions. This work makes important contributions by demonstrating that it is possible to build a pure network-based IoT analytics platform with only location and motion signatures of connected objects, and that the WiFi network is the key enabler for the future IoT applications.
Bridging the gap between Administrative and Operational IT
Vision, Architecure and Project experience. This slide deck shows our vision on this market for industrial enterprise IOT. Conclusion
Bridging the gap between Administrative and Operational IT
Vision, Architecure and Project experience. This slide deck shows our vision on this market for industrial enterprise IOT
Dr Matthew Berryman, IT Architect, presented an overview of his research as part of the SMART Seminar Series on 15 November 2016.
More information: http://smart.uow.edu.au/events/UOW223675.html
Asset Monitoring with Beacons, Lora, NodeJS and IoT CloudRobert van Mölken
In the Healthcare it is important to keep track of important assets like machines (Blood Pumps, AEDs, Ultrasound), commodities (wheelchairs, beds) and even high-risk patients. It’s an essential enterprise task that facilitates hardware management, maintenance, regulatory compliance, and security. A asset management solution can save companies time, money, and lots of management headaches. During this presentation I show the audience how we can connect the physical world to the web. Using beacons, sensors and LoRa to monitor and track assets and publish data to the Internet of Things Cloud Service. I demonstrate how, through multiple Node.js gateways, assets are registered, monitored and tracked inside and outside the hospital building.
FIWARE Developers Week_Managing context information at large scale_conferenceFIWARE
Managing context information at large scale presentation by Fermín Galán Márquez (@fermingalan) for Developers Week
(Madrid, March 2nd 2015)
www.fiware.org
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
2. FIWARE and the IoT
Service Enablement for the IoT
• Exposing information from sensor devices and “things” as consumable services.
› exposing also actuator devices for remote control.
• Allow applications to source information from heterogonous sources.
• Allow an IoT Infrastructure(s) to provide a shared pool of “IoT resources” i.e. sensor/actuator devices that are not used
only for a specific purpose.
› IoT infrastructures could consist of multiple systems and deployments which originally serve a particular use case.
› Enable them to be used in other use cases or “contexts”.
› Enable the consumption of “opportunistic” context, where context from a sensor device can be associated to a dynamic object at
a particular time and location
› E.g. a temperature sensor used to monitor the temperature of a room can be relevant to a person’s ambient temperature when (the “thing”) entering the
room.
• Enable the discovery of sensors/actuator and things
› Discover what contextual data is available, and get information on how to access.
› Enable brokerage on behalf of consumers to discover and retrieve complex sets of contextual data.
• Enable access to and control of sensor/actuator devices and Things.
› Constrained devices might not support the full IP stack
› or it’s limited power capacity could force limited access to it.
› Hence gateways (edge access devices) can act as a mediator.
• Enable pre-processing of data and event handling at the edge, for data aggregation and data summarization
› Allow the restriction of amount of data sent to the backend
› To minimize communication overhead.
› Report only on information that is required.
1
3. FIWARE IoT Architecture
2
Global access and control
management for devices
Registry for sensors
and things
Orchestrator for data
retrieval
Data handling and
complex event
processing
Local access and control management for
devices via constrained protocols
4. NGSI: Main Interface in FIWARE
NGSI (Next Generation Service Interface)
• Standardized suite of interfaces exposing device capabilities and network
resources.
• Originally specified by the OMA Mobile Alliance
• FIWARE has provided an implementation for 2 of the specified interfaces
› NGSI-9: enables the registration and discovery of available context entities
› NGSI-10: enables the submission and querying of contextual data
3
5. Main Roles in FIWARE IoT
IoT Context Producer
• A system entity that
› captures context information from the real world
› through sensor devices; e.g. temperature sensors
› Influences things in the real world
› through actuator devices, e.g. window control module
› Announces the availability and reachability of context information
IoT Context Consumer
• A system entity that
› Discovers sources of context information
› Consumes context information through service endpoints exposed
by IoT Context Providers or via context information brokers.
IoT GE:
• A system entity that
› Provides some form of IoT context management
› Context access/control, processing, registration, orchestration
4
6. IoT Discovery
A service discovery mechanism (SDM)
• About availability of context sources/influencers i.e.
sensor or actuator devices.
