This is the third part of a Future Internet Tutorial presented at IWT 2011. See: www.inatel.br/iwt
The Internet has invaded most aspects of life and society, changing our lifestyle, work, communication and social interaction and giving us expectations about new forms of interactions and access to global knowledge. Application and user demands on the Internet are increasing with mobile technologies and media content. Nevertheless, the Internet today is a complex agglomerate of protocols that inherits the grown legacies of decades of patchwork solutions.
There is a common consensus that the Internet needs improvement. Nevertheless, there is not yet a shared vision on how this may happen. As a direct consequence research programs have started worldwide to re-think traditional Internet design principles and to come up with new architectural concepts for the so-called Future Internet (FI).
The Future Internet Tutorial provides an overview of Future Internet research directions and trends. It presents the Future Internet research initiatives around the world and the efforts to establish experimental facilities for FI research. The tutorial gives an introduction to new Future Internet architectures that are currently under discussion and related technologies. Among the approaches discussed are addressing and routing concepts, adaptability, autonomicity, self-*, *-aware and manageability, virtualization, neutrality, openness, diversity, extendibility, flexibility and evolvability. The tutorial also presents some interdisciplinary aspects related to artificial general intelligence and bio-inspired ICT.
www.inatel.br/iwt
Internet of Information and Services (IoIS): A Conceptual Integrative Archite...Antonio Marcos Alberti
Worldwide, hundreds of projects to redesign the Internet are in progress under the banner of the so-called Future Internet. Some argue that the most important thing is to the design to accommodate information exchanging, a.k.a. information-centrism. Others argue that the most important thing is to design to accommodate service-based applications. In this talk, we defend the idea that the most important thing is to design to integrate both aspects in a cohesive way. To do so, architectural blueprints should be able to solve indirections generally, to allow mobility and semantic rich search for services and contents, as well as location, hiring and dynamic invocation of services. We propose a single conceptual architecture capable of integrating the service- and information-centric approaches for the Future Internet. We call this approach as Internet of Information and Services (IoIS).
Pervasive computing is the growing trend towards embedding microprocessors in everyday objects so they can communicate information.
The words pervasive and ubiquitous mean "existing everywhere”.
It is also called “Ubiquitous computing”
Distributed Computing “two or more computers communicating and co-ordinating by message passing”.
Its also called as "Parallel computing”.
Internet of Information and Services (IoIS): A Conceptual Integrative Archite...Antonio Marcos Alberti
Worldwide, hundreds of projects to redesign the Internet are in progress under the banner of the so-called Future Internet. Some argue that the most important thing is to the design to accommodate information exchanging, a.k.a. information-centrism. Others argue that the most important thing is to design to accommodate service-based applications. In this talk, we defend the idea that the most important thing is to design to integrate both aspects in a cohesive way. To do so, architectural blueprints should be able to solve indirections generally, to allow mobility and semantic rich search for services and contents, as well as location, hiring and dynamic invocation of services. We propose a single conceptual architecture capable of integrating the service- and information-centric approaches for the Future Internet. We call this approach as Internet of Information and Services (IoIS).
Pervasive computing is the growing trend towards embedding microprocessors in everyday objects so they can communicate information.
The words pervasive and ubiquitous mean "existing everywhere”.
It is also called “Ubiquitous computing”
Distributed Computing “two or more computers communicating and co-ordinating by message passing”.
Its also called as "Parallel computing”.
The Presentation focusses on the development from current mobile networks into the future sensor-driven mobile networks. A special focus is given on security aspects, especially measurable security of systems. The presentation was given at the IDC Mobility Series 2012 in Budapest.
The presentation provides an overview on areas for Master Thesis work at UNIK in the areas of Wireless Networks and Information Security (WNIS). Students from UiO, NTNU or any of our collaboration partners are invited to take contact to define a study in one of these areas. Some of these areas include:
* Radio communication, including
- Communication in the high North, advancing propagation models
- models and protocols for industrial sensor networks
- heterogeneous and adaptive networks
- Internet access and provision for emerging economies
* The 3rd wave of Internet: the Internet of People, Things and Services
- providing context-awareness for mobile and business services
- Socialtainment, integrating your social network into future (electrical) mobility
* Information Security
- establish measurable security for the sensor networks
- adaptable security for sensor-driven applications in traffic, eHealth
* Mobile Applications
- Monitoring Air Quality through mobile devices
- using mobile phones for health monitoring (and fun)
* Light-weight solutions for autonomous operations
- distributed logic for decentralised decision making
- light-weight software for autonomous operations
- semantic systems for advanced information handling in shipping
- in Norwegian
Disse foilene inneholder områder for masteroppgaver som kan gjennomføres ved UNIK, forskningsinstitutter ved Kjeller eller samarbeidene industri. Vi tilbyr masteroppgaver i området adaptive nett og informasjonssikkerhet.
Ubiquitous computing is one of the most prodiously growing topic which will be covering all facets of life.In the course of ordinary activities, someone "using" ubiquitous computing engages many computational devices and systems simultaneously, and may not necessarily even be aware that they are doing so. This model is considered an advancement from the older desktop paradigm. More formally, ubiquitous computing is defined as "machines that fit the human environment instead of forcing humans to enter theirs".
The year of the Internet of Things; The Internet of Things probably already influences your life. And if it doesn’t, it soon
will, say computer scientists; Ubiquitous computing names the third wave in computing, just now beginning. First were
mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at
each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into
the background of our lives. Alan Kay of Apple calls this "Third Paradigm" computing.
Ubiquitous computing is essentially the term for human interaction with computers in virtually everything.
Ubiquitous computing is roughly the opposite of virtual reality. Where virtual reality puts people inside a computer-generated
world, ubiquitous computing forces the computer to live out here in the world with people. Virtual reality is primarily a horse
power problem; ubiquitous computing is a very difficult integration of human factors, computer science, engineering, and social
sciences.
The approach: Activate the world. Provide hundreds of wireless computing devices per person per office, of all scales (from 1"
displays to wall sized). This has required new work in operating systems, user interfaces, networks, wireless, displays, and many
other areas. We call our work "ubiquitous computing". This is different from PDA's, dynabooks, or information at your
fingertips. It is invisible; everywhere computing that does not live on a personal device of any sort, but is in the woodwork
everywhere. The initial incarnation of ubiquitous computing was in the form of "tabs", "pads", and "boards" built at Xerox
PARC, 1988-1994. Several papers describe this work, and there are web pages for the Tabs and for the Boards (which are a
commercial product now):
Ubiquitous computing will drastically reduce the cost of digital devices and tasks for the average consumer. With laborintensive
components such as processors and hard drives stored in the remote data centers powering the cloud , and with pooled
resources giving individual consumers the benefits of economies of scale, monthly fees similar to a cable bill for services that
feed into a consumer’s phone
www.itu.int/en/Lists/consultation2015/Attachments/41/45.3104.pdf
http://docplayer.net/search/?q=assem+abdel+hamed+mousa
https://www.waset.org/abstracts/5638
http://www.ipoareview.org/wp-content/uploads/2016/05/Statement-by-Dr.Assem-Abdel-Hamied-Mousa-President-of-the-Association-of-Scientists-Developers-and-FacultiesASDF.pdf
Pervasive computing also known as Ubiquitous computing (ubicomp) is a concept in software engineering and computer science where computing is made to appear everywhere and anywhere. Eg:laptop computers, tablets and terminals in everyday objects such as a fridge or a pair of glasses.
•It is also termed as ambient intelligence, Ubiquitous computing ,everyware,physical computing, the Internet of Things, haptic computing, and 'things that think’.
Towards Abundant Do-it-Yourself (DiY) Service Creativity in the Internet-of-T...trappenl
A profound impact of the Web2.0 lies in its power to transform skilled users into service providers, resulting in more complex value networks. As recently traditional “operated” network infrastructure is complemented with huge amounts of connected smart objects (the Internet-of-Things), the same mass creativity can be made applicable to smart, context-enabled services with real-world interactivity, collaboratively created by end users with varying degrees of programming skills. We report on a vision and solutions addressing easy, do-it-yourself service creation by the masses in an Internet-of-Things enabled world, from which we discuss the (i) value networks, (ii) enabling technology framework, and (iii) domain-specific proof-of-concepts.