• Allow context producers to register
› Describe what attributes of an entity can be queried
› Specific metadata associated with them; e.g. unit, resolution,
location etc.
› Provide endpoint for invoking the IoT context service.
• Allow context consumers to discover
Synonyms
• Registry, directory, catalogue, repository.
Analogies
• “Yellow pages”: Info about service(s) provided, and
how to contact them.
• Searching for Web content using search engines
› Search engines point to relevant sources of Web content.
5
7. 6
Target Users
Context Producers
• IoT Agent/Data Handling GE
› Exposes a service endpoint for data/actuation provision via NGSI-10 (“data interface”)
› e.g. gateway
› Register resources; sensing sources, actuators, processing elements (composite of sensing
sources)
• Backend Device Management GE
› Register sensing/actuator devices,
Context Consumers
• Applications
› Directly discover what context sources are available and for how long.
• IoT Broker GE
› Discovers and retrieves data from multiple context sources on behalf of the consumer
› offers consumers a simple interface and masking the complexity and heterogeneity of the IoT
• Data Context Broker GE
› Subscribes for notification of context source availability directly for simple request, or via the IoT
Broker for more complex requests.
9. Usage Scenario (2)*
An application could invoke the data context broker about a set of entities and
their corresponding attributes
If the data context broker does not have the match to the query, it will invoke
an IoT infrastructure that employ the FIWARE IoT framework.
The first point of contact in the IoT infrastructure can be either the IoT Broker
or IoT Discovery.
• For a simple discovery request it could contact IoT Discovery directly
• For more complex requests, it would forward the original request from the
application to the IoT Broker
› The IoT Broker will handle the discovery process with IoT Discovery via the NGSI-9
interface
› and thereafter the retrieval of the context in question from an IoT gateway via the NGSI-10
interface
8
* From FIWARE wiki on IoT Architecture
10. Other scenario
An application could directly contact an IoT infrastructure by invoking either
the IoT Broker or IoT Discovery, depending on the complexity of the request
• Use NGSI-9 for context discovery or NGSI-10 for context query via IoT Broker
• Use NGSI-9 for context discovery via IoT Discovery
• If application directly invokes IoT Discovery for context discovery, it will need to use
NGSI-10 to invoke the context source.
› Context source endpoint provided with discovery response (if match found)
9
11. 10
Interfaces/APIs (Main)
NGSI-9
• Mainly adopted by GEs in the FIWARE architecture for context discovery
• Discover what sensors and things are available
› Before querying for data
› Know where actual context sources are
› Not only relying on Context Broker
› Know what entities are available and what attributes they have beforehand
› Avoid unnecessary network overload of IoT services.
› IoT Services might be constrained
Serialization in XML or JSON
Release 4
• Geolocation
12. 11
Interfaces/APIs (Semantic)
Sense2Web API v1 (Release 3)
• For sematic context discovery
› Discover what sensors and things are available
• Adopts the IoT-A ontology for modelling IoT entities.
• RESTful CRUD operations for registering, updating, looking up and deleting
semantically-annotated context descriptions
• RESTful SPARQL endpoint for querying
• Association mechanism matches “things” with services that are co-located and
share the same attribute (e.g. ambient temperature of a person co-located with a
temperature sensor)
• Probabilistic search based on text analysis of registered descriptions.
Sense2Web API v2 (Release 4 – Oct’15)
• Context producers can submit annotated information using simpler formats
› CSV, JSON
• Content negotiation through header fields
• Adopts a simpler model for IoT devices and things
13. Examples
Streetlight scenario
• Sensors on streetlight used for measuring luminosity
› One for daylight level to check for transition from/to twilight period
› One for light luminosity to check correct level is set
• An application could provide the most brightest routes for late
pedestrians
› consume a set of IoT services that provide information about the light
intensity in a particular area.
› Application discovers what sensor devices are available in the area
› Application can then query the sensor devices for sensed light level using the
endpoint retrieved form the discovery process.
12
http://www.myledlightingguide.com/images2/StreetLight1.jpg