Internet das Coisas e o Paradigma Software-Defined Everything (SDE)Antonio Marcos Alberti
Palestra apresentada na quinta-feira técnica na sede do Banco do Brasil em Brasilia. Cobre a relação entre Internet of Things (IoT) e arquiteturas software-defined. Apresenta a proposta NovaGenesis como solução à integração desses dois paradigmas.
IoT Challenges: Technological, Business and Social aspectsRoberto Minerva
Internet of Things is promising to be a set of technologies able to have a high impact on how people live, produce, modify and interact with the environment. Such a transformation is driven by increasing technologies capabilities of sensors/actuators, communications, general-purpose hardware, availability of software and programmability of devices. The integration of so different technologies is a problem in itself and IoT is also trying to solve cogent issues of specific problem domains, such as e-health, transportation, manufacturing, and so on. Large IoT systems (e.g., smart cities) stand on their own because the smartness requires integration of different technologies, processes and different administrative domains creating the needs to deal with a complex system. In addition to technological and problem domain specific challenges, there exist further challenges that fall in business, social and regulation realms. They can greatly impact the deployment and the success of IoT deployment. The speech aims at providing a view on some major technologies challenges of IoT and to cover a few critical business and social issues that could hamper the large deployment of IoT systems by providing some examples of implementation.
The Presentation focusses on the development from current mobile networks into the future sensor-driven mobile networks. A special focus is given on security aspects, especially measurable security of systems. The presentation was given at the IDC Mobility Series 2012 in Budapest.
The presentation provides an overview on areas for Master Thesis work at UNIK in the areas of Wireless Networks and Information Security (WNIS). Students from UiO, NTNU or any of our collaboration partners are invited to take contact to define a study in one of these areas. Some of these areas include:
* Radio communication, including
- Communication in the high North, advancing propagation models
- models and protocols for industrial sensor networks
- heterogeneous and adaptive networks
- Internet access and provision for emerging economies
* The 3rd wave of Internet: the Internet of People, Things and Services
- providing context-awareness for mobile and business services
- Socialtainment, integrating your social network into future (electrical) mobility
* Information Security
- establish measurable security for the sensor networks
- adaptable security for sensor-driven applications in traffic, eHealth
* Mobile Applications
- Monitoring Air Quality through mobile devices
- using mobile phones for health monitoring (and fun)
* Light-weight solutions for autonomous operations
- distributed logic for decentralised decision making
- light-weight software for autonomous operations
- semantic systems for advanced information handling in shipping
- in Norwegian
Disse foilene inneholder områder for masteroppgaver som kan gjennomføres ved UNIK, forskningsinstitutter ved Kjeller eller samarbeidene industri. Vi tilbyr masteroppgaver i området adaptive nett og informasjonssikkerhet.
Ubiquitous computing is one of the most prodiously growing topic which will be covering all facets of life.In the course of ordinary activities, someone "using" ubiquitous computing engages many computational devices and systems simultaneously, and may not necessarily even be aware that they are doing so. This model is considered an advancement from the older desktop paradigm. More formally, ubiquitous computing is defined as "machines that fit the human environment instead of forcing humans to enter theirs".
The year of the Internet of Things; The Internet of Things probably already influences your life. And if it doesn’t, it soon
will, say computer scientists; Ubiquitous computing names the third wave in computing, just now beginning. First were
mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at
each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into
the background of our lives. Alan Kay of Apple calls this "Third Paradigm" computing.
Ubiquitous computing is essentially the term for human interaction with computers in virtually everything.
Ubiquitous computing is roughly the opposite of virtual reality. Where virtual reality puts people inside a computer-generated
world, ubiquitous computing forces the computer to live out here in the world with people. Virtual reality is primarily a horse
power problem; ubiquitous computing is a very difficult integration of human factors, computer science, engineering, and social
sciences.
The approach: Activate the world. Provide hundreds of wireless computing devices per person per office, of all scales (from 1"
displays to wall sized). This has required new work in operating systems, user interfaces, networks, wireless, displays, and many
other areas. We call our work "ubiquitous computing". This is different from PDA's, dynabooks, or information at your
fingertips. It is invisible; everywhere computing that does not live on a personal device of any sort, but is in the woodwork
everywhere. The initial incarnation of ubiquitous computing was in the form of "tabs", "pads", and "boards" built at Xerox
PARC, 1988-1994. Several papers describe this work, and there are web pages for the Tabs and for the Boards (which are a
commercial product now):
Ubiquitous computing will drastically reduce the cost of digital devices and tasks for the average consumer. With laborintensive
components such as processors and hard drives stored in the remote data centers powering the cloud , and with pooled
resources giving individual consumers the benefits of economies of scale, monthly fees similar to a cable bill for services that
feed into a consumer’s phone
www.itu.int/en/Lists/consultation2015/Attachments/41/45.3104.pdf
http://docplayer.net/search/?q=assem+abdel+hamed+mousa
https://www.waset.org/abstracts/5638
http://www.ipoareview.org/wp-content/uploads/2016/05/Statement-by-Dr.Assem-Abdel-Hamied-Mousa-President-of-the-Association-of-Scientists-Developers-and-FacultiesASDF.pdf
Pervasive computing also known as Ubiquitous computing (ubicomp) is a concept in software engineering and computer science where computing is made to appear everywhere and anywhere. Eg:laptop computers, tablets and terminals in everyday objects such as a fridge or a pair of glasses.
•It is also termed as ambient intelligence, Ubiquitous computing ,everyware,physical computing, the Internet of Things, haptic computing, and 'things that think’.
Towards Abundant Do-it-Yourself (DiY) Service Creativity in the Internet-of-T...trappenl
A profound impact of the Web2.0 lies in its power to transform skilled users into service providers, resulting in more complex value networks. As recently traditional “operated” network infrastructure is complemented with huge amounts of connected smart objects (the Internet-of-Things), the same mass creativity can be made applicable to smart, context-enabled services with real-world interactivity, collaboratively created by end users with varying degrees of programming skills. We report on a vision and solutions addressing easy, do-it-yourself service creation by the masses in an Internet-of-Things enabled world, from which we discuss the (i) value networks, (ii) enabling technology framework, and (iii) domain-specific proof-of-concepts.
Internet das Coisas e o Paradigma Software-Defined Everything (SDE)Antonio Marcos Alberti
Palestra apresentada na quinta-feira técnica na sede do Banco do Brasil em Brasilia. Cobre a relação entre Internet of Things (IoT) e arquiteturas software-defined. Apresenta a proposta NovaGenesis como solução à integração desses dois paradigmas.
IoT Challenges: Technological, Business and Social aspectsRoberto Minerva
Internet of Things is promising to be a set of technologies able to have a high impact on how people live, produce, modify and interact with the environment. Such a transformation is driven by increasing technologies capabilities of sensors/actuators, communications, general-purpose hardware, availability of software and programmability of devices. The integration of so different technologies is a problem in itself and IoT is also trying to solve cogent issues of specific problem domains, such as e-health, transportation, manufacturing, and so on. Large IoT systems (e.g., smart cities) stand on their own because the smartness requires integration of different technologies, processes and different administrative domains creating the needs to deal with a complex system. In addition to technological and problem domain specific challenges, there exist further challenges that fall in business, social and regulation realms. They can greatly impact the deployment and the success of IoT deployment. The speech aims at providing a view on some major technologies challenges of IoT and to cover a few critical business and social issues that could hamper the large deployment of IoT systems by providing some examples of implementation.
Presentation "Why We Have to Embrace Complexity for Reliability, Availability and Serviceability of Future Networks and 5G" (Bologna, 3rd July, 2017 - IEEE ETR round table
The Five forces that shape StrategyRivalry among existing cocarmanl5wisc
The Five forces that shape Strategy
Rivalry among existing competitors
Threat of new entrants
Bargaining power of supplies
Bargaining power of buyers
Threat of substitute products or services
Emerging and Converging
Technologies
Chapter 12 examines ethical aspects of three key
emerging/converging technologies:
ambient intelligence (AmI),
nanocomputing,
autonomous machines (AMs).
This chapter also examines issues in the emerg-
ing field of machine ethics, and it describes a
“dynamic” ethical framework for addressing chal-
lenges likely to arise from emerging technologies.
Converging Technologies and
Technological Convergence
Before examining specific emerging and
converging technologies, we first consider
what is meant by the concept of
“technological convergence.”
Howard Rheingold (1992) notes that
technological convergence occurs when
unrelated technologies or technological paths
intersect or “converge unexpectedly” to create an
entirely new field.
Technological Convergence
(Continued)
We should note that convergence in the context of
cybertechnology is by no means new or even recent,
but it has been ongoing since this technology’s
inception.
For example, in Chapter 1 we saw that early network
technologies resulted from the convergence of
computing and communications technologies in the
late 1960s and early 1970s.
Howard Rheingold notes that virtual-reality (VR)
technology (examined in Chapter 11) resulted from
the convergence of video technology and computer
hardware in the 1980s.
Converging Technologies and
Pervasive Computing
Currently, cybertechnology is converging with
non-cybertechnologies at an unprecedented
pace.
For example, cyber-specific technologies are
converging with non-cybertechnologies, such as
biotechnology and nanotechnology.
Cybertechnology is also becoming pervasive and
ubiquitous as computing devices now permeate
both our public and private spaces (in connection
with ambient-intelligence-related technologies).
1. Ambient Intelligence (AmI)
Ambient Intelligence (AmI) is typically defined as a
technology that
enables people to live and work in environments
that respond to them in “intelligent ways” (Aarts
and Marzano, 2003; Brey, 2005; and Weber et al.,
2005).
Review the example in the textbook of the
(hypothetical) “intelligent home,” which incoprpoates
key aspects of (and is made possible by) AmI.
Also review Scenario 1-1 in the textbook, which
illustrates an instance of the Internet of Tings (IoT)
and which is made possible, in large part, by AmI.
AmI (Continued)
AmI has benefited from, and has been made
possible by, developments in the field of arti-
ficial intelligence (AI), described in Chap. 11.
AmI has also benefited from the convergence
of three key technological components, which
underlie it:
1) pervasive computing,
2) ubiquitous communication, ...
In this presentation, Akash introduces the concept of IoT and associated trends. Akash's interest areas lie in IoT applications in security, home appliances and Troubleshooting.
Small, Dumb, ¬¬Cheap, and Copious – the Future of the Internet of Things,
Abstract
Over the next decade, billions of interconnected devices will be monitoring and responding to transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans, and other resources.
The unique characteristic that the majority of these otherwise incredibly diverse Internet of Things (IOT) devices will share is that they will be too small, too dumb, too cheap, and too copious to use traditional networking protocols such as IPv6.
For the same reasons, this tidal wave of IOT devices cannot be controlled by existing operational techniques and tools. Instead, lessons from Nature’s massive scale will guide a new architecture for the IOT.
Taking cues from Nature, and in collaboration with our OEM licensees, MeshDynamics is extending concepts outlined in the book “Rethinking the Internet of Things” to real-world problems of supporting “smart: secure and scalable” IOT Machine-to-Machine (M2M) communities at the edge.
Simple devices, speaking simply
Today companies view the IOT as an extension of current networking protocols and practices. But those on the front lines of the Industrial Internet of Things are seeing problems already:
“While much of the ink spilled today is about evolutionary improvements using modern IT technologies to address traditional operational technology concerns, the real business impact will be to expand our horizon of addressable concerns. Traditional operational technology has focused on process correctness and safety; traditional IT has focused on time to market and, as a recent concern, security. Both disciplines have developed in a world of relative scarcity, with perhaps hundreds of devices interconnected to perform specific tasks. The future, however, points toward billions of devices and tasks that change by the millisecond under autonomous control, and are so distributed they cannot be tracked by any individual. Our existing processes for ensuring safety, security and management break down when faced with such scale. Stimulating the redevelopment of our technologies for this new world is a focal point for the Industrial Internet Consortium.”
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
Tutorial on Internet of Thing (IoT) Paradigm in Consumer ApplicationsRaffaele Giaffreda
Tutorial on Internet of Thing (IoT) Paradigm in Consumer Applications given at 11th IEEE Consumer Communication and Networking Conference 2014 - Las Vegas. R.Giaffreda slides subset
Aconteceu entre 18 e 20 de novembro de 2022 em Tiradentes-MG a 7a edição do Fórum do Amanhã. Slides de minha apresentação no painel sobre Metaeconomia e 6G comigo e o @courtnayguimaraes. A Meta Economia é digital, em rede, e ao mesmo tempo interage com objetos físicos (TVs com internet, celulares dentro de carros, por exemplo). Com pessoas como produtoras e consumidoras, sendo produtos e clientes ao mesmo tempo. Seu combustível é a mente humana, criando e recriando o conceito de O QUANTO ISSO VALE PARA MEU BOLSO, TEMPO, ENERGIA MENTAL E QUALIDADE DE VIDA. Como especialistas, debateremos neste painel as forças, as tendências, os fluxos e refluxos dessa economia que envolve as big techs, os chamados tec countries e também o que esse ultra complexo sistema emergente de 4,5 bilhões de pessoas hyper conectadas têm a nos mostrar sobre o presente e o futuro dos modelos econômicos. Apresentei uma fala sobre 6G baseada nos trabalhos do projeto inatel.br/brasil6g: princípios de projeto, casos de uso, principais habilitadores tecnológicos e arquiteturas. Diferenças em relação ao 5G.
Este minicurso vai explorar o projeto de arquiteturas de informação convergentes, incluindo: escopos de projeto, habilitadores tecnológicos, princípios de desenho, decisões de projeto, arquiteturas evolucionárias e disruptivas para 6G e além. Como integrar de forma sinérgica as principais tecnologias emergentes para novas arquiteturas: IA, DLT, Gêmeos Digitais, SDN, NFV, novos computadores (quânticos, neuromórficos, IPUs), IoT, resolução de nomes, cache de rede, redes centradas em informação, service-oriented architectures, O-RAN, SON, novas constelações satelitais, etc. Discussão baseada nos resultados do Projeto Brasil 6G e SINDISAT C. Novas aplicações. Lições aprendidas e oportunidades de pesquisa. Por fim, discute-se brevemente os impactos dessas novas arquiteturas na sociedade: transformação digital, sistêmica, colaborativa, compartilhada, hiperconvergente. Pontos de partida e reflexões para a convergência completa. Futuros desejáveis.
Palestra Transformação Digital no The Developer Conferece (TDC) - FutureAntonio Marcos Alberti
Engenheiro, professor, coordenador do ICT Laboratory do Inatel e programador C/C++. É doutor em Eletrônica e Telecomunicações pela Unicamp e pós-doutor pelo Electronics and Telecommunications Research Institute (ETRI) da Coréia do Sul. Autor de mais de 100 artigos científicos. Colunista do Olhar Digital, EngenhariaÉ e Futurecom Digital. Pai da arquitetura NovaGenesis. Contribuiu para documento de requisitos para Internet do Futuro na Coréia do Sul e nas discussões iniciais do Plano Nacional de M2M/IoT. Criador do movimento de empreendedorismo social em rede chamado Renascidade e autor da parte técnica do projeto de Integração de Soluções IoT para Cidades Inteligentes financiado pelo BNDES. Hacker de tendências, pioneiro Internet do futuro.
Overview of NovaGenesis future Internet architecture. NovaGenesis (NG) is an alternative information architecture that covers data processing, exchanging and storage. The project has idealized an alternative architecture for the current Internet and has been demonstrated viable for IoT and cognitive radio. NG has been evaluated as an alternative to domain name service (DNS), named-data routing and network caching (for efficient content distribution) and software-defined networks. Due to its service-oriented design (SOD) with support for virtualization, software-defined networking and virtual network functions, it can be seen as a 5G architecture as well. In this context, NovaGenesis is a “clean slate” architecture that cohesively integrates many novel ingredients at its core, including exposition of physical things to software, programmable networks (SDN and NFV), service-defined architecture (SDA), ICN, SOA, SCN, IoT, SON, among others.
Read more:
https://www.linkedin.com/pulse/6-questions-novagenesis-information-architecture-alberti/
https://www.linkedin.com/pulse/novagenesis-new-beginning-digital-realm-antonio-marcos-alberti/
https://www.mdpi.com/1424-8220/18/9/3160
Como as tecnologias disruptivas criam abundância? Como a abundância está desafiando os modelos estabelecidos?
Avanços exponenciais -> Abundância -> Disrupção e Softwarization -> Servitization
SDN, NFV -> Network Slicing e NaaS. Demos de criação de fatia em 90 minutos do Projeto VITAL usando combinação de SDN e NFV. Contratação via um portal com dash board.
Blockchain e pós Blockchain: IOTA. IRTF DINRG - Decentralized Internet Infrastructure e Lojas de NFV do Projeto TIP - Telecom Infrastructure Project. Gêmeos digitais e assistentes pessoais. IA para otimizar.
Rentabilização do network slicing: Alocação dinâmica e monetização sobre demanda de slices com uso de IA via gêmeos digitais de coisas e organizações.
Como aproveitar o NaaS pra criar novos fluxos de receita e obter eficiências de rede: Pensar de forma abundante/exponencial para criar novos modelos que favoreçam novos fluxos de receita.
Qual o impacto da IoT: IoT é o sistema sensorial e motor. Irá gerar contexto e tendências para a tomada de decisão, incluindo as melhores políticas de compartilhamento do físico e virtual. O físico reflete o complexo jogo dos serviços. A melhor configuração do físico é aquela que maximiza o uso com qualidade.
Quais novos modelos de precificação poderão ser explorados: Precificação é decorrente da dinâmica da economia de serviços, economia de dados, economia das coisas, funções virtuais de rede, recursos físicos disponíveis expostos via gêmeos digitais. A dinâmica na economia do intangível é feita de forma autonômica.
Tecnologias disruptivas e suas relações com Inteligência Artificial e Inteligência Artificial Geral no contexto de cidades inteligentes, criativas, sustentáveis e felizes. Gentileza citar a fonte quando utilizar o material.
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?Antonio Marcos Alberti
Overview of emerging techs for hibrid 5G. Examples of projects covering this issue. An analysis of what is missing in 5G, including blockchain, smart contracts, service-centric networking, information-centric networking, P4, etc. Talk giving at #5GLATAM.
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...Antonio Marcos Alberti
Internet das Coisas, Orientação a Serviços, Inteligência Artificial ou Blockchain? Não faz mais sentido pensar nessas tecnologias isoladamente... Devemos pensar em soluções convergentes, sinérgicas, integradoras. Nessa palestra, abordaremos possíveis sinergias entre essas tecnologias disruptivas, discutindo uma arquitetura convergente com IA em uma ponta, blockchain e Big Data na outra. Ainda, IoT alimentando as duas. Tudo isso com elasticidade de cloud/fog computing. Tudo como um serviço. Os equipamentos devem ser programáveis e devemos abusar da virtualização. Por fim, tudo isso poderia ficar no núcleo da Internet, na forma de uma nova pilha que inclui protocolos de comunicação inteligentes e evolucionários. Visão geral do projeto NovaGenesis, arquitetura convergente de informação.
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...Antonio Marcos Alberti
Internet of things is a disruptive technology that is impacting many verticals in modern economy. The future of IoT can be evolutionary or revolutionary. Evolutionary means to keep backward compatibility with current Internet technologies, while revolutionary means novel architectures that deeply redesign the status quo. In this paper, we experimentally evaluate a future Internet of things approach called NovaGenesis. For this aim, we employ virtual sensors (emulated in software) to demonstrate a service-defined IoT architecture based on smart objects, self-verifying naming, dynamic resource and services orchestration, software-defined control and contract-based operation. In this paper, we aim at verifying scalability of NovaGenesis distributed temporary cache. Presented results suggest NovaGenesis hash table service can provide the required scalability in a local domain.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…